-
Private federated discovery of out-of-vocabulary words for Gboard
Authors:
Ziteng Sun,
Peter Kairouz,
Haicheng Sun,
Adria Gascon,
Ananda Theertha Suresh
Abstract:
The vocabulary of language models in Gboard, Google's keyboard application, plays a crucial role for improving user experience. One way to improve the vocabulary is to discover frequently typed out-of-vocabulary (OOV) words on user devices. This task requires strong privacy protection due to the sensitive nature of user input data. In this report, we present a private OOV discovery algorithm for G…
▽ More
The vocabulary of language models in Gboard, Google's keyboard application, plays a crucial role for improving user experience. One way to improve the vocabulary is to discover frequently typed out-of-vocabulary (OOV) words on user devices. This task requires strong privacy protection due to the sensitive nature of user input data. In this report, we present a private OOV discovery algorithm for Gboard, which builds on recent advances in private federated analytics. The system offers local differential privacy (LDP) guarantees for user contributed words. With anonymous aggregation, the final released result would satisfy central differential privacy guarantees with $\varepsilon = 0.315, δ= 10^{-10}$ for OOV discovery in en-US (English in United States).
△ Less
Submitted 18 April, 2024; v1 submitted 17 April, 2024;
originally announced April 2024.
-
Confidential Federated Computations
Authors:
Hubert Eichner,
Daniel Ramage,
Kallista Bonawitz,
Dzmitry Huba,
Tiziano Santoro,
Brett McLarnon,
Timon Van Overveldt,
Nova Fallen,
Peter Kairouz,
Albert Cheu,
Katharine Daly,
Adria Gascon,
Marco Gruteser,
Brendan McMahan
Abstract:
Federated Learning and Analytics (FLA) have seen widespread adoption by technology platforms for processing sensitive on-device data. However, basic FLA systems have privacy limitations: they do not necessarily require anonymization mechanisms like differential privacy (DP), and provide limited protections against a potentially malicious service provider. Adding DP to a basic FLA system currently…
▽ More
Federated Learning and Analytics (FLA) have seen widespread adoption by technology platforms for processing sensitive on-device data. However, basic FLA systems have privacy limitations: they do not necessarily require anonymization mechanisms like differential privacy (DP), and provide limited protections against a potentially malicious service provider. Adding DP to a basic FLA system currently requires either adding excessive noise to each device's updates, or assuming an honest service provider that correctly implements the mechanism and only uses the privatized outputs. Secure multiparty computation (SMPC) -based oblivious aggregations can limit the service provider's access to individual user updates and improve DP tradeoffs, but the tradeoffs are still suboptimal, and they suffer from scalability challenges and susceptibility to Sybil attacks. This paper introduces a novel system architecture that leverages trusted execution environments (TEEs) and open-sourcing to both ensure confidentiality of server-side computations and provide externally verifiable privacy properties, bolstering the robustness and trustworthiness of private federated computations.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Federated Heavy Hitter Recovery under Linear Sketching
Authors:
Adria Gascon,
Peter Kairouz,
Ziteng Sun,
Ananda Theertha Suresh
Abstract:
Motivated by real-life deployments of multi-round federated analytics with secure aggregation, we investigate the fundamental communication-accuracy tradeoffs of the heavy hitter discovery and approximate (open-domain) histogram problems under a linear sketching constraint. We propose efficient algorithms based on local subsampling and invertible bloom look-up tables (IBLTs). We also show that our…
▽ More
Motivated by real-life deployments of multi-round federated analytics with secure aggregation, we investigate the fundamental communication-accuracy tradeoffs of the heavy hitter discovery and approximate (open-domain) histogram problems under a linear sketching constraint. We propose efficient algorithms based on local subsampling and invertible bloom look-up tables (IBLTs). We also show that our algorithms are information-theoretically optimal for a broad class of interactive schemes. The results show that the linear sketching constraint does increase the communication cost for both tasks by introducing an extra linear dependence on the number of users in a round. Moreover, our results also establish a separation between the communication cost for heavy hitter discovery and approximate histogram in the multi-round setting. The dependence on the number of rounds $R$ is at most logarithmic for heavy hitter discovery whereas that of approximate histogram is $Θ(\sqrt{R})$. We also empirically demonstrate our findings.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
Amplification by Shuffling without Shuffling
Authors:
Borja Balle,
James Bell,
Adrià Gascón
Abstract:
Motivated by recent developments in the shuffle model of differential privacy, we propose a new approximate shuffling functionality called Alternating Shuffle, and provide a protocol implementing alternating shuffling in a single-server threat model where the adversary observes all communication. Unlike previous shuffling protocols in this threat model, the per-client communication of our protocol…
▽ More
Motivated by recent developments in the shuffle model of differential privacy, we propose a new approximate shuffling functionality called Alternating Shuffle, and provide a protocol implementing alternating shuffling in a single-server threat model where the adversary observes all communication. Unlike previous shuffling protocols in this threat model, the per-client communication of our protocol only grows sub-linearly in the number of clients. Moreover, we study the concrete efficiency of our protocol and show it can improve per-client communication by one or more orders of magnitude with respect to previous (approximate) shuffling protocols. We also show a differential privacy amplification result for alternating shuffling analogous to the one for uniform shuffling, and demonstrate that shuffling-based protocols for secure summation based a construction of Ishai et al. (FOCS'06) remain secure under the Alternating Shuffle. In the process we also develop a protocol for exact shuffling in single-server threat model with amortized logarithmic communication per-client which might be of independent interest.
△ Less
Submitted 7 September, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
UN Handbook on Privacy-Preserving Computation Techniques
Authors:
David W. Archer,
Borja de Balle Pigem,
Dan Bogdanov,
Mark Craddock,
Adria Gascon,
Ronald Jansen,
Matjaž Jug,
Kim Laine,
Robert McLellan,
Olga Ohrimenko,
Mariana Raykova,
Andrew Trask,
Simon Wardley
Abstract:
This paper describes privacy-preserving approaches for the statistical analysis. It describes motivations for privacy-preserving approaches for the statistical analysis of sensitive data, presents examples of use cases where such methods may apply and describes relevant technical capabilities to assure privacy preservation while still allowing analysis of sensitive data. Our focus is on methods th…
▽ More
This paper describes privacy-preserving approaches for the statistical analysis. It describes motivations for privacy-preserving approaches for the statistical analysis of sensitive data, presents examples of use cases where such methods may apply and describes relevant technical capabilities to assure privacy preservation while still allowing analysis of sensitive data. Our focus is on methods that enable protecting privacy of data while it is being processed, not only while it is at rest on a system or in transit between systems. The information in this document is intended for use by statisticians and data scientists, data curators and architects, IT specialists, and security and information assurance specialists, so we explicitly avoid cryptographic technical details of the technologies we describe.
