19,262 research outputs found

    k-Trails: Recognition, Complexity, and Approximations

    Full text link
    The notion of degree-constrained spanning hierarchies, also called k-trails, was recently introduced in the context of network routing problems. They describe graphs that are homomorphic images of connected graphs of degree at most k. First results highlight several interesting advantages of k-trails compared to previous routing approaches. However, so far, only little is known regarding computational aspects of k-trails. In this work we aim to fill this gap by presenting how k-trails can be analyzed using techniques from algorithmic matroid theory. Exploiting this connection, we resolve several open questions about k-trails. In particular, we show that one can recognize efficiently whether a graph is a k-trail. Furthermore, we show that deciding whether a graph contains a k-trail is NP-complete; however, every graph that contains a k-trail is a (k+1)-trail. Moreover, further leveraging the connection to matroids, we consider the problem of finding a minimum weight k-trail contained in a graph G. We show that one can efficiently find a (2k-1)-trail contained in G whose weight is no more than the cheapest k-trail contained in G, even when allowing negative weights. The above results settle several open questions raised by Molnar, Newman, and Sebo

    Undifferentiated Carcinoma of Larynx of Nasopharyngeal Type

    Get PDF
    Undifferentiated carcinoma of nasopharyngeal type arising in the larynx is unusual. This type of carcinoma-which occurs almost exclusively in nasopharynx-is very infrequent in the larynx (0.2%). Till date only 17 cases are reported in the medical literature. We present the clinical and histopathological findings along with the management of one additional case of undifferentiated carcinoma of nasopharyngeal type in the larynx which was managed successfully with radiotherapy

    Malignant peripheral nerve sheath tumor of the cervical vagus nerve in a neurofibromatosis type 1 patient - An unusual presentation

    Get PDF
    Malignant peripheral nerve sheath tumors (MPNST’S) of the head and neck comprise 2% to 6% of head and neck sarcomas. These tumors may arise as sporadic variants or in patients with neurofibromatosis (NF). Development of these MPNST’s is one of the serious complications of neurofibromatosis type 1(NF1). To our knowledge there are only two reported cases of MPNST’s arising in the cervical vagal nerve, occurring in NF1 patients. We present here an NF1 patient who developed an MPNST of the cervical vagus nerve and presented only with a cervical swelling and hoarseness

    Insular Carcinoma of Thyroid Presenting as a Giant Skull Lesion: A Dilemma in Treatment.

    Get PDF
    Thyroid surgeons are becoming increasingly more aware of a histologically distinct subset of thyroid carcinoma whose classification falls between well-differentiated and anaplastic carcinomas with respect to both cell differentiation and clinical behavior. This subtype of tumors has been categorized as poorly differentiated or insular carcinoma, based on its characteristic cell groupings. Although the differentiation of insular carcinoma from other thyroid carcinomas has important prognostic and therapeutic significance, relatively little about insular carcinoma has been published in the otolaryngology literature. In this article, we discuss a case of insular carcinoma of thyroid presenting with concurrent distant metastasis to skull, lung, ribs, and inguinal region with review of the literature. We conclude that insular thyroid carcinoma warrants aggressive management with total thyroidectomy and excision of accessible giant lesion followed by radioactive iodine ablation of any remaining thyroid tissue

    Rational Pessimism, Rational Exuberance, and Asset Pricing Models

    Get PDF
    The paper estimates and examines the empirical plausibiltiy of asset pricing models that attempt to explain features of financial markets such as the size of the equity premium and the volatility of the stock market. In one model, the long run risks model of Bansal and Yaron (2004), low frequency movements and time varying uncertainty in aggregate consumption growth are the key channels for understanding asset prices. In another, as typified by Campbell and Cochrane (1999), habit formation, which generates time-varying risk-aversion and consequently time-variation in risk-premia, is the key channel. These models are fitted to data using simulation estimators. Both models are found to fit the data equally well at conventional significance levels, and they can track quite closely a new measure of realized annual volatility. Further scrutiny using a rich array of diagnostics suggests that the long run risk model is preferred.

