59,504 research outputs found

    Socially-Aware Distributed Hash Tables for Decentralized Online Social Networks

    Full text link
    Many decentralized online social networks (DOSNs) have been proposed due to an increase in awareness related to privacy and scalability issues in centralized social networks. Such decentralized networks transfer processing and storage functionalities from the service providers towards the end users. DOSNs require individualistic implementation for services, (i.e., search, information dissemination, storage, and publish/subscribe). However, many of these services mostly perform social queries, where OSN users are interested in accessing information of their friends. In our work, we design a socially-aware distributed hash table (DHTs) for efficient implementation of DOSNs. In particular, we propose a gossip-based algorithm to place users in a DHT, while maximizing the social awareness among them. Through a set of experiments, we show that our approach reduces the lookup latency by almost 30% and improves the reliability of the communication by nearly 10% via trusted contacts.Comment: 10 pages, p2p 2015 conferenc

    Numerical study of cancer cell invasion dynamics using adaptive mesh refinement: the urokinase model

    Full text link
    In the present work we investigate the chemotactically and proteolytically driven tissue invasion by cancer cells. The model employed is a system of advection-reaction-diffusion equations that features the role of the serine protease urokinase-type plasminogen activator. The analytical and numerical study of this system constitutes a challenge due to the merging, emerging, and travelling concentrations that the solutions exhibit. Classical numerical methods applied to this system necessitate very fine discretization grids to resolve these dynamics in an accurate way. To reduce the computational cost without sacrificing the accuracy of the solution, we apply adaptive mesh refinement techniques, in particular h-refinement. Extended numerical experiments exhibit that this approach provides with a higher order, stable, and robust numerical method for this system. We elaborate on several mesh refinement criteria and compare the results with the ones in the literature. We prove, for a simpler version of this model, LL^\infty bounds for the solutions, we study the stability of its conditional steady states, and conclude that it can serve as a test case for further development of mesh refinement techniques for cancer invasion simulations

    Computational structure‐based drug design: Predicting target flexibility

    Get PDF
    The role of molecular modeling in drug design has experienced a significant revamp in the last decade. The increase in computational resources and molecular models, along with software developments, is finally introducing a competitive advantage in early phases of drug discovery. Medium and small companies with strong focus on computational chemistry are being created, some of them having introduced important leads in drug design pipelines. An important source for this success is the extraordinary development of faster and more efficient techniques for describing flexibility in three‐dimensional structural molecular modeling. At different levels, from docking techniques to atomistic molecular dynamics, conformational sampling between receptor and drug results in improved predictions, such as screening enrichment, discovery of transient cavities, etc. In this review article we perform an extensive analysis of these modeling techniques, dividing them into high and low throughput, and emphasizing in their application to drug design studies. We finalize the review with a section describing our Monte Carlo method, PELE, recently highlighted as an outstanding advance in an international blind competition and industrial benchmarks.We acknowledge the BSC-CRG-IRB Joint Research Program in Computational Biology. This work was supported by a grant from the Spanish Government CTQ2016-79138-R.J.I. acknowledges support from SVP-2014-068797, awarded by the Spanish Government.Peer ReviewedPostprint (author's final draft

    Gradual Liquid Type Inference

    Full text link
    Liquid typing provides a decidable refinement inference mechanism that is convenient but subject to two major issues: (1) inference is global and requires top-level annotations, making it unsuitable for inference of modular code components and prohibiting its applicability to library code, and (2) inference failure results in obscure error messages. These difficulties seriously hamper the migration of existing code to use refinements. This paper shows that gradual liquid type inference---a novel combination of liquid inference and gradual refinement types---addresses both issues. Gradual refinement types, which support imprecise predicates that are optimistically interpreted, can be used in argument positions to constrain liquid inference so that the global inference process e effectively infers modular specifications usable for library components. Dually, when gradual refinements appear as the result of inference, they signal an inconsistency in the use of static refinements. Because liquid refinements are drawn from a nite set of predicates, in gradual liquid type inference we can enumerate the safe concretizations of each imprecise refinement, i.e. the static refinements that justify why a program is gradually well-typed. This enumeration is useful for static liquid type error explanation, since the safe concretizations exhibit all the potential inconsistencies that lead to static type errors. We develop the theory of gradual liquid type inference and explore its pragmatics in the setting of Liquid Haskell.Comment: To appear at OOPSLA 201

    Thermally induced behavior of the K-exchanged erionite. A further step in understanding the structural modifications of the erionite group upon heating

    Get PDF
    Fibrous erionite is a naturally occurring zeolite considered to be highly carcinogenic upon inhalation, even more than crocidolite. Since no iron is typically present in erionite, its toxicity has been attributed to ion-exchanged Fe participating in Fenton chemistry. Recently, a study aimed at investigating possible fiber inactivation routes surprisingly showed that, despite having completely occluded all available pores with K ions, the erionite-Na sample preserved the property to upload Fe (II) within the structure. In this work, the thermal behavior of the K-exchanged erionite-Na was investigated by TG/ DSC and in situ XRPD analyses in order to provide relevant information for modeling the thermally induced behavior of the erionite group. Rietveld refinement results evidenced a general trend of cell parameters and volume with temperature similar to that observed for erionite-K from Rome (Oregon, USA). However, the dependence of Tdehydrand Tbreakfrom Si/Si+Al ratio observed in zeolites (high Si content favours a lower Tdehydrand a higher Tbreak) is not observed, possibly due to the effect of the relevant amount of large K ions dispersed within the erionite cage, acting as reinforcing blocks for the framework. Heating produces a progressive emptying of the Ca sites, common effect previously observed in erionite samples showing different chemistry. In addition, K1 s.s. remains unchanged evidencing the absence of any “internal ion exchange” process, whereas s.s. at K2 increases in the range 438-573 K and then slowly decreases in the range 700-1218 K. Both Rietveld and DSC data suggest the motion of K ions from OW sites toward the walls of the erionite cavity during dehydration

    Domain Objects and Microservices for Systems Development: a roadmap

    Full text link
    This paper discusses a roadmap to investigate Domain Objects being an adequate formalism to capture the peculiarity of microservice architecture, and to support Software development since the early stages. It provides a survey of both Microservices and Domain Objects, and it discusses plans and reflections on how to investigate whether a modeling approach suited to adaptable service-based components can also be applied with success to the microservice scenario
    corecore