△ Less
Submitted 15 January, 2023;
originally announced January 2023.
-
Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation
Authors:
Eugene Bagdasaryan,
Peter Kairouz,
Stefan Mellem,
Adrià Gascón,
Kallista Bonawitz,
Deborah Estrin,
Marco Gruteser
Abstract:
We design a scalable algorithm to privately generate location heatmaps over decentralized data from millions of user devices. It aims to ensure differential privacy before data becomes visible to a service provider while maintaining high data accuracy and minimizing resource consumption on users' devices. To achieve this, we revisit distributed differential privacy based on recent results in secur…
▽ More
We design a scalable algorithm to privately generate location heatmaps over decentralized data from millions of user devices. It aims to ensure differential privacy before data becomes visible to a service provider while maintaining high data accuracy and minimizing resource consumption on users' devices. To achieve this, we revisit distributed differential privacy based on recent results in secure multiparty computation, and we design a scalable and adaptive distributed differential privacy approach for location analytics. Evaluation on public location datasets shows that this approach successfully generates metropolitan-scale heatmaps from millions of user samples with a worst-case client communication overhead that is significantly smaller than existing state-of-the-art private protocols of similar accuracy.
△ Less
Submitted 26 June, 2022; v1 submitted 3 November, 2021;
originally announced November 2021.
-
MPC-Friendly Commitments for Publicly Verifiable Covert Security
Authors:
Nitin Agrawal,
James Bell,
Adrià Gascón,
Matt J. Kusner
Abstract:
We address the problem of efficiently verifying a commitment in a two-party computation. This addresses the scenario where a party P1 commits to a value $x$ to be used in a subsequent secure computation with another party P2 that wants to receive assurance that P1 did not cheat, i.e. that $x$ was indeed the value inputted into the secure computation. Our constructions operate in the publicly verif…
▽ More
We address the problem of efficiently verifying a commitment in a two-party computation. This addresses the scenario where a party P1 commits to a value $x$ to be used in a subsequent secure computation with another party P2 that wants to receive assurance that P1 did not cheat, i.e. that $x$ was indeed the value inputted into the secure computation. Our constructions operate in the publicly verifiable covert (PVC) security model, which is a relaxation of the malicious model of MPC appropriate in settings where P1 faces a reputational harm if caught cheating.
We introduce the notion of PVC commitment scheme and indexed hash functions to build commitments schemes tailored to the PVC framework, and propose constructions for both arithmetic and Boolean circuits that result in very efficient circuits. From a practical standpoint, our constructions for Boolean circuits are $60\times$ faster to evaluate securely, and use $36\times$ less communication than baseline methods based on hashing. Moreover, we show that our constructions are tight in terms of required non-linear operations, by proving lower bounds on the nonlinear gate count of commitment verification circuits. Finally, we present a technique to amplify the security properties our constructions that allows to efficiently recover malicious guarantees with statistical security.
△ Less
Submitted 27 January, 2022; v1 submitted 15 September, 2021;
originally announced September 2021.
-
PrivEdge: From Local to Distributed Private Training and Prediction
Authors:
Ali Shahin Shamsabadi,
Adria Gascon,
Hamed Haddadi,
Andrea Cavallaro
Abstract:
Machine Learning as a Service (MLaaS) operators provide model training and prediction on the cloud. MLaaS applications often rely on centralised collection and aggregation of user data, which could lead to significant privacy concerns when dealing with sensitive personal data. To address this problem, we propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of user…
▽ More
Machine Learning as a Service (MLaaS) operators provide model training and prediction on the cloud. MLaaS applications often rely on centralised collection and aggregation of user data, which could lead to significant privacy concerns when dealing with sensitive personal data. To address this problem, we propose PrivEdge, a technique for privacy-preserving MLaaS that safeguards the privacy of users who provide their data for training, as well as users who use the prediction service. With PrivEdge, each user independently uses their private data to locally train a one-class reconstructive adversarial network that succinctly represents their training data. As sending the model parameters to the service provider in the clear would reveal private information, PrivEdge secret-shares the parameters among two non-colluding MLaaS providers, to then provide cryptographically private prediction services through secure multi-party computation techniques. We quantify the benefits of PrivEdge and compare its performance with state-of-the-art centralised architectures on three privacy-sensitive image-based tasks: individual identification, writer identification, and handwritten letter recognition. Experimental results show that PrivEdge has high precision and recall in preserving privacy, as well as in distinguishing between private and non-private images. Moreover, we show the robustness of PrivEdge to image compression and biased training data. The source code is available at https://github.com/smartcameras/PrivEdge.
△ Less
Submitted 12 April, 2020;
originally announced April 2020.
-
Private Summation in the Multi-Message Shuffle Model
Authors:
Borja Balle,
James Bell,
Adria Gascon,
Kobbi Nissim
Abstract:
The shuffle model of differential privacy (Erlingsson et al. SODA 2019; Cheu et al. EUROCRYPT 2019) and its close relative encode-shuffle-analyze (Bittau et al. SOSP 2017) provide a fertile middle ground between the well-known local and central models. Similarly to the local model, the shuffle model assumes an untrusted data collector who receives privatized messages from users, but in this case a…
▽ More
The shuffle model of differential privacy (Erlingsson et al. SODA 2019; Cheu et al. EUROCRYPT 2019) and its close relative encode-shuffle-analyze (Bittau et al. SOSP 2017) provide a fertile middle ground between the well-known local and central models. Similarly to the local model, the shuffle model assumes an untrusted data collector who receives privatized messages from users, but in this case a secure shuffler is used to transmit messages from users to the collector in a way that hides which messages came from which user. An interesting feature of the shuffle model is that increasing the amount of messages sent by each user can lead to protocols with accuracies comparable to the ones achievable in the central model. In particular, for the problem of privately computing the sum of $n$ bounded real values held by $n$ different users, Cheu et al. showed that $O(\sqrt{n})$ messages per user suffice to achieve $O(1)$ error (the optimal rate in the central model), while Balle et al. (CRYPTO 2019) recently showed that a single message per user leads to $Θ(n^{1/3})$ MSE (mean squared error), a rate strictly in-between what is achievable in the local and central models.
