424 research outputs found

    Stochastic learning dynamics and speed of convergence in population games

    Get PDF
    We study how long it takes for large populations of interacting agents to come close to Nash equilibrium when they adapt their behavior using a stochastic better reply dynamic. Prior work considers this question mainly for 2 × 2 games and potential games; here we characterize convergence times for general weakly acyclic games, including coordination games, dominance solvable games, games with strategic complementarities, potential games, and many others with applications in economics, biology, and distributed control. If players' better replies are governed by idiosyncratic shocks, the convergence time can grow exponentially in the population size; moreover, this is true even in games with very simple payoff structures. However, if their responses are sufficiently correlated due to aggregate shocks, the convergence time is greatly accelerated; in fact, it is bounded for all sufficiently large populations. We provide explicit bounds on the speed of convergence as a function of key structural parameters including the number of strategies, the length of the better reply paths, the extent to which players can influence the payoffs of others, and the desired degree of approximation to Nash equilibrium

    The speed of innovation diffusion in social networks

    Get PDF
    New ways of doing things often get started through the actions of a few innovators, then diffuse rapidly as more and more people come into contact with prior adopters in their social network. Much of the literature focuses on the speed of diffusion as a function of the network topology. In practice, the topology may not be known with any precision, and it is constantly in flux as links are formed and severed. Here, we establish an upper bound on the expected waiting time until a given proportion of the population has adopted that holds independently of the network structure. Kreindler and Young (2014) demonstrated such a bound for regular networks when agents choose between two options: the innovation and the status quo. Our bound holds for directed and undirected networks of arbitrary size and degree distribution, and for multiple competing innovations with different payoffs

    Challenges of tuberculosis management in high and low prevalence countries in a mobile world

    Get PDF
    This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.In this issue of the PCRJ, Bishara et al. 1 present a case report about the treatment of a pregnant woman with tuberculosis (TB). She had emigrated from a country with a high prevalence of TB to one with a lower prevalence. This presented a challenge to her physicians who were faced with identifying and treating close contacts who were also infected. This Perspective article explores in more depth some of the questions raised by this case report. It discusses the role of primary care physicians in low prevalence countries who can implement evidence-based screening programmes, it discusses effective strategies for the diagnosis and treatment of TB in countries with high TB prevalence, and it presents insights from medical anthropology that can help practitioners overcome the barriers to TB diagnosis, treatment and screening described in the case report

    Weak pairwise correlations imply strongly correlated network states in a neural population

    Get PDF
    Biological networks have so many possible states that exhaustive sampling is impossible. Successful analysis thus depends on simplifying hypotheses, but experiments on many systems hint that complicated, higher order interactions among large groups of elements play an important role. In the vertebrate retina, we show that weak correlations between pairs of neurons coexist with strongly collective behavior in the responses of ten or more neurons. Surprisingly, we find that this collective behavior is described quantitatively by models that capture the observed pairwise correlations but assume no higher order interactions. These maximum entropy models are equivalent to Ising models, and predict that larger networks are completely dominated by correlation effects. This suggests that the neural code has associative or error-correcting properties, and we provide preliminary evidence for such behavior. As a first test for the generality of these ideas, we show that similar results are obtained from networks of cultured cortical neurons.Comment: Full account of work presented at the conference on Computational and Systems Neuroscience (COSYNE), 17-20 March 2005, in Salt Lake City, Utah (http://cosyne.org

