77 research outputs found

    Mismatched Rate-Distortion Theory: Ensembles, Bounds, and General Alphabets

    Full text link
    In this paper, we consider the mismatched rate-distortion problem, in which the encoding is done using a codebook, and the encoder chooses the minimum-distortion codeword according to a mismatched distortion function that differs from the true one. For the case of discrete memoryless sources, we establish achievable rate-distortion bounds using multi-user coding techniques, namely, superposition coding and expurgated parallel coding. We give examples where these attain the matched rate-distortion trade-off but a standard ensemble with independent codewords fails to do so. On the other hand, in contrast with the channel coding counterpart, we show that there are cases where structured codebooks can perform worse than their unstructured counterparts. In addition, in view of the difficulties in adapting the existing and above-mentioned results to general alphabets, we consider a simpler i.i.d.~random coding ensemble, and establish its achievable rate-distortion bounds for general alphabets

    Constraint solving for bounded-process cryptographic protocol analysis

    Get PDF

    CAPSL and MuCAPSL, Journal of Telecommunications and Information Technology, 2002, nr 4

    Get PDF
    Secure communication generally begins with a connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication or key distribution cryptographic protocol. CAPSL is a formal language for specifying cryptographic protocols. It is also useful for addressing the correctness of the protocols on an abstract level, rather than the strength of the underlying cryptographic algorithms. We outline the design principles of CAPSL and its integrated specification and analysis environment. Protocols for secure group management are essential in applications that are concerned with confidential authenticated communication among coalition members, authenticated group decisions, or the secure administration of group membership and access control. We will also discuss our progress on designing a new extension of CAPSL for multicast protocols, called MuCAPSL

    A Novel Caloric Restriction-Like Mimetic Affects Longevity in Yeast by Reprogramming Core Metabolic Pathways

    Get PDF
    Glucose limitation is a simple intervention that extends yeast replicative lifespan (RLS) via the same pathway(s) thought to mediate the benefits of caloric restriction (CR) in mammals. Here we report on “C1”, a small molecule that mimics key aspects of CR. C1 was identified in a high throughput screen for drug-like molecules that reverse the RLS shortening effect of the sirtuin inhibitor and NAD+ precursor nicotinamide. C1 reduces the cellular dependence on glycolysis and the pentose phosphate pathway, even in the presence of glucose, and compensates by elevating fatty acid -oxidation to maintain acetyl-CoA levels. C1 acts either downstream of Sir2 or in an independent CR pathway. In this regard, chemical-genetic interactions indicate that C1 influences Tor2 signaling via effects on phosphoinositide pools. Key activities of C1 extend to mammals. C1 stimulates -oxidation in mammalian cells, and in mice, reduces levels of triacylglycerides and cholesterol in livers of lean and obese mice. C1 confers oxidative resistance to diamide in both yeast and mammalian cells. In conclusion, C1 induces global changes in metabolism in yeast and mammalian cells that mimic aspects of CR. Future work will be aimed at identifying the cellular target of C1

    Collaborative Musical Expression and Creativity Among Academics: When Intellectualism Meets Twelve Bar Blues

    Get PDF
    The Professors are a blues, rock, and sometime heavy metal band made up of communication professors from a number of New Jersey schools. Formed in 1995, the band has played in clubs in New York City as well as a number of academic venues, including the annual conference of the International Communication Association in Chicago in 1996 and the annual conference of the National Communication Association in New York City in 1998. The Professors have been featured in both local and national press, including the Chronicle of Higher Education. When we learned of the call for papers for this special issue of the American Communication Journal addressing the creative endeavors of Communication scholars beyond their regular research agendas, we were delighted to have the opportunity to reflect upon the place of musical creativity within our lives as working academics. What follows in this paper are the thoughts of a number of band members, past and present, who trace the relationship of the musical, the creative, and the intellectual in terms of their own personal histories and academic interests

    Effects of an Unusual Poison Identify a Lifespan Role for Topoisomerase 2 in Saccharomyces Cerevisiae

    Get PDF
    A progressive loss of genome maintenance has been implicated as both a cause and consequence of aging. Here we present evidence supporting the hypothesis that an age-associated decay in genome maintenance promotes aging in Saccharomyces cerevisiae (yeast) due to an inability to sense or repair DNA damage by topoisomerase 2 (yTop2). We describe the characterization of LS1, identified in a high throughput screen for small molecules that shorten the replicative lifespan of yeast. LS1 accelerates aging without affecting proliferative growth or viability. Genetic and biochemical criteria reveal LS1 to be a weak Top2 poison. Top2 poisons induce the accumulation of covalent Top2-linked DNA double strand breaks that, if left unrepaired, lead to genome instability and death. LS1 is toxic to cells deficient in homologous recombination, suggesting that the damage it induces is normally mitigated by genome maintenance systems. The essential roles of yTop2 in proliferating cells may come with a fitness trade-off in older cells that are less able to sense or repair yTop2-mediated DNA damage. Consistent with this idea, cells live longer when yTop2 expression levels are reduced. These results identify intrinsic yTop2-mediated DNA damage as a potentially manageable cause of aging

    Security Theorems via Model Theory

    Full text link
    A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi). Models (interpretations) for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1) If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi implies for some ys . psi) iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds

    Many Labs 5:Testing pre-data collection peer review as an intervention to increase replicability

    Get PDF
    Replication studies in psychological science sometimes fail to reproduce prior findings. If these studies use methods that are unfaithful to the original study or ineffective in eliciting the phenomenon of interest, then a failure to replicate may be a failure of the protocol rather than a challenge to the original finding. Formal pre-data-collection peer review by experts may address shortcomings and increase replicability rates. We selected 10 replication studies from the Reproducibility Project: Psychology (RP:P; Open Science Collaboration, 2015) for which the original authors had expressed concerns about the replication designs before data collection; only one of these studies had yielded a statistically significant effect (p < .05). Commenters suggested that lack of adherence to expert review and low-powered tests were the reasons that most of these RP:P studies failed to replicate the original effects. We revised the replication protocols and received formal peer review prior to conducting new replication studies. We administered the RP:P and revised protocols in multiple laboratories (median number of laboratories per original study = 6.5, range = 3?9; median total sample = 1,279.5, range = 276?3,512) for high-powered tests of each original finding with both protocols. Overall, following the preregistered analysis plan, we found that the revised protocols produced effect sizes similar to those of the RP:P protocols (?r = .002 or .014, depending on analytic approach). The median effect size for the revised protocols (r = .05) was similar to that of the RP:P protocols (r = .04) and the original RP:P replications (r = .11), and smaller than that of the original studies (r = .37). Analysis of the cumulative evidence across the original studies and the corresponding three replication attempts provided very precise estimates of the 10 tested effects and indicated that their effect sizes (median r = .07, range = .00?.15) were 78% smaller, on average, than the original effect sizes (median r = .37, range = .19?.50)
    • 

    corecore