This paper introduces two new protocols for summation in the shuffle model with improved accuracy and communication trade-offs. Our first contribution is a recursive construction based on the protocol from Balle et al. mentioned above, providing $\mathrm{poly}(\log \log n)$ error with $O(\log \log n)$ messages per user. The second contribution is a protocol with $O(1)$ error and $O(1)$ messages per user based on a novel analysis of the reduction from secure summation to shuffling introduced by Ishai et al. (FOCS 2006) (the original reduction required $O(\log n)$ messages per user).
△ Less
Submitted 19 December, 2022; v1 submitted 3 February, 2020;
originally announced February 2020.
-
Advances and Open Problems in Federated Learning
Authors:
Peter Kairouz,
H. Brendan McMahan,
Brendan Avent,
Aurélien Bellet,
Mehdi Bennis,
Arjun Nitin Bhagoji,
Kallista Bonawitz,
Zachary Charles,
Graham Cormode,
Rachel Cummings,
Rafael G. L. D'Oliveira,
Hubert Eichner,
Salim El Rouayheb,
David Evans,
Josh Gardner,
Zachary Garrett,
Adrià Gascón,
Badih Ghazi,
Phillip B. Gibbons,
Marco Gruteser,
Zaid Harchaoui,
Chaoyang He,
Lie He,
Zhouyuan Huo,
Ben Hutchinson
, et al. (34 additional authors not shown)
Abstract:
Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while kee** the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs re…
▽ More
Federated learning (FL) is a machine learning setting where many clients (e.g. mobile devices or whole organizations) collaboratively train a model under the orchestration of a central server (e.g. service provider), while kee** the training data decentralized. FL embodies the principles of focused data collection and minimization, and can mitigate many of the systemic privacy risks and costs resulting from traditional, centralized machine learning and data science approaches. Motivated by the explosive growth in FL research, this paper discusses recent advances and presents an extensive collection of open problems and challenges.
△ Less
Submitted 8 March, 2021; v1 submitted 10 December, 2019;
originally announced December 2019.
-
Data Generation for Neural Programming by Example
Authors:
Judith Clymo,
Haik Manukian,
Nathanaël Fijalkow,
Adrià Gascón,
Brooks Paige
Abstract:
Programming by example is the problem of synthesizing a program from a small set of input / output pairs. Recent works applying machine learning methods to this task show promise, but are typically reliant on generating synthetic examples for training. A particular challenge lies in generating meaningful sets of inputs and outputs, which well-characterize a given program and accurately demonstrate…
▽ More
Programming by example is the problem of synthesizing a program from a small set of input / output pairs. Recent works applying machine learning methods to this task show promise, but are typically reliant on generating synthetic examples for training. A particular challenge lies in generating meaningful sets of inputs and outputs, which well-characterize a given program and accurately demonstrate its behavior. Where examples used for testing are generated by the same method as training data then the performance of a model may be partly reliant on this similarity. In this paper we introduce a novel approach using an SMT solver to synthesize inputs which cover a diverse set of behaviors for a given program. We carry out a case study comparing this method to existing synthetic data generation procedures in the literature, and find that data generated using our approach improves both the discriminatory power of example sets and the ability of trained machine learning models to generalize to unfamiliar data.
△ Less
Submitted 6 November, 2019;
originally announced November 2019.
-
Private Protocols for U-Statistics in the Local Model and Beyond
Authors:
James Bell,
Aurélien Bellet,
Adrià Gascón,
Tejas Kulkarni
Abstract:
In this paper, we study the problem of computing $U$-statistics of degree $2$, i.e., quantities that come in the form of averages over pairs of data points, in the local model of differential privacy (LDP). The class of $U$-statistics covers many statistical estimates of interest, including Gini mean difference, Kendall's tau coefficient and Area under the ROC Curve (AUC), as well as empirical ris…
▽ More
In this paper, we study the problem of computing $U$-statistics of degree $2$, i.e., quantities that come in the form of averages over pairs of data points, in the local model of differential privacy (LDP). The class of $U$-statistics covers many statistical estimates of interest, including Gini mean difference, Kendall's tau coefficient and Area under the ROC Curve (AUC), as well as empirical risk measures for machine learning problems such as ranking, clustering and metric learning. We first introduce an LDP protocol based on quantizing the data into bins and applying randomized response, which guarantees an $ε$-LDP estimate with a Mean Squared Error (MSE) of $O(1/\sqrt{n}ε)$ under regularity assumptions on the $U$-statistic or the data distribution. We then propose a specialized protocol for AUC based on a novel use of hierarchical histograms that achieves MSE of $O(α^3/nε^2)$ for arbitrary data distribution. We also show that 2-party secure computation allows to design a protocol with MSE of $O(1/nε^2)$, without any assumption on the kernel function or data distribution and with total communication linear in the number of users $n$. Finally, we evaluate the performance of our protocols through experiments on synthetic and real datasets.
△ Less
Submitted 2 March, 2020; v1 submitted 9 October, 2019;
originally announced October 2019.
