Skip to main content

Showing 1–16 of 16 results for author: Huth, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.08610  [pdf, other

    q-fin.GN cs.CR

    Leverage Staking with Liquid Staking Derivatives (LSDs): Opportunities and Risks

    Authors: Xihan Xiong, Zhipeng Wang, Xi Chen, William Knottenbelt, Michael Huth

    Abstract: In the Proof of Stake (PoS) Ethereum ecosystem, users can stake ETH on Lido to receive stETH, a Liquid Staking Derivative (LSD) that represents staked ETH and accrues staking rewards. LSDs improve the liquidity of staked assets by facilitating their use in secondary markets, such as for collateralized borrowing on Aave or asset exchanges on Curve. The composability of Lido, Aave, and Curve enables… ▽ More

    Submitted 23 May, 2024; v1 submitted 28 November, 2023; originally announced January 2024.

  2. arXiv:2207.12852  [pdf, ps, other

    cs.LG cs.CL cs.IR

    Extreme compression of sentence-transformer ranker models: faster inference, longer battery life, and less storage on edge devices

    Authors: Amit Chaulwar, Lukas Malik, Maciej Krajewski, Felix Reichel, Leif-Nissen Lundbæk, Michael Huth, Bartlomiej Matejczyk

    Abstract: Modern search systems use several large ranker models with transformer architectures. These models require large computational resources and are not suitable for usage on devices with limited computational resources. Knowledge distillation is a popular compression technique that can reduce the resource needs of such models, where a large teacher model transfers knowledge to a small student model.… ▽ More

    Submitted 29 June, 2022; originally announced July 2022.

  3. arXiv:2107.13640  [pdf, ps, other

    cs.CR cs.AI cs.LG

    Secure Bayesian Federated Analytics for Privacy-Preserving Trend Detection

    Authors: Amit Chaulwar, Michael Huth

    Abstract: Federated analytics has many applications in edge computing, its use can lead to better decision making for service provision, product development, and user experience. We propose a Bayesian approach to trend detection in which the probability of a keyword being trendy, given a dataset, is computed via Bayes' Theorem; the probability of a dataset, given that a keyword is trendy, is computed throug… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: 10 pages, 1 figure

  4. arXiv:2009.09524  [pdf, ps, other

    cs.IT cs.CR

    Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis

    Authors: Patrick Ah-Fat, Michael Huth

    Abstract: A digital goods auction is a type of auction where potential buyers bid the maximal price that they are willing to pay for a certain item, which a seller can produce at a negligible cost and in unlimited quantity. To maximise her benefits, the aim for the seller is to find the optimal sales price, which every buyer whose bid is not lower will pay. For fairness and privacy purposes, buyers may be c… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

  5. Owner-centric sharing of physical resources, data, and data-driven insights in digital ecosystems

    Authors: Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche

    Abstract: We are living in an age in which digitization will connect more and more physical assets with IT systems and where IoT endpoints will generate a wealth of valuable data. Companies, individual users, and organizations alike therefore have the need to control their own physical or non-physical assets and data sources. At the same time, they recognize the need for, and opportunity to, share access to… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Journal ref: ACM SACMAT 2019: 73-81

  6. arXiv:1901.00798  [pdf, other

    cs.CR cs.IT

    Scalable Information-Flow Analysis of Secure Three-Party Affine Computations

    Authors: Patrick Ah-Fat, Michael Huth

    Abstract: Elaborate protocols in Secure Multi-party Computation enable several participants to compute a public function of their own private inputs while ensuring that no undesired information leaks about the private inputs, and without resorting to any trusted third party. However, the public output of the computation inevitably leaks some information about the private inputs. Recent works have introduced… ▽ More

    Submitted 3 January, 2019; originally announced January 2019.

  7. Future developments in cyber risk assessment for the internet of things

    Authors: Petar Radanliev, David Charles De Roure, Razvan Nicolescu, Michael Huth, Rafael Mantilla Montalvo, Stacy Cannady, Peter Burnap

    Abstract: This article is focused on the economic impact assessment of Internet of Things (IoT) and its associated cyber risks vectors and vertices - a reinterpretation of IoT verticals. We adapt to IoT both the Cyber Value at Risk model, a well-established model for measuring the maximum possible loss over a given time period, and the MicroMort model, a widely used model for predicting uncertainty through… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: http://doi.org/10.1016/J.COMPIND.2018.08.002

  8. arXiv:1803.07438  [pdf, other

    cs.CR cs.AI

    Ontology-Based Reasoning about the Trustworthiness of Cyber-Physical Systems

    Authors: Marcello Balduccini, Edward Griffor, Michael Huth, Claire Vishik, Martin Burns, David Wollman

    Abstract: It has been challenging for the technical and regulatory communities to formulate requirements for trustworthiness of the cyber-physical systems (CPS) due to the complexity of the issues associated with their design, deployment, and operations. The US National Institute of Standards and Technology (NIST), through a public working group, has released a CPS Framework that adopts a broad and integrat… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

    Comments: IET PETRAS 2018 conference

  9. arXiv:1803.00436  [pdf, other

    cs.CR

    Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations

    Authors: Patrick Ah-Fat, Michael Huth

    Abstract: The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public function of their private inputs while kee** their inputs secret, without resorting to any trusted third party. However, opening the public output of such computations inevitably reveals some information about the private inputs. We propose a measure generalising both Renyi entropy and g-entropy… ▽ More

    Submitted 1 March, 2018; originally announced March 2018.

