1,664 research outputs found
An MDS-PIR Capacity-Achieving Protocol for Distributed Storage Using Non-MDS Linear Codes
We propose a private information retrieval (PIR) protocol for distributed
storage systems with noncolluding nodes where data is stored using an arbitrary
linear code. An expression for the PIR rate, i.e., the ratio of the amount of
retrieved data per unit of downloaded data, is derived, and a necessary and a
sufficient condition for codes to achieve the maximum distance separable (MDS)
PIR capacity are given. The necessary condition is based on the generalized
Hamming weights of the storage code, while the sufficient condition is based on
code automorphisms. We show that cyclic codes and Reed-Muller codes satisfy the
sufficient condition and are thus MDS-PIR capacity-achieving.Comment: To be presented at 2018 IEEE International Symposium on Information
Theory (ISIT). arXiv admin note: substantial text overlap with
arXiv:1712.0389
Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes
We propose three private information retrieval (PIR) protocols for
distributed storage systems (DSSs) where data is stored using an arbitrary
linear code. The first two protocols, named Protocol 1 and Protocol 2, achieve
privacy for the scenario with noncolluding nodes. Protocol 1 requires a file
size that is exponential in the number of files in the system, while Protocol 2
requires a file size that is independent of the number of files and is hence
simpler. We prove that, for certain linear codes, Protocol 1 achieves the
maximum distance separable (MDS) PIR capacity, i.e., the maximum PIR rate (the
ratio of the amount of retrieved stored data per unit of downloaded data) for a
DSS that uses an MDS code to store any given (finite and infinite) number of
files, and Protocol 2 achieves the asymptotic MDS-PIR capacity (with infinitely
large number of files in the DSS). In particular, we provide a necessary and a
sufficient condition for a code to achieve the MDS-PIR capacity with Protocols
1 and 2 and prove that cyclic codes, Reed-Muller (RM) codes, and a class of
distance-optimal local reconstruction codes achieve both the finite MDS-PIR
capacity (i.e., with any given number of files) and the asymptotic MDS-PIR
capacity with Protocols 1 and 2, respectively. Furthermore, we present a third
protocol, Protocol 3, for the scenario with multiple colluding nodes, which can
be seen as an improvement of a protocol recently introduced by Freij-Hollanti
et al.. Similar to the noncolluding case, we provide a necessary and a
sufficient condition to achieve the maximum possible PIR rate of Protocol 3.
Moreover, we provide a particular class of codes that is suitable for this
protocol and show that RM codes achieve the maximum possible PIR rate for the
protocol. For all three protocols, we present an algorithm to optimize their
PIR rates.Comment: This work is the extension of the work done in arXiv:1612.07084v2.
The current version introduces further refinement to the manuscript. Current
version will appear in the IEEE Transactions on Information Theor
Local Reconstruction Codes: A Class of MDS-PIR Capacity-Achieving Codes
We prove that a class of distance-optimal local reconstruction codes (LRCs),
an important family of repair-efficient codes for distributed storage systems,
achieve the maximum distance separable private information retrieval capacity
for the case of noncolluding nodes. This particular class of codes includes
Pyramid codes and other LRCs proposed in the literature.Comment: The contents of this manuscript is extracted from arXiv:1712.03898,
and will be presented at the IEEE Information Theory Workshop (ITW), 201
Asymmetry Helps: Improved Private Information Retrieval Protocols for Distributed Storage
We consider private information retrieval (PIR) for distributed storage
systems (DSSs) with noncolluding nodes where data is stored using a non maximum
distance separable (MDS) linear code. It was recently shown that if data is
stored using a particular class of non-MDS linear codes, the MDS-PIR capacity,
i.e., the maximum possible PIR rate for MDS-coded DSSs, can be achieved. For
this class of codes, we prove that the PIR capacity is indeed equal to the
MDS-PIR capacity, giving the first family of non-MDS codes for which the PIR
capacity is known. For other codes, we provide asymmetric PIR protocols that
achieve a strictly larger PIR rate compared to existing symmetric PIR
protocols.Comment: To be presented at 2018 IEEE Information Theory Workshop (ITW'18).
See arXiv:1808.09018 for its extended versio
Depth, balancing, and limits of the Elo model
-Much work has been devoted to the computational complexity of games.
However, they are not necessarily relevant for estimating the complexity in
human terms. Therefore, human-centered measures have been proposed, e.g. the
depth. This paper discusses the depth of various games, extends it to a
continuous measure. We provide new depth results and present tool
(given-first-move, pie rule, size extension) for increasing it. We also use
these measures for analyzing games and opening moves in Y, NoGo, Killall Go,
and the effect of pie rules
Work-Family Conflict and Gender Equality: Theory Development, Responses of Policy Regimes, and Immigrants' Experiences
Indiana University-Purdue University Indianapolis (IUPUI)Working parents across countries perceive increased work-family conflict. Workfamily
conflict not only has detrimental effect on the well-being of individuals, families,
and organizations, but also contributes to gender inequality and care crisis in society.
