1,664 research outputs found

    An MDS-PIR Capacity-Achieving Protocol for Distributed Storage Using Non-MDS Linear Codes

    Get PDF
    We propose a private information retrieval (PIR) protocol for distributed storage systems with noncolluding nodes where data is stored using an arbitrary linear code. An expression for the PIR rate, i.e., the ratio of the amount of retrieved data per unit of downloaded data, is derived, and a necessary and a sufficient condition for codes to achieve the maximum distance separable (MDS) PIR capacity are given. The necessary condition is based on the generalized Hamming weights of the storage code, while the sufficient condition is based on code automorphisms. We show that cyclic codes and Reed-Muller codes satisfy the sufficient condition and are thus MDS-PIR capacity-achieving.Comment: To be presented at 2018 IEEE International Symposium on Information Theory (ISIT). arXiv admin note: substantial text overlap with arXiv:1712.0389

    Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes

    Get PDF
    We propose three private information retrieval (PIR) protocols for distributed storage systems (DSSs) where data is stored using an arbitrary linear code. The first two protocols, named Protocol 1 and Protocol 2, achieve privacy for the scenario with noncolluding nodes. Protocol 1 requires a file size that is exponential in the number of files in the system, while Protocol 2 requires a file size that is independent of the number of files and is hence simpler. We prove that, for certain linear codes, Protocol 1 achieves the maximum distance separable (MDS) PIR capacity, i.e., the maximum PIR rate (the ratio of the amount of retrieved stored data per unit of downloaded data) for a DSS that uses an MDS code to store any given (finite and infinite) number of files, and Protocol 2 achieves the asymptotic MDS-PIR capacity (with infinitely large number of files in the DSS). In particular, we provide a necessary and a sufficient condition for a code to achieve the MDS-PIR capacity with Protocols 1 and 2 and prove that cyclic codes, Reed-Muller (RM) codes, and a class of distance-optimal local reconstruction codes achieve both the finite MDS-PIR capacity (i.e., with any given number of files) and the asymptotic MDS-PIR capacity with Protocols 1 and 2, respectively. Furthermore, we present a third protocol, Protocol 3, for the scenario with multiple colluding nodes, which can be seen as an improvement of a protocol recently introduced by Freij-Hollanti et al.. Similar to the noncolluding case, we provide a necessary and a sufficient condition to achieve the maximum possible PIR rate of Protocol 3. Moreover, we provide a particular class of codes that is suitable for this protocol and show that RM codes achieve the maximum possible PIR rate for the protocol. For all three protocols, we present an algorithm to optimize their PIR rates.Comment: This work is the extension of the work done in arXiv:1612.07084v2. The current version introduces further refinement to the manuscript. Current version will appear in the IEEE Transactions on Information Theor

    Local Reconstruction Codes: A Class of MDS-PIR Capacity-Achieving Codes

    Get PDF
    We prove that a class of distance-optimal local reconstruction codes (LRCs), an important family of repair-efficient codes for distributed storage systems, achieve the maximum distance separable private information retrieval capacity for the case of noncolluding nodes. This particular class of codes includes Pyramid codes and other LRCs proposed in the literature.Comment: The contents of this manuscript is extracted from arXiv:1712.03898, and will be presented at the IEEE Information Theory Workshop (ITW), 201

    Asymmetry Helps: Improved Private Information Retrieval Protocols for Distributed Storage

    Get PDF
    We consider private information retrieval (PIR) for distributed storage systems (DSSs) with noncolluding nodes where data is stored using a non maximum distance separable (MDS) linear code. It was recently shown that if data is stored using a particular class of non-MDS linear codes, the MDS-PIR capacity, i.e., the maximum possible PIR rate for MDS-coded DSSs, can be achieved. For this class of codes, we prove that the PIR capacity is indeed equal to the MDS-PIR capacity, giving the first family of non-MDS codes for which the PIR capacity is known. For other codes, we provide asymmetric PIR protocols that achieve a strictly larger PIR rate compared to existing symmetric PIR protocols.Comment: To be presented at 2018 IEEE Information Theory Workshop (ITW'18). See arXiv:1808.09018 for its extended versio

    Depth, balancing, and limits of the Elo model

    Get PDF
    -Much work has been devoted to the computational complexity of games. However, they are not necessarily relevant for estimating the complexity in human terms. Therefore, human-centered measures have been proposed, e.g. the depth. This paper discusses the depth of various games, extends it to a continuous measure. We provide new depth results and present tool (given-first-move, pie rule, size extension) for increasing it. We also use these measures for analyzing games and opening moves in Y, NoGo, Killall Go, and the effect of pie rules

    Work-Family Conflict and Gender Equality: Theory Development, Responses of Policy Regimes, and Immigrants' Experiences

