8,404 research outputs found
Behavioral implications of shortlisting procedures
We consider two-stage “shortlisting procedures” in which the menu of alternatives is first pruned by some process or criterion and then a binary relation is maximized. Given a particular first-stage process, our main result supplies a necessary and sufficient condition for choice data to be consistent with a procedure in the designated class. This result applies to any class of procedures with a certain lattice structure, including the cases of “consideration filters,” “satisficing with salience effects,” and “rational shortlist methods.” The theory avoids background assumptions made for mathematical convenience; in this and other respects following Richter’s classical analysis of preference-maximizing choice in the absence of shortlisting
Genetic variation at CHRNA5-CHRNA3-CHRNB4 interacts with smoking status to influence body mass index
Cigarette smoking is associated with lower body mass index (BMI), and a commonly cited reason for unwillingness to quit smoking is a concern about weight gain. Common variation in the CHRNA5-CHRNA3-CHRNB4 gene region (chromosome 15q25) is robustly associated with smoking quantity in smokers, but its association with BMI is unknown. We hypothesized that genotype would accurately reflect smoking exposure and that, if smoking were causally related to weight, it would be associated with BMI in smokers, but not in never smokers
The Search for Invariance: Repeated Positive Testing Serves the Goals of Causal Learning
Positive testing is characteristic of exploratory behavior, yet it seems to be at odds with the aim of information seeking. After all, repeated demonstrations of one’s current hypothesis often produce the same evidence and fail to distinguish it from potential alternatives. Research on the development of scientific reasoning and adult rule learning have both documented and attempted to explain this behavior. The current chapter reviews this prior work and introduces a novel theoretical account—the Search for Invariance (SI) hypothesis—which suggests that producing multiple positive examples serves the goals of causal learning. This hypothesis draws on the interventionist framework of causal reasoning, which suggests that causal learners are concerned with the invariance of candidate hypotheses. In a probabilistic and interdependent causal world, our primary goal is to determine whether, and in what contexts, our causal hypotheses provide accurate foundations for inference and intervention—not to disconfirm their alternatives. By recognizing the central role of invariance in causal learning, the phenomenon of positive testing may be reinterpreted as a rational information-seeking strategy
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute
discrete logarithms on elliptic curves over prime fields. The estimates are
derived from a simulation of a Toffoli gate network for controlled elliptic
curve point addition, implemented within the framework of the quantum computing
software tool suite LIQ. We determine circuit implementations for
reversible modular arithmetic, including modular addition, multiplication and
inversion, as well as reversible elliptic curve point addition. We conclude
that elliptic curve discrete logarithms on an elliptic curve defined over an
-bit prime field can be computed on a quantum computer with at most qubits using a quantum circuit of at most Toffoli gates. We are able to classically simulate the
Toffoli networks corresponding to the controlled elliptic curve point addition
as the core piece of Shor's algorithm for the NIST standard curves P-192,
P-224, P-256, P-384 and P-521. Our approach allows gate-level comparisons to
recent resource estimates for Shor's factoring algorithm. The results also
support estimates given earlier by Proos and Zalka and indicate that, for
current parameters at comparable classical security levels, the number of
qubits required to tackle elliptic curves is less than for attacking RSA,
suggesting that indeed ECC is an easier target than RSA.Comment: 24 pages, 2 tables, 11 figures. v2: typos fixed and reference added.
ASIACRYPT 201
Microstructural Characterization of Graphite Spheroids in Ductile Iron
The present work brings new insights by transmission electron microscopy allowing disregarding or supporting some of the models proposed for spheroidal growth of graphite in cast irons. Nodules consist of sectors made of graphite plates elongated along a hai direction and stack on each other with their c axis aligned with the radial direction. These plates are the elementary units for spheroidal growth and a calculation supports the idea that new units continuously nucleate at the ledge between sectors
Seeing two faces together: preference formation in humans and rhesus macaques
Humans, great apes and old world monkeys show selective attention to faces depending on conspecificity, familiarity, and social status supporting the view that primates share similar face processing mechanisms. Although many studies have been done on face scanning strategy in monkeys and humans, the mechanisms influencing viewing preference have received little attention. To determine how face categories influence viewing preference in humans and rhesus macaques (Macaca mulatta), we performed two eye-tracking experiments using a visual preference task whereby pairs of faces from different species were presented simultaneously. The results indicated that viewing time was significantly influenced by the pairing of the face categories. Humans showed a strong bias towards an own-race face in an Asian–Caucasian condition. Rhesus macaques directed more attention towards non-human primate faces when they were paired with human faces, regardless of the species. When rhesus faces were paired with faces from Barbary macaques
(Macaca sylvanus) or chimpanzees (Pan troglodytes), the novel species’ faces attracted more attention. These results
indicate that monkeys’ viewing preferences, as assessed by a visual preference task, are modulated by several factors,
species and dominance being the most influential
The role of Comprehension in Requirements and Implications for Use Case Descriptions
Within requirements engineering it is generally accepted that in writing specifications (or indeed any requirements phase document), one attempts to produce an artefact which will be simple to comprehend for the user. That is, whether the document is intended for customers to validate requirements, or engineers to understand what the design must deliver, comprehension is an important goal for the author. Indeed, advice on producing ‘readable’ or ‘understandable’ documents is often included in courses on requirements engineering. However, few researchers, particularly within the software engineering domain, have attempted either to define or to understand the nature of comprehension and it’s implications for guidance on the production of quality requirements.
