143 research outputs found
Computing Local Sensitivities of Counting Queries with Joins
Local sensitivity of a query Q given a database instance D, i.e. how much the
output Q(D) changes when a tuple is added to D or deleted from D, has many
applications including query analysis, outlier detection, and in differential
privacy. However, it is NP-hard to find local sensitivity of a conjunctive
query in terms of the size of the query, even for the class of acyclic queries.
Although the complexity is polynomial when the query size is fixed, the naive
algorithms are not efficient for large databases and queries involving multiple
joins. In this paper, we present a novel approach to compute local sensitivity
of counting queries involving join operations by tracking and summarizing tuple
sensitivities -- the maximum change a tuple can cause in the query result when
it is added or removed. We give algorithms for the sensitivity problem for full
acyclic join queries using join trees, that run in polynomial time in both the
size of the database and query for an interesting sub-class of queries, which
we call 'doubly acyclic queries' that include path queries, and in polynomial
time in combined complexity when the maximum degree in the join tree is
bounded. Our algorithms can be extended to certain non-acyclic queries using
generalized hypertree decompositions. We evaluate our approach experimentally,
and show applications of our algorithms to obtain better results for
differential privacy by orders of magnitude.Comment: To be published in Proceedings of the 2020 ACM SIGMOD International
Conference on Management of Dat
Ceftazidime-avibactam or best available therapy in patients with ceftazidime-resistant Enterobacteriaceae and Pseudomonas aeruginosa complicated urinary tract infections or complicated intra-abdominal infections (REPRISE): a randomised, pathogen-directed, phase 3 study
Background
Carbapenems are frequently the last line of defence in serious infections due to multidrug-resistant Gram-negative bacteria, but their use is threatened by the growing prevalence of carbapenemase-producing pathogens. Ceftazidime-avibactam is a potential new agent for use in such infections. We aimed to assess the efficacy, safety, and tolerability of ceftazidime-avibactam compared with best available therapy in patients with complicated urinary tract infection or complicated intra-abdominal infection due to ceftazidime-resistant Gram-negative pathogens.
Methods
REPRISE was a pathogen-directed, international, randomised, open-label, phase 3 trial that recruited patients from hospitals across 16 countries worldwide. Eligible patients were aged 18–90 years with complicated urinary tract infection or complicated intra-abdominal infection caused by ceftazidime-resistant Enterobacteriaceae or Pseudomonas aeruginosa. Patients were randomised (1:1) to 5–21 days of treatment with either ceftazidime-avibactam (a combination of 2000 mg ceftazidime plus 500 mg avibactam, administered via a 2-h intravenous infusion every 8 h) or best available therapy. The primary endpoint was clinical response at the test-of-cure visit, 7–10 days after last infusion of study therapy, analysed in all patients who had at least one ceftazidime-resistant Gram-negative pathogen, as confirmed by the central laboratory, and who received at least one dose of study drug. Safety endpoints were assessed in all patients who received at least one dose of study drug. This study is registered with ClinicalTrials.gov, number NCT01644643.
Findings
Between Jan 7, 2013, and Aug 29, 2014, 333 patients were randomly assigned, 165 to ceftazidime-avibactam and 168 to best available therapy. Of these, 154 assigned to ceftazidime-avibactam (144 with complicated urinary tract infection and ten with complicated intra-abdominal infection) and 148 assigned to best available therapy (137 with complicated urinary tract infection and 11 with complicated intra-abdominal infection) were analysed for the primary outcome. 163 (97%) of 168 patients in the best available therapy group received a carbapenem, 161 (96%) as monotherapy. The overall proportions of patients with a clinical cure at the test-of-cure visit were similar with ceftazidime-avibactam (140 [91%; 95% CI 85·6–94·7] of 154 patients) and best available therapy (135 [91%; 85·9–95·0] of 148 patients). 51 (31%) of 164 patients in the ceftazidime-avibactam group and 66 (39%) of 168 in the best available therapy group had an adverse event, most of which were mild or moderate in intensity. Gastrointestinal disorders were the most frequently reported treatment-emergent adverse events with both ceftazidime-avibactam (21 [13%] of 164 patients) and best available therapy (30 [18%] of 168 patients). No new safety concerns were identified for ceftazidime-avibactam.
Interpretation
These results provide evidence of the efficacy of ceftazidime-avibactam as a potential alternative to carbapenems in patients with ceftazidime-resistant Enterobacteriaceae and P aeruginosa.