    Get PDF
    Indiana University-Purdue University Indianapolis (IUPUI)Working parents across countries perceive increased work-family conflict. Workfamily conflict not only has detrimental effect on the well-being of individuals, families, and organizations, but also contributes to gender inequality and care crisis in society. This dissertation consists of three studies that examine work-family conflict in terms of theory, policy, and understudied populations. The first study examined theories of workfamily conflict through critical realism and gender lenses. Based on an in-depth critique of current theoretical and empirical evidence, an integrated-theoretical framework informed by role theory, gendered organization theory, and the ecology of the gendered life course approach was developed. The second study comparatively ranked OECD countries’ statutory policies of parental leave, early childhood education and care, and flexible work arrangements, in terms of their levels of supportiveness and gender equality based on the Supportiveness Index and Gender Equality Index. Among 33 countries, Sweden ranks 1st based on both indices, while the United States ranks 30th for Supportiveness and 29th for Gender Equality. Mexico, Switzerland, and Turkey rank last for both indices. A new typology of four policy regimes was further constructed based on a care-employment analytic framework using secondary qualitative and quantitative data. This new set of regime types represents countries’ varied abilities to help parents reconcile work and family demands, while promoting gender equality. The third study is a systematic review of immigrants’ experiences of work-family conflict in the U.S. Four categories of factors associated with immigrants’ work-family conflict were identified: 1) work-domain factors, 2) family-domain factors, 3) health outcomes, and 4) immigration, acculturation, and gender roles. Job demands are positively associated with work-family conflict, while having job control and job support are negatively associated with work-family conflict. More domestic work demands and economic responsibilities in the family domain have contributed to work-family conflict, whereas having domestic support for childcare and housework has mitigated it. Workfamily conflict has contributed to deteriorating physical and mental health outcomes among immigrants. Finally, this study revealed that immigration per se has uniquely shaped immigrants’ work-family interactions. Social work implications of the three studies were discussed to better address work-family conflict and related gender inequality.2020-08-2

    Maintaining the structural integrity of thebamboo mosaic virus 3′ untranslated region isnecessary for retaining the catalytic constant forminus-strand RNA synthesis

    Get PDF
    Background: Bamboo mosaic virus (BaMV) and the Potato virus X (PVX) are members of the genus Potexvirus andhave a single-stranded positive-sense RNA genome. The 3′-untranslated region (UTR) of the BaMV RNA genomewas mapped structurally into ABC (a cloverleaf-like), D (a stem-loop), and E (pseudoknot) domains. The BaMVreplicase complex that was isolated from the infected plants was able to recognize the 3′ UTR of PVX RNA toinitiate minus-strand RNA synthesis in vitro.Results: To investigate whether the 3′ UTR of PVX RNA is also compatible with BaMV replicase in vivo, weconstructed chimera mutants using a BaMV backbone containing the PVX 3′ UTR, which was inserted in or used toreplace the various domains in the 3′ UTR of BaMV. None of the mutants, except for the mutant with the PVX3′ UTR inserted upstream of the BaMV 3′ UTR, exhibited a detectable accumulation of viral RNA in Nicotianabenthamiana plants. The in vitro BaMV RdRp replication assay demonstrated that the RNA products were generatedby the short RNA transcripts, which were derived from the chimera mutants to various extents. Furthermore, theVmax/KM of the BaMV 3′ UTR (rABCDE) was approximately three fold higher than rABCP, rP, and rDE in minus-strandRNA synthesis. These mutants failed to accumulate viral products in protoplasts and plants, but were adequatelyreplicated in vitro.Conclusions: Among the various studied BaMV/PVX chimera mutants, the BaMV-S/PABCDE that containednon-interrupted BaMV 3′ UTR was the only mutant that exhibited a wild-type level of viral product accumulation inprotoplasts and plants. These results indicate that the continuity of the domains in the 3′ UTR of BaMV RNA wasnot interrupted and the domains were not replaced with the 3′ UTR of PVX RNA in vivo

    Reduction from Complementary-Label Learning to Probability Estimates

    Full text link
    Complementary-Label Learning (CLL) is a weakly-supervised learning problem that aims to learn a multi-class classifier from only complementary labels, which indicate a class to which an instance does not belong. Existing approaches mainly adopt the paradigm of reduction to ordinary classification, which applies specific transformations and surrogate losses to connect CLL back to ordinary classification. Those approaches, however, face several limitations, such as the tendency to overfit or be hooked on deep models. In this paper, we sidestep those limitations with a novel perspective--reduction to probability estimates of complementary classes. We prove that accurate probability estimates of complementary labels lead to good classifiers through a simple decoding step. The proof establishes a reduction framework from CLL to probability estimates. The framework offers explanations of several key CLL approaches as its special cases and allows us to design an improved algorithm that is more robust in noisy environments. The framework also suggests a validation procedure based on the quality of probability estimates, leading to an alternative way to validate models with only complementary labels. The flexible framework opens a wide range of unexplored opportunities in using deep and non-deep models for probability estimates to solve the CLL problem. Empirical experiments further verified the framework's efficacy and robustness in various settings
    corecore