-
SOS
Authors:
Jasper Caravan,
Michael Han,
Andrew Kalashnikov,
Tanya Khovanova,
Ella Li,
Alexander Meng,
Vaibhav Rastogi,
Gordon Redwine,
Lev Strougov,
Angela Zhao
Abstract:
SOS is a game similar to tic-tac-toe. We study a variety of variations of it played on a 1-by-$n$ rectangle. On our journey we change the target string to SOO, then study all target strings containing SSS, then go back to finite strings and study SOSO. Then we create a variation with two target strings SSSS-OOOO. We continue with misère games. After that we look at different changes of the board:…
▽ More
SOS is a game similar to tic-tac-toe. We study a variety of variations of it played on a 1-by-$n$ rectangle. On our journey we change the target string to SOO, then study all target strings containing SSS, then go back to finite strings and study SOSO. Then we create a variation with two target strings SSSS-OOOO. We continue with misère games. After that we look at different changes of the board: we wrap the board around, add dimension, and allow it to expand. We end with a variation that came from the ultimate tic-tac-toe.
△ Less
Submitted 9 June, 2023;
originally announced June 2023.
-
The Struggles of Chessland
Authors:
Irene Choi,
Shreyas Ekanathan,
Aidan Gao,
Tanya Khovanova,
Sylvia Zia Lee,
Rajarshi Mandal,
Vaibhav Rastogi,
Daniel Sheffield,
Michael Yang,
Angela Zhao,
Corey Zhao
Abstract:
This is a fairy tale taking place in Chessland, located in the Bermuda triangle. The chess pieces survey their land and trap enemy pieces. Behind the story, there is fascinating mathematics on how to optimize surveying and trap**. The tale is written by the students in the PRIMES STEP junior group, who were in grades 6 through 9. The paper has a conclusion, written by the group's mentor, Tanya K…
▽ More
This is a fairy tale taking place in Chessland, located in the Bermuda triangle. The chess pieces survey their land and trap enemy pieces. Behind the story, there is fascinating mathematics on how to optimize surveying and trap**. The tale is written by the students in the PRIMES STEP junior group, who were in grades 6 through 9. The paper has a conclusion, written by the group's mentor, Tanya Khovanova, explaining the students' results in terms of graph theory.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Development of slurry targets for high repetition-rate XFEL experiments
Authors:
Raymond F. Smith,
Vinay Rastogi,
Amy E. Lazicki,
Martin G. Gorman,
Richard Briggs,
Amy L. Coleman,
Carol Davis,
Saransh Singh,
David McGonegle,
Samantha M. Clarke,
Travis Volz,
Trevor Hutchinson,
Christopher McGuire,
Dayne E. Fratanduono,
Damian C. Swift,
Eric Folsom,
Cynthia A. Bolme,
Arianna E. Gleason,
Federica Coppari,
Hae Ja Lee,
Bob Nagler,
Eric Cunningham,
Eduardo Granados,
Phil Heimann,
Richard G. Kraus
, et al. (4 additional authors not shown)
Abstract:
Combining an x-ray free electron laser (XFEL) with high power laser drivers enables the study of phase transitions, equation-of-state, grain growth, strength, and transformation pathways as a function of pressure to 100s GPa along different thermodynamic compression paths. Future high-repetition rate laser operation will enable data to be accumulated at >1 Hz which poses a number of experimental c…
▽ More
Combining an x-ray free electron laser (XFEL) with high power laser drivers enables the study of phase transitions, equation-of-state, grain growth, strength, and transformation pathways as a function of pressure to 100s GPa along different thermodynamic compression paths. Future high-repetition rate laser operation will enable data to be accumulated at >1 Hz which poses a number of experimental challenges including the need to rapidly replenish the target. Here, we present a combined shock-compression and X-ray diffraction study on vol% epoxy(50)-crystalline grains(50) (slurry) targets, which can be fashioned into extruded ribbons for high repetition-rate operation. For shock-loaded NaCl-slurry samples, we observe pressure, density and temperature states within the embedded NaCl grains consistent with observations for shock-compressed single-crystal NaCl.
