| Total: 1000
The Terahertz (0.1-10 THz) band has been envisioned as one of the promising spectrum bands to support ultra-broadband sixth-generation (6G) and beyond communications. In this paper, a wideband channel measurement campaign in a 500- square-meter indoor lobby at 306-321 GHz is presented. The measurement system consists of a vector network analyzer (VNA)-based channel sounder, and a directional antenna equipped at the receiver to resolve multi-path components (MPCs) in the angular domain. In particular, 21 positions and 3780 channel impulse responses (CIRs) are measured in the lobby, including the line-of-sight (LoS), non-line-of-sight (NLoS) and obstructed-line-of-sight (OLoS) cases. The multi-path characteristics are summarized as follows. First, the main scatterers in the lobby include the glass, the pillar, and the LED screen. Second, best direction and omni-directional path losses are analyzed. Compared with the close-in path loss model, the optimal path loss offset in the alpha-beta path loss model exceeds 86 dB in the LoS case, and accordingly, the exponent decreases to 1.57 and below. Third, more than 10 clusters are observed in OLoS and NLoS cases, compared to 2.17 clusters on average in the LoS case. Fourth, the average power dispersion of MPCs is smaller in both temporal and angular domains in the LoS case, compared with the NLoS and OLoS counterparts. Finally, in contrast to hallway scenarios measured in previous works at the same frequency band, the lobby which is larger in dimension and square in shape, features larger path losses and smaller delay and angular spreads.
We propose a new node centrality measure in networks, the lobby index, which is inspired by Hirsch's h-index. It is shown that in scale free networks the l-index has power tail with exponent square of the exponent of the degree distribution one. Properties of the l-index and extensions are discussed.
We study optimal configurations of Queens on a square chessboard, defined as those covering the maximum number of squares. For a fixed number of Queens, q, we prove the existence of two thresholds in board size: a non-attacking threshold beyond which all optimal configurations are pairwise non-attacking, and a stabilizing threshold beyond which the set of optimal configurations becomes constant. Related studies on Queen domination, such as Tarnai and Gáspár (2007), focus on minimizing the number of Queens needed for full board coverage. Our approach, by contrast, fixes the number of Queens and analyzes optimal cover via a certain loss-function due to {\em internal loss} and {\em decentralization}. We demonstrate how the internal loss can be decomposed in terms of defined concepts, {\em balance} and {\em overlap concentration}. Moreover, by using our results, for sufficiently large board sizes, we find all optimal Queen configurations for all 2≤q≤9. And, whenever possible, we relate those solutions in terms of the classical problem of placing q non-attacking Queens on a q×q board. For example, in case q=8, out of the twelve classical fundamental solutions, only three apply here as centralized patterns on large boards. On the other hand, the single classical fundamental solution for q=6 is never cover optimal on large boards, even if centralized, but another pattern that fits inside a q×(q+1) board applies.
We introduce a generic model for spouse's pensions. The generic model allows for the modeling of various types of spouse's pensions with payments commencing at the death of the insured. We derive abstract formulas for cashflows and liabilities corresponding to common types of spouse's pensions. We show how the standard formulas from the Danish G82 concession can be obtained as a special case of our generic model. We also derive expressions for liabilities for spouse's pensions in models more advanced than found in the G82 concession. The generic nature of our model and results furthermore enable the calculation of cashflows and liabilities using simple estimates of marital behaviour among a population.