    Measure-Based Inconsistency-Tolerant Maintenance of Database Integrity

    Full text link
    [EN] To maintain integrity, constraint violations should be prevented or repaired. However, it may not be feasible to avoid inconsistency, or to repair all violations at once. Based on an abstract concept of violation measures, updates and repairs can be checked for keeping inconsistency bounded, such that integrity violations are guaranteed to never get out of control. This measure-based approach goes beyond conventional methods that are not meant to be applied in the presence of inconsistency. It also generalizes recently introduced concepts of inconsistency-tolerant integrity maintenance.Partially supported by FEDER and the Spanish grants TIN2009-14460-C03 and TIN2010-17139Decker, H. (2013). Measure-Based Inconsistency-Tolerant Maintenance of Database Integrity. Lecture Notes in Computer Science. 7693:149-173. https://doi.org/10.1007/978-3-642-36008-4_7S1491737693Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley (1995)Abiteboul, S., Vianu, V.: A transaction-based approach to relational database specification. JACM 36(4), 758–789 (1989)Afrati, F., Kolaitis, P.: Repair checking in inconsistent databases: algorithms and complexity. In: 12th ICDT, pp. 31–41. ACM Press (2009)Arenas, M., Bertossi, L., Chomicki, J.: Consistent query answers in inconsistent databases. In: PODS 1999, pp. 68–79. ACM Press (1999)Arieli, O., Denecker, M., Bruynooghe, M.: Distance semantics for database repair. Ann. Math. Artif. Intell. 50, 389–415 (2007)Arni-Bloch, N., Ralyté, J., Léonard, M.: Service–Driven Information Systems Evolution: Handling Integrity Constraints Consistency. In: Persson, A., Stirna, J. (eds.) PoEM 2009. LNBIP, vol. 39, pp. 191–206. Springer, Heidelberg (2009)Bauer, H.: Maß- und Integrationstheorie, 2. Auflage. De Gruyter (1992)Besnard, P., Hunter, A.: Quasi-Classical Logic: Non-Trivializable Classical Reasoning from Inconsistent Information. In: Froidevaux, C., Kohlas, J. (eds.) ECSQARU 1995. LNCS, vol. 946, pp. 44–51. Springer, Heidelberg (1995)Bohanon, P., Fan, W., Flaster, M., Rastogi, R.: A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification. In: Proc. SIGMOD 2005, pp. 143–154. ACM Press (2005)Ceri, S., Cochrane, R., Widom, J.: Practical Applications of Triggers and Constraints: Success and Lingering Issues. In: Proc. 26th VLDB, pp. 254–262. Morgan Kaufmann (2000)Chakravarthy, U., Grant, J., Minker, J.: Logic-based Approach to Semantic Query Optimization. Transactions on Database Systems 15(2), 162–207 (1990)Chomicki, J.: Consistent Query Answering: Five Easy Pieces. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol. 4353, pp. 1–17. Springer, Heidelberg (2006)Christiansen, H., Martinenghi, D.: On simplification of database integrity constraints. Fundamenta Informaticae 71(4), 371–417 (2006)Clark, K.: Negation as Failure. In: Gallaire, H., Minker, J. (eds.) Logic and Data Bases, pp. 293–322. Plenum Press (1978)Curino, C., Moon, H., Deutsch, A., Zaniolo, C.: Update Rewriting and Integrity Constraint Maintenance in a Schema Evolution Support System: PRISM++. PVLDB 4, 117–128 (2010)Dawson, J.: The compactness of first-order logic: From Gödel to Lindström. History and Philosophy of Logic 14(1), 15–37 (1993)Decker, H.: The Range Form of Databases and Queries or: How to Avoid Floundering. In: Proc. 5th ÖGAI. Informatik-Fachberichte, vol. 208, pp. 114–123. Springer (1989)Decker, H.: Drawing Updates From Derivations. In: Kanellakis, P.C., Abiteboul, S. (eds.) ICDT 1990. LNCS, vol. 470, pp. 437–451. Springer, Heidelberg (1990)Decker, H.: Extending Inconsistency-Tolerant Integrity Checking by Semantic Query Optimization. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) DEXA 2008. LNCS, vol. 5181, pp. 89–96. Springer, Heidelberg (2008)Decker, H.: Answers That Have Integrity. In: Schewe, K.-D., Thalheim, B. (eds.) SDKB 2010. LNCS, vol. 6834, pp. 54–72. Springer, Heidelberg (2011)Decker, H.: Causes of the Violation of Integrity Constraints for Supporting the Quality of Databases. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part V. LNCS, vol. 6786, pp. 283–292. Springer, Heidelberg (2011)Decker, H.: Inconsistency-tolerant Integrity Checking based on Inconsistency Metrics. In: König, A., Dengel, A., Hinkelmann, K., Kise, K., Howlett, R.J., Jain, L.C. (eds.) KES 2011, Part II. LNCS, vol. 6882, pp. 548–558. Springer, Heidelberg (2011)Decker, H.: Partial Repairs that Tolerate Inconsistency. In: Eder, J., Bielikova, M., Tjoa, A.M. (eds.) ADBIS 2011. LNCS, vol. 6909, pp. 389–400. Springer, Heidelberg (2011)Decker, H.: Consistent Explanations of Answers to Queries in Inconsistent Knowledge Bases. In: Roth-Berghofer, T., Tintarev, N., Leake, D. (eds.) Explanation-aware Computing, Proc. IJCAI 2011 Workshop ExaCt 2011, pp. 71–80 (2011), http://exact2011.workshop.hm/index.phpDecker, H., Martinenghi, D.: Classifying integrity checking methods with regard to inconsistency tolerance. In: Proc. PPDP 2008, pp. 195–204. ACM Press (2008)Decker, H., Martinenghi, D.: Modeling, Measuring and Monitoring the Quality of Information. In: Heuser, C.A., Pernul, G. (eds.) ER 2009. LNCS, vol. 5833, pp. 212–221. Springer, Heidelberg (2009)Decker, H., Martinenghi, D.: Inconsistency-tolerant Integrity Checking. IEEE TKDE 23(2), 218–234 (2011)Decker, H., Muñoz-Escoí, F.D.: Revisiting and Improving a Result on Integrity Preservation by Concurrent Transactions. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010 Workshops. LNCS, vol. 6428, pp. 297–306. Springer, Heidelberg (2010)Dung, P., Kowalski, R., Toni, F.: Dialectic Proof Procedures for Assumption-based Admissible Argumentation. Artificial Intelligence 170(2), 114–159 (2006)Ebbinghaus, H.-D., Flum, J.: Finite Model Theory, 2nd edn. Springer (2006)Embury, S., Brandt, S., Robinson, J., Sutherland, I., Bisby, F., Gray, A., Jones, A., White, R.: Adapting integrity enforcement techniques for data reconciliation. Information Systems 26, 657–689 (2001)Enderton, H.: A Mathematical Introduction to Logic, 2nd edn. Academic Press (2001)Eiter, T., Fink, M., Greco, G., Lembo, D.: Repair localization for query answering from inconsistent databases. ACM TODS 33(2), article 10 (2008)Furfaro, F., Greco, S., Molinaro, C.: A three-valued semantics for querying and repairing inconsistent databases. Ann. Math. Artif. Intell. 51(2-4), 167–193 (2007)Grant, J., Hunter, A.: Measuring the Good and the Bad in Inconsistent Information. In: Proc. 22nd IJCAI, pp. 2632–2637 (2011)Greco, G., Greco, S., Zumpano, E.: A logical framework for querying and repairing inconsistent databases. IEEE TKDE 15(6), 1389–1408 (2003)Guessoum, A., Lloyd, J.: Updating knowledge bases. New Generation Computing 8(1), 71–89 (1990)Guessoum, A., Lloyd, J.: Updating knowledge bases II. New Generation Computing 10(1), 73–100 (1991)Gupta, A., Sagiv, Y., Ullman, J., Widom, J.: Constraint checking with partial information. In: Proc. PODS 1994, pp. 45–55. ACM Press (1994)Hunter, A.: Measuring Inconsistency in Knowledge via Quasi-Classical Models. In: Proc. 18th AAAI &14th IAAI, pp. 68–73 (2002)Hunter, A., Konieczny, S.: Approaches to Measuring Inconsistent Information. In: Bertossi, L., Hunter, A., Schaub, T. (eds.) Inconsistency Tolerance. LNCS, vol. 3300, pp. 191–236. Springer, Heidelberg (2005)Hunter, A., Konieczny, S.: Measuring inconsistency through minimal inconsistent sets. In: Brewka, G., Lang, J. (eds.) Principles of Knowledge Representation and Reasoning (Proc. 11th KR), pp. 358–366. AAAI Press (2008)Hunter, A., Konieczny, S.: On the measure of conflicts: Shapley Inconsistency Values. Artificial Intelligence 174, 1007–1026 (2010)Kakas, A., Mancarella, P.: Database updates through abduction. In: Proc. 16th VLDB, pp. 650–661. Morgan Kaufmann (1990)Kakas, A., Kowalski, R., Toni, F.: The role of Abduction in Logic Programming. In: Gabbay, D., Hogger, C., Robinson, J.A. (eds.) Handbook of Logic in Artificial Intelligence and Logic Programming, vol. 5, pp. 235–324. Oxford University Press (1998)Lee, S.Y., Ling, T.W.: Further improvements on integrity constraint checking for stratifiable deductive databases. In: Proc. VLDB 1996, pp. 495–505. Morgan Kaufmann (1996)Lehrer, K.: Relevant Deduction and Minimally Inconsistent Sets. Journal of Philosophy 3(2,3), 153–165 (1973)Mu, K., Liu, W., Jin, Z., Bell, D.: A Syntax-based Approach to Measuring the Degree of Inconsistency for Belief Bases. J. Approx. Reasoning 52(7), 978–999 (2011)Lloyd, J., Sonenberg, L., Topor, R.: Integrity constraint checking in stratified databases. J. Logic Programming 4(4), 331–343 (1987)Lozinskii, E.: Resolving contradictions: A plausible semantics for inconsistent systems. J. Automated Reasoning 12(1), 1–31 (1994)Ma, Y., Qi, G., Hitzler, P.: Computing inconsistency measure based on paraconsistent semantics. J. Logic Computation 21(6), 1257–1281 (2011)Martinenghi, D., Christiansen, H.: Transaction Management with Integrity Checking. In: Andersen, K.V., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 606–615. Springer, Heidelberg (2005)Martinenghi, D., Christiansen, H., Decker, H.: Integrity Checking and Maintenance in Relational and Deductive Databases and Beyond. In: Ma, Z. (ed.) Intelligent Databases: Technologies and Applications, pp. 238–285. IGI Global (2006)Martinez, M.V., Pugliese, A., Simari, G.I., Subrahmanian, V.S., Prade, H.: How Dirty Is Your Relational Database? An Axiomatic Approach. In: Mellouli, K. (ed.) ECSQARU 2007. LNCS (LNAI), vol. 4724, pp. 103–114. Springer, Heidelberg (2007)Meyer, J., Wieringa, R. (eds.): Deontic Logic in Computer Science. Wiley (1994)Nicolas, J.M.: Logic for improving integrity checking in relational data bases. Acta Informatica 18, 227–253 (1982)Plexousakis, D., Mylopoulos, J.: Accommodating Integrity Constraints During Database Design. In: Apers, P.M.G., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol. 1057, pp. 495–513. Springer, Heidelberg (1996)Rahm, E., Do, H.: Data Cleaning: Problems and Current Approaches. Data Engineering Bulletin 23(4), 3–13 (2000)Sadri, F., Kowalski, R.: A theorem-proving approach to database integrity. In: Minker, J. (ed.) Foundations of Deductive Databases and Logic Programming, pp. 313–362. Morgan Kaufmann (1988)Thimm, M.: Measuring Inconsistency in Probabilistic Knowledge Bases. In: Proc. 25th UAI, pp. 530–537. AUAI Press (2009)Vardi, M.: On the integrity of databases with incomplete information. In: Proc. 5th PODS, pp. 252–266. ACM Press (1986)Wijsen, J.: Database repairing using updates. ACM Trans. Database Syst. 30(3), 722–768 (2005

