Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Virtual Switch Vulnerability: When Network Traffic Leaks Secrets

25.01.2026 by Ray Dalio

New research reveals that Open vSwitch, a cornerstone of modern virtualization, is susceptible to remote side-channel attacks that could compromise network security and VM isolation.

Categories Science

When Random Points Form Sharp Boundaries

25.01.2026 by Ray Dalio

New research delves into the subtle conditions that govern how the convex hulls of randomly distributed points transition from sparse to full configurations.

Categories Science

Unlocking a Quantum Puzzle: How Dimer Arrangements Reveal a New Phase of Matter

25.01.2026 by Ray Dalio

The quantum dimer model, studied on a weighted triangular lattice and formalized as [latex] Eq. (5) [/latex], demonstrates a continuous phase transition-from a disordered ‘spin liquid’ to an ordered ‘columnar’ state-reflected in the macroscopic behavior of classical double-dimer coverings, where the prevalence of large loops indicates disorder ([latex]\alpha < 3[/latex]) and small loops/edges signify order ([latex]\alpha > 3[/latex]), offering an intuitive link between classical loop behavior and the observed vison correlator behavior within the quantum system.

Researchers have pinpointed a topological phase transition in a quantum dimer model, revealing insights into exotic states of matter and their underlying physics.

Categories Science

Probing Strong Interactions with Holographic Defects

25.01.2026 by Ray Dalio

New research leverages the AdS/CFT correspondence to calculate correlation functions in defect conformal field theories, offering a powerful tool for understanding strongly coupled systems.

Categories Science

Unlocking Firmware Security: A New Benchmark for Fuzzing

25.01.2026 by Ray Dalio

The framework dissects software vulnerabilities by translating virtual CPU states and function descriptions - termed Reflections and Introspections - into actionable bug data, uniquely identified and categorized as [latex] Reached \ \& \ Triggered [/latex], then standardizing this information alongside fuzzing campaign timing data to visually report performance metrics and expose underlying system behavior.

Researchers have developed a comprehensive framework to rigorously evaluate the effectiveness of firmware fuzzers, tackling critical challenges in embedded system security.

Categories Science

From Voice to Code: The Hidden Errors Undermining Program Comprehension

25.01.2026 by Ray Dalio

Code-aware formatting enhances text-to-speech synthesis by leveraging the underlying structure of the text, allowing for more nuanced and natural-sounding pronunciation.

A new study reveals how inaccuracies in speech-to-text transcription can significantly hinder understanding of spoken code, especially for learners and in multilingual settings.

Categories Science

Beyond the Barrier: Unifying Kinetics and Fluctuations in Complex Systems

24.01.2026 by Ray Dalio

New research establishes a rigorous mathematical link between microscopic fluctuations and the macroscopic rates of transitions between metastable states, offering insights into phenomena ranging from quantum chromodynamics to condensed matter physics.

Categories Science

Charging Ahead with Risk: Wireless Attacks Target EV Infrastructure

24.01.2026 by Ray Dalio

Despite being misled by manipulated reports of [latex] \text{voltage} [/latex] at point A and [latex] \text{current} [/latex] at point B, including a false claim of charging at 1330V and 1330A when actually receiving 448V and 87A, VehicleX continued to charge normally, demonstrating a vulnerability exploitable through real-time, interactive manipulation of communicated demand responses.

New research reveals a successful wireless Man-in-the-Middle attack against CCS EV charging stations, highlighting critical vulnerabilities in current security protocols.

Categories Science

Stitching Together the Invisible: High-Resolution Imaging Across the Whole Slide

24.01.2026 by Ray Dalio

Holographic reconstruction benefits from iterative patching following initial reconstruction, and further refinement is achieved through algorithms employing Minimum Distance Iteration (MDI) or adapted phase integration techniques, demonstrating pathways to improved image fidelity.

A new algorithm overcomes reconstruction artifacts in digital holographic microscopy, enabling accurate quantitative phase imaging of large tissue samples.

Categories Science

Who Knows Your Data? The Limits of Privacy Attacks on Tables

24.01.2026 by Ray Dalio

A structured taxonomy delineates the landscape of membership inference attacks within federated learning systems, categorizing vulnerabilities as they emerge from the distributed nature of model training and data access.

A new review reveals that determining if a specific record was used to train a model from tabular data is surprisingly difficult, despite growing concerns about data privacy.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page3 Page4 Page5 … Page81 Next →
© 2026 Investment Policy • Built with GeneratePress