    Turning cross-cultural medical education on its head: Learning about ourselves and developing respectful curiosity

    Get PDF
    Cross-cultural education is often understood to mean acquiring cultural knowledge about different cultural groups in order to serve people from diverse groups equitably. However, this article argues that to work effectively in cross-cultural situations, we need to learn about our own culture and develop an approach of respectful curiosity. The first goal of cross-cultural education is to understand how culture influences our thoughts, perceptions, biases, and values at an unconscious level. The second goal is to understand the nature of individual cultural identity as a multidimensional and dynamic construct through exploration of our own cultural identity. This exploration helps us understand the limitations of learning about ‘others’ through learning categorical information and helps us limit the effect of our implicit biases on our interactions. The approach of respectful curiosity is recommended to question our assumptions, understand each unique individual patient, connect with each patient, and build the therapeutic relationship

    Inapproximability of Truthful Mechanisms via Generalizations of the VC Dimension

    Full text link
    Algorithmic mechanism design (AMD) studies the delicate interplay between computational efficiency, truthfulness, and optimality. We focus on AMD's paradigmatic problem: combinatorial auctions. We present a new generalization of the VC dimension to multivalued collections of functions, which encompasses the classical VC dimension, Natarajan dimension, and Steele dimension. We present a corresponding generalization of the Sauer-Shelah Lemma and harness this VC machinery to establish inapproximability results for deterministic truthful mechanisms. Our results essentially unify all inapproximability results for deterministic truthful mechanisms for combinatorial auctions to date and establish new separation gaps between truthful and non-truthful algorithms

    An entropy argument for counting matroids

    Full text link
    We show how a direct application of Shearers' Lemma gives an almost optimum bound on the number of matroids on nn elements.Comment: Short note, 4 page

    On the number of matroids

    Get PDF
    We consider the problem of determining mnm_n, the number of matroids on nn elements. The best known lower bound on mnm_n is due to Knuth (1974) who showed that loglogmn\log \log m_n is at least n3/2logn1n-3/2\log n-1. On the other hand, Piff (1973) showed that loglogmnnlogn+loglogn+O(1)\log\log m_n\leq n-\log n+\log\log n +O(1), and it has been conjectured since that the right answer is perhaps closer to Knuth's bound. We show that this is indeed the case, and prove an upper bound on loglogmn\log\log m_n that is within an additive 1+o(1)1+o(1) term of Knuth's lower bound. Our proof is based on using some structural properties of non-bases in a matroid together with some properties of independent sets in the Johnson graph to give a compressed representation of matroids.Comment: Final version, 17 page

    A New Simulation Metric to Determine Safe Environments and Controllers for Systems with Unknown Dynamics

    Full text link
    We consider the problem of extracting safe environments and controllers for reach-avoid objectives for systems with known state and control spaces, but unknown dynamics. In a given environment, a common approach is to synthesize a controller from an abstraction or a model of the system (potentially learned from data). However, in many situations, the relationship between the dynamics of the model and the \textit{actual system} is not known; and hence it is difficult to provide safety guarantees for the system. In such cases, the Standard Simulation Metric (SSM), defined as the worst-case norm distance between the model and the system output trajectories, can be used to modify a reach-avoid specification for the system into a more stringent specification for the abstraction. Nevertheless, the obtained distance, and hence the modified specification, can be quite conservative. This limits the set of environments for which a safe controller can be obtained. We propose SPEC, a specification-centric simulation metric, which overcomes these limitations by computing the distance using only the trajectories that violate the specification for the system. We show that modifying a reach-avoid specification with SPEC allows us to synthesize a safe controller for a larger set of environments compared to SSM. We also propose a probabilistic method to compute SPEC for a general class of systems. Case studies using simulators for quadrotors and autonomous cars illustrate the advantages of the proposed metric for determining safe environment sets and controllers.Comment: 22nd ACM International Conference on Hybrid Systems: Computation and Control (2019
    corecore