Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Nonperturbative suppression of chiral effects in hot QGP for ΛˉΛ-hyperons spin polarization in heavy-ion collisions

    In this paper, we review the calculation of suppression of Chiral Separational and Chiral Vortical Effects for strange quarks (which allegedly yield spin polarization of ΛˉΛ-hyperons in peripheral Heavy-Ion Collisions) by the nonperturbative interactions in hot deconfined QCD with the Field Correlator Method. The parameter range in the temperature-baryon density plane is expected to cover LHC-ALICE and RHIC-STAR data.

  • articleNo Access

    AN AUTONOMOUS DECENTRALIZED MULTI-SERVER FRAMEWORK FOR LARGE SCALE COLLABORATIVE VIRTUAL ENVIRONMENTS

    Collaborative Virtual Environment (CVE) is a promising technology which provides an online shared virtual world to the geographically dispersed people to interact with each other. However, the scalability of existing CVE system is limited due to the constraints in processing power and network speed of each participating host. Large scale CVE (LCVE) that supports a large number of concurrent participants and a large amount of evolving virtual entities is not easy to achieve. In this paper, an autonomous decentralized grid based mobile agent framework for large scale CVE — MACVE is proposed. In MACVE, LCVE software system is decomposed into a group of collaborative mobile agents, each of which is responsible for an independent system task. Agents can migrate or clone dynamically at any suitable participating host (grid node) include traditional servers and qualified user hosts to avoid bottleneck, which can improve the scalability of LCVE. Therefore, MACVE is a logically multi-server architecture while the server workload is autonomously decentralized. Our system prototype and evaluation has demonstrated the feasibility of the proposed framework.

  • articleNo Access

    Vulnerability Rating of Source Code with Token Embedding and Combinatorial Algorithms

    We present an empirical analysis of the source code of the Fluoride Bluetooth module, which is a part of standard Android OS distribution, by exhibiting a novel approach for classifying and scoring source code and vulnerability rating. Our workflow combines deep learning, combinatorial optimization, heuristics and machine learning. A combination of heuristics and deep learning is used to embed function (and method) labels into a low-dimensional Euclidean space. Because the corpus of the Fluoride source code is rather limited (containing approximately 12,000 functions), a straightforward embedding (using, e.g. code2vec) is untenable. To overcome the challenge of dearth of data, it is necessary to go through an intermediate step of Byte-Pair Encoding. Subsequently, we embed the tokens from which we assemble an embedding of function/method labels. Long short-term memory network (LSTM) is used to embed tokens. The next step is to form a distance matrix consisting of the cosines between every pairs of vectors (function embedding) which in turn is interpreted as a (combinatorial) graph whose vertices represent functions, and edges correspond to entries whose value exceed some given threshold. Cluster-Editing is then applied to partition the vertex set of the graph into subsets representing “dense graphs,” that are nearly complete subgraphs. Finally, the vectors representing the components, plus additional heuristic-based features are used as features to model the components for vulnerability risk.

  • chapterNo Access

    7: ‘HITTING HOME…’ LESSONS FROM NARRATIVE STUDIES AND GLOBAL CVE INITIATIVES FOR CREATING EFFECTIVE COUNTER-MESSAGING

    The starting premise of this paper is that people are generally wired to accept information better when it is conveyed through metaphors. We tend to believe narratives when it is conveyed as stories and intersubjective myths that resonate with our beliefs and experiences. Hence, we are receptive to cultural codes and religious beliefs, which are shared stories and myths. Jihadism and other extremist ideologies similarly have shared stories and myths, which are used to transmit their master narrative in a form that an individual in a particular context can identify with. However, when the focus is on combating extremist ideologies, one can overlook the stories and myths used to convey this ideology. Defeating an idea sometimes requires dismantling the myth that supports it. This paper will demonstrate how an effective counter-narrative can do this. Furthermore, there is a wealth of available knowledge from narrative studies about creating persuasive arguments, ranging from philosophical ideas from antiquity to those advocated by prominent motivational speakers today, to explain what contributes to a persuasive argument that ‘hits home’. This paper will illustrate how some of these ideas can be adapted for use in countering violent extremism (CVE).