39,155 research outputs found

    Ideal homogeneous access structures constructed from graphs

    Get PDF
    Starting from a new relation between graphs and secret sharing schemes introduced by Xiao, Liu and Zhang, we show a method to construct more general ideal homogeneous access structures. The method has some advantages: it efficiently gives an ideal homogeneous access structure for the desired rank, and some conditions can be imposed (such as forbidden or necessary subsets of players), even if the exact composition of the resulting access structure cannot be fully controlled. The number of homogeneous access structures that can be constructed in this way is quite limited; for example, we show that (t, l)-threshold access structures can be constructed from a graph only when t = 1, t = l - 1 or t = l.Peer ReviewedPostprint (published version

    Universality in protein residue networks

    Get PDF
    Residue networks representing 595 nonhomologous proteins are studied. These networks exhibit universal topological characteristics as they belong to the topological class of modular networks formed by several highly interconnected clusters separated by topological cavities. There are some networks which tend to deviate from this universality. These networks represent small-size proteins having less than 200 residues. We explain such differences in terms of the domain structure of these proteins. On the other hand, we find that the topological cavities characterizing proteins residue networks match very well with protein binding sites. We then investigate the effect of the cutoff value used in building the residue network. For small cutoff values, less than 5Å, the cavities found are very large corresponding almost to the whole protein surface. On the contrary, for large cutoff value, more than 10.0 Å, only very large cavities are detected and the networks look very homogeneous. These findings are useful for practical purposes as well as for identifying "protein-like" complex networks. Finally, we show that the main topological class of residue networks is not reproduced by random networks growing according to Erdös-Rényi model or the preferential attachment method of Barabási-Albert. However, the Watts-Strogatz (WS) model reproduces very well the topological class as well as other topological properties of residue network. We propose here a more biologically appealing modification of the WS model to describe residue networks

    Studies of metamaterial structures

    Get PDF
    Imperial Users onl

    Fourth moment sum rule for the charge correlations of a two-component classical plasma

    Get PDF
    We consider an ionic fluid made with two species of mobile particles carrying either a positive or a negative charge. We derive a sum rule for the fourth moment of equilibrium charge correlations. Our method relies on the study of the system response to the potential created by a weak external charge distribution with slow spatial variations. The induced particle densities, and the resulting induced charge density, are then computed within density functional theory, where the free energy is expanded in powers of the density gradients. The comparison with the predictions of linear response theory provides a thermodynamical expression for the fourth moment of charge correlations, which involves the isothermal compressibility as well as suitably defined partial compressibilities. The familiar Stillinger-Lovett condition is also recovered as a by-product of our method, suggesting that the fourth moment sum rule should hold in any conducting phase. This is explicitly checked in the low density regime, within the Abe-Meeron diagrammatical expansions. Beyond its own interest, the fourth-moment sum rule should be useful for both analyzing and understanding recently observed behaviours near the ionic critical point

    Composite CDMA - A statistical mechanics analysis

    Get PDF
    Code Division Multiple Access (CDMA) in which the spreading code assignment to users contains a random element has recently become a cornerstone of CDMA research. The random element in the construction is particular attractive as it provides robustness and flexibility in utilising multi-access channels, whilst not making significant sacrifices in terms of transmission power. Random codes are generated from some ensemble, here we consider the possibility of combining two standard paradigms, sparsely and densely spread codes, in a single composite code ensemble. The composite code analysis includes a replica symmetric calculation of performance in the large system limit, and investigation of finite systems through a composite belief propagation algorithm. A variety of codes are examined with a focus on the high multi-access interference regime. In both the large size limit and finite systems we demonstrate scenarios in which the composite code has typical performance exceeding sparse and dense codes at equivalent signal to noise ratio.Comment: 23 pages, 11 figures, Sigma Phi 2008 conference submission - submitted to J.Stat.Mec

    Reasoning & Querying – State of the Art

    Get PDF
    Various query languages for Web and Semantic Web data, both for practical use and as an area of research in the scientific community, have emerged in recent years. At the same time, the broad adoption of the internet where keyword search is used in many applications, e.g. search engines, has familiarized casual users with using keyword queries to retrieve information on the internet. Unlike this easy-to-use querying, traditional query languages require knowledge of the language itself as well as of the data to be queried. Keyword-based query languages for XML and RDF bridge the gap between the two, aiming at enabling simple querying of semi-structured data, which is relevant e.g. in the context of the emerging Semantic Web. This article presents an overview of the field of keyword querying for XML and RDF

    Pathfinding in hierarchical representation of large realistic virtual terrains

    Get PDF
    Pathfinding is critical to virtual simulation applications. One of the most prominent pathfinding challenges is the fast computation of path plans in large and realistic virtual terrain environments. To tackle this problem, this work proposes the exploration of a quadtree structure in the navigation map representation of large real-world virtual terrains. Exploring a hierarchical approach for virtual terrain representation, we detail how a global hierarchical pathfinding algorithm searches for a path in a coarse initial navigation map representation. Then, during execution time, the pathfinding algorithm refines regions of interest in this terrain representation in order to compute paths with a higher quality in areas where a large amount of navigation obstacles is found. The computational time of such hierarchical pathfinding algorithm is systematically measured in different hierarchical and non-hierarchical terrain representation structures that are instantiated in the modeling of a small real-world terrain scenario. Then, similar experiments are developed in a large real-world virtual terrain that is inserted in a real-life simulation system for the development of military tactical training exercises. The results show that the computational time required to generate pathfinding answers can be optimized when the proposed hierarchical pathfinding algorithm along with the easy and reliable implementation of the quadtree-based navigation map representation of the large virtual terrain are explored in the development of simulation systems

    Impact of network structure on the capacity of wireless multihop ad hoc communication

    Full text link
    As a representative of a complex technological system, so-called wireless multihop ad hoc communication networks are discussed. They represent an infrastructure-less generalization of todays wireless cellular phone networks. Lacking a central control authority, the ad hoc nodes have to coordinate themselves such that the overall network performs in an optimal way. A performance indicator is the end-to-end throughput capacity. Various models, generating differing ad hoc network structure via differing transmission power assignments, are constructed and characterized. They serve as input for a generic data traffic simulation as well as some semi-analytic estimations. The latter reveal that due to the most-critical-node effect the end-to-end throughput capacity sensitively depends on the underlying network structure, resulting in differing scaling laws with respect to network size.Comment: 30 pages, to be published in Physica
    • …
    corecore