△ Less
Submitted 11 January, 2022;
originally announced January 2022.
-
Analysis of Model-Free Reinforcement Learning Control Schemes on self-balancing Wheeled Extendible System
Authors:
Kanishk .,
Rushil Kumar,
Vikas Rastogi,
Ajeet Kumar
Abstract:
Traditional linear control strategies have been extensively researched and utilized in many robotic and industrial applications and yet they do not respond to the total dynamics of the systems. To avoid tedious calculations for nonlinear control schemes like H-infinity control and predictive control, the application of Reinforcement Learning(RL) can provide alternative solutions. This article pres…
▽ More
Traditional linear control strategies have been extensively researched and utilized in many robotic and industrial applications and yet they do not respond to the total dynamics of the systems. To avoid tedious calculations for nonlinear control schemes like H-infinity control and predictive control, the application of Reinforcement Learning(RL) can provide alternative solutions. This article presents the implementation of RL control with Deep Deterministic Policy Gradient and Proximal Policy Optimization on a mobile self-balancing Extendable Wheeled Inverted Pendulum (E-WIP) system with provided state history to attain improved control. Such RL models make the task of finding satisfactory control schemes easier and responding to the dynamics effectively while self-tuning the parameters to provide better control. In this article, RL-based controllers are pitted against an MPC controller to evaluate the performance on the basis of state variables and trajectory errors of the E-WIP system while following a specific desired trajectory.
△ Less
Submitted 14 March, 2022; v1 submitted 16 November, 2021;
originally announced November 2021.
-
Lightweight, Multi-Stage, Compiler-Assisted Application Specialization
Authors:
Mohannad Alhanahnah,
Rithik Jain,
Vaibhav Rastogi,
Somesh Jha,
Thomas Reps
Abstract:
Program debloating aims to enhance the performance and reduce the attack surface of bloated applications. Several techniques have been recently proposed to specialize programs. These approaches are either based on unsound strategies or demanding techniques, leading to unsafe results or a high overhead debloating process. In this paper, we address these limitations by applying partial-evaluation pr…
▽ More
Program debloating aims to enhance the performance and reduce the attack surface of bloated applications. Several techniques have been recently proposed to specialize programs. These approaches are either based on unsound strategies or demanding techniques, leading to unsafe results or a high overhead debloating process. In this paper, we address these limitations by applying partial-evaluation principles to generate specialized applications. Our approach relies on a simple observation that an application typically consists of configuration logic, followed by the main logic of the program. The configuration logic specifies what functionality in the main logic should be executed. LMCAS performs partial interpretation to capture a precise program state of the configuration logic based on the supplied inputs. LMCAS then applies partial-evaluation optimizations to generate a specialized program by propagating the constants in the captured partial state, eliminating unwanted code, and preserving the desired functionalities. Our evaluation of LMCAS on commonly used benchmarks and real-world applications shows that it successfully removes unwanted features while preserving the functionality and robustness of the deblated programs, runs faster than prior tools, and reduces the attack surface of specialized programs. LMCAS runs 1500x, 4.6x, and 1.2x faster than the state-of-the-art debloating tools CHISEL, RAZOR, and OCCAM, respectively; achieves 25% reduction in the binary size; reduces the attack surface of code-reuse attacks by removing 51.7% of the total gadgets and eliminating 83% of known CVE vulnerabilities
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Fun with Latin Squares
Authors:
Michael Han,
Tanya Khovanova,
Ella Kim,
Evin Liang,
Miriam,
Lubashev,
Oleg Polin,
Vaibhav Rastogi,
Benjamin Taycher,
Ada Tsui,
Cindy Wei
Abstract:
Do you want to know what an anti-chiece Latin square is? Or what a non-consecutive toroidal modular Latin square is? We invented a ton of new types of Latin squares, some inspired by existing Sudoku variations. We can't wait to introduce them to you and answer important questions, such as: do they even exist? If so, under what conditions? What are some of their interesting properties? And how do w…
▽ More
Do you want to know what an anti-chiece Latin square is? Or what a non-consecutive toroidal modular Latin square is? We invented a ton of new types of Latin squares, some inspired by existing Sudoku variations. We can't wait to introduce them to you and answer important questions, such as: do they even exist? If so, under what conditions? What are some of their interesting properties? And how do we generate them?
