Security Is Not Enough: Privacy in Encryption Regulation and Lawful-Surveillance Protocols
Artur Pericles L. Monteiro
This article argues that security is not enough to fully capture what is at stake in government exceptional access to encrypted data. A conception of privacy as security has little to say about ``lawful-surveillance protocols'' -- an active research agenda in cryptography that aims to enable government exceptional access without compromising systemic security. But the limitations are not contingent on the success of this agenda. The normative landscape today cannot be explained if security is all there is to privacy. And fundamental objections to Apple's abandoned client-side scanning system gesture beyond security. This article's contribution is modest: to show that there must be more to privacy than the security mold it has taken. A richer understanding is needed both to assess policy and to guide research on lawful-surveillance protocols.
Scaling Law for Quantization-Aware Training
Mengzhao Chen, Chaoyi Zhang, Jing Liu
et al.
Large language models (LLMs) demand substantial computational and memory resources, creating deployment challenges. Quantization-aware training (QAT) addresses these challenges by reducing model precision while maintaining performance. However, the scaling behavior of QAT, especially at 4-bit precision (W4A4), is not well understood. Existing QAT scaling laws often ignore key factors such as the number of training tokens and quantization granularity, which limits their applicability. This paper proposes a unified scaling law for QAT that models quantization error as a function of model size, training data volume, and quantization group size. Through 268 QAT experiments, we show that quantization error decreases as model size increases, but rises with more training tokens and coarser quantization granularity. To identify the sources of W4A4 quantization error, we decompose it into weight and activation components. Both components follow the overall trend of W4A4 quantization error, but with different sensitivities. Specifically, weight quantization error increases more rapidly with more training tokens. Further analysis shows that the activation quantization error in the FC2 layer, caused by outliers, is the primary bottleneck of W4A4 QAT quantization error. By applying mixed-precision quantization to address this bottleneck, we demonstrate that weight and activation quantization errors can converge to similar levels. Additionally, with more training data, weight quantization error eventually exceeds activation quantization error, suggesting that reducing weight quantization error is also important in such scenarios. These findings offer key insights for improving QAT research and development.
Parametric Scaling Law of Tuning Bias in Conformal Prediction
Hao Zeng, Kangdao Liu, Bingyi Jing
et al.
Conformal prediction is a popular framework of uncertainty quantification that constructs prediction sets with coverage guarantees. To uphold the exchangeability assumption, many conformal prediction methods necessitate an additional holdout set for parameter tuning. Yet, the impact of violating this principle on coverage remains underexplored, making it ambiguous in practical applications. In this work, we empirically find that the tuning bias - the coverage gap introduced by leveraging the same dataset for tuning and calibration, is negligible for simple parameter tuning in many conformal prediction methods. In particular, we observe the scaling law of the tuning bias: this bias increases with parameter space complexity and decreases with calibration set size. Formally, we establish a theoretical framework to quantify the tuning bias and provide rigorous proof for the scaling law of the tuning bias by deriving its upper bound. In the end, we discuss how to reduce the tuning bias, guided by the theories we developed.
A Study on the Coexistence of Monument Protection and Energy in Southern Germany's the Old Town—Focusing on Installation Requirements for Rooftop PV
Mamiko Numata
ABSTRACT The purpose of this study is to gain knowledge about the coexistence of monument protection and energy in southern Germany's Old Town through resident intentions, laws, and permit decision criteria. First, there is a movement to allow rooftop PV on buildings in the Old Town. Next, there are two requirements for rooftop PV installation under the Old Town Protection Law: (1) building evaluation of monument protection and impact on surrounding buildings, etc. and (2) visibility from public spaces. It has become clear that the expansion of the interpretation of “public space” as a viewpoint is protecting historic buildings.
Architecture, Architectural engineering. Structural engineering of buildings
Potencialidades y limitaciones de la aplicación de la reconstrucción cráneo-facial en la investigación forense
Gustavo Faúndez Salinas
La evidencia en una investigación forense, exige el desarrollo y la aplicación de un análisis crítico de las imágenes, así como el estudio de su circulación y transformación.