-
Improved Summation from Shuffling
Authors:
Borja Balle,
James Bell,
Adria Gascon,
Kobbi Nissim
Abstract:
A protocol by Ishai et al.\ (FOCS 2006) showing how to implement distributed $n$-party summation from secure shuffling has regained relevance in the context of the recently proposed \emph{shuffle model} of differential privacy, as it allows to attain the accuracy levels of the curator model at a moderate communication cost. To achieve statistical security $2^{-σ}$, the protocol by Ishai et al.\ re…
▽ More
A protocol by Ishai et al.\ (FOCS 2006) showing how to implement distributed $n$-party summation from secure shuffling has regained relevance in the context of the recently proposed \emph{shuffle model} of differential privacy, as it allows to attain the accuracy levels of the curator model at a moderate communication cost. To achieve statistical security $2^{-σ}$, the protocol by Ishai et al.\ requires the number of messages sent by each party to {\em grow} logarithmically with $n$ as $O(\log n + σ)$. In this note we give an improved analysis achieving a dependency of the form $O(1+σ/\log n)$. Conceptually, this addresses the intuitive question left open by Ishai et al.\ of whether the shuffling step in their protocol provides a "hiding in the crowd" amplification effect as $n$ increases. From a practical perspective, our analysis provides explicit constants and shows, for example, that the method of Ishai et al.\ applied to summation of $32$-bit numbers from $n=10^4$ parties sending $12$ messages each provides statistical security $2^{-40}$.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
Authors:
Nitin Agrawal,
Ali Shahin Shamsabadi,
Matt J. Kusner,
Adrià Gascón
Abstract:
Recently, there has been a wealth of effort devoted to the design of secure protocols for machine learning tasks. Much of this is aimed at enabling secure prediction from highly-accurate Deep Neural Networks (DNNs). However, as DNNs are trained on data, a key question is how such models can be also trained securely. The few prior works on secure DNN training have focused either on designing custom…
▽ More
Recently, there has been a wealth of effort devoted to the design of secure protocols for machine learning tasks. Much of this is aimed at enabling secure prediction from highly-accurate Deep Neural Networks (DNNs). However, as DNNs are trained on data, a key question is how such models can be also trained securely. The few prior works on secure DNN training have focused either on designing custom protocols for existing training algorithms, or on develo** tailored training algorithms and then applying generic secure protocols. In this work, we investigate the advantages of designing training algorithms alongside a novel secure protocol, incorporating optimizations on both fronts. We present QUOTIENT, a new method for discretized training of DNNs, along with a customized secure two-party protocol for it. QUOTIENT incorporates key components of state-of-the-art DNN training such as layer normalization and adaptive gradient methods, and improves upon the state-of-the-art in DNN training in two-party computation. Compared to prior work, we obtain an improvement of 50X in WAN time and 6% in absolute accuracy.
△ Less
Submitted 7 July, 2019;
originally announced July 2019.
-
Differentially Private Summation with Multi-Message Shuffling
Authors:
Borja Balle,
James Bell,
Adria Gascon,
Kobbi Nissim
Abstract:
In recent work, Cheu et al. (Eurocrypt 2019) proposed a protocol for $n$-party real summation in the shuffle model of differential privacy with $O_{ε, δ}(1)$ error and $Θ(ε\sqrt{n})$ one-bit messages per party. In contrast, every local model protocol for real summation must incur error $Ω(1/\sqrt{n})$, and there exist protocols matching this lower bound which require just one bit of communication…
▽ More
In recent work, Cheu et al. (Eurocrypt 2019) proposed a protocol for $n$-party real summation in the shuffle model of differential privacy with $O_{ε, δ}(1)$ error and $Θ(ε\sqrt{n})$ one-bit messages per party. In contrast, every local model protocol for real summation must incur error $Ω(1/\sqrt{n})$, and there exist protocols matching this lower bound which require just one bit of communication per party. Whether this gap in number of messages is necessary was left open by Cheu et al.
In this note we show a protocol with $O(1/ε)$ error and $O(\log(n/δ))$ messages of size $O(\log(n))$ per party. This protocol is based on the work of Ishai et al.\ (FOCS 2006) showing how to implement distributed summation from secure shuffling, and the observation that this allows simulating the Laplace mechanism in the shuffle model.
△ Less
Submitted 21 August, 2019; v1 submitted 20 June, 2019;
originally announced June 2019.
-
The Privacy Blanket of the Shuffle Model
Authors:
Borja Balle,
James Bell,
Adria Gascon,
Kobbi Nissim
Abstract:
This work studies differential privacy in the context of the recently proposed shuffle model. Unlike in the local model, where the server collecting privatized data from users can track back an input to a specific user, in the shuffle model users submit their privatized inputs to a server anonymously. This setup yields a trust model which sits in between the classical curator and local models for…
▽ More
This work studies differential privacy in the context of the recently proposed shuffle model. Unlike in the local model, where the server collecting privatized data from users can track back an input to a specific user, in the shuffle model users submit their privatized inputs to a server anonymously. This setup yields a trust model which sits in between the classical curator and local models for differential privacy. The shuffle model is the core idea in the Encode, Shuffle, Analyze (ESA) model introduced by Bittau et al. (SOPS 2017). Recent work by Cheu et al. (EUROCRYPT 2019) analyzes the differential privacy properties of the shuffle model and shows that in some cases shuffled protocols provide strictly better accuracy than local protocols. Additionally, Erlingsson et al. (SODA 2019) provide a privacy amplification bound quantifying the level of curator differential privacy achieved by the shuffle model in terms of the local differential privacy of the randomizer used by each user. In this context, we make three contributions. First, we provide an optimal single message protocol for summation of real numbers in the shuffle model. Our protocol is very simple and has better accuracy and communication than the protocols for this same problem proposed by Cheu et al. Optimality of this protocol follows from our second contribution, a new lower bound for the accuracy of private protocols for summation of real numbers in the shuffle model. The third contribution is a new amplification bound for analyzing the privacy of protocols in the shuffle model in terms of the privacy provided by the corresponding local randomizer. Our amplification bound generalizes the results by Erlingsson et al. to a wider range of parameters, and provides a whole family of methods to analyze privacy amplification in the shuffle model.
△ Less
Submitted 2 June, 2019; v1 submitted 7 March, 2019;
originally announced March 2019.
-
TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service
Authors:
Amartya Sanyal,
Matt J. Kusner,
Adrià Gascón,
Varun Kanade
Abstract:
Machine learning methods are widely used for a variety of prediction problems. \emph{Prediction as a service} is a paradigm in which service providers with technological expertise and computational resources may perform predictions for clients. However, data privacy severely restricts the applicability of such services, unless measures to keep client data private (even from the service provider) a…
▽ More
Machine learning methods are widely used for a variety of prediction problems. \emph{Prediction as a service} is a paradigm in which service providers with technological expertise and computational resources may perform predictions for clients. However, data privacy severely restricts the applicability of such services, unless measures to keep client data private (even from the service provider) are designed. Equally important is to minimize the amount of computation and communication required between client and server. Fully homomorphic encryption offers a possible way out, whereby clients may encrypt their data, and on which the server may perform arithmetic computations. The main drawback of using fully homomorphic encryption is the amount of time required to evaluate large machine learning models on encrypted data. We combine ideas from the machine learning literature, particularly work on binarization and sparsification of neural networks, together with algorithmic tools to speed-up and parallelize computation using encrypted data.
