1,621 research outputs found

    Verification of Hierarchical Artifact Systems

    Get PDF
    Data-driven workflows, of which IBM's Business Artifacts are a prime exponent, have been successfully deployed in practice, adopted in industrial standards, and have spawned a rich body of research in academia, focused primarily on static analysis. The present work represents a significant advance on the problem of artifact verification, by considering a much richer and more realistic model than in previous work, incorporating core elements of IBM's successful Guard-Stage-Milestone model. In particular, the model features task hierarchy, concurrency, and richer artifact data. It also allows database key and foreign key dependencies, as well as arithmetic constraints. The results show decidability of verification and establish its complexity, making use of novel techniques including a hierarchy of Vector Addition Systems and a variant of quantifier elimination tailored to our context.Comment: Full version of the accepted PODS pape

    Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search

    Full text link
    The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution H\mathcal{H} over locality-sensitive hash functions that partition space. For a collection of nn points, after preprocessing, the query time is dominated by O(nρlogn)O(n^{\rho} \log n) evaluations of hash functions from H\mathcal{H} and O(nρ)O(n^{\rho}) hash table lookups and distance computations where ρ(0,1)\rho \in (0,1) is determined by the locality-sensitivity properties of H\mathcal{H}. It follows from a recent result by Dahlgaard et al. (FOCS 2017) that the number of locality-sensitive hash functions can be reduced to O(log2n)O(\log^2 n), leaving the query time to be dominated by O(nρ)O(n^{\rho}) distance computations and O(nρlogn)O(n^{\rho} \log n) additional word-RAM operations. We state this result as a general framework and provide a simpler analysis showing that the number of lookups and distance computations closely match the Indyk-Motwani framework, making it a viable replacement in practice. Using ideas from another locality-sensitive hashing framework by Andoni and Indyk (SODA 2006) we are able to reduce the number of additional word-RAM operations to O(nρ)O(n^\rho).Comment: 15 pages, 3 figure

    Fluctuating Hall resistance defeats the quantized Hall insulator

    Full text link
    Using the Chalker-Coddington network model as a drastically simplified, but universal model of integer quantum Hall physics, we investigate the plateau-to-insulator transition at strong magnetic field by means of a real-space renormalization approach. Our results suggest that for a fully quantum coherent situation, the quantized Hall insulator with R_H approx. h/e^2 is observed up to R_L ~25 h/e^2 when studying the most probable value of the distribution function P(R_H). Upon further increasing R_L ->\infty the Hall insulator with diverging Hall resistance R_H \propto R_L^kappa is seen. The crossover between these two regimes depends on the precise nature of the averaging procedure.Comment: major revision, discussion of averaging improved; 8 pages, 7 figures; accepted for publication in EP

    Impairment in predictive processes during auditory mismatch negativity in ScZ: evidence from event-related fields

    Get PDF
    Patients with schizophrenia (ScZ) show pronounced dysfunctions in auditory perception but the underlying mechanisms as well as the localization of the deficit remain unclear. To examine these questions, the current study examined whether alterations in the neuromagnetic mismatch negativity (MMNm) in ScZ-patients could involve an impairment in sensory predictions in local sensory and higher auditory areas. Using a whole-head MEG-approach, we investigated the MMNm as well as P300m and N100m amplitudes during a hierarchical auditory novelty paradigm in 16 medicated ScZ-patients and 16 controls. In addition, responses to omitted sounds were investigated, allowing for a critical test of the predictive coding hypothesis. Source-localization was performed to identify the generators of the MMNm, omission responses as well as the P300m. Clinical symptoms were examined with the positive and negative syndrome scale. Event-related fields (ERFs) to standard sounds were intact in ScZ-patients. However, the ScZ-group showed a reduction in the amplitude of the MMNm during both local (within trials) and global (across trials) conditions as well as an absent P300m at the global level. Importantly, responses to sound omissions were reduced in ScZ-patients which overlapped both in latency and generators with the MMNm sources. Thus, our data suggest that auditory dysfunctions in ScZ involve impaired predictive processes that involve deficits in both automatic and conscious detection of auditory regularities