Therefore, this paper examines thoroughly the nature of textual comprehension, drawing heavily from research in discourse process, and suggests some implications for requirements (and other) software documentation. In essence, we find that the guidance on writing requirements, often prevalent within software engineering, may be based upon assumptions which are an oversimplification of the nature of comprehension. Hence, the paper examines guidelines which have been proposed, in this case for use case descriptions, and the extent to which they agree with discourse process theory; before suggesting refinements to the guidelines which attempt to utilise lessons learned from our richer understanding of the underlying discourse process theory. For example, we suggest subtly different sets of writing guidelines for the different tasks of requirements, specification and design
Pneumococcal carriage in sub-Saharan Africa--a systematic review.
BACKGROUND: Pneumococcal epidemiology varies geographically and few data are available from the African continent. We assess pneumococcal carriage from studies conducted in sub-Saharan Africa (sSA) before and after the pneumococcal conjugate vaccine (PCV) era. METHODS: A search for pneumococcal carriage studies published before 2012 was conducted to describe carriage in sSA. The review also describes pneumococcal serotypes and assesses the impact of vaccination on carriage in this region. RESULTS: Fifty-seven studies were included in this review with the majority (40.3%) from South Africa. There was considerable variability in the prevalence of carriage between studies (I-squared statistic = 99%). Carriage was higher in children and decreased with increasing age, 63.2% (95% CI: 55.6-70.8) in children less than 5 years, 42.6% (95% CI: 29.9-55.4) in children 5-15 years and 28.0% (95% CI: 19.0-37.0) in adults older than 15 years. There was no difference in the prevalence of carriage between males and females in 9/11 studies. Serotypes 19F, 6B, 6A, 14 and 23F were the five most common isolates. A meta-analysis of four randomized trials of PCV vaccination in children aged 9-24 months showed that carriage of vaccine type (VT) serotypes decreased with PCV vaccination; however, overall carriage remained the same because of a concomitant increase in non-vaccine type (NVT) serotypes. CONCLUSION: Pneumococcal carriage is generally high in the African continent, particularly in young children. The five most common serotypes in sSA are among the top seven serotypes that cause invasive pneumococcal disease in children globally. These serotypes are covered by the two PCVs recommended for routine childhood immunization by the WHO. The distribution of serotypes found in the nasopharynx is altered by PCV vaccination
Topologically Protected Quantum State Transfer in a Chiral Spin Liquid
Topology plays a central role in ensuring the robustness of a wide variety of
physical phenomena. Notable examples range from the robust current carrying
edge states associated with the quantum Hall and the quantum spin Hall effects
to proposals involving topologically protected quantum memory and quantum logic
operations. Here, we propose and analyze a topologically protected channel for
the transfer of quantum states between remote quantum nodes. In our approach,
state transfer is mediated by the edge mode of a chiral spin liquid. We
demonstrate that the proposed method is intrinsically robust to realistic
imperfections associated with disorder and decoherence. Possible experimental
implementations and applications to the detection and characterization of spin
liquid phases are discussed.Comment: 14 pages, 7 figure
Non-perturbative gauge/gravity correspondence in N=2 theories
We derive the exact supergravity profile for the twisted scalar field emitted
by a system of fractional D3 branes at a Z2 orbifold singularity supporting N=2
quiver gauge theories with unitary groups and bifundamental matter. At the
perturbative level this twisted field is "dual" to the gauge coupling but it is
corrected non-perturbatively by an infinite tower of fractional D-instantons.
The explicit microscopic description allows to derive the gravity profile from
disk amplitudes computing the emission rate of the twisted scalar field in
terms of chiral correlators in the dual gauge theory. We compute these quantum
correlators using multi-instanton localization techniques and/or Seiberg-Witten
analysis. Finally, we discuss a non-perturbative relation between the twisted
scalar and the effective coupling of the gauge theory for some simple choices
of the brane set ups.Comment: 42 pages. 3 figures, PDFLaTe
- …