Este trabajo plantea la necesidad de contextualizar el desarrollo histórico de la reconstrucción cráneo-facial, en el marco de las técnicas biométricas y de identificación facial y evaluar las posibilidades y limitaciones, que trae consigo su aplicación forense.
Se propone una puesta en contexto de las aplicaciones más recientes de la antropometría, así como la realización de un análisis de fortalezas, oportunidades, debilidades y amenazas, con el fin de alcanzar claridad, respecto de las condiciones en que resulta pertinente utilizarla y cuáles son profesionales forenses idóneos, a quienes solicitar su aplicación.
Finalmente, se concluye que, con el objeto de sacar el máximo provecho del empleo de la reconstrucción cráneo-facial forense, es necesario tener claros sus límites, contar con un perfil de los profesionales idóneos y moderar las expectativas respecto de sus alcances.
Criminal law and procedure, Medical legislation
Automated legal reasoning with discretion to act using s(LAW)
Joaquín Arias, Mar Moreno-Rebato, José A. Rodríguez-García
et al.
Automated legal reasoning and its application in smart contracts and automated decisions are increasingly attracting interest. In this context, ethical and legal concerns make it necessary for automated reasoners to justify in human-understandable terms the advice given. Logic Programming, specially Answer Set Programming, has a rich semantics and has been used to very concisely express complex knowledge. However, modelling discretionality to act and other vague concepts such as ambiguity cannot be expressed in top-down execution models based on Prolog, and in bottom-up execution models based on ASP the justifications are incomplete and/or not scalable. We propose to use s(CASP), a top-down execution model for predicate ASP, to model vague concepts following a set of patterns. We have implemented a framework, called s(LAW), to model, reason, and justify the applicable legislation and validate it by translating (and benchmarking) a representative use case, the criteria for the admission of students in the "Comunidad de Madrid".
A Reinforcement Learning Approach Combined With Scope Loss Function for Crime Prediction on Twitter (X)
Liu Yang, Jiang Guofan, Zhang Yixin
et al.
Online social networks, especially Twitter (X), have become focal points for illicit activities, providing unique criminal investigation opportunities. This paper introduces an innovative methodology that uses social media sentiment analysis to predict criminal activities. One major challenge in sentiment analysis is the uneven distribution of sentiment classes, where traditional models often fail to accurately classify instances of the minority class due to the overwhelming presence of majority class data. To tackle this issue, we propose a model that combines a reinforcement learning (RL) algorithm with a scope loss function. The RL approach uses a reward mechanism that assigns a more significant value to correctly predicting minority class instances over majority class ones. The scope loss function ensures an optimal balance between utilizing known data and exploring new data, thus maintaining a delicate equilibrium between accuracy and generalizability. Our model employs a series of convolutional neural networks (CNNs) to extract significant features from textual content, which are then utilized for sentiment classification. We also incorporate an advanced artificial bee colony (ABC) optimization technique to refine the model's hyperparameters. The effectiveness of our approach was empirically tested using two distinct datasets: one consisting of crime incident reports from the Chicago Police Department covering the period from September 2019 to July 2024 and another comprising tweets containing crime-related terms related to Chicago. The predictive capabilities of our proposed model were benchmarked against existing models, demonstrating superior performance with accuracies of 96.411% and 94.088%, respectively. This breakthrough highlights the potential of integrating sentiment analysis with reinforcement learning to significantly enhance the predictive accuracy of crime-related activities in online social networks, offering valuable insights for law enforcement and criminal investigation applications.
