1,722 research outputs found

    Information Leakage Games

    Full text link
    We consider a game-theoretic setting to model the interplay between attacker and defender in the context of information flow, and to reason about their optimal strategies. In contrast with standard game theory, in our games the utility of a mixed strategy is a convex function of the distribution on the defender's pure actions, rather than the expected value of their utilities. Nevertheless, the important properties of game theory, notably the existence of a Nash equilibrium, still hold for our (zero-sum) leakage games, and we provide algorithms to compute the corresponding optimal strategies. As typical in (simultaneous) game theory, the optimal strategy is usually mixed, i.e., probabilistic, for both the attacker and the defender. From the point of view of information flow, this was to be expected in the case of the defender, since it is well known that randomization at the level of the system design may help to reduce information leaks. Regarding the attacker, however, this seems the first work (w.r.t. the literature in information flow) proving formally that in certain cases the optimal attack strategy is necessarily probabilistic

    Epistemic and Ontic Quantum Realities

    Get PDF
    Quantum theory has provoked intense discussions about its interpretation since its pioneer days. One of the few scientists who have been continuously engaged in this development from both physical and philosophical perspectives is Carl Friedrich von Weizsaecker. The questions he posed were and are inspiring for many, including the authors of this contribution. Weizsaecker developed Bohr's view of quantum theory as a theory of knowledge. We show that such an epistemic perspective can be consistently complemented by Einstein's ontically oriented position

    Parasitic Cape honeybee workers, Apis mellifera capensis, evade policing

    Get PDF
    Relocation of the Cape honeybee, Apis mellifera capensis, by bee-keepers from southern to northern South Africa in 1990 has caused widespread death of managed African honeybee, A. m. scutellata, colonies. Apis mellifera capensis worker bees are able to lay diploid, female eggs without mating by means of automictic thelytoky (meiosis followed by fusion of two meiotic products to restore egg diploidy), whereas workers of other honeybee subspecies are able to lay only haploid, male eggs. The A. m. capensis workers, which are parasitizing and killing A. m. scutellata colonies in northern South Africa, are the asexual offspring of a single, original worker in which the small amount of genetic variation observed is due to crossing over during meiosis (P. Kryger, personal communication). Here we elucidate two principal mechanisms underlying this parasitism. Parasitic A. m. capensis workers activate their ovaries in host colonies that have a queen present (queenright colonies), and they lay eggs that evade being killed by other workers (worker policing)—the normal fate of worker-laid eggs in colonies with a queen. This unique parasitism by workers is an instance in which a society is unable to control the selfish actions of its members

    A pedagogic appraisal of the Priority Heuristic

    Get PDF
    We have explored how science and mathematics teachers made decisions when confronted with a dilemma in which a fictitious young woman, Deborah, may choose to have an operation that might address a painful spinal condition. We sought to explore the extent to which psychological heuristic models, in particular the Priority Heuristic, might successfully describe the decision-making process of these teachers and how an analysis of the role of personal and emotional factors in shaping the decision-making process might inform pedagogical design. A novel aspect of this study is that the setting in which the decision-making process is examined contrasts sharply with those used in psychological experiments. We found that to some extent, even in this contrasting setting, the Priority Heuristic could describe these teachers' decision-making. Further analysis of the transcripts yielded some insights into limitations on scope as well the richness and complexity in how personal factors were brought to bear. We see these limitations as design opportunities for educational intervention

    Composite-pulse magnetometry with a solid-state quantum sensor

    Get PDF
    The sensitivity of quantum magnetometers is challenged by control errors and, especially in the solid-state, by their short coherence times. Refocusing techniques can overcome these limitations and improve the sensitivity to periodic fields, but they come at the cost of reduced bandwidth and cannot be applied to sense static (DC) or aperiodic fields. Here we experimentally demonstrate that continuous driving of the sensor spin by a composite pulse known as rotary-echo (RE) yields a flexible magnetometry scheme, mitigating both driving power imperfections and decoherence. A suitable choice of RE parameters compensates for different scenarios of noise strength and origin. The method can be applied to nanoscale sensing in variable environments or to realize noise spectroscopy. In a room-temperature implementation based on a single electronic spin in diamond, composite-pulse magnetometry provides a tunable trade-off between sensitivities in the microT/sqrt(Hz) range, comparable to those obtained with Ramsey spectroscopy, and coherence times approaching T1

    CellCognition : time-resolved phenotype annotation in high-throughput live cell imaging