△ Less
Submitted 2 September, 2021;
originally announced September 2021.
-
SpellBound: Defending Against Package Typosquatting
Authors:
Matthew Taylor,
Ruturaj K. Vaidya,
Drew Davidson,
Lorenzo De Carli,
Vaibhav Rastogi
Abstract:
Package managers for software repositories based on a single programming language are very common. Examples include npm (JavaScript), and PyPI (Python). These tools encourage code reuse, making it trivial for developers to import external packages. Unfortunately, repositories' size and the ease with which packages can be published facilitates the practice of typosquatting: the uploading of a packa…
▽ More
Package managers for software repositories based on a single programming language are very common. Examples include npm (JavaScript), and PyPI (Python). These tools encourage code reuse, making it trivial for developers to import external packages. Unfortunately, repositories' size and the ease with which packages can be published facilitates the practice of typosquatting: the uploading of a package with name similar to that of a highly popular package, typically with the aim of capturing some of the popular package's installs. Typosquatting has serious negative implications, resulting in developers importing malicious packages, or -- as we show -- code clones which do not incorporate recent security updates. In order to tackle this problem, we present SpellBound, a tool for identifying and reporting potentially erroneous imports to developers. SpellBound implements a novel typosquatting detection technique, based on an in-depth analysis of npm and PyPI. Our technique leverages a model of lexical similarity between names, and further incorporates the notion of package popularity. This approach flags cases where unknown/scarcely used packages would be installed in place of popular ones with similar names, before installation occurs. We evaluated SpellBound on both npm and PyPI, with encouraging results: SpellBound flags typosquatting cases while generating limited warnings (0.5% of total package installs), and low overhead (only 2.5% of package install time). Furthermore, SpellBound allowed us to confirm known cases of typosquatting and discover one high-profile, unknown case of typosquatting that resulted in a package takedown by the npm security team.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Robust Attribution Regularization
Authors:
Jiefeng Chen,
Xi Wu,
Vaibhav Rastogi,
Yingyu Liang,
Somesh Jha
Abstract:
An emerging problem in trustworthy machine learning is to train models that produce robust interpretations for their predictions. We take a step towards solving this problem through the lens of axiomatic attribution of neural networks. Our theory is grounded in the recent work, Integrated Gradients (IG), in axiomatically attributing a neural network's output change to its input change. We propose…
▽ More
An emerging problem in trustworthy machine learning is to train models that produce robust interpretations for their predictions. We take a step towards solving this problem through the lens of axiomatic attribution of neural networks. Our theory is grounded in the recent work, Integrated Gradients (IG), in axiomatically attributing a neural network's output change to its input change. We propose training objectives in classic robust optimization models to achieve robust IG attributions. Our objectives give principled generalizations of previous objectives designed for robust predictions, and they naturally degenerate to classic soft-margin training for one-layer neural networks. We also generalize previous theory and prove that the objectives for different robust optimization models are closely related. Experiments demonstrate the effectiveness of our method, and also point to intriguing problems which hint at the need for better optimization techniques or better neural network architectures for robust attribution training.
△ Less
Submitted 26 October, 2019; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Security Issues in Language-based Software Ecosystems
Authors:
Ruturaj K. Vaidya,
Lorenzo De Carli,
Drew Davidson,
Vaibhav Rastogi
Abstract:
Language-based ecosystems (LBE), i.e., software ecosystems based on a single programming language, are very common. Examples include the npm ecosystem for JavaScript, and PyPI for Python. These environments encourage code reuse between packages, and incorporate utilities - package managers - for automatically resolving dependencies. However, the same aspects that make these systems popular - ease…
▽ More
Language-based ecosystems (LBE), i.e., software ecosystems based on a single programming language, are very common. Examples include the npm ecosystem for JavaScript, and PyPI for Python. These environments encourage code reuse between packages, and incorporate utilities - package managers - for automatically resolving dependencies. However, the same aspects that make these systems popular - ease of publishing code and importing external code - also create novel security issues, which have so far seen little study.
