-
From Data Leverage to Data Co-Ops: An Institutional Model for User Control over Information Access
Authors:
Caleb Malchik,
Joan Feigenbaum
Abstract:
Internet companies derive value from users by recording and influencing their behavior. Users can pressure companies to refrain from certain invasive and manipulative practices by selectively withdrawing their attention, an exercise of data leverage as formulated by Vincent et al. Ligett and Nissim's proposal for an institution representing the interests of users, the data co-op, offers a means of…
▽ More
Internet companies derive value from users by recording and influencing their behavior. Users can pressure companies to refrain from certain invasive and manipulative practices by selectively withdrawing their attention, an exercise of data leverage as formulated by Vincent et al. Ligett and Nissim's proposal for an institution representing the interests of users, the data co-op, offers a means of coordinating this action. We present one possible instantiation of the data co-op, including the Platform for Untrusted Resource Evaluation (PURE), a system for assigning labels provided by untrusted and semi-trusted parties to Internet resources. We also describe PURESearch, a client program that re-ranks search results according to labels provided by data co-ops and other sources.
△ Less
Submitted 25 January, 2022;
originally announced January 2022.
-
On Heuristic Models, Assumptions, and Parameters
Authors:
Samuel Judson,
Joan Feigenbaum
Abstract:
Insightful interdisciplinary collaboration is essential to the principled governance of complex technologies, like those produced by modern computing research and development. Technical research on the interaction between computation and society often focuses on how researchers model social and physical systems. These models underlie how computer scientists specify problems and propose algorithmic…
▽ More
Insightful interdisciplinary collaboration is essential to the principled governance of complex technologies, like those produced by modern computing research and development. Technical research on the interaction between computation and society often focuses on how researchers model social and physical systems. These models underlie how computer scientists specify problems and propose algorithmic solutions. However, the social effects of computing can depend just as much on obscure and opaque technical caveats, choices, and qualifiers. Such artifacts are products of the particular algorithmic techniques and theory applied to solve a problem once modeled, and their nature can imperil thorough sociotechnical scrutiny of the often discretionary decisions made to manage them. We describe three classes of objects used to encode these choices and qualifiers: heuristic models, assumptions, and parameters. We raise six reasons these objects may be hazardous to comprehensive analysis of computing and argue they deserve deliberate consideration as researchers explain scientific work.
△ Less
Submitted 16 August, 2023; v1 submitted 18 January, 2022;
originally announced January 2022.
-
Privacy-Preserving XGBoost Inference
Authors:
Xianrui Meng,
Joan Feigenbaum
Abstract:
Although machine learning (ML) is widely used for predictive tasks, there are important scenarios in which ML cannot be used or at least cannot achieve its full potential. A major barrier to adoption is the sensitive nature of predictive queries. Individual users may lack sufficiently rich datasets to train accurate models locally but also be unwilling to send sensitive queries to commercial servi…
▽ More
Although machine learning (ML) is widely used for predictive tasks, there are important scenarios in which ML cannot be used or at least cannot achieve its full potential. A major barrier to adoption is the sensitive nature of predictive queries. Individual users may lack sufficiently rich datasets to train accurate models locally but also be unwilling to send sensitive queries to commercial services that vend such models. One central goal of privacy-preserving machine learning (PPML) is to enable users to submit encrypted queries to a remote ML service, receive encrypted results, and decrypt them locally. We aim at developing practical solutions for real-world privacy-preserving ML inference problems. In this paper, we propose a privacy-preserving XGBoost prediction algorithm, which we have implemented and evaluated empirically on AWS SageMaker. Experimental results indicate that our algorithm is efficient enough to be used in real ML production environments.
△ Less
Submitted 24 November, 2020; v1 submitted 9 November, 2020;
originally announced November 2020.
-
PriFi: Low-Latency Anonymity for Organizational Networks
Authors:
Ludovic Barman,
Italo Dacosta,
Mahdi Zamani,
Ennan Zhai,
Apostolos Pyrgelis,
Bryan Ford,
Jean-Pierre Hubaux,
Joan Feigenbaum
Abstract:
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdrop…
▽ More
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and are poorly suited for organizational networks. We present PriFi, an anonymous communication protocol for LANs, which protects users against eavesdroppers and provides high-performance traffic-analysis resistance. PriFi builds on Dining Cryptographers networks but reduces the high communication latency of prior work via a new client/relay/server architecture, in which a client's packets remain on their usual network path without additional hops, and in which a set of remote servers assist the anonymization process without adding latency. PriFi also solves the challenge of equivocation attacks, which are not addressed by related works, by encrypting the traffic based on the communication history. Our evaluation shows that PriFi introduces a small latency overhead (~100ms for 100 clients) and is compatible with delay-sensitive applications such as VoIP.