This dissertation consists of three studies that examine work-family conflict in terms of
theory, policy, and understudied populations. The first study examined theories of workfamily
conflict through critical realism and gender lenses. Based on an in-depth critique
of current theoretical and empirical evidence, an integrated-theoretical framework
informed by role theory, gendered organization theory, and the ecology of the gendered
life course approach was developed.
The second study comparatively ranked OECD countries’ statutory policies of
parental leave, early childhood education and care, and flexible work arrangements, in
terms of their levels of supportiveness and gender equality based on the Supportiveness
Index and Gender Equality Index. Among 33 countries, Sweden ranks 1st based on both
indices, while the United States ranks 30th for Supportiveness and 29th for Gender
Equality. Mexico, Switzerland, and Turkey rank last for both indices. A new typology
of four policy regimes was further constructed based on a care-employment analytic
framework using secondary qualitative and quantitative data. This new set of regime
types represents countries’ varied abilities to help parents reconcile work and family
demands, while promoting gender equality. The third study is a systematic review of immigrants’ experiences of work-family
conflict in the U.S. Four categories of factors associated with immigrants’ work-family
conflict were identified: 1) work-domain factors, 2) family-domain factors, 3) health
outcomes, and 4) immigration, acculturation, and gender roles. Job demands are
positively associated with work-family conflict, while having job control and job support
are negatively associated with work-family conflict. More domestic work demands and
economic responsibilities in the family domain have contributed to work-family conflict,
whereas having domestic support for childcare and housework has mitigated it. Workfamily
conflict has contributed to deteriorating physical and mental health outcomes
among immigrants. Finally, this study revealed that immigration per se has uniquely
shaped immigrants’ work-family interactions. Social work implications of the three
studies were discussed to better address work-family conflict and related gender
inequality.2020-08-2
Maintaining the structural integrity of thebamboo mosaic virus 3′ untranslated region isnecessary for retaining the catalytic constant forminus-strand RNA synthesis
Background: Bamboo mosaic virus (BaMV) and the Potato virus X (PVX) are members of the genus Potexvirus andhave a single-stranded positive-sense RNA genome. The 3′-untranslated region (UTR) of the BaMV RNA genomewas mapped structurally into ABC (a cloverleaf-like), D (a stem-loop), and E (pseudoknot) domains. The BaMVreplicase complex that was isolated from the infected plants was able to recognize the 3′ UTR of PVX RNA toinitiate minus-strand RNA synthesis in vitro.Results: To investigate whether the 3′ UTR of PVX RNA is also compatible with BaMV replicase in vivo, weconstructed chimera mutants using a BaMV backbone containing the PVX 3′ UTR, which was inserted in or used toreplace the various domains in the 3′ UTR of BaMV. None of the mutants, except for the mutant with the PVX3′ UTR inserted upstream of the BaMV 3′ UTR, exhibited a detectable accumulation of viral RNA in Nicotianabenthamiana plants. The in vitro BaMV RdRp replication assay demonstrated that the RNA products were generatedby the short RNA transcripts, which were derived from the chimera mutants to various extents. Furthermore, theVmax/KM of the BaMV 3′ UTR (rABCDE) was approximately three fold higher than rABCP, rP, and rDE in minus-strandRNA synthesis. These mutants failed to accumulate viral products in protoplasts and plants, but were adequatelyreplicated in vitro.Conclusions: Among the various studied BaMV/PVX chimera mutants, the BaMV-S/PABCDE that containednon-interrupted BaMV 3′ UTR was the only mutant that exhibited a wild-type level of viral product accumulation inprotoplasts and plants. These results indicate that the continuity of the domains in the 3′ UTR of BaMV RNA wasnot interrupted and the domains were not replaced with the 3′ UTR of PVX RNA in vivo
Reduction from Complementary-Label Learning to Probability Estimates
Complementary-Label Learning (CLL) is a weakly-supervised learning problem
that aims to learn a multi-class classifier from only complementary labels,
which indicate a class to which an instance does not belong. Existing
approaches mainly adopt the paradigm of reduction to ordinary classification,
which applies specific transformations and surrogate losses to connect CLL back
to ordinary classification. Those approaches, however, face several
limitations, such as the tendency to overfit or be hooked on deep models. In
this paper, we sidestep those limitations with a novel perspective--reduction
to probability estimates of complementary classes. We prove that accurate
probability estimates of complementary labels lead to good classifiers through
a simple decoding step. The proof establishes a reduction framework from CLL to
probability estimates. The framework offers explanations of several key CLL
approaches as its special cases and allows us to design an improved algorithm
that is more robust in noisy environments. The framework also suggests a
validation procedure based on the quality of probability estimates, leading to
an alternative way to validate models with only complementary labels. The
flexible framework opens a wide range of unexplored opportunities in using deep
and non-deep models for probability estimates to solve the CLL problem.
Empirical experiments further verified the framework's efficacy and robustness
in various settings
Genome-Wide Gene Expression Analysis to Identify Epistatic Gene-Pairs Associated with Prognosis of Breast Cancer
- …