We present an a systematic study of security issues that plague LBEs. These issues are inherent to the ways these ecosystems work and cannot be resolved by fixing software vulnerabilities in either the packages or the utilities, e.g., package manager tools, that build these ecosystems. We systematically characterize recent security attacks from various aspects, including attack strategies, vectors, and goals. Our characterization and in-depth analysis of npm and PyPI ecosystems, which represent the largest LBEs, covering nearly one million packages indicates that these ecosystems make an opportune environment for attackers to incorporate stealthy attacks.
Overall, we argue that (i) fully automated detection of malicious packages is likely to be unfeasible; however (ii) tools and metrics that help developers assess the risk of including external dependencies would go a long way toward preventing attacks.
△ Less
Submitted 30 November, 2021; v1 submitted 6 March, 2019;
originally announced March 2019.
-
Compression of Femtosecond Pulses in a wide Wavelength Range Using a Large Mode Area Tapered Fiber
Authors:
M. Rehan,
G. Kumar,
V. Rastogi,
D. A. Korobko,
A. A. Sysolyatin
Abstract:
We report design of a tapered fiber that can be used for compression of pulses at different central wavelengths. The proposed fiber is a 3-layer W-type large-mode-area fiber, which has been tapered to transform the mode area from 1700 μm2 to 900 μm2. We determine the exact length of the maximum pulse compression and numerically demonstrate the compression of 250 fs, 100 kW peak power input pulse t…
▽ More
We report design of a tapered fiber that can be used for compression of pulses at different central wavelengths. The proposed fiber is a 3-layer W-type large-mode-area fiber, which has been tapered to transform the mode area from 1700 μm2 to 900 μm2. We determine the exact length of the maximum pulse compression and numerically demonstrate the compression of 250 fs, 100 kW peak power input pulse to 15 fs, 850 kW at 1.55 μm wavelength and 250 fs, 120 kW peak power input pulses to 28 fs, 700 kW and to 46 fs, 500 kW at 1.8 μm and 2 μm wavelengths, respectively. Such a fiber can find wide ranging applications including in communication, spectroscopy and medicine.
△ Less
Submitted 22 November, 2018;
originally announced November 2018.
-
Neural-Augmented Static Analysis of Android Communication
Authors:
**man Zhao,
Aws Albarghouthi,
Vaibhav Rastogi,
Somesh Jha,
Damien Octeau
Abstract:
We address the problem of discovering communication links between applications in the popular Android mobile operating system, an important problem for security and privacy in Android. Any scalable static analysis in this complex setting is bound to produce an excessive amount of false-positives, rendering it impractical. To improve precision, we propose to augment static analysis with a trained n…
▽ More
We address the problem of discovering communication links between applications in the popular Android mobile operating system, an important problem for security and privacy in Android. Any scalable static analysis in this complex setting is bound to produce an excessive amount of false-positives, rendering it impractical. To improve precision, we propose to augment static analysis with a trained neural-network model that estimates the probability that a communication link truly exists. We describe a neural-network architecture that encodes abstractions of communicating objects in two applications and estimates the probability with which a link indeed exists. At the heart of our architecture are type-directed encoders (TDE), a general framework for elegantly constructing encoders of a compound data type by recursively composing encoders for its constituent types. We evaluate our approach on a large corpus of Android applications, and demonstrate that it achieves very high accuracy. Further, we conduct thorough interpretability studies to understand the internals of the learned neural networks.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks
Authors:
Jiefeng Chen,
Xi Wu,
Vaibhav Rastogi,
Yingyu Liang,
Somesh Jha
Abstract:
Wide adoption of artificial neural networks in various domains has led to an increasing interest in defending adversarial attacks against them. Preprocessing defense methods such as pixel discretization are particularly attractive in practice due to their simplicity, low computational overhead, and applicability to various systems. It is observed that such methods work well on simple datasets like…
▽ More
Wide adoption of artificial neural networks in various domains has led to an increasing interest in defending adversarial attacks against them. Preprocessing defense methods such as pixel discretization are particularly attractive in practice due to their simplicity, low computational overhead, and applicability to various systems. It is observed that such methods work well on simple datasets like MNIST, but break on more complicated ones like ImageNet under recently proposed strong white-box attacks. To understand the conditions for success and potentials for improvement, we study the pixel discretization defense method, including more sophisticated variants that take into account the properties of the dataset being discretized. Our results again show poor resistance against the strong attacks. We analyze our results in a theoretical framework and offer strong evidence that pixel discretization is unlikely to work on all but the simplest of the datasets. Furthermore, our arguments present insights why some other preprocessing defenses may be insecure.
