Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Bayesian Learning (1)
- Black hole (1)
- Bounded Rationality (1)
- Collaboration (1)
- Computational Complexity (1)
-
- Content security (1)
- Decision Theory (1)
- Electronic abuse (1)
- Group Decision-Making (1)
- Holography (1)
- Information security (1)
- Mixed-Criticality systems (1)
- Multiprocessor (1)
- Quantum complexity (1)
- Quantum entanglement (1)
- Quantum field theory (1)
- Quantum gravity (1)
- Real-time systems (1)
- Schedulability analysis (1)
- Scheduling algorithm (1)
- Social Learning (1)
- Wikipedia (1)
- Wikis (1)
Articles 1 - 4 of 4
Full-Text Articles in Library and Information Science
Complexity And Entanglement In Quantum Gravity, Arjun Kar
Complexity And Entanglement In Quantum Gravity, Arjun Kar
Publicly Accessible Penn Dissertations
We present a collection of recent results concerning quantum information theory applied to quantum gravity. We first study the entanglement structure of Euclidean path integral states in SU(2) Chern-Simons theory, where we elucidate a connection between topological entanglement and quantum mechanical entanglement. We prove that the topology of certain three-manifolds controls the entanglement structure of the resulting quantum state, and conjecture a more general relationship for arbitrary three-manifolds. We then analyze the quantum circuit complexity of the time evolution operator in the Sachdev-Ye-Kitaev model, a theory of near-extremal black hole microstates. We find that this complexity grows linearly for a …
Learning And Decision Making In Groups, M. Amin Rahimian
Learning And Decision Making In Groups, M. Amin Rahimian
Publicly Accessible Penn Dissertations
Many important real-world decision-making problems involve group interactions among individuals with purely informational interactions. Such situations arise for example in jury deliberations, expert committees, medical diagnoses, etc. We model the purely informational interactions of group members, where they receive private information and act based on that information while also observing other people's beliefs or actions.
In the first part of the thesis, we address the computations that a rational (Bayesian) decision-maker should undertake to realize her optimal actions, maximizing her expected utility given all available information at every decision epoch. We use an approach called iterated eliminations of infeasible signals …
Resource-Efficient Scheduling Of Multiprocessor Mixed-Criticality Real-Time Systems, Jaewoo Lee
Resource-Efficient Scheduling Of Multiprocessor Mixed-Criticality Real-Time Systems, Jaewoo Lee
Publicly Accessible Penn Dissertations
Timing guarantee is critical to ensure the correctness of embedded software systems that
interact with the physical environment. As modern embedded real-time systems evolves,
they face three challenges: resource constraints, mixed-criticality, and multiprocessors. This
dissertation focuses on resource-efficient scheduling techniques for mixed-criticality systems
on multiprocessor platforms.
While Mixed-Criticality (MC) scheduling has been extensively studied on uniprocessor plat-
forms, the problem on multiprocessor platforms has been largely open. Multiprocessor al-
gorithms are broadly classified into two categories: global and partitioned. Global schedul-
ing approaches use a global run-queue and migrate tasks among processors for improved
schedulability. Partitioned scheduling approaches use per …
Damage Detection And Mitigation In Open Collaboration Applications, Andrew Granville West
Damage Detection And Mitigation In Open Collaboration Applications, Andrew Granville West
Publicly Accessible Penn Dissertations
Collaborative functionality is changing the way information is amassed, refined, and disseminated in online environments. A subclass of these systems characterized by "open collaboration" uniquely allow participants to *modify* content with low barriers-to-entry. A prominent example and our case study, English Wikipedia, exemplifies the vulnerabilities: 7%+ of its edits are blatantly unconstructive. Our measurement studies show this damage manifests in novel socio-technical forms, limiting the effectiveness of computational detection strategies from related domains. In turn this has made much mitigation the responsibility of a poorly organized and ill-routed human workforce. We aim to improve all facets of this incident response …