  10. arXiv:1705.05326  [pdf, other

    cs.AI

    Constrained Bayesian Networks: Theory, Optimization, and Applications

    Authors: Paul Beaumont, Michael Huth

    Abstract: We develop the theory and practice of an approach to modelling and probabilistic inference in causal networks that is suitable when application-specific or analysis-specific constraints should inform such inference or when little or no data for the learning of causal network structure or probability values at nodes are available. Constrained Bayesian Networks generalize a Bayesian Network such tha… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

    Comments: 43 pages, 18 figures

  11. arXiv:1702.01332  [pdf, other

    cs.AI cs.MS

    Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving

    Authors: Andrea Callia D'Iddio, Michael Huth

    Abstract: Optimization of Mixed-Integer Non-Linear Programming (MINLP) supports important decisions in applications such as Chemical Process Engineering. But current solvers have limited ability for deductive reasoning or the use of domain-specific theories, and the management of integrality constraints does not yet exploit automated reasoning tools such as SMT solvers. This seems to limit both scalability… ▽ More

    Submitted 4 February, 2017; originally announced February 2017.

    Comments: 17 pages, 3 figures, link to open research data and code available

  12. arXiv:1612.00407  [pdf, other

    cs.CR

    Optimizing Governed Blockchains for Financial Process Authentications

    Authors: Leif-Nissen Lundbaek, Andrea Callia D'Iddio, Michael Huth

    Abstract: We propose the formal study of governed blockchains that are owned and controlled by organizations and that neither create cryptocurrencies nor provide any incentives to solvers of cryptographic puzzles. We view such approaches as frameworks in which system parts, such as the cryptographic puzzle, may be instantiated with different technology. Owners of such a blockchain procure puzzle solvers as… ▽ More

    Submitted 16 May, 2017; v1 submitted 1 December, 2016; originally announced December 2016.

    Comments: 25 pages, 4 tables, minor corrections and edits throughout second version, updated relation work in second version, statistical evaluation of random variable for disputes added in second version

  13. Partial Solvers for Parity Games: Effective Polynomial-Time Composition

    Authors: Patrick Ah-Fat, Michael Huth

    Abstract: Partial methods play an important role in formal methods and beyond. Recently such methods were developed for parity games, where polynomial-time partial solvers decide the winners of a subset of nodes. We investigate here how effective polynomial-time partial solvers can be by studying interactions of partial solvers based on generic composition patterns that preserve polynomial-time computabilit… ▽ More

    Submitted 13 September, 2016; originally announced September 2016.

    Comments: In Proceedings GandALF 2016, arXiv:1609.03648

    Journal ref: EPTCS 226, 2016, pp. 1-15

  14. arXiv:1405.0386  [pdf, other

    cs.LO

    Fatal Attractors in Parity Games: Building Blocks for Partial Solvers

    Authors: Michael Huth, Jim Huan-Pu Kuo, Nir Piterman

    Abstract: Attractors in parity games are a technical device for solving "alternating" reachability of given node sets. A well known solver of parity games - Zielonka's algorithm - uses such attractor computations recursively. We here propose new forms of attractors that are monotone in that they are aware of specific static patterns of colors encountered in reaching a given node set in alternating fashion.… ▽ More

    Submitted 19 May, 2014; v1 submitted 2 May, 2014; originally announced May 2014.

  15. The Rabin index of parity games

    Authors: Michael Huth, Jim Huan-Pu Kuo, Nir Piterman

    Abstract: We study the descriptive complexity of parity games by taking into account the coloring of their game graphs whilst ignoring their ownership structure. Colored game graphs are identified if they determine the same winning regions and strategies, for all ownership structures of nodes. The Rabin index of a parity game is the minimum of the maximal color taken over all equivalent coloring functions.… ▽ More

    Submitted 16 July, 2013; originally announced July 2013.

    Comments: In Proceedings GandALF 2013, arXiv:1307.4162

    Journal ref: EPTCS 119, 2013, pp. 35-49

  16. Labelled transition systems as a Stone space

    Authors: Michael Huth

    Abstract: A fully abstract and universal domain model for modal transition systems and refinement is shown to be a maximal-points space model for the bisimulation quotient of labelled transition systems over a finite set of events. In this domain model we prove that this quotient is a Stone space whose compact, zero-dimensional, and ultra-metrizable Hausdorff topology measures the degree of bisimilarity s… ▽ More

    Submitted 8 March, 2006; v1 submitted 15 December, 2004; originally announced December 2004.

    Comments: Changes since v2: Metadata update

    ACM Class: F.3.2; F.4.1

    Journal ref: Logical Methods in Computer Science, Volume 1, Issue 1 (January 26, 2005) lmcs:2271