△ Less
Submitted 3 October, 2019; v1 submitted 20 May, 2018;
originally announced May 2018.
-
Towards Least Privilege Containers with Cimplifier
Authors:
Vaibhav Rastogi,
Drew Davidson,
Lorenzo De Carli,
Somesh Jha,
Patrick McDaniel
Abstract:
Application containers, such as Docker containers, have recently gained popularity as a solution for agile and seamless deployment of applications. These light-weight virtualization environments run applications that are packed together with their resources and configuration information, and thus can be deployed across various software platforms. However, these software ecosystems are not conduciv…
▽ More
Application containers, such as Docker containers, have recently gained popularity as a solution for agile and seamless deployment of applications. These light-weight virtualization environments run applications that are packed together with their resources and configuration information, and thus can be deployed across various software platforms. However, these software ecosystems are not conducive to the true and tried security principles of privilege separation (PS) and principle of least privilege (PLP). We propose algorithms and a tool Cimplifier, which address these concerns in the context of containers. Specifically, given a container our tool partitions them into simpler containers, which are only provided enough resources to perform their functionality. As part our solution, we develop techniques for analyzing resource usage, for performing partitioning, and gluing the containers together to preserve functionality. Our evaluation on real-world containers demonstrates that Cimplifier can preserve the original functionality, leads to reduction in image size of 58-95%, and processes even large containers in under thirty seconds.
△ Less
Submitted 26 February, 2016;
originally announced February 2016.
-
DroidNative: Semantic-Based Detection of Android Native Code Malware
Authors:
Shahid Alam,
Zhengyang Qu,
Ryan Riley,
Yan Chen,
Vaibhav Rastogi
Abstract:
According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively ~99% on the Android platform. Malware writers are applying stealthy mutations (obfuscations) to create malware variants, thwarting detection by signature based detectors. In addition, the plethora of more sophisticated detectors making use of static analysis…
▽ More
According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively ~99% on the Android platform. Malware writers are applying stealthy mutations (obfuscations) to create malware variants, thwarting detection by signature based detectors. In addition, the plethora of more sophisticated detectors making use of static analysis techniques to detect such variants operate only at the bytecode level, meaning that malware embedded in native code goes undetected. A recent study shows that 86% of the most popular Android applications contain native code, making this a plausible threat. This paper proposes DroidNative, an Android malware detector that uses specific control flow patterns to reduce the effect of obfuscations, provides automation and platform independence, and as far as we know is the first system that operates at the Android native code level, allowing it to detect malware embedded in both native code and bytecode. When tested with traditional malware variants it achieves a detection rate (DR) of 99.48%, compared to academic and commercial tools' DRs that range from 8.33% -- 93.22%. When tested with a dataset of 2240 samples DroidNative achieves a DR of 99.16%, a false positive rate of 0.4% and an average detection time of 26.87 sec/sample.
△ Less
Submitted 21 February, 2016; v1 submitted 15 February, 2016;
originally announced February 2016.
