1,217 research outputs found
Equality of Opportunity and the Distribution of Long-Run Income in Sweden
Equality of opportunity is an ethical goal with almost universal appeal. The interpretation taken here is that a society has achieved equality of opportunity if it is the case that what individuals accomplish, with respect to some desirable objective, is determined wholly by their choices and personal effort, rather than by circumstances beyond their control. We use data for Swedish men born between 1955 and 1967 for whom we measure the distribution of long-run income, as well as several important background circumstances, such as parental education and income, family structure and own IQ before adulthood. We address the question: in Sweden, given its present constellation of social policies and institutions, to what extent is existing income inequality due to circumstances, as opposed to 'effort'? Our results suggest that several circumstances, importantly both parental income and own IQ, are important for long-run income inequality, but that variations in individual effort account for the most part of that inequality.equality of opportunity, family background, inequality, long-run income
Families with infants: a general approach to solve hard partition problems
We introduce a general approach for solving partition problems where the goal
is to represent a given set as a union (either disjoint or not) of subsets
satisfying certain properties. Many NP-hard problems can be naturally stated as
such partition problems. We show that if one can find a large enough system of
so-called families with infants for a given problem, then this problem can be
solved faster than by a straightforward algorithm. We use this approach to
improve known bounds for several NP-hard problems as well as to simplify the
proofs of several known results.
For the chromatic number problem we present an algorithm with
time and exponential space for graphs of average
degree . This improves the algorithm by Bj\"{o}rklund et al. [Theory Comput.
Syst. 2010] that works for graphs of bounded maximum (as opposed to average)
degree and closes an open problem stated by Cygan and Pilipczuk [ICALP 2013].
For the traveling salesman problem we give an algorithm working in
time and polynomial space for graphs of average
degree . The previously known results of this kind is a polyspace algorithm
by Bj\"{o}rklund et al. [ICALP 2008] for graphs of bounded maximum degree and
an exponential space algorithm for bounded average degree by Cygan and
Pilipczuk [ICALP 2013].
For counting perfect matching in graphs of average degree~ we present an
algorithm with running time and polynomial
space. Recent algorithms of this kind due to Cygan, Pilipczuk [ICALP 2013] and
Izumi, Wadayama [FOCS 2012] (for bipartite graphs only) use exponential space.Comment: 18 pages, a revised version of this paper is available at
http://arxiv.org/abs/1410.220
Algebraic Methods in the Congested Clique
In this work, we use algebraic methods for studying distance computation and
subgraph detection tasks in the congested clique model. Specifically, we adapt
parallel matrix multiplication implementations to the congested clique,
obtaining an round matrix multiplication algorithm, where
is the exponent of matrix multiplication. In conjunction
with known techniques from centralised algorithmics, this gives significant
improvements over previous best upper bounds in the congested clique model. The
highlight results include:
-- triangle and 4-cycle counting in rounds, improving upon the
triangle detection algorithm of Dolev et al. [DISC 2012],
-- a -approximation of all-pairs shortest paths in
rounds, improving upon the -round -approximation algorithm of Nanongkai [STOC 2014], and
-- computing the girth in rounds, which is the first
non-trivial solution in this model.
In addition, we present a novel constant-round combinatorial algorithm for
detecting 4-cycles.Comment: This is work is a merger of arxiv:1412.2109 and arxiv:1412.266
Spotting Trees with Few Leaves
We show two results related to the Hamiltonicity and -Path algorithms in
undirected graphs by Bj\"orklund [FOCS'10], and Bj\"orklund et al., [arXiv'10].
First, we demonstrate that the technique used can be generalized to finding
some -vertex tree with leaves in an -vertex undirected graph in
time. It can be applied as a subroutine to solve the
-Internal Spanning Tree (-IST) problem in
time using polynomial space, improving upon previous algorithms for this
problem. In particular, for the first time we break the natural barrier of
. Second, we show that the iterated random bipartition employed by
the algorithm can be improved whenever the host graph admits a vertex coloring
with few colors; it can be an ordinary proper vertex coloring, a fractional
vertex coloring, or a vector coloring. In effect, we show improved bounds for
-Path and Hamiltonicity in any graph of maximum degree
or with vector chromatic number at most 8
Assigning channels via the meet-in-the-middle approach
We study the complexity of the Channel Assignment problem. By applying the
meet-in-the-middle approach we get an algorithm for the -bounded Channel
Assignment (when the edge weights are bounded by ) running in time
. This is the first algorithm which breaks the
barrier. We extend this algorithm to the counting variant, at the
cost of slightly higher polynomial factor.