Funding
AstraZeneca
The PER model of abstract non-interference
Abstract. In this paper, we study the relationship between two models of secure information flow: the PER model (which uses equivalence relations) and the abstract non-interference model (which uses upper closure operators). We embed the lattice of equivalence relations into the lattice of closures, re-interpreting abstract non-interference over the lattice of equivalence relations. For narrow abstract non-interference, we show non-interference it is strictly less general. The relational presentation of abstract non-interference leads to a simplified construction of the most concrete harmless attacker. Moreover, the PER model of abstract noninterference allows us to derive unconstrained attacker models, which do not necessarily either observe all public information or ignore all private information. Finally, we show how abstract domain completeness can be used for enforcing the PER model of abstract non-interference
Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)
30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. ProceedingsThe main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier’s decisional composite residuosity (DCR) assumption), achieve key-dependent message security as well as high resilience to secret key leakage and high resilience to the presence of auxiliary input information.
In particular, under what we call the subgroup indistinguishability assumption, of which the QR and DCR are special cases, we can construct a scheme that has:
• Key-dependent message (circular) security. Achieves security even when encrypting affine functions of its own secret key (in fact, w.r.t. affine “key-cycles” of predefined length). Our scheme also meets the requirements for extending key-dependent message security to broader classes of functions beyond affine functions using previous techniques of Brakerski et al. or Barak et al.
• Leakage resiliency. Remains secure even if any adversarial low-entropy (efficiently computable) function of the secret key is given to the adversary. A proper selection of parameters allows for a “leakage rate” of (1 − o(1)) of the length of the secret key.
• Auxiliary-input security. Remains secure even if any sufficiently hard to invert (efficiently computable) function of the secret key is given to the adversary.
Our scheme is the first to achieve key-dependent security and auxiliary-input security based on the DCR and QR assumptions. Previous schemes that achieved these properties relied either on the DDH or LWE assumptions. The proposed scheme is also the first to achieve leakage resiliency for leakage rate (1 − o(1)) of the secret key length, under the QR assumption. We note that leakage resilient schemes under the DCR and the QR assumptions, for the restricted case of composite modulus product of safe primes, were implied by the work of Naor and Segev, using hash proof systems. However, under the QR assumption, known constructions of hash proof systems only yield a leakage rate of o(1) of the secret key length.Microsoft Researc
Plucked human hair as a tissue in which to assess pharmacodynamic end points during drug development studies
We have demonstrated the feasibility of detecting and quantifying six cell-cycle-related nuclear markers (Ki67, pRb, p27, phospho-p27 (phosphorylated p27), phospho-pRb (phosphorylated pRb), phospho-HH3 (phosphorylated histone H3)) in plucked human scalp and eyebrow hair. Estimates of the proportion of plucked hairs that are lost or damaged during processing plus the intra- and intersubject variability of each nuclear marker with these techniques are provided to inform sizing decisions for intervention studies with drugs potentially impacting on these markers in the future
Extended Ensemble Theory, Spontaneous Symmetry Breaking, and Phase Transitions
In this paper, we suppose a possible extension of Gibbs ensemble theory so
that it can provide a reasonable description to phase transitions and
spontaneous symmetry breaking. The extension is founded on three hypotheses,
and can be regarded as a microscopic edition of the Landau phenomenological
theory of phase transitions. Within its framework, the state of a system is
determined by the evolution of order parameter with temperature according to
such a principle that the entropy of the system will reach its minimum in this
state. The evolution of order parameter can cause change in representation of
the system Hamiltonian, different phases will realize different
representations. Physically, it turns out that phase transition originates from
the automatic interference among matter waves as temperature is cooled down.