△ Less
Submitted 9 June, 2018;
originally announced June 2018.
-
Blind Justice: Fairness with Encrypted Sensitive Attributes
Authors:
Niki Kilbertus,
Adrià Gascón,
Matt J. Kusner,
Michael Veale,
Krishna P. Gummadi,
Adrian Weller
Abstract:
Recent work has explored how to train machine learning models which do not discriminate against any subgroup of the population as determined by sensitive attributes such as gender or race. To avoid disparate treatment, sensitive attributes should not be considered. On the other hand, in order to avoid disparate impact, sensitive attributes must be examined, e.g., in order to learn a fair model, or…
▽ More
Recent work has explored how to train machine learning models which do not discriminate against any subgroup of the population as determined by sensitive attributes such as gender or race. To avoid disparate treatment, sensitive attributes should not be considered. On the other hand, in order to avoid disparate impact, sensitive attributes must be examined, e.g., in order to learn a fair model, or to check if a given model is fair. We introduce methods from secure multi-party computation which allow us to avoid both. By encrypting sensitive attributes, we show how an outcome-based fair model may be learned, checked, or have its outputs verified and held to account, without users revealing their sensitive attributes.
△ Less
Submitted 8 June, 2018;
originally announced June 2018.
-
How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation
Authors:
David Butler,
David Aspinall,
Adria Gascon
Abstract:
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while kee** their inputs private. Recent breakthroughs are bringing MPC into practice, solving fundamental challenges for secure distributed computation. Just as with classic protocols for encryption and key exchange, precise guarantees are needed for MPC designs and implementations;…
▽ More
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while kee** their inputs private. Recent breakthroughs are bringing MPC into practice, solving fundamental challenges for secure distributed computation. Just as with classic protocols for encryption and key exchange, precise guarantees are needed for MPC designs and implementations; any flaw will give attackers a chance to break privacy or correctness. In this paper we present the first (as far as we know) formalisation of some MPC security proofs. These proofs provide probabilistic guarantees in the computational model of security, but have a different character to machine proofs and proof tools implemented so far --- MPC proofs use a \emph{simulation} approach, in which security is established by showing indistinguishability between execution traces in the actual protocol execution and an ideal world where security is guaranteed by definition. We show that existing machinery for reasoning about probabilistic programs adapted to this setting, paving the way to precisely check a new class of cryptography arguments. We implement our proofs using the CryptHOL framework inside Isabelle/HOL.
△ Less
Submitted 31 May, 2018;
originally announced May 2018.
-
Grammar-based Compression of Unranked Trees
Authors:
Adrià Gascón,
Markus Lohrey,
Sebastian Maneth,
Carl Philipp Reh,
Kurt Sieber
Abstract:
We introduce forest straight-line programs (FSLPs) as a compressed representation of unranked ordered node-labelled trees. FSLPs are based on the operations of forest algebra and generalize tree straight-line programs. We compare the succinctness of FSLPs with two other compression schemes for unranked trees: top dags and tree straight-line programs of first-child/next sibling encodings. Efficient…
▽ More
We introduce forest straight-line programs (FSLPs) as a compressed representation of unranked ordered node-labelled trees. FSLPs are based on the operations of forest algebra and generalize tree straight-line programs. We compare the succinctness of FSLPs with two other compression schemes for unranked trees: top dags and tree straight-line programs of first-child/next sibling encodings. Efficient translations between these formalisms are provided. Finally, we show that equality of unranked trees in the setting where certain symbols are associative or commutative can be tested in polynomial time. This generalizes previous results for testing isomorphism of compressed unordered ranked trees.
△ Less
Submitted 15 February, 2018;
originally announced February 2018.
-
Synthesis of a simple self-stabilizing system
Authors:
Adrià Gascón,
Ashish Tiwari
Abstract:
With the increasing importance of distributed systems as a computing paradigm, a systematic approach to their design is needed. Although the area of formal verification has made enormous advances towards this goal, the resulting functionalities are limited to detecting problems in a particular design. By means of a classical example, we illustrate a simple template-based approach to computer-ai…
▽ More
With the increasing importance of distributed systems as a computing paradigm, a systematic approach to their design is needed. Although the area of formal verification has made enormous advances towards this goal, the resulting functionalities are limited to detecting problems in a particular design. By means of a classical example, we illustrate a simple template-based approach to computer-aided design of distributed systems based on leveraging the well-known technique of bounded model checking to the synthesis setting.
△ Less
Submitted 21 July, 2014;
originally announced July 2014.
-
CORSIKA Implementation of Heavy Quark Production and Propagation in Extensive Air Showers
Authors:
A. Bueno,
A. Gascon
Abstract:
Heavy quarks are commonly produced in current accelerator experiments. Hence it is natural to think that they should be likewise created in collisions with larger center of mass energies like the ones involving ultra-high energy cosmic rays and atmospheric nuclei. Despite this fact, a detailed treatment of heavy hadrons is missing in Monte Carlo generators of Extensive Air Showers (EAS). It is a m…
▽ More
Heavy quarks are commonly produced in current accelerator experiments. Hence it is natural to think that they should be likewise created in collisions with larger center of mass energies like the ones involving ultra-high energy cosmic rays and atmospheric nuclei. Despite this fact, a detailed treatment of heavy hadrons is missing in Monte Carlo generators of Extensive Air Showers (EAS). It is a must to improve the description of how heavy flavours appear and evolve in atmospheric showers. With this goal in mind, we study two different models for heavy quark production in proton-air collisions. We also analyze a dedicated treatment of heavy hadrons interactions with atmospheric nuclei. This paper shows how those models have been implemented as new options available in CORSIKA, one of the most used EAS simulators. This new computational tool allows us to analyze the effects that the propagation of heavy hadrons has in the EAS development
△ Less
Submitted 12 January, 2013;
originally announced January 2013.