A major open problem asks whether Channel Assignment admits a -time
algorithm, for a constant independent of . We consider a similar
question for Generalized T-Coloring, a CSP problem that generalizes \CA. We
show that Generalized T-Coloring does not admit a
-time algorithm, where is the
size of the instance.Comment: SWAT 2014: 282-29
Expansion of Protein Domain Repeats
Many proteins, especially in eukaryotes, contain tandem repeats of several domains from the same family. These repeats have a variety of binding properties and are involved in protein–protein interactions as well as binding to other ligands such as DNA and RNA. The rapid expansion of protein domain repeats is assumed to have evolved through internal tandem duplications. However, the exact mechanisms behind these tandem duplications are not well-understood. Here, we have studied the evolution, function, protein structure, gene structure, and phylogenetic distribution of domain repeats. For this purpose we have assigned Pfam-A domain families to 24 proteomes with more sensitive domain assignments in the repeat regions. These assignments confirmed previous findings that eukaryotes, and in particular vertebrates, contain a much higher fraction of proteins with repeats compared with prokaryotes. The internal sequence similarity in each protein revealed that the domain repeats are often expanded through duplications of several domains at a time, while the duplication of one domain is less common. Many of the repeats appear to have been duplicated in the middle of the repeat region. This is in strong contrast to the evolution of other proteins that mainly works through additions of single domains at either terminus. Further, we found that some domain families show distinct duplication patterns, e.g., nebulin domains have mainly been expanded with a unit of seven domains at a time, while duplications of other domain families involve varying numbers of domains. Finally, no common mechanism for the expansion of all repeats could be detected. We found that the duplication patterns show no dependence on the size of the domains. Further, repeat expansion in some families can possibly be explained by shuffling of exons. However, exon shuffling could not have created all repeats
Inhibitory properties of ibuprofen and its amide analogues towards the hydrolysis and cyclooxygenation of the endocannabinoid anandamide
A dual-action cyclooxygenase (COX)–fatty acid amide hydrolase (FAAH) inhibitor may have therapeutic usefulness as an analgesic, but a key issue is finding the right balance of inhibitory effects. This can be done by the design of compounds exhibiting different FAAH/COX-inhibitory potencies. In the present study, eight ibuprofen analogues were investigated. Ibuprofen (1), 2-(4-Isobutylphenyl)-N-(2-(3-methylpyridin-2-ylamino)-2-oxoethyl)propanamide (9) and N-(3-methylpyridin-2-yl)-2-(4′-isobutylphenyl)propionamide (2) inhibited FAAH with IC50 values of 134, 3.6 and 0.52 µM respectively. The corresponding values for COX-1 were ~29, ~50 and ~60 µM, respectively. Using arachidonic acid as substrate, the compounds were weak inhibitors of COX-2. However, when anandamide was used as COX-2 substrate, potency increased, with approximate IC50 values of ~6, ~10 and ~19 µM, respectively. Compound 2 was confirmed to be active in vivo in a murine model of visceral nociception, but the effects of the compound were not blocked by CB receptor antagonists.
Read More: http://informahealthcare.com/doi/abs/10.3109/14756366.2011.64330
Tree Buffers
In runtime verification, the central problem is to decide if a given program execution violates a given property. In online runtime verification, a monitor observes a program’s execution as it happens. If the program being observed has hard real-time constraints, then the monitor inherits them. In the presence of hard real-time constraints it becomes a challenge to maintain enough information to produce error traces, should a property violation be observed. In this paper we introduce a data structure, called tree buffer, that solves this problem in the context of automata-based monitors: If the monitor itself respects hard real-time constraints, then enriching it by tree buffers makes it possible to provide error traces, which are essential for diagnosing defects. We show that tree buffers are also useful in other application domains. For example, they can be used to implement functionality of capturing groups in regular expressions. We prove optimal asymptotic bounds for our data structure, and validate them using empirical data from two sources: regular expression searching through Wikipedia, and runtime verification of execution traces obtained from the DaCapo test suite
On -Simple -Path
An -simple -path is a {path} in the graph of length that passes
through each vertex at most times. The -SIMPLE -PATH problem, given a
graph as input, asks whether there exists an -simple -path in . We
first show that this problem is NP-Complete. We then show that there is a graph
that contains an -simple -path and no simple path of length greater
than . So this, in a sense, motivates this problem especially
when one's goal is to find a short path that visits many vertices in the graph
while bounding the number of visits at each vertex.
We then give a randomized algorithm that runs in time that solves the -SIMPLE -PATH on a graph with
vertices with one-sided error. We also show that a randomized algorithm
with running time with gives a
randomized algorithm with running time \poly(n)\cdot 2^{cn} for the
Hamiltonian path problem in a directed graph - an outstanding open problem. So
in a sense our algorithm is optimal up to an factor
- …