4,131 research outputs found
The Attack and Defense of Weakest-Link Networks
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker’s objective is to successfully attack at least one target and the defender’s objective is diametrically opposed .We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy - in which a single random target is attacked - more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets.Colonel Blotto, conflict resolution, weakest-link, best-shot, multi-dimensional resource allocation, experiments
The Attack and Defense of Weakest-Link Networks
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker's objective is to successfully attack at least one target and the defender's objective is diametrically opposed. We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy — in which a single random target is attacked — more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets.Colonel Blotto, conflict resolution, weakest-link, best-shot, multi-dimensional resource allocation, experiments.
The Attack and Defense of Weakest-Link Networks
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker’s objective is to successfully attack at least one target and the defender’s objective is diametrically opposed. We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy — in which a single random target is attacked — more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets.Colonel Blotto, conflict resolution, weakest-link, best-shot, multi-dimensional resource allocation, experiments
Rapid evolution of the env gene leader sequence in cats naturally infected with feline immunodeficiency virus (FIV)
Analysing the evolution of FIV on the intra-host level is important, in order to address whether the diversity and composition of viral quasispecies affects disease progression.<p></p>
We examined the intra-host diversity and the evolutionary rates of the entire env and structural fragments of the env sequences obtained from sequential blood samples in 43 naturally infected domestic cats that displayed different clinical outcomes. We observed in the majority of cats that FIV env showed very low levels of intra-host diversity. We estimated that env evolved at the rate of 1.16 x 10-3 substitutions per site per year and demonstrated that recombinant sequences evolved faster than non-recombinant sequences. It was evident that the V3-V5 fragment of FIV env displayed higher evolutionary rates in healthy cats than in those with terminal illness. Our study provided the first evidence that the leader sequence of env, rather than the V3-V5 sequence, had the highest intra-host diversity and the highest evolutionary rate of all env fragments, consistent with this region being under a strong selective pressure for genetic variation.<p></p>
Overall, FIV env displayed relatively low intra-host diversity and evolved slowly in naturally infected cats. The maximal evolutionary rate was observed in the leader sequence of env. Although genetic stability is not necessarily a prerequisite for clinical stability, the higher genetic stability of FIV compared to HIV might explain why many naturally infected cats do not progress to AIDS rapidly.<p></p>
Mass scaling and non-adiabatic effects in photoassociation spectroscopy of ultracold strontium atoms
We report photoassociation spectroscopy of ultracold Sr atoms near the
intercombination line and provide theoretical models to describe the obtained
bound state energies. We show that using only the molecular states correlating
with the asymptote is insufficient to provide a mass scaled
theoretical model that would reproduce the bound state energies for all
isotopes investigated to date: Sr, Sr and Sr. We attribute
that to the recently discovered avoided crossing between the
() and () potential
curves at short range and we build a mass scaled interaction model that
quantitatively reproduces the available and bound state energies
for the three stable bosonic isotopes. We also provide isotope-specific
two-channel models that incorporate the rotational (Coriolis) mixing between
the and curves which, while not mass scaled, are capable of
quantitatively describing the vibrational splittings observed in experiment. We
find that the use of state-of-the-art ab initio potential curves significantly
improves the quantitative description of the Coriolis mixing between the two -8
GHz bound states in Sr over the previously used model potentials. We
show that one of the recently reported energy levels in Sr does not
follow the long range bound state series and theorize on the possible causes.
Finally, we give the Coriolis mixing angles and linear Zeeman coefficients for
all of the photoassociation lines. The long range van der Waals coefficients
~a.u. and ~a.u. are reported.Comment: 14 pages, 7 tables, 5 figures. Submitted to Phys. Rev.
The Attack and Defense of Weakest-Link Networks
This paper experimentally examines behavior in a two-player game of attack and defense of a weakest-link network of targets, in which the attacker‟s objective is to successfully attack at least one target and the defender‟s objective is diametrically opposed. We apply two benchmark contest success functions (CSFs): the auction CSF and the lottery CSF. Consistent with the theoretical prediction, under the auction CSF, attackers utilize a stochastic “guerilla warfare” strategy — in which a single random target is attacked — more than 80% of the time. Under the lottery CSF, attackers utilize the stochastic guerilla warfare strategy almost 45% of the time, contrary to the theoretical prediction of an equal allocation of forces across the targets
Binary Black-Hole Mergers in Magnetized Disks: Simulations in Full General Relativity
We present results from the first fully general relativistic,
magnetohydrodynamic (GRMHD) simulations of an equal-mass black hole binary
(BHBH) in a magnetized, circumbinary accretion disk. We simulate both the pre
and post-decoupling phases of a BHBH-disk system and both "cooling" and
"no-cooling" gas flows. Prior to decoupling, the competition between the binary
tidal torques and the effective viscous torques due to MHD turbulence depletes
the disk interior to the binary orbit. However, it also induces a two-stream
accretion flow and mildly relativistic polar outflows from the BHs. Following
decoupling, but before gas fills the low-density "hollow" surrounding the
remnant, the accretion rate is reduced, while there is a prompt electromagnetic
(EM) luminosity enhancement following merger due to shock heating and accretion
onto the spinning BH remnant. This investigation, though preliminary, previews
more detailed GRMHD simulations we plan to perform in anticipation of future,
simultaneous detections of gravitational and EM radiation from a merging
BHBH-disk system.Comment: 5 pages, 5 figure
- …