-
A QM/MM approach for the study of monolayer-protected gold clusters
Authors:
Sandipan Banerjee,
John A. Montgomery,
José A. Gascón
Abstract:
We report the development and implementation of hybrid methods that combine quantum mechanics (QM) with molecular mechanics (MM) to theoretically characterize thiolated gold clusters. We use, as training systems, structures such as Au25(SCH2-R)18 and Au38(SCH2-R)24, which can be readily compared with recent crystallographic data. We envision that such an approach will lead to an accurate descripti…
▽ More
We report the development and implementation of hybrid methods that combine quantum mechanics (QM) with molecular mechanics (MM) to theoretically characterize thiolated gold clusters. We use, as training systems, structures such as Au25(SCH2-R)18 and Au38(SCH2-R)24, which can be readily compared with recent crystallographic data. We envision that such an approach will lead to an accurate description of key structural and electronic signatures at a fraction of the cost of a full quantum chemical treatment. As an example, we demonstrate that calculations of the 1H and 13C NMR shielding constants with our proposed QM/MM model maintain the qualitative features of a full DFT calculation, with an order-of-magnitude increase in computational efficiency.
△ Less
Submitted 2 August, 2012;
originally announced August 2012.
-
A search for ultra-high energy neutrinos in highly inclined events at the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
M. Ahlers,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
A. Almela,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Anticic,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave
, et al. (475 additional authors not shown)
Abstract:
The Surface Detector of the Pierre Auger Observatory is sensitive to neutrinos of all flavours above 0.1 EeV. These interact through charged and neutral currents in the atmosphere giving rise to extensive air showers. When interacting deeply in the atmosphere at nearly horizontal incidence, neutrinos can be distinguished from regular hadronic cosmic rays by the broad time structure of their shower…
▽ More
The Surface Detector of the Pierre Auger Observatory is sensitive to neutrinos of all flavours above 0.1 EeV. These interact through charged and neutral currents in the atmosphere giving rise to extensive air showers. When interacting deeply in the atmosphere at nearly horizontal incidence, neutrinos can be distinguished from regular hadronic cosmic rays by the broad time structure of their shower signals in the water-Cherenkov detectors. In this paper we present for the first time an analysis based on down-going neutrinos. We describe the search procedure, the possible sources of background, the method to compute the exposure and the associated systematic uncertainties. No candidate neutrinos have been found in data collected from 1 January 2004 to 31 May 2010. Assuming an E^-2 differential energy spectrum the limit on the single flavour neutrino is (E^2 * dN/dE) < 1.74x10^-7 GeV cm^-2 s^-1 sr^-1 at 90% C.L. in the energy range 1x10^17 eV < E < 1x10^20 eV.
△ Less
Submitted 7 February, 2012;
originally announced February 2012.
-
Description of Atmospheric Conditions at the Pierre Auger Observatory using the Global Data Assimilation System (GDAS)
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
M. Ahlers,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
A. Almela,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave
, et al. (477 additional authors not shown)
Abstract:
Atmospheric conditions at the site of a cosmic ray observatory must be known for reconstructing observed extensive air showers. The Global Data Assimilation System (GDAS) is a global atmospheric model predicated on meteorological measurements and numerical weather predictions. GDAS provides altitude-dependent profiles of the main state variables of the atmosphere like temperature, pressure, and hu…
▽ More
Atmospheric conditions at the site of a cosmic ray observatory must be known for reconstructing observed extensive air showers. The Global Data Assimilation System (GDAS) is a global atmospheric model predicated on meteorological measurements and numerical weather predictions. GDAS provides altitude-dependent profiles of the main state variables of the atmosphere like temperature, pressure, and humidity. The original data and their application to the air shower reconstruction of the Pierre Auger Observatory are described. By comparisons with radiosonde and weather station measurements obtained on-site in Malargüe and averaged monthly models, the utility of the GDAS data is shown.
△ Less
Submitted 24 January, 2012; v1 submitted 11 January, 2012;
originally announced January 2012.
-
The effect of the geomagnetic field on cosmic ray energy estimates and large scale anisotropy searches on data from the Pierre Auger Observatory
Authors:
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier,
G. Avila
, et al. (473 additional authors not shown)
Abstract:
We present a comprehensive study of the influence of the geomagnetic field on the energy estimation of extensive air showers with a zenith angle smaller than $60^\circ$, detected at the Pierre Auger Observatory. The geomagnetic field induces an azimuthal modulation of the estimated energy of cosmic rays up to the ~2% level at large zenith angles. We present a method to account for this modulation…
▽ More
We present a comprehensive study of the influence of the geomagnetic field on the energy estimation of extensive air showers with a zenith angle smaller than $60^\circ$, detected at the Pierre Auger Observatory. The geomagnetic field induces an azimuthal modulation of the estimated energy of cosmic rays up to the ~2% level at large zenith angles. We present a method to account for this modulation of the reconstructed energy. We analyse the effect of the modulation on large scale anisotropy searches in the arrival direction distributions of cosmic rays. At a given energy, the geomagnetic effect is shown to induce a pseudo-dipolar pattern at the percent level in the declination distribution that needs to be accounted for.
△ Less
Submitted 30 November, 2011;
originally announced November 2011.
-
The Lateral Trigger Probability function for the Ultra-High Energy Cosmic Ray Showers detected by the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (473 additional authors not shown)
Abstract:
In this paper we introduce the concept of Lateral Trigger Probability (LTP) function, i.e., the probability for an extensive air shower (EAS) to trigger an individual detector of a ground based array as a function of distance to the shower axis, taking into account energy, mass and direction of the primary cosmic ray. We apply this concept to the surface array of the Pierre Auger Observatory consi…
▽ More
In this paper we introduce the concept of Lateral Trigger Probability (LTP) function, i.e., the probability for an extensive air shower (EAS) to trigger an individual detector of a ground based array as a function of distance to the shower axis, taking into account energy, mass and direction of the primary cosmic ray. We apply this concept to the surface array of the Pierre Auger Observatory consisting of a 1.5 km spaced grid of about 1600 water Cherenkov stations. Using Monte Carlo simulations of ultra-high energy showers the LTP functions are derived for energies in the range between 10^{17} and 10^{19} eV and zenith angles up to 65 degs. A parametrization combining a step function with an exponential is found to reproduce them very well in the considered range of energies and zenith angles. The LTP functions can also be obtained from data using events simultaneously observed by the fluorescence and the surface detector of the Pierre Auger Observatory (hybrid events). We validate the Monte-Carlo results showing how LTP functions from data are in good agreement with simulations.
△ Less
Submitted 28 November, 2011;
originally announced November 2011.
