1,722 research outputs found
Information Leakage Games
We consider a game-theoretic setting to model the interplay between attacker
and defender in the context of information flow, and to reason about their
optimal strategies. In contrast with standard game theory, in our games the
utility of a mixed strategy is a convex function of the distribution on the
defender's pure actions, rather than the expected value of their utilities.
Nevertheless, the important properties of game theory, notably the existence of
a Nash equilibrium, still hold for our (zero-sum) leakage games, and we provide
algorithms to compute the corresponding optimal strategies. As typical in
(simultaneous) game theory, the optimal strategy is usually mixed, i.e.,
probabilistic, for both the attacker and the defender. From the point of view
of information flow, this was to be expected in the case of the defender, since
it is well known that randomization at the level of the system design may help
to reduce information leaks. Regarding the attacker, however, this seems the
first work (w.r.t. the literature in information flow) proving formally that in
certain cases the optimal attack strategy is necessarily probabilistic
Epistemic and Ontic Quantum Realities
Quantum theory has provoked intense discussions about its interpretation since its pioneer days. One of the few scientists who have been continuously engaged in this development from both physical and philosophical perspectives is Carl Friedrich von Weizsaecker. The questions he posed were and are inspiring for many, including the authors of this contribution. Weizsaecker developed Bohr's view of quantum theory as a theory of knowledge. We show that such an epistemic perspective can be consistently complemented by Einstein's ontically oriented position
Parasitic Cape honeybee workers, Apis mellifera capensis, evade policing
Relocation of the Cape honeybee, Apis mellifera capensis, by bee-keepers from southern to northern South Africa in 1990 has caused widespread death of managed African honeybee, A. m. scutellata, colonies. Apis mellifera capensis worker bees are able to lay diploid, female eggs without mating by means of automictic thelytoky (meiosis followed by fusion of two meiotic products to restore egg diploidy), whereas workers of other honeybee subspecies are able to lay only haploid, male eggs. The A. m. capensis workers, which are parasitizing and killing A. m. scutellata colonies in northern South Africa, are the asexual offspring of a single, original worker in which the small amount of genetic variation observed is due to crossing over during meiosis (P. Kryger, personal communication). Here we elucidate two principal mechanisms underlying this parasitism. Parasitic A. m. capensis workers activate their ovaries in host colonies that have a queen present (queenright colonies), and they lay eggs that evade being killed by other workers (worker policing)—the normal fate of worker-laid eggs in colonies with a queen. This unique parasitism by workers is an instance in which a society is unable to control the selfish actions of its members
A pedagogic appraisal of the Priority Heuristic
We have explored how science and mathematics teachers made decisions when confronted with a dilemma in which a fictitious young woman, Deborah, may choose to have an operation that might address a painful spinal condition. We sought to explore the extent to which psychological heuristic models, in particular the Priority Heuristic, might successfully describe the decision-making process of these teachers and how an analysis of the role of personal and emotional factors in shaping the decision-making process might inform pedagogical design. A novel aspect of this study is that the setting in which the decision-making process is examined contrasts sharply with those used in psychological experiments. We found that to some extent, even in this contrasting setting, the Priority Heuristic could describe these teachers' decision-making. Further analysis of the transcripts yielded some insights into limitations on scope as well the richness and complexity in how personal factors were brought to bear. We see these limitations as design opportunities for educational intervention
Composite-pulse magnetometry with a solid-state quantum sensor
The sensitivity of quantum magnetometers is challenged by control errors and,
especially in the solid-state, by their short coherence times. Refocusing
techniques can overcome these limitations and improve the sensitivity to
periodic fields, but they come at the cost of reduced bandwidth and cannot be
applied to sense static (DC) or aperiodic fields. Here we experimentally
demonstrate that continuous driving of the sensor spin by a composite pulse
known as rotary-echo (RE) yields a flexible magnetometry scheme, mitigating
both driving power imperfections and decoherence. A suitable choice of RE
parameters compensates for different scenarios of noise strength and origin.
The method can be applied to nanoscale sensing in variable environments or to
realize noise spectroscopy. In a room-temperature implementation based on a
single electronic spin in diamond, composite-pulse magnetometry provides a
tunable trade-off between sensitivities in the microT/sqrt(Hz) range,
comparable to those obtained with Ramsey spectroscopy, and coherence times
approaching T1
CellCognition : time-resolved phenotype annotation in high-throughput live cell imaging
Author Posting. © The Authors, 2010. This is the author's version of the work. It is posted here by permission of Nature Publishing Group for personal use, not for redistribution. The definitive version was published in Nature Methods 7 (2010): 747-754, doi:10.1038/nmeth.1486.Fluorescence time-lapse imaging has become a powerful tool to investigate complex
dynamic processes such as cell division or intracellular trafficking. Automated
microscopes generate time-resolved imaging data at high throughput, yet tools for
quantification of large-scale movie data are largely missing. Here, we present
CellCognition, a computational framework to annotate complex cellular dynamics.