△ Less
Submitted 6 April, 2021; v1 submitted 27 October, 2017;
originally announced October 2017.
-
Open, privacy-preserving protocols for lawful surveillance
Authors:
Aaron Segal,
Joan Feigenbaum,
Bryan Ford
Abstract:
The question of how government agencies can acquire actionable, useful information about legitimate but unknown targets without intruding upon the electronic activity of innocent parties is extremely important. We address this question by providing experimental evidence that actionable, useful information can indeed be obtained in a manner that preserves the privacy of innocent parties and that ho…
▽ More
The question of how government agencies can acquire actionable, useful information about legitimate but unknown targets without intruding upon the electronic activity of innocent parties is extremely important. We address this question by providing experimental evidence that actionable, useful information can indeed be obtained in a manner that preserves the privacy of innocent parties and that holds government agencies accountable. In particular, we present practical, privacy-preserving protocols for two operations that law-enforcement and intelligence agencies have used effectively: set intersection and contact chaining. Experiments with our protocols suggest that privacy-preserving contact chaining can perform a 3-hop privacy-preserving graph traversal producing 27,000 ciphertexts in under two minutes. These ciphertexts are usable in turn via privacy-preserving set intersection to pinpoint potential unknown targets within a body of 150,000 total ciphertexts within 10 minutes, without exposing personal information about non-targets.
△ Less
Submitted 13 July, 2016;
originally announced July 2016.
-
Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection
Authors:
Aaron Johnson,
Rob Jansen,
Aaron D. Jaggard,
Joan Feigenbaum,
Paul Syverson
Abstract:
Tor users are vulnerable to deanonymization by an adversary that can observe some Tor relays or some parts of the network. We demonstrate that previous network-aware path-selection algorithms that propose to solve this problem are vulnerable to attacks across multiple Tor connections. We suggest that users use trust to choose the paths through Tor that are less likely to be observed, where trust i…
▽ More
Tor users are vulnerable to deanonymization by an adversary that can observe some Tor relays or some parts of the network. We demonstrate that previous network-aware path-selection algorithms that propose to solve this problem are vulnerable to attacks across multiple Tor connections. We suggest that users use trust to choose the paths through Tor that are less likely to be observed, where trust is flexibly modeled as a probability distribution on the location of the user's adversaries, and we present the Trust-Aware Path Selection algorithm for Tor that helps users avoid traffic-analysis attacks while still choosing paths that could have been selected by many other users. We evaluate this algorithm in two settings using a high-level map of Internet routing: (i) users try to avoid a single global adversary that has an independent chance to control each Autonomous System organization, Internet Exchange Point organization, and Tor relay family, and (ii) users try to avoid deanonymization by any single country. We also examine the performance of Trust-Aware Path selection using the Shadow network simulator.
△ Less
Submitted 27 January, 2017; v1 submitted 17 November, 2015;
originally announced November 2015.
-
Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values
Authors:
Benjamin Mood,
Debayan Gupta,
Kevin Butler,
Joan Feigenbaum
Abstract:
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems. However, there are still bottlenecks, particularly in the input validation stage of a computation. Moreover, SFE research has not yet devoted sufficient attention to the important problem of retaining state after a computa…
▽ More
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems. However, there are still bottlenecks, particularly in the input validation stage of a computation. Moreover, SFE research has not yet devoted sufficient attention to the important problem of retaining state after a computation has been performed so that expensive processing does not have to be repeated if a similar computation is done again. This paper presents PartialGC, an SFE system that allows the reuse of encrypted values generated during a garbled-circuit computation. We show that using PartialGC can reduce computation time by as much as 96% and bandwidth by as much as 98% in comparison with previous outsourcing schemes for secure computation. We demonstrate the feasibility of our approach with two sets of experiments, one in which the garbled circuit is evaluated on a mobile device and one in which it is evaluated on a server. We also use PartialGC to build a privacy-preserving "friend finder" application for Android. The reuse of previous inputs to allow stateful evaluation represents a new way of looking at SFE and further reduces computational barriers.
