2,818 research outputs found
Coded Merkle Tree: Solving Data Availability Attacks in Blockchains
In this paper, we propose coded Merkle tree (CMT), a novel hash accumulator
that offers a constant-cost protection against data availability attacks in
blockchains, even if the majority of the network nodes are malicious. A CMT is
constructed using a family of sparse erasure codes on each layer, and is
recovered by iteratively applying a peeling-decoding technique that enables a
compact proof for data availability attack on any layer. Our algorithm enables
any node to verify the full availability of any data block generated by the
system by just downloading a byte block hash commitment and
randomly sampling bytes, where is the size of the data
block. With the help of only one connected honest node in the system, our
method also allows any node to verify any tampering of the coded Merkle tree by
just downloading bytes. We provide a modular library for CMT
in Rust and Python and demonstrate its efficacy inside the Parity Bitcoin
client.Comment: To appear in Financial Cryptography and Data Security (FC) 202
Generalized Wishart processes for interpolation over diffusion tensor fields
Diffusion Magnetic Resonance Imaging (dMRI) is a non-invasive tool for watching the microstructure of fibrous nerve and muscle tissue. From dMRI, it is possible to estimate 2-rank diffusion tensors imaging (DTI) fields, that are widely used in clinical applications: tissue segmentation, fiber tractography, brain atlas construction, brain conductivity models, among others. Due to hardware limitations of MRI scanners, DTI has the difficult compromise between spatial resolution and signal noise ratio (SNR) during acquisition. For this reason, the data are often acquired with very low resolution. To enhance DTI data resolution, interpolation provides an interesting software solution. The aim of this work is to develop a methodology for DTI interpolation that enhance the spatial resolution of DTI fields. We assume that a DTI field follows a recently introduced stochastic process known as a generalized Wishart process (GWP), which we use as a prior over the diffusion tensor field. For posterior inference, we use Markov Chain Monte Carlo methods. We perform experiments in toy and real data. Results of GWP outperform other methods in the literature, when compared in different validation protocols
Unpacking merger jets: a Bayesian analysis of GW170817, GW190425 and electromagnetic observations of short gamma-ray bursts
We present a novel fully Bayesian analysis to constrain short gamma-ray burst jet structures associated with cocoon, wide-angle and simple top-hat jet models, as well as the binary neutron star merger rate. These constraints are made given the distance and inclination information from GW170817, observed flux of GRB170817A, observed rate of short gamma-ray bursts detected by Swift, and the neutron star merger rate inferred from LIGO's first and second observing runs. A separate analysis is conducted where a fitted short gamma-ray burst luminosity function is included to provide further constraints. The jet structure models are further constrained using the observation of GW190425 and we find that the assumption that it produced a GRB170817-like short gamma-ray burst that went undetected due to the jet geometry is consistent with previous observations. We find and quantify evidence for low luminosity and wide-angled jet structuring in the short gamma-ray burst population, independently from afterglow observations, with log Bayes factors of 0.45−0.55 for such models when compared to a classical top-hat jet. Slight evidence is found for a Gaussian jet structure model over all others when the fitted luminosity function is provided, producing log Bayes factors of 0.25−0.9±0.05 when compared to the other models. However without considering GW190425 or the fitted luminosity function, the evidence favours a cocoon-like model with log Bayes factors of 0.14±0.05 over the Gaussian jet structure. We provide new constraints to the binary neutron star merger rates of 1−1300Gpc−3yr−1 or 2−680Gpc−3yr−1 when a fitted luminosity function is assumed
Caspase-2 is upregulated after sciatic nerve transection and its inhibition protects dorsal root ganglion neurons from Apoptosis after serum withdrawal