-
Search for signatures of magnetically-induced alignment in the arrival directions measured by the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (474 additional authors not shown)
Abstract:
We present the results of an analysis of data recorded at the Pierre Auger Observatory in which we search for groups of directionally-aligned events (or `multiplets') which exhibit a correlation between arrival direction and the inverse of the energy. These signatures are expected from sets of events coming from the same source after having been deflected by intervening coherent magnetic fields. T…
▽ More
We present the results of an analysis of data recorded at the Pierre Auger Observatory in which we search for groups of directionally-aligned events (or `multiplets') which exhibit a correlation between arrival direction and the inverse of the energy. These signatures are expected from sets of events coming from the same source after having been deflected by intervening coherent magnetic fields. The observation of several events from the same source would open the possibility to accurately reconstruct the position of the source and also measure the integral of the component of the magnetic field orthogonal to the trajectory of the cosmic rays. We describe the largest multiplets found and compute the probability that they appeared by chance from an isotropic distribution. We find no statistically significant evidence for the presence of multiplets arising from magnetic deflections in the present data.
△ Less
Submitted 10 November, 2011;
originally announced November 2011.
-
Propagation of B mesons in the atmosphere
Authors:
A. Bueno,
A. Gascon,
J. I. Illana,
M. Masip
Abstract:
Collisions of cosmic rays in the atmosphere may produce heavy hadrons of very high energy. The decay length of a $B$ meson of energy above $10^7$ GeV is larger than 1 km, implying that such a particle tends to interact in the air before it decays. We show that the fraction of energy deposited in these interactions is much smaller than in proton and pion collisions. We parameterize their elasticity…
▽ More
Collisions of cosmic rays in the atmosphere may produce heavy hadrons of very high energy. The decay length of a $B$ meson of energy above $10^7$ GeV is larger than 1 km, implying that such a particle tends to interact in the air before it decays. We show that the fraction of energy deposited in these interactions is much smaller than in proton and pion collisions. We parameterize their elasticity and determine the average number of interactions and the atmospheric depth at the decay point for different initial energies. We find that the profile of a $3\times 10^9$ GeV bottom shower may be very different from the profile of a proton shower of the same energy, defining either a very deep maximum, or two maxima, or other features that cannot be parameterized with a single Gaisser-Hillas function. Finally, we discuss under what conditions a bottom hadron inside the parent air shower may provide observable effects.
△ Less
Submitted 6 November, 2011; v1 submitted 20 September, 2011;
originally announced September 2011.
-
The Pierre Auger Observatory I: The Cosmic Ray Energy Spectrum and Related Measurements
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Studies of the cosmic ray energy spectrum at the highest energies with the Pierre Auger Observatory
Studies of the cosmic ray energy spectrum at the highest energies with the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory V: Enhancements
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Ongoing and planned enhancements of the Pierre Auger Observatory
Ongoing and planned enhancements of the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory IV: Operation and Monitoring
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Technical reports on operations and monitoring of the Pierre Auger Observatory
Technical reports on operations and monitoring of the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory III: Other Astrophysical Observations
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Astrophysical observations of ultra-high-energy cosmic rays with the Pierre Auger Observatory
Astrophysical observations of ultra-high-energy cosmic rays with the Pierre Auger Observatory
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
The Pierre Auger Observatory II: Studies of Cosmic Ray Composition and Hadronic Interaction models
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (471 additional authors not shown)
Abstract:
Studies of the composition of the highest energy cosmic rays with the Pierre Auger Observatory, including examination of hadronic physics effects on the structure of extensive air showers.
Studies of the composition of the highest energy cosmic rays with the Pierre Auger Observatory, including examination of hadronic physics effects on the structure of extensive air showers.
△ Less
Submitted 24 July, 2011;
originally announced July 2011.
-
Anisotropy and chemical composition of ultra-high energy cosmic rays using arrival directions measured by the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier
, et al. (468 additional authors not shown)
Abstract:
The Pierre Auger Collaboration has reported evidence for anisotropy in the distribution of arrival directions of the cosmic rays with energies $E>E_{th}=5.5\times 10^{19}$ eV. These show a correlation with the distribution of nearby extragalactic objects, including an apparent excess around the direction of Centaurus A. If the particles responsible for these excesses at $E>E_{th}$ are heavy nuclei…
▽ More
The Pierre Auger Collaboration has reported evidence for anisotropy in the distribution of arrival directions of the cosmic rays with energies $E>E_{th}=5.5\times 10^{19}$ eV. These show a correlation with the distribution of nearby extragalactic objects, including an apparent excess around the direction of Centaurus A. If the particles responsible for these excesses at $E>E_{th}$ are heavy nuclei with charge $Z$, the proton component of the sources should lead to excesses in the same regions at energies $E/Z$. We here report the lack of anisotropies in these directions at energies above $E_{th}/Z$ (for illustrative values of $Z=6,\ 13,\ 26$). If the anisotropies above $E_{th}$ are due to nuclei with charge $Z$, and under reasonable assumptions about the acceleration process, these observations imply stringent constraints on the allowed proton fraction at the lower energies.
△ Less
Submitted 4 July, 2011; v1 submitted 15 June, 2011;
originally announced June 2011.
-
Search for First Harmonic Modulation in the Right Ascension Distribution of Cosmic Rays Detected at the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier,
G. Avila
, et al. (444 additional authors not shown)
Abstract:
We present the results of searches for dipolar-type anisotropies in different energy ranges above $2.5\times 10^{17}$ eV with the surface detector array of the Pierre Auger Observatory, reporting on both the phase and the amplitude measurements of the first harmonic modulation in the right-ascension distribution. Upper limits on the amplitudes are obtained, which provide the most stringent bounds…
▽ More
We present the results of searches for dipolar-type anisotropies in different energy ranges above $2.5\times 10^{17}$ eV with the surface detector array of the Pierre Auger Observatory, reporting on both the phase and the amplitude measurements of the first harmonic modulation in the right-ascension distribution. Upper limits on the amplitudes are obtained, which provide the most stringent bounds at present, being below 2% at 99% $C.L.$ for EeV energies. We also compare our results to those of previous experiments as well as with some theoretical expectations.
△ Less
Submitted 14 March, 2011;
originally announced March 2011.
