114 research outputs found

    Frameworks for logically classifying polynomial-time optimisation problems.

    Get PDF
    We show that a logical framework, based around a fragment of existential second-order logic formerly proposed by others so as to capture the class of polynomially-bounded P-optimisation problems, cannot hope to do so, under the assumption that P ≠ NP. We do this by exhibiting polynomially-bounded maximisation and minimisation problems that can be expressed in the framework but whose decision versions are NP-complete. We propose an alternative logical framework, based around inflationary fixed-point logic, and show that we can capture the above classes of optimisation problems. We use the inductive depth of an inflationary fixed-point as a means to describe the objective functions of the instances of our optimisation problems

    I read it on reddit: Exploring the role of online communities in the 2016 US elections news cycle

    Get PDF
    Reddit has developed into a significant platform for political discussion among Millennials. In this exploratory study, we examine subscription trends on three political sub-forums on Reddit during the 2016 US presidential elections: /The_Donald, /SandersForPresident, and /HillaryClinton. As a theoretical framework, we draw from work on online communities’ group identity and cohesion. Concretely, we investigate how subscription dynamics relate to positive, negative and neutral news events occurring during the election cycle. We classify news events using a sentiment analysis of event-related news headlines. We observe that users who supported Sanders displayed no consolidation of support for Clinton after she won the Democratic Party’s presidential nomination. Secondly, we show that negative news events affected Sanders and Clintons subscription trends negatively, while showing no effect for Donald Trump. This gives empirical credence to Trump’s controversial claim that he could “stand in the middle of 5th Avenue and shoot somebody and not lose any voters”. We offer a number of explanations for the observed phenomena: the nature of the content of the three subreddits, their cultural dynamics, and changing dynamics of partisanship. We posit that the ‘death of expertise’ expresses itself on Reddit as a switch in persuasion tactics from a policy-based to an emotions-based approach, and that group members’ agreement on policy proved a weak marker for online communities’ group identity and cohesion. We also claim that strong partisanship coupled with weak party affiliation among Millennials contributed to the low levels of Democratic support consolidation after Clinton won the nomination

    Control of Transdermal Permeation of Hydrocortisone Acetate from Hydrophilic and Lipophilic Formulations

    Get PDF
    The purpose of this research was the preparation of four formulations containing hydrocortisone acetate (HCA) for topical application, including two aqueous systems (hydrophilic microemulsion and aqueous gel) and two systems with dominant hydrophobicity (hydrophobic microemulsion and ointment). The formulations were tested for the release and permeation of HCA across an animal membrane. The release of HCA was found comparable for the four systems. The two microemulsions promote permeation across an ex-vivo membrane, examined by means of a Franz cell. Hydrophobic microemulsion guarantees the highest solubility (2,370 μg/ml) and flux (133 μg/cm2.h) of the drug, since it contains almost 40% Transcutol, a permeation enhancer. Gel and ointment provide lower solubility and flux, being the values, related to the ointment, the lowest ones (562 μg/ml and 0.4 μg/cm2.h). Experimental results allow the conclusion that gel and ointment can be suitable when it is desirable to minimize absorption of topically applied HCA as to keep the drug restricted to the diseased area and prevent side effects of the systemic presence of HCA

    Association between lifestyle factors and headache

    Get PDF
    Modification of lifestyle habits is a key preventive strategy for many diseases. The role of lifestyle for the onset of headache in general and for specific headache types, such as migraine and tension-type headache (TTH), has been discussed for many years. Most results, however, were inconsistent and data on the association between lifestyle factors and probable headache forms are completely lacking. We evaluated the cross-sectional association between different lifestyle factors and headache subtypes using data from three different German cohorts. Information was assessed by standardized face-to-face interviews. Lifestyle factors included alcohol consumption, smoking status, physical activity and body mass index. According to the 2004 diagnostic criteria, we distinguished the following headache types: migraine, TTH and their probable forms. Regional variations of lifestyle factors were observed. In the age- and gender-adjusted logistic regression models, none of the lifestyle factors was statistically significant associated with migraine, TTH, and their probable headache forms. In addition, we found no association between headache subtypes and the health index representing the sum of individual lifestyle factors. The lifestyle factors such as alcohol consumption, smoking, physical activity and overweight seem to be unrelated to migraine and TTH prevalence. For a judgement on their role in the onset of new or first attacks of migraine or TTH (incident cases), prospective cohort studies are required

    The Price of Low Communication in Secure Multi-Party Computation

    Get PDF
    Traditional protocols for secure multi-party computation among n parties communicate at least a linear (in n) number of bits, even when computing very simple functions. In this work we investigate the feasibility of protocols with sublinear communication complexity. Concretely, we consider two clients, one of which may be corrupted, who wish to perform some “small” joint computation using n servers but without any trusted setup. We show that enforcing sublinear communication complexity drastically affects the feasibility bounds on the number of corrupted parties that can be tolerated in the setting of information-theoretic security. We provide a complete investigation of security in the presence of semi-honest adversaries---static and adaptive, with and without erasures---and initiate the study of security in the presence of malicious adversaries. For semi-honest static adversaries, our bounds essentially match the corresponding bounds when there is no communication restriction---i.e., we can tolerate up to t < (1/2 - \epsilon)n corrupted parties. For the adaptive case, however, the situation is different. We prove that without erasures even a small constant fraction of corruptions is intolerable, and---more surprisingly---when erasures are allowed, we prove that t < (1- \sqrt(0.5) -\epsilon)n corruptions can be tolerated, which we also show to be essentially optimal. The latter optimality proof hinges on a new treatment of probabilistic adversary structures that may be of independent interest. In the case of active corruptions in the sublinear communication setting, we prove that static “security with abort” is feasible when t < (1/2 - \epsilon)n, namely, the bound that is tight for semi-honest security. All of our negative results in fact rule out protocols with sublinear message complexity
    corecore