-
Design and analysis of annulus core few mode EDFA for modal gain equalization
Authors:
Ankita Gaur,
Vipul Rastogi
Abstract:
Few-mode fiber amplifier is widely under study to overcome the issue of internet traffic in optical communication. This article proposes annulus core few-mode erbium doped fiber (FM-EDF) with annulus or extra annulus do** for amplification of the LP01, LP11, LP21, and LP31 signal mode groups with low differential modal gain (DMG). Our simulations confirm that extra annulus do** helps in reduci…
▽ More
Few-mode fiber amplifier is widely under study to overcome the issue of internet traffic in optical communication. This article proposes annulus core few-mode erbium doped fiber (FM-EDF) with annulus or extra annulus do** for amplification of the LP01, LP11, LP21, and LP31 signal mode groups with low differential modal gain (DMG). Our simulations confirm that extra annulus do** helps in reducing DMG of higher order mode groups. We have achieved less than 2.2 dB DMG over C-band for 4-mode groups using extra annulus do**. The proposed EDF would be useful for space division multiplexing (SDM) based optical fiber communication system.
△ Less
Submitted 19 January, 2016;
originally announced January 2016.
-
Laser Induced Damage Studies in Borosilicate Glass Using nanosecond and sub nanosecond pulses
Authors:
Vinay Rastogi,
S. Chaurasia,
D. S. Munda
Abstract:
The damage mechanism induced by laser pulse of different duration in borosilicate glass widely used for making confinement geometry targets which are important for laser driven shock multiplication and elongation of pressure pulse, is studied. We measured the front and rear surface damage threshold of borosilicate glass and their dependency on laser parameters. In this paper, we also study the the…
▽ More
The damage mechanism induced by laser pulse of different duration in borosilicate glass widely used for making confinement geometry targets which are important for laser driven shock multiplication and elongation of pressure pulse, is studied. We measured the front and rear surface damage threshold of borosilicate glass and their dependency on laser parameters. In this paper, we also study the thermal effects on the damage diameters, generated at the time of plasma formation. These induced damage width, geometries and microstructure changes are measured and analyzed with optical microscope, scanning electron microscope and Raman spectroscopy. The results show that at low energies symmetrical damages are found and these damage width increases nonlinearly with laser intensity. The emitted optical spectrum during the process of breakdown is also investigated and is used for the characterization of emitted plasma such as plasma temperature and free electron density. Optical emission lines from Si I at 500 nm, Si II at 385nm and Si III at 455 nm are taken for the temperature calculations.
△ Less
Submitted 13 January, 2016;
originally announced January 2016.
-
Finding Connected Components on Map-reduce in Logarithmic Rounds
Authors:
Vibhor Rastogi,
Ashwin Machanavajjhala,
Laukik Chitnis,
Anish Das Sarma
Abstract:
Given a large graph G = (V,E) with millions of nodes and edges, how do we compute its connected components efficiently? Recent work addresses this problem in map-reduce, where a fundamental trade-off exists between the number of map-reduce rounds and the communication of each round. Denoting d the diameter of the graph, and n the number of nodes in the largest component, all prior map-reduce techn…
▽ More
Given a large graph G = (V,E) with millions of nodes and edges, how do we compute its connected components efficiently? Recent work addresses this problem in map-reduce, where a fundamental trade-off exists between the number of map-reduce rounds and the communication of each round. Denoting d the diameter of the graph, and n the number of nodes in the largest component, all prior map-reduce techniques either require d rounds, or require about n|V| + |E| communication per round. We propose two randomized map-reduce algorithms -- (i) Hash-Greater-To-Min, which provably requires at most 3log(n) rounds with high probability, and at most 2(|V| + |E|) communication per round, and (ii) Hash-to-Min, which has a worse theoretical complexity, but in practice completes in at most 2log(d) rounds and 3(|V| + |E|) communication per rounds.
Our techniques for connected components can be applied to clustering as well. We propose a novel algorithm for agglomerative single linkage clustering in map-reduce. This is the first algorithm that can provably compute a clustering in at most O(log(n)) rounds, where n is the size of the largest cluster. We show the effectiveness of all our algorithms through detailed experiments on large synthetic as well as real-world datasets.
△ Less
Submitted 12 November, 2012; v1 submitted 24 March, 2012;
originally announced March 2012.