△ Less
Submitted 9 June, 2015;
originally announced June 2015.
-
Representing Network Trust and Using It to Improve Anonymous Communication
Authors:
Aaron D. Jaggard,
Aaron Johnson,
Paul Syverson,
Joan Feigenbaum
Abstract:
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions a…
▽ More
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets of elements observed by network adversaries. We present a modular system that allows users to efficiently and conveniently create such distributions and use them to improve their security. The major components of this system are (i) an ontology of network-element types that represents the main threats to and vulnerabilities of anonymous communication over Tor, (ii) a formal language that allows users to naturally express trust beliefs about network elements, and (iii) a conversion procedure that takes the ontology, public information about the network, and user beliefs written in the trust language and produce a Bayesian Belief Network that represents the probability distribution in a way that is concise and easily sampleable. We also present preliminary experimental results that show the distribution produced by our system can improve security when employed by users; further improvement is seen when the system is employed by both users and services.
△ Less
Submitted 13 June, 2014;
originally announced June 2014.
-
Seeking Anonymity in an Internet Panopticon
Authors:
Joan Feigenbaum,
Bryan Ford
Abstract:
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to…
▽ More
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to be forthcoming soon. Current approaches to anonymity also appear unable to offer accurate, principled measurement of the level or quality of anonymity a user might obtain.
Toward this end, we offer a high-level view of the Dissent project, the first systematic effort to build a practical anonymity system based purely on foundations that offer measurable and formally provable anonymity properties. Dissent builds on two key pre-existing primitives - verifiable shuffles and dining cryptographers - but for the first time shows how to scale such techniques to offer measurable anonymity guarantees to thousands of participants. Further, Dissent represents the first anonymity system designed from the ground up to incorporate some systematic countermeasure for each of the major classes of known vulnerabilities in existing approaches, including global traffic analysis, active attacks, and intersection attacks. Finally, because no anonymity protocol alone can address risks such as software exploits or accidental self-identification, we introduce WiNon, an experimental operating system architecture to harden the uses of anonymity tools such as Tor and Dissent against such attacks.
△ Less
Submitted 2 January, 2015; v1 submitted 18 December, 2013;
originally announced December 2013.
-
An Economic Analysis of User-Privacy Options in Ad-Supported Services
Authors:
Joan Feigenbaum,
Michael Mitzenmacher,
Georgios Zervas
Abstract:
We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting. In particular, we assume that site operators have some control over the cost that a privacy option imposes on users and ask when it is to their advantage to make such costs low. We consider both the case of a single site and the case of multiple sites that…
▽ More
We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting. In particular, we assume that site operators have some control over the cost that a privacy option imposes on users and ask when it is to their advantage to make such costs low. We consider both the case of a single site and the case of multiple sites that compete both for users who value privacy highly and for users who value it less. One of our main results in the case of a single site is that, under normally distributed utilities, if a privacy-sensitive user is worth at least $\sqrt{2} - 1$ times as much to advertisers as a privacy-insensitive user, the site operator should strive to make the cost of a privacy option as low as possible. In the case of multiple sites, we show how a Prisoner's-Dilemma situation can arise: In the equilibrium in which both sites are obliged to offer a privacy option at minimal cost, both sites obtain lower revenue than they would if they colluded and neither offered a privacy option.
△ Less
Submitted 1 August, 2012;
originally announced August 2012.
-
On the Resilience of Routing Tables
Authors:
Joan Feigenbaum,
Brighten Godfrey,
Aurojit Panda,
Michael Schapira,
Scott Shenker,
Ankit Singla
Abstract:
Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.
Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.
△ Less
Submitted 3 August, 2012; v1 submitted 16 July, 2012;
originally announced July 2012.
-
Probabilistic Analysis of Onion Routing in a Black-box Model
Authors:
Joan Feigenbaum,
Aaron Johnson,
Paul Syverson
Abstract:
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable framework that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices of destination. Our results quantify how muc…
▽ More
We perform a probabilistic analysis of onion routing. The analysis is presented in a black-box model of anonymous communication in the Universally Composable framework that abstracts the essential properties of onion routing in the presence of an active adversary that controls a portion of the network and knows all a priori distributions on user choices of destination. Our results quantify how much the adversary can gain in identifying users by exploiting knowledge of their probabilistic behavior. In particular, we show that, in the limit as the network gets large, a user u's anonymity is worst either when the other users always choose the destination u is least likely to visit or when the other users always choose the destination u chooses. This worst-case anonymity with an adversary that controls a fraction b of the routers is shown to be comparable to the best-case anonymity against an adversary that controls a fraction \surdb.