Queen Daniela of Sardinia is asleep at the center of a round room at the top of the tower in her castle. She is accompanied by her faithful servant, Eva. Suddenly, they are awakened by cries of "Fire". The room is pitch black and they are disoriented. There is exactly one exit from the room somewhere along its boundary. They must find it as quickly as possible in order to save the life of the queen. It is known that with two people searching while moving at maximum speed 1 anywhere in the room, the room can be evacuated (i.e., with both people exiting) in 1+2π3+√3≈4.8264 time units and this is optimal~[Czyzowicz et al., DISC'14], assuming that the first person to find the exit can directly guide the other person to the exit using her voice. Somewhat surprisingly, in this paper we show that if the goal is to save the queen (possibly leaving Eva behind to die in the fire) there is a slightly better strategy. We prove that this "priority" version of evacuation can be solved in time at most 4.81854. Furthermore, we show that any strategy for saving the queen requires time at least 3+π/6+√3/2≈4.3896 in the worst case. If one or both of the queen's other servants (Biddy and/or Lili) are with her, we show that the time bounds can be improved to 3.8327 for two servants, and 3.3738 for three servants. Finally we show lower bounds for these cases of 3.6307 (two servants) and 3.2017 (three servants). The case of n≥4 is the subject of an independent study by Queen Daniela's Royal Scientific Team.
This document represents the proceedings of the 2022 XCSP3 Competition. The results of this competition of constraint solvers were presented at FLOC (Federated Logic Conference) 2022 Olympic Games, held in Haifa, Israel from 31th July 2022 to 7th August, 2022.
In this paper we study queen's graphs, which encode the moves by a queen on an n×m chess board, through the lens of chip-firing games. We prove that their gonality is equal to nm minus the independence number of the graph, and give a one-to-one correspondence between maximum independent sets and classes of positive rank divisors achieving gonality. We also prove an identical result for toroidal queen's graphs.
A trademark of eusocial insect species is reproductive division of labor, in which workers forego their own reproduction while the queen produces almost all offspring. The presence of the queen is key for maintaining social harmony, but the specific role of the queen in the evolution of eusociality remains unclear. A long-discussed scenario is that a queen either behaviorally or chemically sterilizes her workers. However, the demographic and ecological conditions that enable such manipulation are unknown. Accordingly, we propose a simple model of evolutionary dynamics that is based on haplodiploid genetics. We consider a mutation that acts in a queen, causing her to control the reproductive behavior of her workers. Our mathematical analysis yields precise conditions for the evolutionary emergence and stability of queen-induced worker sterility. These conditions do not depend on the queen's mating frequency. Moreover, we find that queen control is always established if it increases colony reproductive efficiency and can evolve even if it decreases colony efficiency. We further outline the conditions under which queen control is evolutionarily stable against invasion by mutant, reproductive workers.
User-generated family trees are invaluable for constructing population-scale family networks and studying population dynamics over many generations and far into the past. Family trees contain information on individuals such as birth and death places and years, and kinship ties, e.g., parent-child, spouse, and sibling relationships. Such information about individuals in family trees makes it possible to extract migration networks over time. Despite the recent advances, existing spatial and temporal abstraction techniques for time-variant flow data have limitations due to the lack of knowledge on the effect of temporal partitioning on flow patterns. In this study, we extracted state-to-state migration patterns over a period of 150 years between 1776 and 1926 from a cleaned, geocoded and connected family trees from Rootsweb.com. We used birthplaces and birthyears of parents and children to extract intergenerational migration flows between states. To reveal the temporal trends of migration patterns, we evaluated three temporal partitioning strategies: (1) predefined periods in American history, (2) overlapping time periods with fixed length, and (3) time periods with variable length, which have approximately equal volume of moves per time period. To account for the effect of geographic proximity and flow volumes in migration flows, we transformed the raw flows into modularity flows using a double-constrained a gravity model. Our preliminary results revealed longitudinal population mobility in the U.S. on such a large spatial and temporal scale.
