scispace - formally typeset
Search or ask a question

Showing papers by "Massachusetts Institute of Technology published in 1978"


Journal ArticleDOI
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Abstract: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: (1) Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intented recipient. Only he can decipher the message, since only he knows the corresponding decryption key. (2) A message can be “signed” using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in “electronic mail” and “electronic funds transfer” systems. A message is encrypted by representing it as a number M, raising M to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret primer numbers p and q. Decryption is similar; only a different, secret, power d is used, where e * d ≡ 1(mod (p - 1) * (q - 1)). The security of the system rests in part on the difficulty of factoring the published divisor, n.

14,659 citations


Book
01 Jan 1978
TL;DR: In this article, the structure of semisimplepleasure Lie groups and Lie algebras is studied. But the classification of simple Lie algesbras and of symmetric spaces is left open.
Abstract: Elementary differential geometry Lie groups and Lie algebras Structure of semisimple Lie algebras Symmetric spaces Decomposition of symmetric spaces Symmetric spaces of the noncompact type Symmetric spaces of the compact type Hermitian symmetric spaces Structure of semisimple Lie groups The classification of simple Lie algebras and of symmetric spaces Solutions to exercises Some details Bibliography List of notational conventions Symbols frequently used Index Reviews for the first edition.

6,321 citations


Journal ArticleDOI
TL;DR: The human visual process can be studied by examining the computational problems associated with deriving useful information from retinal images by applying the approach to the problem of representing three-dimensional shapes for the purpose of recognition.
Abstract: The human visual process can be studied by examining the computational problems associated with deriving useful information from retinal images. In this paper, we apply this approach to the problem of representing three-dimensional shapes for the purpose of recognition. 1. Three criteria, accessibility, scope and uniqueness, and stability and sensitivity, are presented for judging the usefulness of a representation for shape recognition. 2. Three aspects of a representation9s design are considered, (i) the representation9s coordinate system, (ii) its primitives, which are the primary units of shape information used in the representation, and (iii) the organization the representation imposes on the information in its descriptions. 3. In terms of these design issues and the criteria presented, a shape representation for recognition should: (i) use an object-centred coordinate system, (ii) include volumetric primitives of varied sizes, and (iii) have a modular organization. A representation based on a shape9s natural axes (for example the axes identified by a stick figure) follows directly from these choices. 4. The basic process for deriving a shape description in this representation must involve: (i) a means for identifying the natural axes of a shape in its image and (ii) a mechanism for transforming viewer-centred axis specifications to specifications in an object-centred coordinate system. 5. Shape recognition involves: (i) a collection of stored shape descriptions, and (ii) various indexes into the collection that allow a newly derived description to be associated with an appropriate stored description. The most important of these indexes allows shape recognition to proceed conservatively from the general to the specific based on the specificity of the information available from the image. 6. New constraints supplied by a conservative recognition process can be used to extract more information from the image. A relaxation process for carrying out this constraint analysis is described.

2,256 citations


Journal ArticleDOI
TL;DR: Wyner's results for discrete memoryless wire-tap channels are extended and it is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels.
Abstract: Wyner's results for discrete memoryless wire-tap channels are extended to the Gaussian wire-tap channel. It is shown that the secrecy capacity Cs is the difference between the capacities of the main and wire.tap channels. It is further shown that Rd= Cs is the upper boundary of the achievable rate-equivocation region.

2,079 citations


Journal ArticleDOI
TL;DR: In this article, the authors explain the collapse of polyacrylamide gels in terms of mean field theory based on the extension of Flory's formula for free energy of gels.
Abstract: Collapse of polyacrylamide gels is observed upon changing temperature or fluid composition. It is explained in terms of mean-field theory based on the extension of Flory's formula for free energy of gels. Theory predicts, and I have observed, existence of a critical endpoint in the phase equilibria.

1,383 citations


Journal ArticleDOI
TL;DR: Observations indicate for the first time the existence of relatively direct conduction lines by which interoceptive information might be conveyed to limbic forebrain structures.

1,343 citations


Journal ArticleDOI
TL;DR: An improved algorithm is derived which requires O =(\log^{2} p) complexity if p - 1 has only small prime factors and such values of p must be avoided in the cryptosystem.
Abstract: A cryptographic system is described which is secure if and only if computing logarithms over GF(p) is infeasible. Previously published algorithms for computing this function require O(p^{1/2}) complexity in both time and space. An improved algorithm is derived which requires O =(\log^{2} p) complexity if p - 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.

