skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: New Perspectives on Recognition Performance of Daugman’s IrisCode or “Everything is New–it is Well Forgotten Old”
Award ID(s):
1650474
PAR ID:
10328364
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
IEEE Access
Volume:
9
ISSN:
2169-3536
Page Range / eLocation ID:
158632 to 158637
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Get outside and learn the galls; it's good biology, and it's good fun. 
    more » « less
  2. Abstract In non-interacting systems, bands from non-trivial topology emerge strictly at half-filling and exhibit either the quantum anomalous Hall or spin Hall effects. Here we show using determinantal quantum Monte Carlo and an exactly solvable strongly interacting model that these topological states now shift to quarter filling. A topological Mott insulator is the underlying cause. The peak in the spin susceptibility is consistent with a possible ferromagnetic state atT = 0. The onset of such magnetism would convert the quantum spin Hall to a quantum anomalous Hall effect. While such a symmetry-broken phase typically is accompanied by a gap, we find that the interaction strength must exceed a critical value for this to occur. Hence, we predict that topology can obtain in a gapless phase but only in the presence of interactions in dispersive bands. These results explain the recent quarter-filled quantum anomalous Hall effects seen in moiré systems. 
    more » « less
  3. Modern integrated circuits (ICs) possess several countermeasures to safeguard sensitive data and information stored in the device. In recent years, semi-invasive physical attacks based on optical debugging techniques have proven to be capable of easily bypassing these security measures implemented in the chip. Optical attacks can reveal the data stored in memory, cache and register through various methods such as photon emission analysis, laser fault injection, laser voltage probing, and thermal laser stimulation. The above-mentioned methods, which employ laser scanning microscopy and photon emission microscopy, are effective because the silicon substrate is transparent to near-infrared (NIR) photons. Therefore, the most vulnerable part of an IC to optical attacks is the backside, where the chip's transistors can be accessed and probed with a NIR laser beam. Although different optical attack detection and … 
    more » « less
  4. Altınbüken, Deniz; Stutsman, Ryan (Ed.)
    In the 1990s, many networks deployed performance-enhancing proxies (PEPs) that transparently split TCP connections to aid performance, especially over lossy, long-delay paths. Two recent developments have cast doubts on their relevance: the BBR congestion-control algorithm, which de-emphasizes loss as a congestion signal, and the QUIC transport protocol, which prevents transparent connection-splitting yet empirically matches or exceeds TCP’s performance in wide deployment, using the same congestion control. In light of this, are PEPs obsolete? This paper presents a range of emulation measurements indicating: “probably not.” While BBR’s original 2016 version didn’t benefit markedly from connection-splitting, more recent versions of BBR do and, in some cases, even more so than earlier “loss-based” congestion-control algorithms. We also find that QUIC implementations of the “same” congestion-control algorithms vary dramatically and further differ from those of Linux TCP—frustrating head-to-head comparisons. Notwithstanding their controversial nature, our results suggest that PEPs remain relevant to Internet performance for the foreseeable future. 
    more » « less