△ Less
Submitted 10 November, 2011;
originally announced November 2011.
-
Approximate Privacy: PARs for Set Problems
Authors:
Joan Feigenbaum,
Aaron D. Jaggard,
Michael Schapira
Abstract:
In previous work (arXiv:0910.5714), we introduced the Privacy Approximation Ratio (PAR) and used it to study the privacy of protocols for second-price Vickrey auctions and Yao's millionaires problem. Here, we study the PARs of multiple protocols for both the disjointness problem (in which two participants, each with a private subset of {1,...,k}, determine whether their sets are disjoint) and the…
▽ More
In previous work (arXiv:0910.5714), we introduced the Privacy Approximation Ratio (PAR) and used it to study the privacy of protocols for second-price Vickrey auctions and Yao's millionaires problem. Here, we study the PARs of multiple protocols for both the disjointness problem (in which two participants, each with a private subset of {1,...,k}, determine whether their sets are disjoint) and the intersection problem (in which the two participants, each with a private subset of {1,...,k}, determine the intersection of their private sets).
We show that the privacy, as measured by the PAR, provided by any protocol for each of these problems is necessarily exponential (in k). We also consider the ratio between the subjective PARs with respect to each player in order to show that one protocol for each of these problems is significantly fairer than the others (in the sense that it has a similarly bad effect on the privacy of both players).
△ Less
Submitted 9 June, 2010; v1 submitted 19 January, 2010;
originally announced January 2010.
-
Approximate Privacy: Foundations and Quantification
Authors:
Joan Feigenbaum,
Aaron D. Jaggard,
Michael Schapira
Abstract:
Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of priv…
▽ More
Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao.
For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve, but even close approximations of perfect privacy suffer from the same lower bounds. By contrast, we show that, if the values of the parties are drawn uniformly at random from {0,...,2^k-1}, then, for both problems, simple and natural communication protocols have privacy-approximation ratios that are linear in k (i.e., logarithmic in the size of the space of possible inputs). We conjecture that this improved privacy-approximation ratio is achievable for any probability distribution.
△ Less
Submitted 9 June, 2010; v1 submitted 29 October, 2009;
originally announced October 2009.
-
The Theory of Relativity - Galileo's Child
Authors:
Mitchell J. Feigenbaum
Abstract:
We determine the Lorentz transformations and the kinematic content and dynamical framework of special relativity as purely an extension of Galileo's thoughts. No reference to light is ever required: The theories of relativity are logically independent of any properties of light. The thoughts of Galileo are fully realized in a system of Lorentz transformations with a parameter 1/c^2, some undeter…
▽ More
We determine the Lorentz transformations and the kinematic content and dynamical framework of special relativity as purely an extension of Galileo's thoughts. No reference to light is ever required: The theories of relativity are logically independent of any properties of light. The thoughts of Galileo are fully realized in a system of Lorentz transformations with a parameter 1/c^2, some undetermined, universal constant of nature; and are realizable in no other. Isotropy of space plays a deep and pivotal role in all of this, since here three-dimensional space appears at first blush, and persists until the conclusion: Relativity can never correctly be fully developed in just one spatial dimension.
△ Less
Submitted 6 June, 2008;
originally announced June 2008.