Electrical engineering. Electronics. Nuclear engineering
From Brussels Effect to Gravity Assists: Understanding the Evolution of the GDPR-Inspired Personal Information Protection Law in China
Wenlong Li, Jiahong Chen
This paper explores the evolution of China's Personal Information Protection Law (PIPL) and situates it within the context of global data protection development. It draws inspiration from the theory of 'Brussels Effect' and provides a critical account of its application in non-Western jurisdictions, taking China as a prime example. Our objective is not to provide a comparative commentary on China's legal development but to illuminate the intricate dynamics between the Chinese law and the EU's GDPR. We argue that the trajectory of China's Personal Information Protection Law calls into question the applicability of the Brussels Effect: while the GDPR's imprint on the PIPL is evident, a deeper analysis unveils China's nuanced, non-linear adoption that diverges from many assumptions of the Brussels Effect and similar theories. The evolution of the GDPR-inspired PIPL is not as a straightforward outcome of the Brussels Effect but as a nuanced, intricate interplay of external influence and domestic dynamics. We introduce a complementary theory of 'gravity assist', which portrays China's strategic instrumentalisation of the GDPR as a template to shape its unique data protection landscape. Our theoretical framework highlights how China navigates through a patchwork of internal considerations, international standards, and strategic choices, ultimately sculpting a data protection regime that has a similar appearance to the GDPR but aligns with its distinct political, cultural and legal landscape. With a detailed historical and policy analysis of the PIPL, coupled with reasonable speculations on its future avenues, our analysis presents a pragmatic, culturally congruent approach to legal development in China. It signals a trajectory that, while potentially converging at a principled level, is likely to diverge significantly in practice [...]
Why Fair Automated Hiring Systems Breach EU Non-Discrimination Law
Robert Lee Poe
Employment selection processes that use automated hiring systems based on machine learning are becoming increasingly commonplace. Meanwhile, concerns about algorithmic direct and indirect discrimination that result from such systems are front-and-center, and the technical solutions provided by the research community often systematically deviate from the principle of equal treatment to combat disparate or adverse impacts on groups based on protected attributes. Those technical solutions are now being used in commercially available automated hiring systems, potentially engaging in real-world discrimination. Algorithmic fairness and algorithmic non-discrimination are not the same. This article examines a conflict between the two: whether such hiring systems are compliant with EU non-discrimination law.
Global Public Goods: The Case for the Global Earth Observation System of Systems
Miloslav Machon
The debate surrounding the provision of welfare by state institutions has been widely discussed in the field of political economics since the 1930s. Related research also focuses on welfare supply at an international system level. This article assesses whether international cooperation in the area of sharing remote sensing data leads to the supply of global public goods, which to date has not yet been discussed in related scholarly literature. The supply of global public goods is assessed within the GEO international regime and leads to the use of the non-rivalrous GEOSS, which can be accessed by every socio-economic group in every UN member country including future generations. However, providing the benefit of GEOSS is not always favourable because of the low number of financially participating consumers.
Reasoning and Logical-Proofs of the Fundamental Laws: 'No Hope' for the Challengers of the Second Law of Thermodynamics
Milivoje M. Kostic
This comprehensive treatise is written for the special occasion of the author's 70th birthday. It presents his lifelong endeavors and reflections with original reasoning and re-interpretations of the most critical and misleading issues in thermodynamics; since now, we have the advantage to look at the historical developments more comprehensively and objectively than the pioneers. Starting from Carnot (grandfather of thermodynamics-to-be) to Kelvin and Clausius (fathers of thermodynamics), and other followers, the most relevant issues are critically examined and put in historical and contemporary perspective. From original reasoning of energy forcing and displacement to logical proofs of the fundamental laws, to ubiquity of thermal motion and heat, and indestructibility of entropy, including the new concept of "thermal roughness" and the inevitability of dissipative irreversibility, to "dissecting Carnot true reversible-equivalency" and critical concept of "Carnot-Clausius heat-work equivalency (CCHWE)" regarding the interchangeability of heat and work, and to demonstrating "no hope" for the "challengers" of the Second Law of thermodynamics, among others, are offered. It is hoped that the novel contributions presented will enhance comprehension and resolve some of the fundamental issues, as well as promote collaboration and future progress.