Typical quantum many-body systems are studied with this extended ensemble
theory. In particular, the theory predicts that the specific heat Cp of liquid
He II will vanish linearly as T tends to zero, which is anticipating
experimental verifications.Comment: 41 pages, 8 figures, content change
Assessing proliferation, cell-cycle arrest and apoptotic end points in human buccal punch biopsies for use as pharmacodynamic biomarkers in drug development
Easily accessible normal tissues expressing the same molecular site(s) of drug action as malignant tissue offer an enhanced potential for early proof of anticancer drug mechanism and estimation of the biologically effective dose. Studies were undertaken in healthy male volunteers to assess the tolerability of single and multiple (four in 24 h) 3 mm punch biopsies of the buccal mucosa, and to determine the feasibility of detecting and quantifying a range of proliferation, cell-cycle arrest and apoptosis markers by immunohistochemistry (IHC) for use as potential pharmacodynamic (PD) end points. The biopsy procedure was well tolerated with 100% of volunteers stating that they would undergo single (n=10) and multiple (n=12) biopsies again. Total retinoblastoma protein (pRb), phosphorylated pRb (phospho-pRb), total p27, phosphorylated p27 (phospho-p27), phosphorylated-histone H3 (phospho-HH3), p21, p53, Cyclin A, Cyclin E, Ki67 all produced good signal detection, but M30, cleaved caspase 3 and terminal deoxynucleotidyl transferase-mediated dUTP-biotin nick end labelling did not. Total pRb, phospho-pRb, total p27 and phospho-p27 were quantified further in a multiple biopsy study to allow components of variability to be addressed to inform future sizing decisions on intervention studies. Neither site of biopsy within the oral cavity, nor the nominal time of biopsy had any significant impact on any of the four markers expression levels. Inter- and intrasubject coefficients of variation (CVs) that could be used to size future intervention studies for pRb, phospho-pRb, total p27 and phospho-p27 were 14, 19, 18 and 16%; and 18, 29, 25 and 19%, respectively. In conclusion, quantitation of such markers in 3 mm buccal punch biopsies would be suitable to explore as PD end points within intervention studies of drugs acting on these pathways
Screening of the DNA mismatch repair genes MLH1, MSH2 and MSH6 in a Greek cohort of Lynch syndrome suspected families
<p>Abstract</p> <p>Background</p> <p>Germline mutations in the DNA mismatch repair genes predispose to Lynch syndrome, thus conferring a high relative risk of colorectal and endometrial cancer. The <it>MLH1, MSH2 </it>and <it>MSH6 </it>mutational spectrum reported so far involves minor alterations scattered throughout their coding regions as well as large genomic rearrangements. Therefore, a combination of complete sequencing and a specialized technique for the detection of genomic rearrangements should be conducted during a proper DNA-testing procedure. Our main goal was to successfully identify Lynch syndrome families and determine the spectrum of <it>MLH1</it>, <it>MSH2 </it>and <it>MSH6 </it>mutations in Greek Lynch families in order to develop an efficient screening protocol for the Greek colorectal cancer patients' cohort.</p> <p>Methods</p> <p>Forty-two samples from twenty-four families, out of which twenty two of Greek, one of Cypriot and one of Serbian origin, were screened for the presence of germline mutations in the major mismatch repair genes through direct sequencing and MLPA. Families were selected upon Amsterdam criteria or revised Bethesda guidelines.</p> <p>Results</p> <p>Ten deleterious alterations were detected in twelve out of the twenty-four families subjected to genetic testing, thus our detection rate is 50%. Four of the pathogenic point mutations, namely two nonsense, one missense and one splice site change, are novel, whereas the detected genomic deletion encompassing exon 6 of the <it>MLH1 </it>gene has been described repeatedly in the LOVD database. The average age of onset for the development of both colorectal and endometrial cancer among mutation positive families is 43.2 years.</p> <p>Conclusion</p> <p>The mutational spectrum of the MMR genes investigated as it has been shaped by our analysis is quite heterogeneous without any strong indication for the presence of a founder effect.</p
A simple graphical way of evaluating coverage and directional non-coverages
Evaluation of the coverage probability and, more recently, of the intervalar location
of con dence intervals, is a useful procedure if exact and asymptotic methods for
constructing con dence intervals are used for some populacional parameter. In this
paper, a simple graphical procedure is presented to execute this kind of evaluation in
con dence methods for linear combinations of k independent binomial proportions.
Our proposal is based on the representation of the mesial and distal non-coverage
probabilities on a plane. We carry out a simulation study to show how this graphical
representation can be interpreted and used as a basis for the evaluation of intervalar
location of con dence interval methods
Bayesian Mode Regression
This article has been made available through the Brunel Open Access Publishing Fund.Like mean, quantile and variance, mode is also an important measure of central tendency of a distribution. Many practical questions, particularly in the analysis of big data, such as \Which element (gene or le or signal) is the most typical one among all elements in a network?" are directly related to mode. Mode regression, which provides a convenient summary of how the regressors a ect the conditional mode, is totally di erent from other models based on conditional mean or conditional quantile or conditional variance. Some inference methods for mode regression exist but none of them is from the Bayesian perspective. This paper introduces Bayesian mode regression by exploring three different approaches, including their theoretic properties. The proposed approacher are illustrated using simulated datasets and a real data set
- …