1,292 citations



Journal ArticleDOI
TL;DR: In this article, the authors survey the control theoretic literature on decentralized and hierarchical control, and methods of analysis of large scale systems, and present a survey of the control theory of large-scale systems.
Abstract: This paper surveys the control theoretic literature on decentralized and hierarchical control, and methods of analysis of large scale systems.

1,124 citations


ReportDOI
15 Jul 1978
TL;DR: This is a review of factors pertaining to man-machine interaction in remote control of undersea vehicles, especially their manipulators and sensors, and the needs for research in this area.
Abstract: The potential of supervisory controlled teleoperators for accomplishment of manipulation and sensory tasks in deep ocean environments is discussed Teleoperators and supervisory control are defined, the current problems of human divers are reviewed, and some assertions are made about why supervisory control has potential use to replace and extend human diver capabilities The relative roles of man and computer and the variables involved in man-computer interaction are next discussed Finally, a detailed description of a supervisory controlled teleoperator system, SUPERMAN, is presented

1,079 citations


Journal ArticleDOI
01 Feb 1978
TL;DR: This online revelation quantum detection and estimation theory can be one of the options to accompany you in imitation of having other time.
Abstract: Getting the books quantum detection and estimation theory now is not type of challenging means. You could not unaided going following books hoard or library or borrowing from your friends to gain access to them. This is an enormously easy means to specifically get guide by on-line. This online revelation quantum detection and estimation theory can be one of the options to accompany you in imitation of having other time.

Journal ArticleDOI
TL;DR: The mixing equation applied by Vollmer [1] to Pb and Sr isotope ratios is shown to be a general equation applicable to consideration of element and isotope ratio.

Journal ArticleDOI
TL;DR: In this article, the additive group of R has a direct-sum decomposition R = R + R, +..., where RiRi C R,+j and 1 E R,.

Journal ArticleDOI
TL;DR: The qualitative PAH pattern is remarkably constant for most of the locations studied, and the quantitative PAH abundance increases with proximity to urban centers as discussed by the authors, consistent with anthropogenic combustion's being the major source of these compounds.

Journal ArticleDOI
TL;DR: The results of this study confirm earlier reports of accumbens projections to the globus pallidus and to dorsal strata of the medial half of the substantia nigra and confirm that this striatal region receives telen­ cephalic afferents from the hippocampus and amyg­ dala rather than from the neocortex.

Journal ArticleDOI
TL;DR: A projection matrix known as the hat matrix contains this information and, together with the Studentized residuals, provides a means of identifying exceptional data points and simplifies the calculations involved in removing a data point.
Abstract: In least-squares fitting it is important to understand the influence which a data y value will have on each fitted y value. A projection matrix known as the hat matrix contains this information and, together with the Studentized residuals, provides a means of identifying exceptional data points. This approach also simplifies the calculations involved in removing a data point, and it requires only simple modifications in the preferred numerical least-squares algorithms.

Journal ArticleDOI
TL;DR: In this article, the authors classified ultramafic inclusions from San Carlos, Arizona into two groups: Group I inclusions are dominated by magnesian (Mg/Mg + ΣFe= 0.86-0.91), olivine-rich peridotites containing Cr-rich clinopyroxene and spinel.

Journal ArticleDOI
TL;DR: The TOUR model captures the multiple representations that make up the cognitive map, the problem-solving strategies it uses, and the mechanisms for assimilating new information.

Journal ArticleDOI
TL;DR: In this article, a simple model is developed to illustrate a number of contractionary effects of currency devaluation, some of which have been noted previously, and it is shown that depreciation can lead to a reduction in national output if imports initially exceed exports; there are differences in consumption propensities from profits and wages; and government revenues are increased by devaluation.

Proceedings ArticleDOI
01 Jan 1978
TL;DR: This paper describes an adjustment procedure for observer-based linear control systems which asymptotically achieves the same loop transfer functions (and hence the same relative stability, robustness, and disturbance rejection properties) as full-state feedback control implementations.
Abstract: This paper describes an adjustment procedure for observer-based linear control systems which asymptotically achieves the same loop transfer functions (and hence the same relative stability, robustness, and disturbance rejection properties) as full-state feedback control implementations.

Journal ArticleDOI
TL;DR: In this article, the set of all connections of a principal bundle over the 4-sphere with compact nonabelian Lie group under the action of the group of gauge transformations is studied.
Abstract: The set of all connections of a principal bundle over the 4-sphere with compact nonabelian Lie group under the action of the group of gauge transformations is studied. It is shown that no continuous choice of exactly one connection on each orbit can be made. Thus the Gribov ambiguity for the Coloumb gauge will occur in all other gauges. No gauge fixing is possible.

