194 research outputs found

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Get PDF
    A distinct difference configuration is a set of points in Z2 with the property that the vectors (difference vectors) connecting any two of the points are all distinct. Many specific examples of these configurations have been previously studied: the class of distinct difference configurations includes both Costas arrays and sonar sequences, for example. Motivated by an application of these structures in key predistribution for wireless sensor networks, we define the k-hop coverage of a distinct difference configuration to be the number of distinct vectors that can be expressed as the sum of k or fewer difference vectors. This is an important parameter when distinct difference configurations are used in the wireless sensor application, as this parameter describes the density of nodes that can be reached by a short secure path in the network. We provide upper and lower bounds for the k-hop coverage of a distinct difference configuration with m points, and exploit a connection with Bh sequences to construct configurations with maximal k-hop coverage. We also construct distinct difference configurations that enable all small vectors to be expressed as the sum of two of the difference vectors of the configuration, an important task for local secure connectivity in the application

    Two-dimensional patterns with distinct differences; constructions, bounds, and maximal anticodes

    Get PDF
    A two-dimensional (2-D) grid with dots is called a configuration with distinct differences if any two lines which connect two dots are distinct either in their length or in their slope. These configurations are known to have many applications such as radar, sonar, physical alignment, and time-position synchronization. Rather than restricting dots to lie in a square or rectangle, as previously studied, we restrict the maximum distance between dots of the configuration; the motivation for this is a new application of such configurations to key distribution in wireless sensor networks. We consider configurations in the hexagonal grid as well as in the traditional square grid, with distances measured both in the Euclidean metric, and in the Manhattan or hexagonal metrics. We note that these configurations are confined inside maximal anticodes in the corresponding grid. We classify maximal anticodes for each diameter in each grid. We present upper bounds on the number of dots in a pattern with distinct differences contained in these maximal anticodes. Our bounds settle (in the negative) a question of Golomb and Taylor on the existence of honeycomb arrays of arbitrarily large size. We present constructions and lower bounds on the number of dots in configurations with distinct differences contained in various 2-D shapes (such as anticodes) by considering periodic configurations with distinct differences in the square grid

    PIR schemes with small download complexity and low storage requirements

    Get PDF
    Shah, Rashmi and Ramchandran recently considered a model for Private Information Retrieval (PIR) where a user wishes to retrieve one of several Ä-bit messages from a set of n non-colluding servers. Their security model is information-theoretic. Their paper is the first to consider a model for PIR in which the database is not necessarily replicated, so allowing distributed storage techniques to be used. Shah et al. show that at least Ä+1 bits must be downloaded from servers, and describe a scheme with linear total storage (in R) that downloads between 2R and 3R bits. For any positive e, we provide a construction with the same storage property, that requires at most (1 + e)R bits to be downloaded; moreover one variant of our scheme only requires each server to store a bounded number of bits (in the sense of being bounded by a function that is independent of R). We also provide variants of a scheme of Shah et al which downloads exactly R +1 bits and has quadratic total storage. Finally, we simplify and generalise a lower bound due to Shah et al. on the download complexity of a PIR scheme. In a natural model, we show that an n-server PIR scheme requires at least nR/(n - 1) download bits in many cases, and provide a scheme that meets this bound. This paper provides various bounds on the download complexity of a PIR scheme, generalising those of Shah et al.\ to the case when the number nn of servers is bounded, and providing links with classical techniques due to Chor et al. The paper also provides a range of constructions for PIR schemes that are either simpler or perform better than previously known schemes. These constructions include explicit schemes that achieve the best asymptotic download complexity of Sun and Jafar with significantly lower upload complexity, and general techniques for constructing a scheme with good worst case download complexity from a scheme with good download complexity on average

    PIR schemes with small download complexity and low storage requirements

    Get PDF
    Shah, Rashmi and Ramchandran recently considered a model for Private Information Retrieval (PIR) where a user wishes to retrieve one of several R-bit messages from a set of n non-colluding servers. Their security model is information-theoretic. Their paper is the first to consider a model for PIR in which the database is not necessarily replicated, so allowing distributed storage techniques to be used. They concentrate on minimising the total number of bits downloaded from the servers. Shah et al. provide a construction of a scheme that requires just R + 1 bits to be downloaded from servers, but requires an exponential (in R) number of servers. We provide an improved scheme that requires a linear number of servers. Shah et al. construct a scheme with linear total storage (in R) that needs at least 2R bits to be downloaded. For any positive ïżœ, we provide a construction with the same storage property, that requires at most (1 + ïżœ)R bits to be downloaded; moreover one variant of our scheme only requires each server to store a bounded number of bits (in the sense of being bounded by a function that is independent of R). Finally, we simplify and generalise a lower bound due to Shah et al. on the download complexity of such a PIR scheme. In a natural model, we show that an n-server PIR scheme requires at least nR/(n−1) download bits, and provide a scheme that meets this bound

