28,090 research outputs found

    Beyond Node Degree: Evaluating AS Topology Models

    Get PDF
    This is the accepted version of 'Beyond Node Degree: Evaluating AS Topology Models', archived originally at arXiv:0807.2023v1 [cs.NI] 13 July 2008.Many models have been proposed to generate Internet Autonomous System (AS) topologies, most of which make structural assumptions about the AS graph. In this paper we compare AS topology generation models with several observed AS topologies. In contrast to most previous works, we avoid making assumptions about which topological properties are important to characterize the AS topology. Our analysis shows that, although matching degree-based properties, the existing AS topology generation models fail to capture the complexity of the local interconnection structure between ASs. Furthermore, we use BGP data from multiple vantage points to show that additional measurement locations significantly affect local structure properties, such as clustering and node centrality. Degree-based properties, however, are not notably affected by additional measurements locations. These observations are particularly valid in the core. The shortcomings of AS topology generation models stems from an underestimation of the complexity of the connectivity in the core caused by inappropriate use of BGP data

    An implementation of Deflate in Coq

    Full text link
    The widely-used compression format "Deflate" is defined in RFC 1951 and is based on prefix-free codings and backreferences. There are unclear points about the way these codings are specified, and several sources for confusion in the standard. We tried to fix this problem by giving a rigorous mathematical specification, which we formalized in Coq. We produced a verified implementation in Coq which achieves competitive performance on inputs of several megabytes. In this paper we present the several parts of our implementation: a fully verified implementation of canonical prefix-free codings, which can be used in other compression formats as well, and an elegant formalism for specifying sophisticated formats, which we used to implement both a compression and decompression algorithm in Coq which we formally prove inverse to each other -- the first time this has been achieved to our knowledge. The compatibility to other Deflate implementations can be shown empirically. We furthermore discuss some of the difficulties, specifically regarding memory and runtime requirements, and our approaches to overcome them

    MYCN Silencing by RNA Interference Induces Neurogenesis and Suppresses Proliferation in Models of Neuroblastoma with Resistance to Retinoic Acid

    Get PDF
    Neuroblastoma (NB) is the most common solid tumor in childhood. Twenty percent of patients display MYCN amplification, which indicates a very poor prognosis. MYCN is a highly specific target for an NB tumor therapy as MYCN expression is absent or very low in most normal cells, while, as a transcription factor, it regulates many essential cell activities in tumor cells. We aim to develop a therapy for NB based on MYCN silencing by short interfering RNA (siRNA) molecules, which can silence target genes by RNA interference (RNAi), a naturally occurring method of gene silencing. It has been shown previously that MYCN silencing can induce apoptosis and differentiation in MYCN amplified NB. In this article, we have demonstrated that siRNA-mediated silencing of MYCN in MYCN-amplified NB cells induced neurogenesis in NB cells, whereas retinoic acid (RA) treatment did not. RA can differentiate NB cells and is used for treatment of residual disease after surgery or chemotherapy, but resistance can develop. In addition, MYCN siRNA treatment suppressed growth in a MYCN-amplified NB cell line more than that by RA. Our result suggests that gene therapy using RNAi targeting MYCN can be a novel therapy toward MYCN-amplified NB that have complete or partial resistance toward RA

    Information Security as Strategic (In)effectivity

    Full text link
    Security of information flow is commonly understood as preventing any information leakage, regardless of how grave or harmless consequences the leakage can have. In this work, we suggest that information security is not a goal in itself, but rather a means of preventing potential attackers from compromising the correct behavior of the system. To formalize this, we first show how two information flows can be compared by looking at the adversary's ability to harm the system. Then, we propose that the information flow in a system is effectively information-secure if it does not allow for more harm than its idealized variant based on the classical notion of noninterference

    Determination of the strange nucleon form factors

    Get PDF
    The strange contribution to the electric and magnetic form factors of the nucleon is determined at a range of discrete values of Q2Q^2 up to 1.41.4 GeV2^2. This is done by combining recent lattice QCD results for the electromagnetic form factors of the octet baryons with experimental determinations of those quantities. The most precise result is a small negative value for the strange magnetic moment: GMs(Q2=0)=−0.07±0.03 μNG_M^s(Q^2=0) = -0.07\pm0.03\,\mu_N. At larger values of Q2Q^2 both the electric and magnetic form factors are consistent with zero to within 22-sigma