Sciatic nerve (SN) transection-induced apoptosis of dorsal root ganglion neurons (DRGN) is one factor determining the efficacy of peripheral axonal regeneration and the return of sensation. Here, we tested the hypothesis that caspase-2(CASP2) orchestrates apoptosis of axotomised DRGN both in vivo and in vitro by disrupting the local neurotrophic supply to DRGN. We observed significantly elevated levels of cleaved CASP2 (C-CASP2), compared to cleaved caspase-3 (C-CASP3), within TUNEL+DRGN and DRG glia (satellite and Schwann cells) after SN transection. A serum withdrawal cell culture model, which induced 40% apoptotic death in DRGN and 60% in glia, was used to model DRGN loss after neurotrophic factor withdrawal. Elevated C-CASP2 and TUNEL were observed in both DRGN and DRG glia, with C-CASP2 localisation shifting from the cytosol to the nucleus, a required step for induction of direct CASP2-mediated apoptosis. Furthermore, siRNAmediated downregulation of CASP2 protected 50% of DRGN from apoptosis after serum withdrawal, while downregulation of CASP3 had no effect on DRGN or DRG glia survival. We conclude that CASP2 orchestrates the death of SN-axotomised DRGN directly and also indirectly through loss of DRG glia and their local neurotrophic factor support. Accordingly, inhibiting CASP2 expression is a potential therapy for improving both the SN regeneration response and peripheral sensory recovery
A dose-finding Phase 2 study of single agent isatuximab (anti-CD38 mAb) in relapsed/refractory multiple myeloma
A Phase 2 dose-finding study evaluated isatuximab, an anti-CD38 monoclonal antibody, in relapsed/refractory multiple myeloma (RRMM; NCT01084252). Patients with ?3 prior lines or refractory to both immunomodulatory drugs and proteasome inhibitors (dual refractory) were randomized to isatuximab 3 mg/kg every 2 weeks (Q2W), 10 mg/kg Q2W(2 cycles)/Q4W, or 10 mg/kg Q2W. A fourth arm evaluated 20 mg/kg QW(1 cycle)/Q2W. Patients (N = 97) had a median (range) age of 62 years (38-85), 5 (2-14) prior therapy lines, and 85% were double refractory. The overall response rate (ORR) was 4.3, 20.0, 29.2, and 24.0% with isatuximab 3 mg/kg Q2W, 10 mg/kg Q2W/Q4W, 10 mg/kg Q2W, and 20 mg/kg QW/Q2W, respectively. At doses ?10 mg/kg, median progression-free survival and overall survival were 4.6 and 18.7 months, respectively, and the ORR was 40.9% (9/22) in patients with high-risk cytogenetics. CD38 receptor density was similar in responders and non-responders. The most common non-hematologic adverse events (typically grade ?2) were nausea (34.0%), fatigue (32.0%), and upper respiratory tract infections (28.9%). Infusion reactions (typically with first infusion and grade ?2) occurred in 51.5% of patients. In conclusion, isatuximab is active and generally well tolerated in heavily pretreated RRMM, with greatest efficacy at doses ?10 mg/kg
The extraordinary evolutionary history of the reticuloendotheliosis viruses
The reticuloendotheliosis viruses (REVs) comprise several closely related amphotropic retroviruses isolated from birds. These viruses exhibit several highly unusual characteristics that have not so far been adequately explained, including their extremely close relationship to mammalian retroviruses, and their presence as endogenous sequences within the genomes of certain large DNA viruses. We present evidence for an iatrogenic origin of REVs that accounts for these phenomena. Firstly, we identify endogenous retroviral fossils in mammalian genomes that share a unique recombinant structure with REVs—unequivocally demonstrating that REVs derive directly from mammalian retroviruses. Secondly, through sequencing of archived REV isolates, we confirm that contaminated Plasmodium lophurae stocks have been the source of multiple REV outbreaks in experimentally infected birds. Finally, we show that both phylogenetic and historical evidence support a scenario wherein REVs originated as mammalian retroviruses that were accidentally introduced into avian hosts in the late 1930s, during experimental studies of P. lophurae, and subsequently integrated into the fowlpox virus (FWPV) and gallid herpesvirus type 2 (GHV-2) genomes, generating recombinant DNA viruses that now circulate in wild birds and poultry. Our findings provide a novel perspective on the origin and evolution of REV, and indicate that horizontal gene transfer between virus families can expand the impact of iatrogenic transmission events
1/2-BPS Correlators as c=1 S-matrix
We argue from two complementary viewpoints of Holography that the 2-point
correlation functions of 1/2-BPS multi-trace operators in the large-N (planar)
limit are nothing but the (Wick-rotated) S-matrix elements of c=1 matrix model.