-
Advanced functionality for radio analysis in the Offline software framework of the Pierre Auger Observatory
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
I. F. M. Albuquerque,
D. Allard,
I. Allekotte,
J. Allen,
P. Allison,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
C. Aramo,
E. Arganda,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier,
G. Avila
, et al. (446 additional authors not shown)
Abstract:
The advent of the Auger Engineering Radio Array (AERA) necessitates the development of a powerful framework for the analysis of radio measurements of cosmic ray air showers. As AERA performs "radio-hybrid" measurements of air shower radio emission in coincidence with the surface particle detectors and fluorescence telescopes of the Pierre Auger Observatory, the radio analysis functionality had to…
▽ More
The advent of the Auger Engineering Radio Array (AERA) necessitates the development of a powerful framework for the analysis of radio measurements of cosmic ray air showers. As AERA performs "radio-hybrid" measurements of air shower radio emission in coincidence with the surface particle detectors and fluorescence telescopes of the Pierre Auger Observatory, the radio analysis functionality had to be incorporated in the existing hybrid analysis solutions for fluoresence and surface detector data. This goal has been achieved in a natural way by extending the existing Auger Offline software framework with radio functionality. In this article, we lay out the design, highlights and features of the radio extension implemented in the Auger Offline framework. Its functionality has achieved a high degree of sophistication and offers advanced features such as vectorial reconstruction of the electric field, advanced signal processing algorithms, a transparent and efficient handling of FFTs, a very detailed simulation of detector effects, and the read-in of multiple data formats including data from various radio simulation codes. The source code of this radio functionality can be made available to interested parties on request.
△ Less
Submitted 3 February, 2011; v1 submitted 24 January, 2011;
originally announced January 2011.
-
Update on the correlation of the highest energy cosmic rays with nearby extragalactic matter
Authors:
The Pierre Auger Collaboration,
P. Abreu,
M. Aglietta,
E. J. Ahn,
D. Allard,
I. Allekotte,
J. Allen,
J. Alvarez Castillo,
J. Alvarez-Muñiz,
M. Ambrosio,
A. Aminaei,
L. Anchordoqui,
S. Andringa,
T. Antičić,
A. Anzalone,
C. Aramo,
E. Arganda,
K. Arisaka,
F. Arqueros,
H. Asorey,
P. Assis,
J. Aublin,
M. Ave,
M. Avenier,
G. Avila
, et al. (450 additional authors not shown)
Abstract:
Data collected by the Pierre Auger Observatory through 31 August 2007 showed evidence for anisotropy in the arrival directions of cosmic rays above the Greisen-Zatsepin-Kuz'min energy threshold, \nobreak{$6\times 10^{19}$eV}. The anisotropy was measured by the fraction of arrival directions that are less than $3.1^\circ$ from the position of an active galactic nucleus within 75 Mpc (using the Véro…
▽ More
Data collected by the Pierre Auger Observatory through 31 August 2007 showed evidence for anisotropy in the arrival directions of cosmic rays above the Greisen-Zatsepin-Kuz'min energy threshold, \nobreak{$6\times 10^{19}$eV}. The anisotropy was measured by the fraction of arrival directions that are less than $3.1^\circ$ from the position of an active galactic nucleus within 75 Mpc (using the Véron-Cetty and Véron $12^{\rm th}$ catalog). An updated measurement of this fraction is reported here using the arrival directions of cosmic rays recorded above the same energy threshold through 31 December 2009. The number of arrival directions has increased from 27 to 69, allowing a more precise measurement. The correlating fraction is $(38^{+7}_{-6})%$, compared with $21%$ expected for isotropic cosmic rays. This is down from the early estimate of $(69^{+11}_{-13})%$. The enlarged set of arrival directions is examined also in relation to other populations of nearby extragalactic objects: galaxies in the 2 Microns All Sky Survey and active galactic nuclei detected in hard X-rays by the Swift Burst Alert Telescope. A celestial region around the position of the radiogalaxy Cen A has the largest excess of arrival directions relative to isotropic expectations. The 2-point autocorrelation function is shown for the enlarged set of arrival directions and compared to the isotropic expectation.
△ Less
Submitted 29 September, 2010; v1 submitted 9 September, 2010;
originally announced September 2010.
-
Unification and Matching on Compressed Terms
Authors:
Adrià Gascón,
Guillem Godoy,
Manfred Schmidt-Schauß
Abstract:
Term unification plays an important role in many areas of computer science, especially in those related to logic. The universal mechanism of grammar-based compression for terms, in particular the so-called Singleton Tree Grammars (STG), have recently drawn considerable attention. Using STGs, terms of exponential size and height can be represented in linear space. Furthermore, the term representa…
▽ More
Term unification plays an important role in many areas of computer science, especially in those related to logic. The universal mechanism of grammar-based compression for terms, in particular the so-called Singleton Tree Grammars (STG), have recently drawn considerable attention. Using STGs, terms of exponential size and height can be represented in linear space. Furthermore, the term representation by directed acyclic graphs (dags) can be efficiently simulated. The present paper is the result of an investigation on term unification and matching when the terms given as input are represented using different compression mechanisms for terms such as dags and Singleton Tree Grammars. We describe a polynomial time algorithm for context matching with dags, when the number of different context variables is fixed for the problem. For the same problem, NP-completeness is obtained when the terms are represented using the more general formalism of Singleton Tree Grammars. For first-order unification and matching polynomial time algorithms are presented, each of them improving previous results for those problems.
△ Less
Submitted 8 March, 2010;
originally announced March 2010.
-
Surface effects on the statistics of the local density of states in metallic nanoparticles: manifestation on the NMR spectra
Authors:
J. A. Gascon,
H. M. Pastawski
Abstract:
In metallic nanoparticles, shifts in the ionization energy of surface atoms with respect to bulk atoms can lead to surface bands. Within a simple Tight Binding model we find that the projection of the electronic density of states on these sites presents two overlap** structures. One of them is characterized by the level spacing coming from bulk states and the other arises from the surface stat…
▽ More
In metallic nanoparticles, shifts in the ionization energy of surface atoms with respect to bulk atoms can lead to surface bands. Within a simple Tight Binding model we find that the projection of the electronic density of states on these sites presents two overlap** structures. One of them is characterized by the level spacing coming from bulk states and the other arises from the surface states. In very small particles, this contributes to an over-broadening of the NMR absorption spectra, determined by the Knight shift distribution of magnetic nuclei. We compare our calculated Knight shifts with experiments on aluminum nanoparticles, and show that the deviation of the scaling law as a function of temperature and particle size can be explained in terms of surface states.
△ Less
Submitted 7 December, 2005;
originally announced December 2005.