In: International journal, 2021, vol. 76, no. 2, p. 238-256
This essay investigates justifications for the “necessity” of official secrecy, by tracing and structuring the rationales underlying it. Justifications will be investigated through the case of “national security secrecy,” a prominent example of official secrecy. While the literature generally treats “national security secrecy” as unidimensional, this analysis demarcates several...
|
In: Journal of computational science, 2021, vol. 53, p. 13
The ℓ1-regularized Gaussian maximum likelihood method is a common approach for sparse precision matrix estimation, but one that poses a computational challenge for high-dimensional datasets. We present a novel ℓ1- regularized maximum likelihood method for performant large-scale sparse precision matrix estimation utilizing the block structures in the underlying computations. We identify the...
|
In: Computer aided geometric design, 2021, vol. 88, p. 11
Bézier curves are indispensable for geometric modelling and computer graphics. They have numerous favourable properties and provide the user with intuitive tools for editing the shape of a parametric polynomial curve. Even more control and flexibility can be achieved by associating a shape parameter with each control point and considering rational Bézier curves, which comes with the...
|
In: International journal on software tools for technology transfer, 2021, p. 15
The use of propositional logic and systems of linear inequalities over reals is a common means to model software for formal verification. Craig interpolants constitute a central building block in this setting for over-approximating reachable states, e.g. as candidates for inductive loop invariants. Interpolants for a linear system can be efficiently computed from a Simplex refutation by ...
|
In: Journal of systems and software, 2021, vol. 181, p. 13
Software testing depends on effective oracles. Implicit oracles, such as checks for program crashes, are widely applicable but narrow in scope. Oracles based on formal specifications can reveal applicationspecific failures, but specifications are expensive to obtain and maintain. Metamorphic oracles are somewhere in-between. They test equivalence among different procedures to detect semantic...
|
In: Annals of Mathematics and Artificial Intelligence, 2021, no. 89, p. 965–1011
We develop joint foundations for the fields of social choice and opinion pooling using coherent sets of desirable gambles, a general uncertainty model that allows to encompass both complete and incomplete preferences. This leads on the one hand to a new perspective of traditional results of social choice (in particular Arrow’s theorem as well as sufficient conditions for the existence of an...
|
In: Quantum reports, 2021, vol. 3, no. 2, p. 272-285
It has been more than 20 years since Deutsch and Hayden proved the locality of quantum theory, using the Heisenberg picture of quantum computational networks. Of course, locality holds even in the face of entanglement and Bell’s theorem. Today, most researchers in quantum foundations are still convinced not only that a local description of quantum systems has not yet been provided, but that...
|
In: Digital Journalism, 2021, vol. 9, no. 4, p. 443-460
Information security tools have gained prominence and importance in the journalism field and are now being adopted more frequently by newsrooms and investigative journalists. SecureDrop, an opensource software for operating whistleblowing platforms, is now a common component of the toolboxes of journalists willing to work with stronger levels of security, especially in regard to source...
|
In: List Forum für Wirtschafts- und Finanzpolitik, 2021, vol. 46, no. 3, p. 359-377
Obwohl man im Zuge der COVID-19-Pandemie aufgrund des dramatischen Einbruchs aller Wirtschaftsprognosen weltweit bislang von rezessivdeflationären Auswirkungen ausgegangen ist, lassen sich Inflationsrisiken keineswegs ausschließen. Welche Folgeeffekte kann die Kombination aus milliardenhohen Liquiditätsspritzen bei starkem Produktionsrückgang sowie streng einzuhaltenden (und ebenso...
|
In: Algorithms, 2020, vol. 13, no. 12, p. 17
Incomplete data are a common feature in many domains, from clinical trials to industrial applications. Bayesian networks (BNs) are often used in these domains because of their graphical and causal interpretations. BN parameter learning from incomplete data is usually implemented with the Expectation-Maximisation algorithm (EM), which computes the relevant sufficient statistics (“soft EM”) ...
|