Good Faith in the Judgments of the International Court of Justice
Abdolmajid Mehdizadeh, Mohammadhadi Soleimanian
Good faith, as one of the fundamental principles of international law, indicates the need for fairness, honesty and reasonableness in international relations. And the International Court of Justice and other international judicial authorities have been repeatedly cited. The judges of the Court have also discussed and cited the concept of good faith in their separate opinions on various occasions. The International Court of Justice, citing the principle of good faith in the settlement of international disputes, has played an effective role in objectifying some manifestations of the principle of good faith in international law and in the process of interpreting the law, creating the law, replacing the law or removing ambiguity International law - sometimes from general principles such as good faith, has made effective inferences that are helpful in understanding the content of the manifestations of good faith and its legal criteria. In the first part of the present article, we examine the principle of good faith and its various manifestations, and in the second part, we analyze some of the cases that have been invoked in the procedures of the Permanent International Court of Justice and the International Court of Justice.
Law in general. Comparative and uniform law. Jurisprudence
The Dark Side of Judicialization: Criminalizing Mining Protests in Peru
Angela Lindt
Social conflicts stemming from industrial mining projects in Peru have increasingly been fought in court cases in recent years. This article analyzes the dark side of this judicialization of mining conflicts, a process through which state authorities criminalize participation in social protests and attempt to prevent the mobilization of social movements. This use of the law by public authorities is an example of the so-called shrinking space in which the scope of action of civil society actors is increasingly restricted and constrained worldwide. This article presents an in-depth analysis of a specific court case against a group of mining opponents in the Cajamarca region of Peru. Based on ethnographic field research conducted in Peru, the article discusses three different modalities of the law’s domination, exploring the various ways the law rules those who oppose large-scale extractive projects.
Latin America. Spanish America, Social Sciences
The Role of the Judge in Public Law Litigation
A. Chayes
543 sitasi
en
Political Science
Human rights and humanitarian forensic action: the experience in Uruguay
Hugo Rodríguez Almada, Frances Borches Duhalde, Victoria Iglesias Salaverría
Humanitarian Forensic Action (HFA) is considered a new field of Forensic Medicine and Forensic Sciences where the forensic science is applied to different humanitarian activities. In Uruguay, the HFA has been developed based on international documents and developed some methodologies appropriate to the particular features of the country. The Department of Legal Medicine and Forensic Sciences has devised and maintained several lines of action in response to demands from public institutions and other requests from victims, families, prosecutors and courts. In every instance, humanitarian forensic work contributes to the education and training of young forensic professionals.
Criminal law and procedure, Public aspects of medicine
Pushing for Sustainability through Technology: administrative consensuality by default and online dispute resolutions tools
Cássio Castro Souza, Justo Reyna
The Brazilian Public Administration is a repeat player and, often, predatory and strategic player. The behavior of the Public Administration is oriented towards the litigation and contributes to the increase in the congestion rate of the Judiciary, limiting access to justice. In this article, it was reflected whether a more adequate choice architecture could make the Public Administration start to show a more consensual and less litigious behavior. It was found that an architecture of choices appropriate to the greater promotion of access to Justice must create an administrative consensus by default, implemented based on an online dispute resolution system that presents an architecture of choices that makes the standard choice of individuals who wish to resolve a conflict with the Public Administration is self-composition.
Public law, Regulation of industry, trade, and commerce. Occupational law
Power-law distribution in the number of confirmed COVID-19 cases
Bernd Blasius
COVID-19 is an emerging respiratory infectious disease caused by the coronavirus SARS-CoV-2. It was first reported on in early December 2019 in Wuhan, China and within three month spread as a pandemic around the whole globe. Here, we study macro-epidemiological patterns along the time course of the pandemic. We compute the distribution of confirmed COVID-19 cases and deaths for countries worldwide and for counties in the US, and show that both distributions follow a truncated power-law over five orders of magnitude. We are able to explain the origin of this scaling behavior as a dual-scale process: the large-scale spread of the virus between countries and the small-scale accumulation of case numbers within each country. Assuming exponential growth on both scales, the critical exponent of the power-law is determined by the ratio of large-scale to small-scale growth rates. We confirm this theory in numerical simulations in a simple meta-population model, describing the epidemic spread in a network of interconnected countries. Our theory gives a mechanistic explanation why most COVID-19 cases occurred within a few epicenters, at least in the initial phase of the outbreak. Assessing how well a simple dual-scale model predicts the early spread of epidemics, despite the huge contrasts between countries, could help identify critical temporal and spatial scales of response in which to mitigate future epidemic threats.