    PIR schemes with small download complexity and low storage requirements

    Get PDF
    Shah, Rashmi and Ramchandran recently considered a model for Private Information Retrieval (PIR) where a user wishes to retrieve one of several Ä-bit messages from a set of n non-colluding servers. Their security model is information-theoretic. Their paper is the first to consider a model for PIR in which the database is not necessarily replicated, so allowing distributed storage techniques to be used. Shah et al. show that at least Ä+1 bits must be downloaded from servers, and describe a scheme with linear total storage (in R) that downloads between 2R and 3R bits. For any positive e, we provide a construction with the same storage property, that requires at most (1 + e)R bits to be downloaded; moreover one variant of our scheme only requires each server to store a bounded number of bits (in the sense of being bounded by a function that is independent of R). We also provide variants of a scheme of Shah et al which downloads exactly R +1 bits and has quadratic total storage. Finally, we simplify and generalise a lower bound due to Shah et al. on the download complexity of a PIR scheme. In a natural model, we show that an n-server PIR scheme requires at least nR/(n - 1) download bits in many cases, and provide a scheme that meets this bound. This paper provides various bounds on the download complexity of a PIR scheme, generalising those of Shah et al.\ to the case when the number nn of servers is bounded, and providing links with classical techniques due to Chor et al. The paper also provides a range of constructions for PIR schemes that are either simpler or perform better than previously known schemes. These constructions include explicit schemes that achieve the best asymptotic download complexity of Sun and Jafar with significantly lower upload complexity, and general techniques for constructing a scheme with good worst case download complexity from a scheme with good download complexity on average

    A unified approach to combinatorial key predistribution schemes for sensor networks

    Get PDF
    There have been numerous recent proposals for key predistribution schemes for wireless sensor networks based on various types of combinatorial structures such as designs and codes. Many of these schemes have very similar properties and are analysed in a similar manner. We seek to provide a unified framework to study these kinds of schemes. To do so, we define a new, general class of designs, termed “partially balanced t-designs”, that is sufficiently general that it encompasses almost all of the designs that have been proposed for combinatorial key predistribution schemes. However, this new class of designs still has sufficient structure that we are able to derive general formulas for the metrics of the resulting key predistribution schemes. These metrics can be evaluated for a particular scheme simply by substituting appropriate parameters of the underlying combinatorial structure into our general formulas. We also compare various classes of schemes based on different designs, and point out that some existing proposed schemes are in fact identical, even though their descriptions may seem different. We believe that our general framework should facilitate the analysis of proposals for combinatorial key predistribution schemes and their comparison with existing schemes, and also allow researchers to easily evaluate which scheme or schemes present the best combination of performance metrics for a given application scenario

    Modern clinician-initiated clinical trials to determine optimal therapy for multidrug-resistant gram-negative infections

    Get PDF
    Treatment options for multidrug-resistant (MDR) gram-negative infection are growing. However, postregistration, pragmatic, and clinician-led clinical trials in this field are few, recruit small sample sizes, and experience deficiencies in design and operations. MDR gram-negative therapeutic trials are often inefficient, only evaluating a single antibiotic or strategy at a time. Novel clinical trial designs offer potential solutions by attempting to obtain clinically meaningful conclusions at the end or during a trial, for many treatment strategies, simultaneously. An integrated, consensus approach to MDR gram-negative infection trial design is crucial

    Hypoxia modulates platelet purinergic signalling pathways.