    Charge Symmetry Violation in the Electromagnetic Form Factors of the Proton

    Get PDF
    Experimental tests of QCD through its predictions for the strange-quark content of the proton have been drastically restricted by our lack of knowledge of the violation of charge symmetry (CSV). We find unexpectedly tiny CSV in the proton's electromagnetic form factors by performing the first extraction of these quantities based on an analysis of lattice QCD data. The resulting values are an order of magnitude smaller than current bounds on proton strangeness from parity violating electron-proton scattering experiments. This result paves the way for a new generation of experimental measurements of the proton's strange form factors to challenge the predictions of QCD

    Diagnosis and Decision-Making in Telemedicine

    Get PDF
    This article provides an analysis of the skills that health professionals and patients employ in reaching diagnosis and decision-making in telemedicine consultations. As governmental priorities continue to emphasize patient involvement in the management of their disease, there is an increasing need to accurately capture the provider–patient interactions in clinical encounters. Drawing on conversation analysis of 10 video-mediated consultations in 3 National Health Service settings in England, this study examines the interaction between patients, General Practitioner (GPs), nurses, and consultants during diagnosis and decision-making, with the aim to identify the range of skills that participants use in the process and capture the interprofessional communication and patient involvement in the diagnosis and decision-making phases of telemedicine consultations. The analysis shows that teleconsultations enhance collaborative working among professionals and enable GPs and nurses to develop their skills and actively participate in diagnosis and decision-making by contributing primary care–specific knowledge to the consultation. However, interprofessional interaction may result in limited patient involvement in decisionmaking. The findings of this study can be used to inform training programs in telemedicine that focus on the development of effective skills for professionals and the provision of information to patients

    Recombining your way out of trouble: The genetic architecture of hybrid fitness under environmental stress

    Get PDF
    Hybridization between species can either promote or impede adaptation. But there is a deficit in our understanding of the genetic basis of hybrid fitness, especially in non-domesticated organisms, and when populations are facing environmental stress. We made genetically variable F2 hybrid populations from two divergent Saccharomyces yeast species. We exposed populations to ten toxins and sequenced the most resilient hybrids on low coverage using ddRADseq to investigate four aspects of their genomes: 1) hybridity, 2) interspecific heterozygosity, 3) epistasis (positive or negative associations between non-homologous chromosomes) and 4) ploidy. We used linear mixed effect models and simulations to measure to which extent hybrid genome composition was contingent on the environment. Genomes grown in different environments varied in every aspect of hybridness measured, revealing strong genotype-environment interactions. We also found selection against heterozygosity or directional selection for one of the parental alleles, with larger fitness of genomes carrying more homozygous allelic combinations in an otherwise hybrid genomic background. In addition, individual chromosomes and chromosomal interactions showed significant species biases and pervasive aneuploidies. Against our expectations, we observed multiple beneficial, opposite-species chromosome associations, confirmed by epistasis- and selection-free computer simulations, which is surprising given the large divergence of parental genomes (∼15%). Together, these results suggest that successful, stress-resilient hybrid genomes can be assembled from the best features of both parents without paying high costs of negative epistasis. This illustrates the importance of measuring genetic trait architecture in an environmental context when determining the evolutionary potential of genetically diverse hybrid populations

    A simple scheme for allocating capital in a foreign exchange proprietary trading firm

    Get PDF
    We present a model of capital allocation in a foreign exchange proprietary trading firm. The owner allocates capital to individual traders, who operate within strict risk limits. Traders specialize in individual currencies, but are given discretion over their choice of trading rule. The owner provides the simple formula that determines position sizes – a formula that does not require estimation of the firm-level covariance matrix. We provide supporting empirical evidence of excess risk-adjusted returns to the firm-level portfolio, and we discuss a modification of the model in which the owner dictates the choice of trading rule

    Previous Experiences with Epilepsy and Effectiveness of Information to Change Public Perception of Epilepsy

    Get PDF
    Differences with regard to the effectiveness of health information and attitude change are suggested between people with direct, behavioral experiences with a health topic and people with indirect, nonbehavioral experiences. The effects of three different methods of health education about epilepsy, frequently used in health education practice, are assessed in a pretest posttest design with control groups, controlling for experiences with epilepsy. Subjects were 132 students from teacher-training colleges. After all treatments, attitudes, and knowledge about epilepsy were changed in a positive way. Treatments were found to be equally effective. Before treatment, direct behavioral experiences were related to knowledge and a more positive attitude towards epilepsy. After treatment, subjects with direct behavioral experiences with epilepsy showed less change of attitude and knowledge as compared with subjects with indirect experiences. Direct experiences appear to restrain the processing of new information and attitude change
    • …
    corecore