Tracking Social Media Discourse About the COVID-19 Pandemic: Development of a Public Coronavirus Twitter Data Set
Emily Chen, Kristina Lerman, Emilio Ferrara
At the time of this writing, the novel coronavirus (COVID-19) pandemic outbreak has already put tremendous strain on many countries' citizens, resources and economies around the world. Social distancing measures, travel bans, self-quarantines, and business closures are changing the very fabric of societies worldwide. With people forced out of public spaces, much conversation about these phenomena now occurs online, e.g., on social media platforms like Twitter. In this paper, we describe a multilingual coronavirus (COVID-19) Twitter dataset that we have been continuously collecting since January 22, 2020. We are making our dataset available to the research community (https://github.com/echen102/COVID-19-TweetIDs). It is our hope that our contribution will enable the study of online conversation dynamics in the context of a planetary-scale epidemic outbreak of unprecedented proportions and implications. This dataset could also help track scientific coronavirus misinformation and unverified rumors, or enable the understanding of fear and panic -- and undoubtedly more. Ultimately, this dataset may contribute towards enabling informed solutions and prescribing targeted policy interventions to fight this global crisis.
Notary Liability over their Involvement in Document Falsification Crime
Isdian Anggraeny, Tongat Tongat
The presence of a notary in the Association of legal Communities is significant. Nevertheless, in carrying out its role and function, the Notary is very vulnerable in the vortex of deed against the law. Although in many instances, the public Notary can not be held accountable for the unlawful acts, in some cases, the Notary is unable to circumvent his involvement. This article presents two issues related to notary involvement in unlawful acts, especially the criminal offense. Each of these is: first, how is the form of notary involvement in criminal acts of document falsification? Secondly, can the public Notary be held accountable for his involvement in criminal acts of document falsification? This research was conducted through normative legal research. The results show that there are many forms of notary involvement in criminal acts of document counterfeiting. Secondly, the Notary may be held accountable and may be asked for criminal liability because of his involvement in criminal acts of document falsification.
Law in general. Comparative and uniform law. Jurisprudence
The strong circular law: a combinatorial view
Vishesh Jain
Let $N_n$ be an $n\times n$ complex random matrix, each of whose entries is an independent copy of a centered complex random variable $z$ with finite non-zero variance $σ^{2}$. The strong circular law, proved by Tao and Vu, states that almost surely, as $n\to \infty$, the empirical spectral distribution of $N_n/(σ\sqrt{n})$ converges to the uniform distribution on the unit disc in $\mathbb{C}$. A crucial ingredient in the proof of Tao and Vu, which uses deep ideas from additive combinatorics, is controlling the lower tail of the least singular value of the random matrix $xI - N_{n}/(σ\sqrt{n})$ (where $x\in \mathbb{C}$ is fixed) with failure probability that is inverse polynomial. In this paper, using a simple and novel approach (in particular, not using tools from additive combinatorics or any net arguments), we show that for any fixed matrix $M$ with operator norm at most $n^{0.51}$ and for all $η\geq 0$, $$\Pr\left(s_n(M+N_n) \leq η\right) \lesssim n^{C}η+ \exp(-n^{c}),$$ where $s_n(M+N_n)$ is the least singular value of $M+N_n$ and $C,c$ are absolute constants. Our result is optimal up to the constants $C,c$ and the inverse exponential-type error rate improves upon the inverse polynomial error rate due to Tao and Vu. During the course of our proof, we extend the solution of the counting problem in inverse Littlewood-Offord theory, recently isolated by the author along with Ferber, Luh, and Samotij, from Rademacher variables to general complex random variables. This significantly improves on estimates for this problem obtained using the optimal inverse Littlewood-Offord theorem of Nguyen and Vu, and may be of independent interest.