Model extraction attacks currently pose a non-negligible threat to the security and privacy of deep learning models. By querying the model with a small dataset and usingthe query results as the ground-truth labels, an adversary can steal a piracy model with performance comparable to the original model. Two key issues that cause the threat are, on the one hand, accurate and unlimited queries can be obtained by the adversary; on the other hand, the adversary can aggregate the query results to train the model step by step. The existing defenses usually employ model watermarking or fingerprinting to protect the ownership. However, these methods cannot proactively prevent the violation from happening. To mitigate the threat, we propose QUEEN (QUEry unlEarNing) that proactively launches counterattacks on potential model extraction attacks from the very beginning. To limit the potential threat, QUEEN has sensitivity measurement and outputs perturbation that prevents the adversary from training a piracy model with high performance. In sensitivity measurement, QUEEN measures the single query sensitivity by its distance from the center of its cluster in the feature space. To reduce the learning accuracy of attacks, for the highly sensitive query batch, QUEEN applies query unlearning, which is implemented by gradient reverse to perturb the softmax output such that the piracy model will generate reverse gradients to worsen its performance unconsciously. Experiments show that QUEEN outperforms the state-of-the-art defenses against various model extraction attacks with a relatively low cost to the model accuracy. The artifact is publicly available at https://anonymous.4open.science/r/queen implementation-5408/.
Since the standardization of IPv6 in 1998, both versions of the Internet Protocol have coexisted in the Internet. Clients usually run algorithms such as Happy Eyeballs, to decide whether to connect to an IPv4 or IPv6 endpoint for dual-stack domains. To identify whether two addresses belong to the same device or service, researchers have proposed different forms of alias resolution techniques. Similarly, one can also form siblings of IPv4 and IPv6 addresses belonging to the same device. Traditionally, all of these approaches have focused on individual IP addresses. In this work, we propose the concept of "sibling prefixes", where we extend the definition of an IPv4-IPv6 sibling to two IP prefixe-one IPv4 prefix and its sibling IPv6 prefix. We present a technique based on large-scale DNS resolution data to identify 76k IPv4-IPv6 sibling prefixes. We find sibling prefixes to be relatively stable over time. We present SP-Tuner algorithm to tune the CIDR size of sibling prefixes and improve the perfect match siblings from 52% to 82%. For more than half of sibling prefixes, the organization names for their IPv4 and IPv6 origin ASes are identical, and 60% of all sibling prefixes have at least one of the prefixes with a valid ROV status in RPKI. Furthermore, we identify sibling prefixes in 24 hypergiant and CDN networks. Finally, we plan to regularly publish a list of sibling prefixes to be used by network operators and fellow researchers in dual-stack studies.
This paper aims at finding a subclass of DTDs that covers many of the real-world DTDs while offering a polynomial-time complexity for deciding the XPath satisfiability problem. In our previous work, we proposed RW-DTDs, which cover most of the real-world DTDs (26 out of 27 real-world DTDs and 1406 out of 1407 DTD rules). However, under RW-DTDs, XPath satisfiability with only child, descendant-or-self, and sibling axes is tractable. In this paper, we propose MRW-DTDs, which are slightly smaller than RW-DTDs but have tractability on XPath satisfiability with parent axes or qualifiers. MRW-DTDs are a proper superclass of duplicate-free DTDs proposed by Montazerian et al., and cover 24 out of the 27 real-world DTDs and 1403 out of the 1407 DTD rules. Under MRW-DTDs, we show that XPath satisfiability problems with (1) child, parent, and sibling axes, and (2) child and sibling axes and qualifiers are both tractable, which are known to be intractable under RW-DTDs.
Using data collected from the AMS websites, and the internet in general, we compute the weight-enumerator of the set of 145 AMS fellows who passed away before Aug. 2022, according to the statistics [Age, Number of Publications, Number of Citations]. Using Maple and elementary calculus, we deduced from it the numbers stated in the title, as well as much more detailed and fascinating statistical information. For example, while the correlation coefficient between the number of publications and number of citations is, not surprisingly, positive, it is far lower than one would expect, being a mere 0.5797 . The appendices contain the rankings according to longevity, number of publications, and number of citations.