On the bulk side, we consider an Euclideanized version of the so-called
bubbling geometries and show that the corresponding droplets reach the
conformal boundary. Then the scattering matrix of fluctuations of the droplets
gives directly the two-point correlators through the GKPW prescription. On the
Yang-Mills side, we show that the two-point correlators of holomorphic and
anti-holomorphic operators are essentially equivalent with the transformation
functions between asymptotic in- and out-states of c=1 matrix model. Extension
to non-planar case is also discussed.Comment: 28 pages, 3 figures, corrected typos, version to appear in JHE
An Integrated-Photonics Optical-Frequency Synthesizer
Integrated-photonics microchips now enable a range of advanced
functionalities for high-coherence applications such as data transmission,
highly optimized physical sensors, and harnessing quantum states, but with
cost, efficiency, and portability much beyond tabletop experiments. Through
high-volume semiconductor processing built around advanced materials there
exists an opportunity for integrated devices to impact applications cutting
across disciplines of basic science and technology. Here we show how to
synthesize the absolute frequency of a lightwave signal, using integrated
photonics to implement lasers, system interconnects, and nonlinear frequency
comb generation. The laser frequency output of our synthesizer is programmed by
a microwave clock across 4 THz near 1550 nm with 1 Hz resolution and
traceability to the SI second. This is accomplished with a heterogeneously
integrated III/V-Si tunable laser, which is guided by dual
dissipative-Kerr-soliton frequency combs fabricated on silicon chips. Through
out-of-loop measurements of the phase-coherent, microwave-to-optical link, we
verify that the fractional-frequency instability of the integrated photonics
synthesizer matches the reference-clock instability for a 1
second acquisition, and constrain any synthesis error to while
stepping the synthesizer across the telecommunication C band. Any application
of an optical frequency source would be enabled by the precision optical
synthesis presented here. Building on the ubiquitous capability in the
microwave domain, our results demonstrate a first path to synthesis with
integrated photonics, leveraging low-cost, low-power, and compact features that
will be critical for its widespread use.Comment: 10 pages, 6 figure
A bayesian inference framework for gamma-ray burst afterglow properties
In the field of multi-messenger astronomy, Bayesian inference is commonly adopted to compare the compatibility of models given the observed data. However, to describe a physical system like neutron star mergers and their associated gamma-ray burst (GRB) events, usually more than ten physical parameters are incorporated in the model. With such a complex model, likelihood evaluation for each Monte Carlo sampling point becomes a massive task and requires a significant amount of computational power. In this work, we perform quick parameter estimation on simulated GRB X-ray light curves using an interpolated physical GRB model. This is achieved by generating a grid of GRB afterglow light curves across the parameter space and replacing the likelihood with a simple interpolation function in the high-dimensional grid that stores all light curves. This framework, compared to the original method, leads to a ∼90× speedup per likelihood estimation. It will allow us to explore different jet models and enable fast model comparison in the future
Contact lens rehabilitation following repaired corneal perforations
BACKGROUND: Visual outcome following repair of post-traumatic corneal perforation may not be optimal due to presence of irregular keratometric astigmatism. We performed a study to evaluate and compare rigid gas permeable contact lens and spectacles in visual rehabilitation following perforating corneal injuries. METHOD: Eyes that had undergone repair for corneal perforating injuries with or without lens aspiration were fitted rigid gas permeable contact lenses. The fitting pattern and the improvement in visual acuity by contact lens over spectacle correction were noted. RESULTS: Forty eyes of 40 patients that had undergone surgical repair of posttraumatic corneal perforations were fitted rigid gas permeable contact lenses for visual rehabilitation. Twenty-four eyes (60%) required aphakic contact lenses. The best corrected visual acuity (BCVA) of ≥ 6/18 in the snellen's acuity chart was seen in 10 (25%) eyes with spectacle correction and 37 (92.5%) eyes with the use of contact lens (p < 0.001). The best-corrected visual acuity with spectacles was 0.20 ± 0.13 while the same with contact lens was 0.58 ± 0.26. All the patients showed an improvement of ≥ 2 lines over spectacles in the snellen's acuity chart with contact lens. CONCLUSION: Rigid gas permeable contact lenses are better means of rehabilitation in eyes that have an irregular cornea due to scars caused by perforating corneal injuries
- …