-
Large-Scale Collective Entity Matching
Authors:
Vibhor Rastogi,
Nilesh Dalvi,
Minos Garofalakis
Abstract:
There have been several recent advancements in Machine Learning community on the Entity Matching (EM) problem. However, their lack of scalability has prevented them from being applied in practical settings on large real-life datasets. Towards this end, we propose a principled framework to scale any generic EM algorithm. Our technique consists of running multiple instances of the EM algorithm on sm…
▽ More
There have been several recent advancements in Machine Learning community on the Entity Matching (EM) problem. However, their lack of scalability has prevented them from being applied in practical settings on large real-life datasets. Towards this end, we propose a principled framework to scale any generic EM algorithm. Our technique consists of running multiple instances of the EM algorithm on small neighborhoods of the data and passing messages across neighborhoods to construct a global solution. We prove formal properties of our framework and experimentally demonstrate the effectiveness of our approach in scaling EM algorithms.
△ Less
Submitted 11 March, 2011;
originally announced March 2011.
-
Large-mode-area leaky optical fibre fabricated by MCVD
Authors:
Bernard Dussardier,
Stanislaw Trzesien,
Michèle Ude,
Vipul Rastogi,
Ajeet Kumar,
Gérard Monnom
Abstract:
A large mode area single-mode optical fibre based on leaky mode filtering was prepared by MCVD. The cladding structure discriminates the fundamental mode from the higher order ones. A preliminary version has 25-$μ$m core diameter and 0.11 numerical aperture. A Gaussian-like mode with 22-$μ$m MFD is observed after 3-m propagation, in agreement with modeling.
A large mode area single-mode optical fibre based on leaky mode filtering was prepared by MCVD. The cladding structure discriminates the fundamental mode from the higher order ones. A preliminary version has 25-$μ$m core diameter and 0.11 numerical aperture. A Gaussian-like mode with 22-$μ$m MFD is observed after 3-m propagation, in agreement with modeling.
△ Less
Submitted 7 February, 2011;
originally announced February 2011.
-
Birefringence analysis of multilayer leaky cladding optical fibre
Authors:
Laurent Labonté,
Vipul Rastogi,
A. Kumar,
Bernard Dussardier,
Gérard Monnom
Abstract:
We analyse a multilayer leaky cladding (MLC) fibre using the finite element method and study the effect of the MLC on the bending loss and birefringence of two types of structures: (i) a circular core large-mode-area structure and (ii) an elliptical-small-core structure. In a large-mode-area structure, we verify that the multilayer leaky cladding strongly discriminates against higher order modes t…
▽ More
We analyse a multilayer leaky cladding (MLC) fibre using the finite element method and study the effect of the MLC on the bending loss and birefringence of two types of structures: (i) a circular core large-mode-area structure and (ii) an elliptical-small-core structure. In a large-mode-area structure, we verify that the multilayer leaky cladding strongly discriminates against higher order modes to achieve single-mode operation, the fibre shows negligible birefringence, and the bending loss of the fibre is low for bending radii larger than 10 cm. In the elliptical-small-core structure we show that the MLC reduces the birefringence of the fibre. This prevents the structure from becoming birefringent in case of any departures from circular geometry. The study should be useful in the designs of MLC fibres for various applications including high power amplifiers, gain flattening of fibre amplifiers and dispersion compensation.
△ Less
Submitted 14 August, 2010; v1 submitted 19 March, 2010;
originally announced March 2010.
-
Co-axial dual-core resonant leaky fibre for optical amplifiers
Authors:
Ajeet Kumar,
Vipul Rastogi,
Charu Kakkar,
Bernard Dussardier
Abstract:
We present a co-axial dual-core resonant leaky optical fibre design, in which the outer core is made highly leaky. A suitable choice of parameters can enable us to resonantly couple power from the inner core to the outer core. In a large-core fibre, such a resonant coupling can considerably increase the differential leakage loss between the fundamental and the higher order modes and can result i…
▽ More
We present a co-axial dual-core resonant leaky optical fibre design, in which the outer core is made highly leaky. A suitable choice of parameters can enable us to resonantly couple power from the inner core to the outer core. In a large-core fibre, such a resonant coupling can considerably increase the differential leakage loss between the fundamental and the higher order modes and can result in effective single-mode operation. In a small-core single-mode fibre, such a coupling can lead to sharp increase in the wavelength dependent leakage loss near the resonant wavelength and can be utilized for the suppression of amplified spontaneous emission and thereby gain equalization of an optical amplifier. We study the propagation characteristics of the fibre using the transfer matrix method and present an example of each, the large-mode-area design for high power amplifiers and the wavelength tunable leakage loss design for inherent gain equalization of optical amplifiers.