A rook path is a path on lattice points in the plane in which any proper horizontal step to the right or vertical step north is allowed. If, in addition, one allow bishop steps, that is, proper diagonal steps of slope 1, then one has queen paths. A rook or queen path is Catalan if it starts at the origin and stays strictly to the left of the line y = x-1. We give explicit formulas for the ordinary generating function of the number of Catalan rook and queen paths finishing at (n,n). These generating functions are algebraic; indeed, they satisfy quadratic equations. In the second version, we also consider paths with "spider steps", that is, proper steps on lattice points with slope strictly greater than one. In the third version, we give step-enumerator versions of our results.
Reading seal title text is a challenging task due to the variable shapes of seals, curved text, background noise, and overlapped text. However, this important element is commonly found in official and financial scenarios, and has not received the attention it deserves in the field of OCR technology. To promote research in this area, we organized ICDAR 2023 competition on reading the seal title (ReST), which included two tasks: seal title text detection (Task 1) and end-to-end seal title recognition (Task 2). We constructed a dataset of 10,000 real seal data, covering the most common classes of seals, and labeled all seal title texts with text polygons and text contents. The competition opened on 30th December, 2022 and closed on 20th March, 2023. The competition attracted 53 participants from academia and industry including 28 submissions for Task 1 and 25 submissions for Task 2, which demonstrated significant interest in this challenging task. In this report, we present an overview of the competition, including the organization, challenges, and results. We describe the dataset and tasks, and summarize the submissions and evaluation results. The results show that significant progress has been made in the field of seal title text reading, and we hope that this competition will inspire further research and development in this important area of OCR technology.
Sibling fixed effects (FE) models are useful for estimating causal treatment effects while offsetting unobserved sibling-invariant confounding. However, treatment estimates are biased if an individual's outcome affects their sibling's outcome. We propose a robustness test for assessing the presence of outcome-to-outcome interference in linear two-sibling FE models. We regress a gain-score--the difference between siblings' continuous outcomes--on both siblings' treatments and on a pre-treatment observed FE. Under certain restrictions, the observed FE's partial regression coefficient signals the presence of outcome-to-outcome interference. Monte Carlo simulations demonstrated the robustness test under several models. We found that an observed FE signaled outcome-to-outcome spillover if it was directly associated with an sibling-invariant confounder of treatments and outcomes, directly associated with a sibling's treatment, or directly and equally associated with both siblings' outcomes. However, the robustness test collapsed if the observed FE was directly but differentially associated with siblings' outcomes or if outcomes affected siblings' treatments.
Audio Packet Loss Concealment (PLC) is the hiding of gaps in audio streams caused by data transmission failures in packet switched networks. This is a common problem, and of increasing importance as end-to-end VoIP telephony and teleconference systems become the default and ever more widely used form of communication in business as well as in personal usage. This paper presents the INTERSPEECH 2022 Audio Deep Packet Loss Concealment challenge. We first give an overview of the PLC problem, and introduce some classical approaches to PLC as well as recent work. We then present the open source dataset released as part of this challenge as well as the evaluation methods and metrics used to determine the winner. We also briefly introduce PLCMOS, a novel data-driven metric that can be used to quickly evaluate the performance PLC systems. Finally, we present the results of the INTERSPEECH 2022 Audio Deep PLC Challenge, and provide a summary of important takeaways.
The interplay between parasites and their hosts is found in all kinds of species and plays an important role in understanding the principles of evolution and coevolution. Usually, the different genotypes of hosts and parasites oscillate in their abundances. The well-established theory of oscillatory Red Queen dynamics proposes an ongoing change in frequencies of the different types within each species. So far, it is unclear in which way Red Queen dynamics persists with more than two types of hosts and parasites. In our analysis, an arbitrary number of types within two species are examined in a deterministic framework with constant or changing population size. This general framework allows for analytical solutions for internal fixed points and their stability. For more than two species, apparently chaotic dynamics has been reported. Here we show that even for two species, once more than two types are considered per species, irregular dynamics in their frequencies can be observed in the long run. The nature of the dynamics depends strongly on the initial configuration of the system; the usual regular Red Queen oscillations are only observed in some parts of the parameter region.
