6,476 research outputs found

    CMPE : cluster-management & power-efficient protocol for wireless sensor networks

    Get PDF

    Network monitoring in multicast networks using network coding

    Get PDF
    In this paper we show how information contained in robust network codes can be used for passive inference of possible locations of link failures or losses in a network. For distributed randomized network coding, we bound the probability of being able to distinguish among a given set of failure events, and give some experimental results for one and two link failures in randomly generated networks. We also bound the required field size and complexity for designing a robust network code that distinguishes among a given set of failure events

    The Aircraft Carrier in Indian Naval Doctrine

    Get PDF
    In October 2015, the Indian navy released a document entitled Ensuring Secure Seas: Indian Maritime Security Strategy (IMMS-2015). In contrast to its more conservative predecessor, Freedom to Use the Seas: India\u27s Maritime Military Strategy, published in 2007, the new strategic document propounds a more assertive role for the Indian navy over the next ten years. To that end, New Delhi seeks to build up a force structure centered on three aircraft carriers, each of which would form the nucleus of a carrier battle group (CBG)

    On the utility of network coding in dynamic environments

    Get PDF
    Many wireless applications, such as ad-hoc networks and sensor networks, require decentralized operation in dynamically varying environments. We consider a distributed randomized network coding approach that enables efficient decentralized operation of multi-source multicast networks. We show that this approach provides substantial benefits over traditional routing methods in dynamically varying environments. We present a set of empirical trials measuring the performance of network coding versus an approximate online Steiner tree routing approach when connections vary dynamically. The results show that network coding achieves superior performance in a significant fraction of our randomly generated network examples. Such dynamic settings represent a substantially broader class of networking problems than previously recognized for which network coding shows promise of significant practical benefits compared to routing

    Byzantine modification detection in multicast networks using randomized network coding

    Get PDF
    Distributed randomized network coding, a robust approach to multicasting in distributed network settings, can be extended to provide Byzantine modification detection without the use of cryptographic functions is presented in this paper

    Byzantine Modification Detection in Multicast Networks With Random Network Coding

    Get PDF
    An information-theoretic approach for detecting Byzantine or adversarial modifications in networks employing random linear network coding is described. Each exogenous source packet is augmented with a flexible number of hash symbols that are obtained as a polynomial function of the data symbols. This approach depends only on the adversary not knowing the random coding coefficients of all other packets received by the sink nodes when designing its adversarial packets. We show how the detection probability varies with the overhead (ratio of hash to data symbols), coding field size, and the amount of information unknown to the adversary about the random code

    PI3 Kinase Activation and Response to Trastuzumab Therapy: What's neu with Herceptin Resistance?

    Get PDF
    Trastuzumab is an established therapy for women with breast cancers that overexpress HER2. Despite its proven benefit in treating breast cancer, not all women derive benefit from this monoclonal antibody, and resistant disease can develop. In this issue of Cancer Cell, Berns et al. present evidence that activation of the PI3 kinase pathway, either via loss of the tumor suppressor PTEN or through oncogenic stimulation of PIK3CA, can mediate trastuzumab resistance. This study extends important work of others and forms the rationale for future investigations combining inhibitors of the PI3 kinase pathway in conjunction with trastuzumab therapy

    Divergence in Cultural Practices: Tastes as Signals of Identity

    Get PDF
    Divergence is a fact of social life; people select different tastes to distinguish themselves from others and they abandon tastes when others adopt them. But while we know a great deal about conformity, it predicts convergence, and thus is less equipped to explain why people diverge. We suggest people diverge to maintain clear signals of identity. Our approach emphasizes that the meaning of signals is set at a social rather than individual level. Tastes gain signal value through association with groups or types or individuals, but become diluted when members of more than one type hold them. Thus different types of people will diverge in the tastes they select, and they will abandon tastes they previously liked when they are adopted by members of other social types

    Beyond Ads: Sequential Decision-Making Algorithms in Law and Public Policy

    Full text link
    We explore the promises and challenges of employing sequential decision-making algorithms - such as bandits, reinforcement learning, and active learning - in law and public policy. While such algorithms have well-characterized performance in the private sector (e.g., online advertising), their potential in law and the public sector remains largely unexplored, due in part to distinct methodological challenges of the policy setting. Public law, for instance, can pose multiple objectives, necessitate batched and delayed feedback, and require systems to learn rational, causal decision-making policies, each of which presents novel questions at the research frontier. We highlight several applications of sequential decision-making algorithms in regulation and governance, and discuss areas for needed research to render such methods policy-compliant, more widely applicable, and effective in the public sector. We also note the potential risks of such deployments and describe how sequential decision systems can also facilitate the discovery of harms. We hope our work inspires more investigation of sequential decision making in law and public policy, which provide unique challenges for machine learning researchers with tremendous potential for social benefit.Comment: Version 1 presented at Causal Inference Challenges in Sequential Decision Making: Bridging Theory and Practice, a NeurIPS 2021 Worksho
    corecore