منابع مشابه
Obfuscation for Evasive Functions
An evasive circuit family is a collection of circuits C such that for every input x, a random circuit from C outputs 0 on x with overwhelming probability. We provide a combination of definitional, constructive, and impossibility results regarding obfuscation for evasive functions: 1. The (average case variants of the) notions of virtual black box obfuscation (Barak et al, CRYPTO ’01) and virtua...
متن کاملSparse and Evasive Pseudorandom Distributions
Pseudorandom distributions on n -bit strings are ones which cannot be efficiently distinguished from the uniform distribution on strings of the same length. Namely, the expected behavior of any polynomial-time algorithm on a pseudorandom input is (almost) the same as on a random (Le. unifo~y chosen) input. Clearly, the uniform distribution is a pseudorandom one. But do such trivial cases exhaus...
متن کاملGregarious behaviour of evasive prey.
Gregarious behavior of potential prey was explained by Hamilton (1971) on the basis of risk-sharing: The probability of being picked up by a predator is small when one makes part of a large aggregate of prey. This argument holds only if the predator chooses its victims at random. It is not the case for herds of evasive prey in the open, where prey's gregarious behavior, favorable for the fast g...
متن کاملAcoustic Aposematism and Evasive Action in Select Chemically Defended Arctiine (Lepidoptera: Erebidae) Species: Nonchalant or Not?
Tiger moths (Erebidae: Arctiinae) have experienced intense selective pressure from echolocating, insectivorous bats for over 65 million years. One outcome has been the evolution of acoustic signals that advertise the presence of toxins sequestered from the moths' larval host plants, i.e. acoustic aposematism. Little is known about the effectiveness of tiger moth anti-bat sounds in their natural...
متن کاملSurvival of an evasive prey.
We study the survival of a prey that is hunted by N predators. The predators perform independent random walks on a square lattice with V sites and start a direct chase whenever the prey appears within their sighting range. The prey is caught when a predator jumps to the site occupied by the prey. We analyze the efficacy of a lazy, minimal-effort evasion strategy according to which the prey trie...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: CFA Institute Magazine
سال: 2016
ISSN: 1543-1398
DOI: 10.2469/cfm.v27.n2.16