-
Pattern Selection: Determined by Symmetry and Modifiable by Long-Range Effects
Authors:
Mitchell J. Feigenbaum
Abstract:
We consider Saffman-Taylor channel flow without surface tension on a high-pressure driven interface, but modify the usual infinite-fluid in infinite-channel configuration. Here we include the treatment of efflux by considering a finite connected body of fluid in an arbitrarily long channel, with its second free interface the efflux of this configuration. We show that there is a uniquely determin…
▽ More
We consider Saffman-Taylor channel flow without surface tension on a high-pressure driven interface, but modify the usual infinite-fluid in infinite-channel configuration. Here we include the treatment of efflux by considering a finite connected body of fluid in an arbitrarily long channel, with its second free interface the efflux of this configuration. We show that there is a uniquely determined translating solution for the driven interface, which is exactly the 1/2 width S-T solution, following from correct symmetry for a finite channel flow. We establish that there exist no perturbations about this solution corresponding to a finger propagating with any other width: Selection is unique and isolated. The stability of this solution is anomalous, in that all freely impressible perturbations are stabilities, while unstable modes request power proportional to their strength from the external agencies that drive the flow, and so, in principle, are experimentally controllable. This is very different from the behavior of the usual infinite fluid: The limit of infinite length is singular, and not that of the literature. We argue that surface tension on the efflux interface decreases the finger-width by the ratio of its surface tension to velocity of the high-pressure tip. The perturbation theory created here to deal with transport between two free boundaries is novel and dependent upon a remarkable symmetry.
△ Less
Submitted 29 July, 2002;
originally announced July 2002.
-
More on A Statistical Analysis of Log-Periodic Precursors to Financial Crashes
Authors:
James A. Feigenbaum
Abstract:
We respond to Sornette and Johansen's criticisms of our findings regarding log-periodic precursors to financial crashes. Included in this paper are discussions of the Sornette-Johansen theoretical paradigm, traditional methods of identifying log-periodic precursors, the behavior of the first differences of a log-periodic price series, and the distribution of drawdowns for a securities price.
We respond to Sornette and Johansen's criticisms of our findings regarding log-periodic precursors to financial crashes. Included in this paper are discussions of the Sornette-Johansen theoretical paradigm, traditional methods of identifying log-periodic precursors, the behavior of the first differences of a log-periodic price series, and the distribution of drawdowns for a securities price.
△ Less
Submitted 20 July, 2001;
originally announced July 2001.
-
A Statistical Analysis of Log-Periodic Precursors to Financial Crashes
Authors:
James Feigenbaum
Abstract:
Motivated by the hypothesis that financial crashes are macroscopic examples of critical phenomena associated with a discrete scaling symmetry, we reconsider the evidence of log-periodic precursors to financial crashes and test the prediction that log-periodic oscillations in a financial index are embedded in the mean function of this index. In particular, we examine the first differences of the…
▽ More
Motivated by the hypothesis that financial crashes are macroscopic examples of critical phenomena associated with a discrete scaling symmetry, we reconsider the evidence of log-periodic precursors to financial crashes and test the prediction that log-periodic oscillations in a financial index are embedded in the mean function of this index. In particular, we examine the first differences of the logarithm of the S&P 500 prior to the October 87 crash and find the log-periodic component of this time series is not statistically significant if we exclude the last year of data before the crash. We also examine the claim that two separate mechanisms are responsible for draw downs in the S&P 500 and find the evidence supporting this claim to be unconvincing.
△ Less
Submitted 27 February, 2001; v1 submitted 3 January, 2001;
originally announced January 2001.
-
Conformal Dynamics of Fractal Growth Patterns Without Randomness
Authors:
Benny Davidovich,
M. J. Feigenbaum,
H. G. E. Hentschel,
Itamar Procaccia
Abstract:
Many models of fractal growth patterns (like Diffusion Limited Aggregation and Dielectric Breakdown Models) combine complex geometry with randomness; this double difficulty is a stumbling block to their elucidation. In this paper we introduce a wide class of fractal growth models with highly complex geometry but without any randomness in their growth rules. The models are defined in terms of det…
▽ More
Many models of fractal growth patterns (like Diffusion Limited Aggregation and Dielectric Breakdown Models) combine complex geometry with randomness; this double difficulty is a stumbling block to their elucidation. In this paper we introduce a wide class of fractal growth models with highly complex geometry but without any randomness in their growth rules. The models are defined in terms of deterministic itineraries of iterated conformal maps, automatically generating the global conformal function which maps the exterior of the unit circle to the exterior of a n-particle growing aggregate. The complexity of the evolving interfaces is fully contained in the deterministic dynamics of the conformal map. We focus attention to a class of growth models in which the itinerary is quasiperiodic. Such itineraries can be approached via a series of rational approximants. The analytic power gained is used to introduce a scaling theory of the fractal growth patterns. We explain the mechanism for the fractality of the clusters and identify the exponent that determines the fractal dimension.
△ Less
Submitted 27 February, 2000;
originally announced February 2000.