We developed a machine learning method that combines state-of-the-art classification
with hidden Markov modeling for annotation of the progression through
morphologically distinct biological states. The incorporation of time information into
the annotation scheme was essential to suppress classification noise at state
transitions, and confusion between different functional states with similar
morphology. We demonstrate generic applicability in a set of different assays and
perturbation conditions, including a candidate-based RNAi screen for mitotic exit
regulators in human cells. CellCognition is published as open source software,
enabling live imaging-based screening with assays that directly score cellular
dynamics.Work in the Gerlich
laboratory is supported by Swiss National Science Foundation (SNF) research grant
3100A0-114120, SNF ProDoc grant PDFMP3_124904, a European Young
Investigator (EURYI) award of the European Science Foundation, an EMBO YIP
fellowship, and a MBL Summer Research Fellowship to D.W.G., an ETH TH grant, a
grant by the UBS foundation, a Roche Ph.D. fellowship to M.H.A.S, and a Mueller
fellowship of the Molecular Life Sciences Ph.D. program Zurich to M.H. M.H. and
M.H.A.S are fellows of the Zurich Ph.D. Program in Molecular Life Sciences. B.F.
was supported by European Commission’s seventh framework program project
Cancer Pathways. Work in the Ellenberg laboratory is supported by a European
Commission grant within the Mitocheck consortium (LSHG-CT-2004-503464). Work
in the Peter laboratory is supported by the ETHZ, Oncosuisse, SystemsX.ch (LiverX)
and the SNF
Metal-macrofauna interactions determine microbial community structure and function in copper contaminated sediments
Peer reviewedPublisher PD
A public health approach to understanding and preventing violent radicalization
<p>Abstract</p> <p>Background</p> <p>Very recent acts of terrorism in the UK were perpetrated by 'homegrown', well educated young people, rather than by foreign Islamist groups; consequently, a process of violent radicalization was proposed to explain how ordinary people were recruited and persuaded to sacrifice their lives.</p> <p>Discussion</p> <p>Counterterrorism approaches grounded in the criminal justice system have not prevented violent radicalization. Indeed there is some evidence that these approaches may have encouraged membership of radical groups by not recognizing Muslim communities as allies, citizens, victims of terrorism, and victims of discrimination, but only as suspect communities who were then further alienated. Informed by public health research and practice, a new approach is proposed to target populations vulnerable to recruitment, rather than rely only on research of well known terrorist groups and individual perpetrators of terrorist acts.</p> <p>Conclusions</p> <p>This paper proposes public health research and practice to guard against violent radicalization.</p
The Shine-Through Masking Paradigm Is a Potential Endophenotype of Schizophrenia
BACKGROUND: To understand the genetics of schizophrenia, a hunt for so-called intermediate phenotypes or endophenotypes is ongoing. Visual masking has been proposed to be such an endophenotype. However, no systematic study has been conducted yet to prove this claim. Here, we present the first study showing that masking meets the most important criteria for an endophenotype. METHODOLOGY/PRINCIPAL FINDINGS: We tested 62 schizophrenic patients, 39 non-affected first-degree relatives, and 38 healthy controls in the shine-through masking paradigm and, in addition, in the Continuous Performance Test (CPT) and the Wisconsin Card Sorting Test (WCST). Most importantly, masking performance of relatives was significantly in between the one of patients and controls in the shine-through paradigm. Moreover, deficits were stable throughout one year. Using receiver operating characteristics (ROC) methods, we show that the shine-through paradigm distinguishes with high sensitivity and specificity between schizophrenic patients, first-order relatives and healthy controls. CONCLUSIONS/SIGNIFICANCE: The shine-through paradigm is a potential endophenotype
CRISPR-Cas9 screens in human cells and primary neurons identify modifiers of C9ORF72 dipeptide-repeat-protein toxicity.
Hexanucleotide-repeat expansions in the C9ORF72 gene are the most common cause of amyotrophic lateral sclerosis and frontotemporal dementia (c9ALS/FTD). The nucleotide-repeat expansions are translated into dipeptide-repeat (DPR) proteins, which are aggregation prone and may contribute to neurodegeneration. We used the CRISPR-Cas9 system to perform genome-wide gene-knockout screens for suppressors and enhancers of C9ORF72 DPR toxicity in human cells. We validated hits by performing secondary CRISPR-Cas9 screens in primary mouse neurons. We uncovered potent modifiers of DPR toxicity whose gene products function in nucleocytoplasmic transport, the endoplasmic reticulum (ER), proteasome, RNA-processing pathways, and chromatin modification. One modifier, TMX2, modulated the ER-stress signature elicited by C9ORF72 DPRs in neurons and improved survival of human induced motor neurons from patients with C9ORF72 ALS. Together, our results demonstrate the promise of CRISPR-Cas9 screens in defining mechanisms of neurodegenerative diseases
- …