Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Obfuscation’s Layered Defense: How Code Complexity Thwarts Attackers

28.11.2025 by Ray Dalio

A new empirical study reveals that combining multiple code obfuscation techniques dramatically increases the effort required for successful software attacks.

Categories Science

Boosting Quantum Security: A New Analysis of Key Distribution

28.11.2025 by Ray Dalio

Researchers have refined the decoy-state BB84 protocol with advantage distillation, pushing the boundaries of secure quantum communication.

Categories Science

Finding Flaws: A New Approach to Verifying Mathematical Reasoning

28.11.2025 by Ray Dalio

This work introduces three distinct pessimistic verification methods-designated “pes@n”, “vp@l”, and “prog@n/l”-each offering a unique approach to robust system evaluation.

Researchers are shifting focus from confirming correct answers to proactively identifying errors in large language models tackling complex mathematical problems.

Categories Science

AI’s Expanding Reach: Securing the Model Context

28.11.2025 by Ray Dalio

The system establishes a distributed framework wherein a client, leveraging a designated protocol, requests services from a central server, effectively partitioning tasks and resources to optimize computational efficiency and scalability, as symbolized by the $client \leftrightarrow server$ interaction.

As AI agents gain the ability to dynamically access external resources, a critical need emerges to address the unique security challenges posed by this expanding context.

Categories Science

Beyond Certainty: When Quantum Measurements Align—and Diverge

28.11.2025 by Ray Dalio

The scenario illustrates a distributed system involving two laboratories.

A new analysis explores the fundamental limits of agreement between observers making measurements on quantum systems, revealing that disagreement isn’t just possible, but governed by predictable bounds.

Categories Science

Beyond Perimeter Security: Securing the 5G IoT with Content-Centric Networking

28.11.2025 by Ray Dalio

As the Internet of Things expands and relies increasingly on 5G, traditional security models are proving inadequate, necessitating a shift towards more intelligent, distributed approaches.

Categories Science

Beyond the Centipede’s Bite: Quantum Strategies for Cooperation

27.11.2025 by Ray Dalio

The centipede game unfolds across three distinct rounds, each presenting a sequential decision point where players must choose between continuing toward a larger shared reward or defecting to secure a smaller, immediate gain.

A new analysis reveals that applying the principles of quantum game theory can unlock cooperative solutions in the classic ‘centipede game,’ challenging traditional predictions of self-interest.

Categories Science

Squeezing More Out of Noisy Quantum Computers

27.11.2025 by Ray Dalio

A two-layered transformation Upsampling Ansatz, designed for an 88-qubit system, utilizes tiles-each containing gates corresponding to single and double electronic excitations and parameterized by three variational parameters-to transform an initial qubit register into a desired reference state.

A new error mitigation technique boosts the performance of complex quantum algorithms on near-term hardware.

Categories Science

Holographic Data Gets a Deep Learning Makeover

27.11.2025 by Ray Dalio

The quantitative comparison demonstrates VQ-HoloNet’s superior performance against DPRC, establishing its efficacy in the given task.

Researchers have developed a novel deep learning framework to dramatically compress holographic data without sacrificing reconstruction quality.

Categories Science

Passive QKD: A Rigorous Security Analysis

27.11.2025 by Ray Dalio

A passive decoy-state BB84 protocol utilizes phase-randomized coherent states-characterized by intensity $\mu_{\omega_i}$ and polarization $\phi(a_i, \alpha_i)$-to transmit quantum information, where Alice encodes data through choices of bit $a_i$, basis $\alpha_i$, and intensity label $\omega_i$, while Bob employs a measurement setup featuring a beam splitter with transmittance $q$ and subsequent polarization analysis via ZZ and XX lines-each consisting of polarization beam splitters and threshold photon detectors with efficiencies $\eta_{det}$ and dark count probabilities $d$-to receive and decode the quantum signal.

A new proof demonstrates the security of a practical quantum key distribution system using a simplified, passive measurement approach.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page125 Page126 Page127 … Page140 Next →
© 2026 Investment Policy • Built with GeneratePress