-
Dynamics of Finger Formation in Laplacian Growth without Surface Tension
Authors:
Mitchell J. Feigenbaum,
Itamar Procaccia,
Benny Davidovich
Abstract:
We study the dynamics of "finger" formation in Laplacian growth without surface tension in a channel geometry (the Saffman-Taylor problem). Carefully determining the role of boundary geometry, we construct field equations of motion, these central to the analytic power we can here exercise. We consider an explicit analytic class of maps to the physical space, a basis of solutions for infinite flu…
▽ More
We study the dynamics of "finger" formation in Laplacian growth without surface tension in a channel geometry (the Saffman-Taylor problem). Carefully determining the role of boundary geometry, we construct field equations of motion, these central to the analytic power we can here exercise. We consider an explicit analytic class of maps to the physical space, a basis of solutions for infinite fluid in an infinitely long channel, characterized by meromorphic derivatives. We verify that these maps never lose analyticity in the course of temporal evolution, thus justifying the underlying machinery. However, the great bulk of these solutions can lose conformality in time, this the circumstance of finite-time singularities. By considerations of the nature of the analyticity of all these solutions, we show that those free of such singularities inevitably result in a {\em single} asymptotic "finger". This is purely nonlinear behavior: the very early "finger" actually already has a waist, this having signalled the end of any linear regime. The single "finger" has nevertheless an arbitrary width determined by initial conditions. This is in contradiction with the experimental results that indicate selection of a finger of width 1/2. In the last part of this paper we motivate that such a solution can be determined by the boundary conditions when the fluid is finite. This is a strong signal that {\em finiteness} is determinative of pattern selection.
△ Less
Submitted 1 August, 1999;
originally announced August 1999.
-
Born-Regulated Gravity in Four Dimensions
Authors:
James A. Feigenbaum
Abstract:
Previous work involving Born-regulated gravity theories in two dimensions is extended to four dimensions. The action we consider has two dimensionful parameters. Black hole solutions are studied for typical values of these parameters. For masses above a critical value determined in terms of these parameters, the event horizon persists. For masses below this critical value, the event horizon disa…
▽ More
Previous work involving Born-regulated gravity theories in two dimensions is extended to four dimensions. The action we consider has two dimensionful parameters. Black hole solutions are studied for typical values of these parameters. For masses above a critical value determined in terms of these parameters, the event horizon persists. For masses below this critical value, the event horizon disappears, leaving a ``bare mass'', though of course no singularity.
△ Less
Submitted 16 July, 1998;
originally announced July 1998.
-
Discrete Scale Invariance and the "Second Black Monday"
Authors:
James A. Feigenbaum,
Peter G. O. Freund
Abstract:
Evidence is offered for log-periodic (in time) fluctuations in the S&P 500 stock index during the three years prior to the October 27, 1997 "correction". These fluctuations were expected on the basis of a discretely scale invariant rupture phenomenology of stock market crashes proposed earlier.
Evidence is offered for log-periodic (in time) fluctuations in the S&P 500 stock index during the three years prior to the October 27, 1997 "correction". These fluctuations were expected on the basis of a discretely scale invariant rupture phenomenology of stock market crashes proposed earlier.
△ Less
Submitted 29 October, 1997;
originally announced October 1997.
-
Gravitational Analogues of Non-linear Born Electrodynamics
Authors:
James A. Feigenbaum,
Peter G. O. Freund,
Mircea Pigli
Abstract:
Gravitational analogues of the nonlinear electrodynamics of Born and of Born and Infeld are introduced and applied to the black hole problem. This work is mainly devoted to the 2-dimensional case in which the relevant lagrangians are nonpolynomial in the scalar curvature.
Gravitational analogues of the nonlinear electrodynamics of Born and of Born and Infeld are introduced and applied to the black hole problem. This work is mainly devoted to the 2-dimensional case in which the relevant lagrangians are nonpolynomial in the scalar curvature.
△ Less
Submitted 12 December, 1997; v1 submitted 26 September, 1997;
originally announced September 1997.
