512 research outputs found

    Observation of large-scale multi-agent based simulations

    Full text link
    The computational cost of large-scale multi-agent based simulations (MABS) can be extremely important, especially if simulations have to be monitored for validation purposes. In this paper, two methods, based on self-observation and statistical survey theory, are introduced in order to optimize the computation of observations in MABS. An empirical comparison of the computational cost of these methods is performed on a toy problem

    On Counting Triangles through Edge Sampling in Large Dynamic Graphs

    Full text link
    Traditional frameworks for dynamic graphs have relied on processing only the stream of edges added into or deleted from an evolving graph, but not any additional related information such as the degrees or neighbor lists of nodes incident to the edges. In this paper, we propose a new edge sampling framework for big-graph analytics in dynamic graphs which enhances the traditional model by enabling the use of additional related information. To demonstrate the advantages of this framework, we present a new sampling algorithm, called Edge Sample and Discard (ESD). It generates an unbiased estimate of the total number of triangles, which can be continuously updated in response to both edge additions and deletions. We provide a comparative analysis of the performance of ESD against two current state-of-the-art algorithms in terms of accuracy and complexity. The results of the experiments performed on real graphs show that, with the help of the neighborhood information of the sampled edges, the accuracy achieved by our algorithm is substantially better. We also characterize the impact of properties of the graph on the performance of our algorithm by testing on several Barabasi-Albert graphs.Comment: A short version of this article appeared in Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2017

    Crude incidence in two-phase designs in the presence of competing risks.

    Get PDF
    BackgroundIn many studies, some information might not be available for the whole cohort, some covariates, or even the outcome, might be ascertained in selected subsamples. These studies are part of a broad category termed two-phase studies. Common examples include the nested case-control and the case-cohort designs. For two-phase studies, appropriate weighted survival estimates have been derived; however, no estimator of cumulative incidence accounting for competing events has been proposed. This is relevant in the presence of multiple types of events, where estimation of event type specific quantities are needed for evaluating outcome.MethodsWe develop a non parametric estimator of the cumulative incidence function of events accounting for possible competing events. It handles a general sampling design by weights derived from the sampling probabilities. The variance is derived from the influence function of the subdistribution hazard.ResultsThe proposed method shows good performance in simulations. It is applied to estimate the crude incidence of relapse in childhood acute lymphoblastic leukemia in groups defined by a genotype not available for everyone in a cohort of nearly 2000 patients, where death due to toxicity acted as a competing event. In a second example the aim was to estimate engagement in care of a cohort of HIV patients in resource limited setting, where for some patients the outcome itself was missing due to lost to follow-up. A sampling based approach was used to identify outcome in a subsample of lost patients and to obtain a valid estimate of connection to care.ConclusionsA valid estimator for cumulative incidence of events accounting for competing risks under a general sampling design from an infinite target population is derived

    Dynamic nuclear polarization and spin-diffusion in non-conducting solids

    Full text link
    There has been much renewed interest in dynamic nuclear polarization (DNP), particularly in the context of solid state biomolecular NMR and more recently dissolution DNP techniques for liquids. This paper reviews the role of spin diffusion in polarizing nuclear spins and discusses the role of the spin diffusion barrier, before going on to discuss some recent results.Comment: submitted to Applied Magnetic Resonance. The article should appear in a special issue that is being published in connection with the DNP Symposium help in Nottingham in August 200