Journal ArticleDOI
TL;DR: A simplified version of the side-pumped pulsed dye laser which has a spectral halfwidth of 1.25 GHz and a peak power of 10 kW at 600 nm and is exceptionally easy to align is developed.
Abstract: We have developed a simplified version of the side-pumped pulsed dye laser which has a spectral halfwidth of 1.25 GHz and a peak power of 10 kW at 600 nm. The basic laser consists of only four components (output mirror, dye cell, diffraction grating, and tuning mirror) and is exceptionally easy to align. Since the beam expander has been eliminated, the laser cavity can be made quite compact. Under the condition of reduced gain, the laser has been operated in a single mode.


Journal ArticleDOI
TL;DR: A real-time list processing system is presented which continuously reclaims garbage, including directed cycles, while linearizing and compacting the accessible cells into contiguous locations to avoid fragmenting the free storage pool.
Abstract: A real-time list processing system is one in which the time required by the elementary list operations (e.g. CONS, CAR, CDR, RPLACA, RPLACD, EQ, and ATOM in LISP) is bounded by a (small) constant. Classical implementations of list processing systems lack this property because allocating a list cell from the heap may cause a garbage collection, which process requires time proportional to the heap size to finish. A real-time list processing system is presented which continuously reclaims garbage, including directed cycles, while linearizing and compacting the accessible cells into contiguous locations to avoid fragmenting the free storage pool. The program is small and requires no time-sharing interrupts, making it suitable for microcode. Finally, the system requires the same average time, and not more than twice the space, of a classical implementation, and those space requirements can be reduced to approximately classical proportions by compact list representation. Arrays of different sizes, a program stack, and hash linking are simple extensions to our system, and reference counting is found to be inferior for many applications.

Journal ArticleDOI
TL;DR: In this paper, a model for the movement of a small viscous droplet on a surface is constructed that is based on the lubrication equations and uses the dynamic contact angle to describe the forces acting on the fluid at the contact line.
Abstract: A model for the movement of a small viscous droplet on a surface is constructed that is based on the lubrication equations and uses the dynamic contact angle to describe the forces acting on the fluid at the contact line. The problems analysed are: the spreading or retraction of a circular droplet; the advance of a thin two-dimensional layer; the creeping of a droplet or cell on a coated surface to a region of greater adhesion; the distortion of droplet shape owing to surface contamination. Relevant biological problems concerning cell movement and adhesion are described.

Journal ArticleDOI
TL;DR: In this article, the authors investigated various homotopy invariants of the simplicial complex, such as homology, connectivity, and connectivity of simplicial complexes, for finite groups.


Journal ArticleDOI
TL;DR: Four new results about Huffman codes are presented and a simple algorithm for adapting a Huffman code to slowly varying esthnates of the source probabilities is presented.
Abstract: In honor of the twenty-fifth anniversary of Huffman coding, four new results about Huffman codes are presented. The first result shows that a binary prefix condition code is a Huffman code iff the intermediate and terminal nodes in the code tree can be listed by nonincreasing probability so that each node in the list is adjacent to its sibling. The second result upper bounds the redundancy (expected length minus entropy) of a binary Huffman code by P_{1}+ \log_{2}[2(\log_{2}e)/e]=P_{1}+0.086 , where P_{1} is the probability of the most likely source letter. The third result shows that one can always leave a codeword of length two unused and still have a redundancy of at most one. The fourth result is a simple algorithm for adapting a Huffman code to slowly varying esthnates of the source probabilities. In essence, one maintains a running count of uses of each node in the code tree and lists the nodes in order of these counts. Whenever the occurrence of a message increases a node count above the count of the next node in the list, the nodes, with their attached subtrees, are interchanged.

Journal ArticleDOI
TL;DR: This paper considers the estimation of speech parameters in an all-pole model when the speech has been degraded by additive background noise and develops a procedure based on maximum a posteriori (MAP) estimation techniques which is related to linear prediction analysis of speech.
Abstract: This paper considers the estimation of speech parameters in an all-pole model when the speech has been degraded by additive background noise. The procedure, based on maximum a posteriori (MAP) estimation techniques is first developed in the absence of noise and related to linear prediction analysis of speech. The modification in the presence of background noise is shown to be nonlinear. Two suboptimal procedures are suggested which have linear iterative implementations. A preliminary illustration and discussion based both on a synthetic example and real speech data are given.

Journal ArticleDOI
TL;DR: Partitioning of Ni between olivine and silicate melt has been determined for compositions in the system Fo-Ab-An (1 atm) for temperatures ranging from 1250°C to 1450°c.