    ‘Dominant ethnicity’ and the ‘ethnic-civic’ dichotomy in the work of A. D. Smith

    Get PDF
    This article considers the way in which the work of Anthony Smith has helped to structure debates surrounding the role of ethnicity in present-day nations. Two major lines of enquiry are evident here. First, the contemporary role of dominant ethnic groups within 'their' nations and second, the interplay between ethnic and civic elements in nationalist argument. The two processes are related, but maintain elements of distinctiveness. Smith's major contribution to the dominant ethnicity debate has been to disembed ethnicity from the ideologically-charged and/or anglo-centric discourse of ethnic relations and to place it in historical context, thereby opening up space for dominant group ethnicity to be considered as a distinct phenomenon. This said, Smith's work does not adequately account for the vicissitudes of dominant ethnicity in the contemporary West. Building on the classical works of Hans Kohn and Friedrich Meinecke, Anthony Smith has also made a seminal contribution to the debate on civic and ethnic forms of national identity and nationalist ideology. As well as freeing this debate from the strong normative overtones which it has often carried, he has continued to insist that the terms civic and ethnic should be treated as an ideal-typical distinction rather than a scheme of classification

    Transfer entropy—a model-free measure of effective connectivity for the neurosciences

    Get PDF
    Understanding causal relationships, or effective connectivity, between parts of the brain is of utmost importance because a large part of the brain’s activity is thought to be internally generated and, hence, quantifying stimulus response relationships alone does not fully describe brain dynamics. Past efforts to determine effective connectivity mostly relied on model based approaches such as Granger causality or dynamic causal modeling. Transfer entropy (TE) is an alternative measure of effective connectivity based on information theory. TE does not require a model of the interaction and is inherently non-linear. We investigated the applicability of TE as a metric in a test for effective connectivity to electrophysiological data based on simulations and magnetoencephalography (MEG) recordings in a simple motor task. In particular, we demonstrate that TE improved the detectability of effective connectivity for non-linear interactions, and for sensor level MEG signals where linear methods are hampered by signal-cross-talk due to volume conduction
    • …
    corecore