    Automating unobtrusive personalized services in ambient media environments

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-013-1634-2In the age of ambient media, people are surrounded by lots of physical objects (media objects) for rendering the digital world in the natural environment. These media objects should interact with users in a way that is not disturbing for them. To address this issue, this work presents a design and automation strategy for augmenting the world around us with personalized ambient media services that behave in a considerate manner. That is, ambient services are capable of adjusting its obtrusiveness level (i.e., the extent to which each service intrudes the user¿s mind) by using the appropriate media objects for each user¿s situation.This work has been developed with the support of MICINN, under the project EVERYWARE TIN2010-18011, and the support of the Christian Doppler Forschungsgesellschaft and the BMWFJ, Austria.Serral Asensio, E.; Gil Pascual, M.; Valderas Aranda, PJ.; Pelechano Ferragud, V. (2014). Automating unobtrusive personalized services in ambient media environments. Multimedia Tools and Applications. 71(1):159-178. https://doi.org/10.1007/s11042-013-1634-2S159178711Bencomo N, Grace P, Flores-Cortés CA, Hughes D, Blair GS (2008) Genie: supporting the model driven development of reflective, component-based adaptive systems. In: ICSE, pp 811–814Blumendorf M, Lehmann G, Albayrak S (2010) Bridging models and systems at runtime to build adaptive user interfaces. In: Proc. of EICS 2010. ACM, pp 9–18Brown DM (2010) Communicating design: developing web site documentation for design and planning, 2nd edn. New Riders PressCalinescu R (2011) When the requirements for adaptation and high integrity meet. In: Proceedings of the 8th workshop on assurances for self-adaptive systems, ASAS ’11. ACM, New York, pp 1–4Filieri A, Ghezzi C, Tamburrelli G (2011) Run-time efficient probabilistic model checking. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE ’11. ACM, New York, pp 341–350Gershenfeld N, Krikorian R, Cohen D (2004) The internet of things. Sci Am 291(4):46–51Gibbs WW (2005) Considerate computing. Sci Am 292(1):54–61Gulliksen J, Goransson B, Boivie I, Blomkvist S, Persson J, Cajander A (2003) Key principles for user-centred systems design. Behav Inform Technol 22:397–409Hinckley K, Horvitz E (2001) Toward more sensitive mobile phones. In: Proc. of the UIST ’01, pp 191–192Ho J, Intille SS (2005) Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proc. of CHI ’05. ACM, pp 909–918Horvitz E, Kadie C, Paek T, Hovel D (2003) Models of attention in computing and communication: from principles to applications. Commun ACM 46:52–59Ju W, Leifer L (2008) The design of implicit interactions: making interactive systems less obnoxious. Des Issues 24(3):72–84Kortuem G, Kawsar F, Fitton D, Sundramoorthy V (2010) Smart objects as building blocks for the internet of things. IEEE Internet Comput 14(1):44–51Lewis JR (1995) Ibm computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. Int J Hum Comput Interact 7(1):57–78Lugmayr A, Risse T, Stockleben B, Laurila K, Kaario J (2009) Semantic ambient media—an introduction. Multimed Tools Appl 43(3):337–359Mattern F (2003) From smart devices to smart everyday objects. In: Proc. Smart Objects Conf. (SOC 03). Springer, pp 15–16Morin B, Barais O, Jezequel JM, Fleurey F, Solberg A (2009) Models run.time to support dynamic adaptation. Comput 42(10):44–51Nelson L, Churchill EF (2005) User experience of physical-digital object systems: implications for representation and infrastructure. Paper presented at smart object systems workshop, in cojunction with ubicomp 2005Paternò F (2002) Concurtasktrees: an engineered approach to model-based design of interactive systems. In: L.E. Associates (ed) The handbook of analysis for human-computer interaction, pp 483–500Paternò F (2003) From model-based to natural development. HCI International, pp 592–596Ramchurn SD, Deitch B, Thompson MK, Roure DCD, Jennings NR, Luck M (2004) Minimising intrusiveness in pervasive computing environments using multi-agent negotiation. MobiQuitous ’04, pp 364–372Runeson P, Höst M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131–164Schmidt A (2000) Implicit human computer interaction through context. Pers Technol 4(2–3):191–199Serral E, Valderas P, Pelechano V (2010) Supporting runtime system evolution to adapt to user behaviour. In: Proc. of CAiSE’10, pp 378–392Serral E, Valderas P, Pelechano V (2010) Towards the model driven development of context-aware pervasive systems. PMC 6(2):254–280Siegemund F (2004) A context-aware communication platform for smart objects. In: Proc of the int conf on pervasive computing. Springer, pp 69–86Streitz NA, Rocker C, Prante T, Alphen Dv, Stenzel R, Magerkurth C (2005) Designing smart artifacts for smart environments. Comput 38(3):41–49. doi: 10.1109/MC.2005.92Thiesse F, Kohler M (2008) An analysis of usage-based pricing policies for smart products. Electron Mark 18(3):232–241. doi: 10.1080/10196780802265751Vastenburg MH, Keyson DV, de Ridder H (2008) Considerate home notification systems: a field study of acceptability of notifications in the home. Pers Ubiquit Comput 12(8):555–56

    Adaptive Oblivious Transfer and Generalization

    Get PDF
    International audienceOblivious Transfer (OT) protocols were introduced in the seminal paper of Rabin, and allow a user to retrieve a given number of lines (usually one) in a database, without revealing which ones to the server. The server is ensured that only this given number of lines can be accessed per interaction, and so the others are protected; while the user is ensured that the server does not learn the numbers of the lines required. This primitive has a huge interest in practice, for example in secure multi-party computation, and directly echoes to Symmetrically Private Information Retrieval (SPIR). Recent Oblivious Transfer instantiations secure in the UC framework suf- fer from a drastic fallback. After the first query, there is no improvement on the global scheme complexity and so subsequent queries each have a global complexity of O(|DB|) meaning that there is no gain compared to running completely independent queries. In this paper, we propose a new protocol solving this issue, and allowing to have subsequent queries with a complexity of O(log(|DB|)), and prove the protocol security in the UC framework with adaptive corruptions and reliable erasures. As a second contribution, we show that the techniques we use for Obliv- ious Transfer can be generalized to a new framework we call Oblivi- ous Language-Based Envelope (OLBE). It is of practical interest since it seems more and more unrealistic to consider a database with uncontrolled access in access control scenarii. Our approach generalizes Oblivious Signature-Based Envelope, to handle more expressive credentials and requests from the user. Naturally, OLBE encompasses both OT and OSBE, but it also allows to achieve Oblivious Transfer with fine grain access over each line. For example, a user can access a line if and only if he possesses a certificate granting him access to such line. We show how to generically and efficiently instantiate such primitive, and prove them secure in the Universal Composability framework, with adaptive corruptions assuming reliable erasures. We provide the new UC ideal functionalities when needed, or we show that the existing ones fit in our new framework. The security of such designs allows to preserve both the secrecy of the database values and the user credentials. This symmetry allows to view our new approach as a generalization of the notion of Symmetrically PIR
    corecore