    Get PDF
    BACKGROUND:  Hypoxia resulting from ascent to high-altitude or pathological states at sea level is known to increase platelet reactivity. Previous work from our group has suggested that this may be adenosine diphosphate (ADP)-specific. Given the clinical importance of drugs targeting ADP pathways, research into the impact of hypoxia on platelet ADP pathways is highly important. METHODS:  Optimul aggregometry was performed on plasma from 29 lowland residents ascending to 4,700 m, allowing systematic assessment of platelet reactivity in response to several platelet agonists. Aggregometry was also performed in response to ADP in the presence of inhibitors of the two main ADP receptors, P2Y1 and P2Y12 (MRS2500 and cangrelor, respectively). Phosphorylation of vasodilator-stimulated phosphoprotein (VASP), a key determinant of platelet aggregation, was analysed using the VASPFix assay. RESULTS:  Hypobaric hypoxia significantly reduced the ability of a fixed concentration of cangrelor to inhibit ADP-induced aggregation and increased basal VASP phosphorylation. However, in the absence of P2Y receptor inhibitors, we did not find evidence of increased platelet sensitivity to any of the agonists tested and found reduced sensitivity to thrombin receptor-activating peptide-6 amide. CONCLUSION:  Our results provide evidence of increased P2Y1 receptor activity at high altitude and suggest down-regulation of the P2Y12 pathway through increased VASP phosphorylation. These changes in ADP pathway activity are of potential therapeutic significance to high-altitude sojourners and hypoxic sea level patients prescribed platelet inhibitors and warrant further investigation

    Mafic rocks of the Ordovician Famatinian magmatic arc (NW Argentina): New insights into the mantle contribution

    Get PDF
    We studied the petrogenesis of mafic igneous rocks in the Famatinian arc in the western Sierra Famatina (NW Argentina), an Early Ordovician middle-crustal section in the proto-Andean margin of Gondwana. Mafic rock types consist of amphibolite, metagabbro, and gabbro, as well as pod- and dike-like bodies of gabbro to diorite composition. Field relations together with geochemical and isotopic data for the mafic rocks of the western Sierra de Famatina (at 29°S) define two contrasting suites, which can be correlated with similar assemblages noted in other parts of the orogen. Amphibolite, metagabbro, and gabbro bodies are mostly the oldest intrusive rocks (older than 480 Ma), with the host tonalite and post-tonalite mafic dikes being slightly younger. The older mafic suite is tholeiitic to calc-alkaline and isotopically evolved, except for most of the amphibolite samples. The younger suite is calc-alkaline, typically displaying subduction-related geochemical signatures, and it is isotopically more juvenile. Whole-rock chemical composition and isotopic analyses are compatible with a progressive mixing of different isotopic reservoirs. Pyroxenite (±garnet) was likely the dominant source of the older gabbroic magmas, whereas peridotite dominated in the source of the younger suite, implying that the mafic magma experienced a progressive shift toward more juvenile compositions though time (over 20 m.y.). Pyroxenitederived melts could have been generated by lithospheric foundering followed by upwelling of primitive melts by adiabatic decompression of mantle wedge peridotite.Fil: Alasino, Pablo Horacio. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de Catamarca. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de la Rioja. - Secretaria de Industria y Minería. Servicio Geológico Minero Argentino. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Provincia de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja; ArgentinaFil: Casquet, C.. Consejo Superior de Investigaciones Científica. Instituto de Geociencias; EspañaFil: Pankhurst, R. J.. British Geological Survey; Reino UnidoFil: Rapela, Carlos Washington. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - La Plata. Centro de Investigaciones Geológicas. Universidad Nacional de La Plata. Facultad de Ciencias Naturales y Museo. Centro de Investigaciones Geológicas; ArgentinaFil: Dahlquist, Juan Andrés. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Centro de Investigaciones en Ciencias de la Tierra. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Centro de Investigaciones en Ciencias de la Tierra; ArgentinaFil: Galindo, C.. Consejo Superior de Investigaciones Científica. Instituto de Geociencias; EspañaFil: Larrovere, Mariano Alexis. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Universidad Nacional de Catamarca. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de la Rioja. - Secretaria de Industria y Minería. Servicio Geológico Minero Argentino. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja. - Provincia de La Rioja. Centro Regional de Investigaciones Científicas y Transferencia Tecnológica de La Rioja; ArgentinaFil: Recio, C.. Universidad de Salamanca; EspañaFil: Paterson, S.R.. University of Southern California; Estados UnidosFil: Colombo, Fernando. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Centro de Investigaciones en Ciencias de la Tierra. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Centro de Investigaciones en Ciencias de la Tierra; ArgentinaFil: Baldo, Edgardo Gaspar Agustín. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Córdoba. Centro de Investigaciones en Ciencias de la Tierra. Universidad Nacional de Córdoba. Facultad de Ciencias Exactas Físicas y Naturales. Centro de Investigaciones en Ciencias de la Tierra; Argentin
    • 

    corecore