Thermonuclear supernovae, or Type-Ia supernovae (SNeIa), are an essential tool of cosmology. Precise cosmological constraints are extracted from a Hubble diagram defined by homogeneous distance indicators, but supernova homogeneity is not guaranteed. The degree of heterogeneity within the SNeIa parent population is unknown. In addition, event selections and standardization procedures are based on empirical, optically-measured observables rather than fundamental thermonuclear properties. Systematics are a natural consequence of event selection from a diverse parent population. Quantifying the impact of diversity-driven systematics is crucial to optimizing SNeIa as cosmic probes. In this work, the empirical observables are used to calibrate previously unidentified diversity-driven systematic uncertainties. The foundation of this approach is the concept of "supernova siblings'', two or more supernovae hosted by the same parent galaxy. Sibling-based calibrations isolate intrinsic differences between supernovae; they control for source distance and host galaxy dependencies that can conceal systematics or lead to their underestimation. Newly calibrated distance modulus uncertainties are approximately an order of magnitude larger than previously reported. The physical origin of these uncertainties is plausibly attributed to the diverse thermonuclear scenarios responsible for SNeIa and the inhomogeneous apparent magnitudes induced by this diversity. Systematics mitigation strategies are discussed. Cosmological parameter constraints extracted from a re-analysis of the Pantheon+ SNeIa dataset are weaker than previously reported. Agreement with early-Universe parameter estimates is achieved for a ΛCDM cosmology, including a reduction of the Hubble Tension from ∼5σ to <1σ.
We study the lobby index (l-index for short) as a local node centrality measure for complex networks. The l-inde is compared with degree (a local measure), betweenness and Eigenvector centralities (two global measures) in the case of biological network (Yeast interaction protein-protein network) and a linguistic network (Moby Thesaurus II). In both networks, the l-index has poor correlation with betweenness but correlates with degree and Eigenvector. Being a local measure, one can take advantage by using the l-index because it carries more information about its neighbors when compared with degree centrality, indeed it requires less time to compute when compared with Eigenvector centrality. Results suggests that l-index produces better results than degree and Eigenvector measures for ranking purposes, becoming suitable as a tool to perform this task.
A growing area of research in epidemiology is the identification of health-related sibling spillover effects, or the effect of one individual's exposure on their sibling's outcome. The health and health care of family members may be inextricably confounded by unobserved factors, rendering identification of spillover effects within families particularly challenging. We demonstrate a gain-score regression method for identifying exposure-to-outcome spillover effects within sibling pairs in a linear fixed effects framework. The method can identify the exposure-to-outcome spillover effect if only one sibling's exposure affects the other's outcome; and it identifies the difference between the spillover effects if both siblings' exposures affect the others' outcomes. The method fails in the presence of outcome-to-exposure spillover and outcome-to-outcome spillover. Analytic results and Monte Carlo simulations demonstrate the method and its limitations. To exercise this method, we estimate the spillover effect of a child's preterm birth on an older sibling's literacy skills, measured by the Phonological Awarenesses Literacy Screening-Kindergarten test. We analyze 20,010 sibling pairs from a population-wide, Wisconsin-based (United States) birth cohort. Without covariate adjustment, we estimate that preterm birth modestly decreases an older sibling's test score (-2.11 points; 95% confidence interval: -3.82, -0.40 points). In conclusion, gain-scores are a promising strategy for identifying exposure-to-outcome spillovers in sibling pairs while controlling for sibling-invariant unobserved confounding in linear settings.
