56 research outputs found

    Network intrusion detection

    Get PDF
    Attacks against computers and the internet are in the news every week. These primarily take the form of malicious code such as viruses and worms, or denial of service attacks. Less commonly reported are attacs with gain access to computers, either for the purpose of producing damage (such as defacing web sites or deleting data) or for the opportunities such as access provides to the attacker, such as accessto bank accounts or controlsystems of power stations. This chapter will discuss some of the areas in which computational statistics can be applied to these and related problems. --

    Fusion and Inference from Multiple Data Sources in a Commensurate Space

    Get PDF
    Abstract: Given objects measured under multiple conditions—for example, indoor lighting versus outdoor lighting for face recognition, multiple language translation for document matching, etc.—the challenging task is to perform data fusion and utilize all the available information for inferential purposes. We consider two exploitation tasks: (i) how to determine whether a set of feature vectors represent a single object measured under different conditions; and (ii) how to create a classifier based on training data from one condition in order to classify objects measured under other conditions. The key to both problems is to transform data from multiple conditions into one commensurate space, where the (transformed) feature vectors are comparable and would be treated as if they were collected under the same condition. Toward this end, we studied Procrustes analysis and developed a new approach, which uses the interpoint dissimilarities for each condition. We impute the dissimilarities between measurements of different conditions to create one omnibus dissimilarity matrix, which is then embedded into Euclidean space. We illustrate our methodology on English and French documents collected from Wikipedia, demonstrating superior performanc

    Spectral properties of random graphs with fixed equitable partition

    Full text link
    We define a graph to be SS-regular if it contains an equitable partition given by a matrix SS. These graphs are generalizations of both regular and bipartite, biregular graphs. An SS-regular matrix is defined then as a matrix on an SS-regular graph consistent with the graph's equitable partition. In this paper we derive the limiting spectral density for large, random SS-regular matrices as well as limiting functions of certain statistics for their eigenvector coordinates as a function of eigenvalue. These limiting functions are defined in terms of spectral measures on SS-regular trees. In general, these spectral measures do not have a closed-form expression; however, we provide a defining system of polynomials for them. Finally, we explore eigenvalue bounds of SS-regular graph, proving an expander mixing lemma, Alon-Bopana bound, and other eigenvalue inequalities in terms of the eigenvalues of the matrix SS.Comment: 24 pages, 3 figure

    Neighborhood Homogeneous Labelings of Graphs

    Get PDF
    Given a labeling of the vertices and edges of a graph, we define a type of homogeneity that requires that the neighborhood of every vertex contains the same number of each of the labels. This homogeneity constraint is a generalization of regularity – all such graphs are regular. We consider a specific condition in which both the edge and vertex label sets have two elements and every neighborhood contains two of each label. We show that vertex homogeneity implies edge homogeneity (so long as the number of edges in any neighborhood is four), and give two theorems describing how to build new homogeneous graphs (or multigraphs) from others. Keywords: vertex labeling; edge labeling; homogenous graph; regular graph 1

    Germline bias dictates cross-serotype reactivity in a common dengue-virus-specific CD8(+) T cell response.

    Get PDF
    Adaptive immune responses protect against infection with dengue virus (DENV), yet cross-reactivity with distinct serotypes can precipitate life-threatening clinical disease. We found that clonotypes expressing the T cell antigen receptor (TCR) β-chain variable region 11 (TRBV11-2) were 'preferentially' activated and mobilized within immunodominant human-leukocyte-antigen-(HLA)-A*11:01-restricted CD8(+) T cell populations specific for variants of the nonstructural protein epitope NS3133 that characterize the serotypes DENV1, DENV3 and DENV4. In contrast, the NS3133-DENV2-specific repertoire was largely devoid of such TCRs. Structural analysis of a representative TRBV11-2(+) TCR demonstrated that cross-serotype reactivity was governed by unique interplay between the variable antigenic determinant and germline-encoded residues in the second β-chain complementarity-determining region (CDR2β). Extensive mutagenesis studies of three distinct TRBV11-2(+) TCRs further confirmed that antigen recognition was dependent on key contacts between the serotype-defined peptide and discrete residues in the CDR2β loop. Collectively, these data reveal an innate-like mode of epitope recognition with potential implications for the outcome of sequential exposure to heterologous DENVs
    • …
    corecore