256 research outputs found

    LINVIEW: Incremental View Maintenance for Complex Analytical Queries

    Full text link
    Many analytics tasks and machine learning problems can be naturally expressed by iterative linear algebra programs. In this paper, we study the incremental view maintenance problem for such complex analytical queries. We develop a framework, called LINVIEW, for capturing deltas of linear algebra programs and understanding their computational cost. Linear algebra operations tend to cause an avalanche effect where even very local changes to the input matrices spread out and infect all of the intermediate results and the final view, causing incremental view maintenance to lose its performance benefit over re-evaluation. We develop techniques based on matrix factorizations to contain such epidemics of change. As a consequence, our techniques make incremental view maintenance of linear algebra practical and usually substantially cheaper than re-evaluation. We show, both analytically and experimentally, the usefulness of these techniques when applied to standard analytics tasks. Our evaluation demonstrates the efficiency of LINVIEW in generating parallel incremental programs that outperform re-evaluation techniques by more than an order of magnitude.Comment: 14 pages, SIGMO

    Lifeworld Inc. : and what to do about it

    Get PDF
    Can we detect changes in the way that the world turns up as they turn up? This paper makes such an attempt. The first part of the paper argues that a wide-ranging change is occurring in the ontological preconditions of Euro-American cultures, based in reworking what and how an event is produced. Driven by the security – entertainment complex, the aim is to mass produce phenomenological encounter: Lifeworld Inc as I call it. Swimming in a sea of data, such an aim requires the construction of just enough authenticity over and over again. In the second part of the paper, I go on to argue that this new world requires a different kind of social science, one that is experimental in its orientation—just as Lifeworld Inc is—but with a mission to provoke awareness in untoward ways in order to produce new means of association. Only thus, or so I argue, can social science add to the world we are now beginning to live in

    Phenotypic and genotypic monitoring of Schistosoma mansoni in Tanzanian schoolchildren five years into a preventative chemotherapy national control programme

    Get PDF
    We conducted combined in vitro PZQ efficacy testing with population genetic analyses of S. mansoni collected from children from two schools in 2010, five years after the introduction of a National Control Programme. Children at one school had received four annual PZQ treatments and the other school had received two mass treatments in total. We compared genetic differentiation, indices of genetic diversity, and estimated adult worm burden from parasites collected in 2010 with samples collected in 2005 (before the control programme began) and in 2006 (six months after the first PZQ treatment). Using 2010 larval samples, we also compared the genetic similarity of those with high and low in vitro sensitivity to PZQ

    Exploring the logic of mobile search

    Get PDF
    After more than a decade of development work and hopes, the usage of mobile Internet has finally taken off. Now, we are witnessing the first signs of evidence of what might become the explosion of mobile content and applications that will be shaping the (mobile) Internet of the future. Similar to the wired Internet, search will become very relevant for the usage of mobile Internet. Current research on mobile search has applied a limited set of methodologies and has also generated a narrow outcome of meaningful results. This article covers new ground, exploring the use and visions of mobile search with a users' interview-based qualitative study. Its main conclusion builds upon the hypothesis that mobile search is sensitive to a mobile logic different than today's one. First, (advanced) users ask for accessing with their mobile devices the entire Internet, rather than subsections of it. Second, success is based on new added-value applications that exploit unique mobile functionalities. The authors interpret that such mobile logic involves fundamentally the use of personalised and context-based services

    Ranking by Loops: a new approach to categorization

    Full text link
    We introduce Loop Ranking, a new ranking measure based on the detection of closed paths, which can be computed in an efficient way. We analyze it with respect to several ranking measures which have been proposed in the past, and are widely used to capture the relative importance of the vertices in complex networks. We argue that Loop Ranking is a very appropriate measure to quantify the role of both vertices and edges in the network traffic.Comment: 4 pages, 2 figures, 1 table, corrected misprin

    Trust transitivity in social networks

    Get PDF
    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary degree distribution, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate degrees, in detriment of the authorities and its "fringe" peers.Comment: 11 pages, 9 figures (with minor corrections
    corecore