We investigate the long-term dynamical evolution of star clusters in a steady tidal field produced by its parent galaxy. In this paper, we focus on the influence of mass profile of the parent galaxy. The previous studies were done with the simplification where the parent galaxy was expressed by point mass. We express different mass profiles of the parent galaxy by the tidal fields in which the ratios of the epicyclic frequency to the angular velocity are different. We compare the mass-loss timescale of star clusters whose tidal radii are identical but in parent galaxies with different mass profile, by means of orbits calculations in fixed cluster potential and N-body simulations. In this situation, a cluster rotates around the parent galaxy more rapidly as the parent galaxy has shallower mass profile. We found that the mass-loss timescale increase 20% and 50% for the cases that the mass density profile of the parent galaxies are proportional to R^-2 and R^-1.5 where R is the distance from the galaxy center, compared to the point-mass case, in moderately strong tidal field. Counterintuitively, a cluster which rotates around the parent galaxy more rapidly has a longer lifetime. The increase of lifetime is due to the fact that the fraction occupied by regular-like orbit increases in shallower profile. Finally, we derive an evaluation formula for the mass-loss timescale of clusters. Our formula can explain a property of the population of the observed galactic globular clusters that their half-mass radii become smaller as their distances from the galactic center become smaller.
The Red Queen's notion "It takes all the running you can do, to keep in the same place" has been applied within evolutionary biology, politics and economics. We find that a generalized version in which an adaptive Red Queen (e.g. insurgency) sporadically edges ahead of a Blue King (e.g. military), explains the progress curves for fatal insurgent attacks against the coalition military within individual provinces in Afghanistan and Iraq. Remarkably regular mathematical relations emerge which suggest a prediction formula for the timing of the n'th future fatal day, and provide a common framework for understanding how insurgents fight in different regions. Our findings are consistent with a Darwinian selection hypothesis which favors a weak species which can adapt rapidly, and establish an unexpected conceptual connection to the physics of correlated walks.
The rapid progress of Large Language Models (LLMs) has opened up new opportunities across various domains and applications; yet it also presents challenges related to potential misuse. To mitigate such risks, red teaming has been employed as a proactive security measure to probe language models for harmful outputs via jailbreak attacks. However, current jailbreak attack approaches are single-turn with explicit malicious queries that do not fully capture the complexity of real-world interactions. In reality, users can engage in multi-turn interactions with LLM-based chat assistants, allowing them to conceal their true intentions in a more covert manner. To bridge this gap, we, first, propose a new jailbreak approach, RED QUEEN ATTACK. This method constructs a multi-turn scenario, concealing the malicious intent under the guise of preventing harm. We craft 40 scenarios that vary in turns and select 14 harmful categories to generate 56k multi-turn attack data points. We conduct comprehensive experiments on the RED QUEEN ATTACK with four representative LLM families of different sizes. Our experiments reveal that all LLMs are vulnerable to RED QUEEN ATTACK, reaching 87.62% attack success rate on GPT-4o and 75.4% on Llama3-70B. Further analysis reveals that larger models are more susceptible to the RED QUEEN ATTACK, with multi-turn structures and concealment strategies contributing to its success. To prioritize safety, we introduce a straightforward mitigation strategy called RED QUEEN GUARD, which aligns LLMs to effectively counter adversarial attacks. This approach reduces the attack success rate to below 1% while maintaining the model's performance across standard benchmarks. Full implementation and dataset are publicly accessible at https://github.com/kriti-hippo/red_queen.
Hundreds of millions of people live in countries that do not have complete death registration systems, meaning that most deaths are not recorded and critical quantities like life expectancy cannot be directly measured. The sibling survival method is a leading approach to estimating adult mortality in the absence of death registration. The idea is to ask a survey respondent to enumerate her siblings and to report about their survival status. In many countries and time periods, sibling survival data are the only nationally-representative source of information about adult mortality. Although a huge amount of sibling survival data has been collected, important methodological questions about the method remain unresolved. To help make progress on this issue, we propose re-framing the sibling survival method as a network sampling problem. This approach enables us to formally derive statistical estimators for sibling survival data. Our derivation clarifies the precise conditions that sibling history estimates rely upon; it leads to internal consistency checks that can help assess data and reporting quality; and it reveals important quantities that could potentially be measured to relax assumptions in the future. We introduce the R package siblingsurvival, which implements the methods we describe.