-
T-Duality Considerations for Hadronic Strings
Authors:
James A. Feigenbaum,
Peter G. O. Freund,
Mircea Pigli
Abstract:
We show that a simple account of hadronic high energy total cross-sections and of the observed masses and flavor-gauge-like couplings of the familiar vector mesons is obtained in a hadronic string model suggested by QCD in the limit of a large number of colors. Our picture involves a Minkowski space which in addition to the well established continuous one time and three space dimensions is endow…
▽ More
We show that a simple account of hadronic high energy total cross-sections and of the observed masses and flavor-gauge-like couplings of the familiar vector mesons is obtained in a hadronic string model suggested by QCD in the limit of a large number of colors. Our picture involves a Minkowski space which in addition to the well established continuous one time and three space dimensions is endowed with an extra discrete space dimension involving a minimal 2-point lattice with spacing of order 10^{-14} cm in one of the two T-dual pictures. New mesonic states with characteristic decay modes are expected in such a picture.
△ Less
Submitted 11 March, 1997;
originally announced March 1997.
-
High Energy Hadronic Total Cross-Sections
Authors:
James A. Feigenbaum,
Peter G. O. Freund,
Mircea Pigli
Abstract:
High energy hadronic total cross-section data are found to agree with the predictions of a QCD-string picture.
High energy hadronic total cross-section data are found to agree with the predictions of a QCD-string picture.
△ Less
Submitted 11 March, 1997; v1 submitted 11 March, 1997;
originally announced March 1997.
-
Square root singularity in the viscosity of neutral colloidal suspensions at large frequencies
Authors:
R. Verberg,
I. M. de Schepper,
M. J. Feigenbaum,
E. G. D. Cohen
Abstract:
The asymptotic frequency $ω$, dependence of the dynamic viscosity of neutral hard sphere colloidal suspensions is shown to be of the form $η_0 A(φ) (ωτ_P)^{-1/2}$, where $A(φ)$ has been determined as a function of the volume fraction $φ$, for all concentrations in the fluid range, $η_0$ is the solvent viscosity and $τ_P$ the Péclet time. For a soft potential it is shown that, to leading order st…
▽ More
The asymptotic frequency $ω$, dependence of the dynamic viscosity of neutral hard sphere colloidal suspensions is shown to be of the form $η_0 A(φ) (ωτ_P)^{-1/2}$, where $A(φ)$ has been determined as a function of the volume fraction $φ$, for all concentrations in the fluid range, $η_0$ is the solvent viscosity and $τ_P$ the Péclet time. For a soft potential it is shown that, to leading order steepness, the asymptotic behavior is the same as that for the hard sphere potential and a condition for the cross-over behavior to $1/ωτ_P$ is given. Our result for the hard sphere potential generalizes a result of Cichocki and Felderhof obtained at low concentrations and agrees well with the experiments of van der Werff et al, if the usual Stokes-Einstein diffusion coefficient $D_0$ in the Smoluchowski operator is consistently replaced by the short-time self diffusion coefficient $D_s(φ)$ for non-dilute colloidal suspensions.
△ Less
Submitted 17 January, 1997;
originally announced January 1997.
-
Discrete Scaling in Stock Markets Before Crashes
Authors:
James A. Feigenbaum,
Peter G. O. Freund
Abstract:
We propose a picture of stock market crashes as critical points in a hierachical system with discrete scaling. The critical exponent is then complex, leading to log-periodic fluctuations in stock market indexes. We present ``experimental'' evidence in favor of this prediction. This picture is in the spirit of the known earthquake-stock market analogy and of recent work on log-periodic fluctuatio…
▽ More
We propose a picture of stock market crashes as critical points in a hierachical system with discrete scaling. The critical exponent is then complex, leading to log-periodic fluctuations in stock market indexes. We present ``experimental'' evidence in favor of this prediction. This picture is in the spirit of the known earthquake-stock market analogy and of recent work on log-periodic fluctuations associated with earthquakes.
△ Less
Submitted 6 September, 1995;
originally announced September 1995.
-
A $q$-deformation of the Coulomb Problem
Authors:
J. Feigenbaum,
P. G. O. Freund
Abstract:
The algebra of observables of $SO_{q}(3)$-symmetric quantum mechanics is extended to include the inverse $\frac{1}{R}$ of the radial coordinate and used to obtain eigenvalues and eigenfunctions of a \q-deformed Coulomb Hamiltonian.
The algebra of observables of $SO_{q}(3)$-symmetric quantum mechanics is extended to include the inverse $\frac{1}{R}$ of the radial coordinate and used to obtain eigenvalues and eigenfunctions of a \q-deformed Coulomb Hamiltonian.
△ Less
Submitted 21 July, 1995;
originally announced July 1995.