    Get PDF
    Author Posting. © The Authors, 2010. This is the author's version of the work. It is posted here by permission of Nature Publishing Group for personal use, not for redistribution. The definitive version was published in Nature Methods 7 (2010): 747-754, doi:10.1038/nmeth.1486.Fluorescence time-lapse imaging has become a powerful tool to investigate complex dynamic processes such as cell division or intracellular trafficking. Automated microscopes generate time-resolved imaging data at high throughput, yet tools for quantification of large-scale movie data are largely missing. Here, we present CellCognition, a computational framework to annotate complex cellular dynamics. We developed a machine learning method that combines state-of-the-art classification with hidden Markov modeling for annotation of the progression through morphologically distinct biological states. The incorporation of time information into the annotation scheme was essential to suppress classification noise at state transitions, and confusion between different functional states with similar morphology. We demonstrate generic applicability in a set of different assays and perturbation conditions, including a candidate-based RNAi screen for mitotic exit regulators in human cells. CellCognition is published as open source software, enabling live imaging-based screening with assays that directly score cellular dynamics.Work in the Gerlich laboratory is supported by Swiss National Science Foundation (SNF) research grant 3100A0-114120, SNF ProDoc grant PDFMP3_124904, a European Young Investigator (EURYI) award of the European Science Foundation, an EMBO YIP fellowship, and a MBL Summer Research Fellowship to D.W.G., an ETH TH grant, a grant by the UBS foundation, a Roche Ph.D. fellowship to M.H.A.S, and a Mueller fellowship of the Molecular Life Sciences Ph.D. program Zurich to M.H. M.H. and M.H.A.S are fellows of the Zurich Ph.D. Program in Molecular Life Sciences. B.F. was supported by European Commission’s seventh framework program project Cancer Pathways. Work in the Ellenberg laboratory is supported by a European Commission grant within the Mitocheck consortium (LSHG-CT-2004-503464). Work in the Peter laboratory is supported by the ETHZ, Oncosuisse, SystemsX.ch (LiverX) and the SNF

    A public health approach to understanding and preventing violent radicalization

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Very recent acts of terrorism in the UK were perpetrated by 'homegrown', well educated young people, rather than by foreign Islamist groups; consequently, a process of violent radicalization was proposed to explain how ordinary people were recruited and persuaded to sacrifice their lives.</p> <p>Discussion</p> <p>Counterterrorism approaches grounded in the criminal justice system have not prevented violent radicalization. Indeed there is some evidence that these approaches may have encouraged membership of radical groups by not recognizing Muslim communities as allies, citizens, victims of terrorism, and victims of discrimination, but only as suspect communities who were then further alienated. Informed by public health research and practice, a new approach is proposed to target populations vulnerable to recruitment, rather than rely only on research of well known terrorist groups and individual perpetrators of terrorist acts.</p> <p>Conclusions</p> <p>This paper proposes public health research and practice to guard against violent radicalization.</p

    The Shine-Through Masking Paradigm Is a Potential Endophenotype of Schizophrenia

    Get PDF
    BACKGROUND: To understand the genetics of schizophrenia, a hunt for so-called intermediate phenotypes or endophenotypes is ongoing. Visual masking has been proposed to be such an endophenotype. However, no systematic study has been conducted yet to prove this claim. Here, we present the first study showing that masking meets the most important criteria for an endophenotype. METHODOLOGY/PRINCIPAL FINDINGS: We tested 62 schizophrenic patients, 39 non-affected first-degree relatives, and 38 healthy controls in the shine-through masking paradigm and, in addition, in the Continuous Performance Test (CPT) and the Wisconsin Card Sorting Test (WCST). Most importantly, masking performance of relatives was significantly in between the one of patients and controls in the shine-through paradigm. Moreover, deficits were stable throughout one year. Using receiver operating characteristics (ROC) methods, we show that the shine-through paradigm distinguishes with high sensitivity and specificity between schizophrenic patients, first-order relatives and healthy controls. CONCLUSIONS/SIGNIFICANCE: The shine-through paradigm is a potential endophenotype

    CRISPR-Cas9 screens in human cells and primary neurons identify modifiers of C9ORF72 dipeptide-repeat-protein toxicity.

    Get PDF
    Hexanucleotide-repeat expansions in the C9ORF72 gene are the most common cause of amyotrophic lateral sclerosis and frontotemporal dementia (c9ALS/FTD). The nucleotide-repeat expansions are translated into dipeptide-repeat (DPR) proteins, which are aggregation prone and may contribute to neurodegeneration. We used the CRISPR-Cas9 system to perform genome-wide gene-knockout screens for suppressors and enhancers of C9ORF72 DPR toxicity in human cells. We validated hits by performing secondary CRISPR-Cas9 screens in primary mouse neurons. We uncovered potent modifiers of DPR toxicity whose gene products function in nucleocytoplasmic transport, the endoplasmic reticulum (ER), proteasome, RNA-processing pathways, and chromatin modification. One modifier, TMX2, modulated the ER-stress signature elicited by C9ORF72 DPRs in neurons and improved survival of human induced motor neurons from patients with C9ORF72 ALS. Together, our results demonstrate the promise of CRISPR-Cas9 screens in defining mechanisms of neurodegenerative diseases
    corecore