△ Less
Submitted 28 February, 2010;
originally announced March 2010.
-
Optimizing Histogram Queries under Differential Privacy
Authors:
Chao Li,
Michael Hay,
Vibhor Rastogi,
Gerome Miklau,
Andrew McGregor
Abstract:
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. Despite much recent work, optimal strategies for answering a collection of correlated queries are not known.
We study the problem of devising a set of strategy queries, to be submitted and answered privately, that will support the answers to a given workload of queries. We prop…
▽ More
Differential privacy is a robust privacy standard that has been successfully applied to a range of data analysis tasks. Despite much recent work, optimal strategies for answering a collection of correlated queries are not known.
We study the problem of devising a set of strategy queries, to be submitted and answered privately, that will support the answers to a given workload of queries. We propose a general framework in which query strategies are formed from linear combinations of counting queries, and we describe an optimal method for deriving new query answers from the answers to the strategy queries. Using this framework we characterize the error of strategies geometrically, and we propose solutions to the problem of finding optimal strategies.
△ Less
Submitted 6 September, 2010; v1 submitted 23 December, 2009;
originally announced December 2009.
-
Boosting the Accuracy of Differentially-Private Histograms Through Consistency
Authors:
Michael Hay,
Vibhor Rastogi,
Gerome Miklau,
Dan Suciu
Abstract:
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a set of queries to evaluate, and then exploits consistency constraints that should hold over the noisy output. In a post-processing phase, we compute the consistent input most likely to have produced the noisy output. The f…
▽ More
We show that it is possible to significantly improve the accuracy of a general class of histogram queries while satisfying differential privacy. Our approach carefully chooses a set of queries to evaluate, and then exploits consistency constraints that should hold over the noisy output. In a post-processing phase, we compute the consistent input most likely to have produced the noisy output. The final output is differentially-private and consistent, but in addition, it is often much more accurate. We show, both theoretically and experimentally, that these techniques can be used for estimating the degree sequence of a graph very precisely, and for computing a histogram that can support arbitrary range queries accurately.
△ Less
Submitted 8 July, 2010; v1 submitted 6 April, 2009;
originally announced April 2009.
-
The Boundary Between Privacy and Utility in Data Anonymization
Authors:
Vibhor Rastogi,
Dan Suciu,
Sungho Hong
Abstract:
We consider the privacy problem in data publishing: given a relation I containing sensitive information 'anonymize' it to obtain a view V such that, on one hand attackers cannot learn any sensitive information from V, and on the other hand legitimate users can use V to compute useful statistics on I. These are conflicting goals. We use a definition of privacy that is derived from existing ones i…
▽ More
We consider the privacy problem in data publishing: given a relation I containing sensitive information 'anonymize' it to obtain a view V such that, on one hand attackers cannot learn any sensitive information from V, and on the other hand legitimate users can use V to compute useful statistics on I. These are conflicting goals. We use a definition of privacy that is derived from existing ones in the literature, which relates the a priori probability of a given tuple t, Pr(t), with the a posteriori probability, Pr(t | V), and propose a novel and quite practical definition for utility. Our main result is the following. Denoting n the size of I and m the size of the domain from which I was drawn (i.e. n < m) then: when the a priori probability is Pr(t) = Omega(n/sqrt(m)) for some t, there exists no useful anonymization algorithm, while when Pr(t) = O(n/m) for all tuples t, then we give a concrete anonymization algorithm that is both private and useful. Our algorithm is quite different from the k-anonymization algorithm studied intensively in the literature, and is based on random deletions and insertions to I.
△ Less
Submitted 20 December, 2006;
originally announced December 2006.