    Confirmation Sampling for Exact Nearest Neighbor Search

    Get PDF
    Locality-sensitive hashing (LSH), introduced by Indyk and Motwani in STOC ’98, has been an extremely influential framework for nearest neighbor search in high-dimensional data sets. While theoretical work has focused on the approximate nearest neighbor problem, in practice LSH data structures with suitably chosen parameters are used to solve the exact nearest neighbor problem (with some error probability). Sublinear query time is often possible in practice even for exact nearest neighbor search, intuitively because the nearest neighbor tends to be significantly closer than other data points. However, theory offers little advice on how to choose LSH parameters outside of pre-specified worst-case settings. We introduce the technique of confirmation sampling for solving the exact nearest neighbor problem using LSH. First, we give a general reduction that transforms a sequence of data structures that each find the nearest neighbor with a small, unknown probability, into a data structure that returns the nearest neighbor with probability 1−δ , using as few queries as possible. Second, we present a new query algorithm for the LSH Forest data structure with L trees that is able to return the exact nearest neighbor of a query point within the same time bound as an LSH Forest of Ω(L) trees with internal parameters specifically tuned to the query and data

    The quantized Hall effect in the presence of resistance fluctuations

    Full text link
    We present an experimental study of mesoscopic, two-dimensional electronic systems at high magnetic fields. Our samples, prepared from a low-mobility InGaAs/InAlAs wafer, exhibit reproducible, sample specific, resistance fluctuations. Focusing on the lowest Landau level we find that, while the diagonal resistivity displays strong fluctuations, the Hall resistivity is free of fluctuations and remains quantized at its ν=1\nu=1 value, h/e2h/e^{2}. This is true also in the insulating phase that terminates the quantum Hall series. These results extend the validity of the semicircle law of conductivity in the quantum Hall effect to the mesoscopic regime.Comment: Includes more data, changed discussio

    Fuzzy Fibers: Uncertainty in dMRI Tractography

    Full text link
    Fiber tracking based on diffusion weighted Magnetic Resonance Imaging (dMRI) allows for noninvasive reconstruction of fiber bundles in the human brain. In this chapter, we discuss sources of error and uncertainty in this technique, and review strategies that afford a more reliable interpretation of the results. This includes methods for computing and rendering probabilistic tractograms, which estimate precision in the face of measurement noise and artifacts. However, we also address aspects that have received less attention so far, such as model selection, partial voluming, and the impact of parameters, both in preprocessing and in fiber tracking itself. We conclude by giving impulses for future research

    β-Catenin Phosphorylated at Serine 45 Is Spatially Uncoupled from β-Catenin Phosphorylated in the GSK3 Domain: Implications for Signaling

    Get PDF
    C. elegans and Drosophila generate distinct signaling and adhesive forms of β-catenin at the level of gene expression. Whether vertebrates, which rely on a single β-catenin gene, generate unique adhesive and signaling forms at the level of protein modification remains unresolved. We show that β-catenin unphosphorylated at serine 37 (S37) and threonine 41 (T41), commonly referred to as transcriptionally Active β-Catenin (ABC), is a minor nuclear-enriched monomeric form of β-catenin in SW480 cells, which express low levels of E-cadherin. Despite earlier indications, the superior signaling activity of ABC is not due to reduced cadherin binding, as ABC is readily incorporated into cadherin contacts in E-cadherin-restored cells. β-catenin phosphorylated at serine 45 (S45) or threonine 41 (T41) (T41/S45) or along the GSK3 regulatory cassette S33, S37 or T41 (S33/37/T41), however, is largely unable to associate with cadherins. β-catenin phosphorylated at T41/S45 and unphosphorylated at S37 and T41 is predominantly nuclear, while β-catenin phosphorylated at S33/37/T41 is mostly cytoplasmic, suggesting that β-catenin hypophosphorylated at S37 and T41 may be more active in transcription due to its enhanced nuclear accumulation. Evidence that phosphorylation at T41/S45 can be spatially separated from phosphorylations at S33/37/T41 suggests that these phosphorylations may not always be coupled, raising the possibility that phosphorylation at S45 serves a distinct nuclear function

    A well-separated pairs decomposition algorithm for k-d trees implemented on multi-core architectures

    Get PDF
    Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.Variations of k-d trees represent a fundamental data structure used in Computational Geometry with numerous applications in science. For example particle track tting in the software of the LHC experiments, and in simulations of N-body systems in the study of dynamics of interacting galaxies, particle beam physics, and molecular dynamics in biochemistry. The many-body tree methods devised by Barnes and Hutt in the 1980s and the Fast Multipole Method introduced in 1987 by Greengard and Rokhlin use variants of k-d trees to reduce the computation time upper bounds to O(n log n) and even O(n) from O(n2). We present an algorithm that uses the principle of well-separated pairs decomposition to always produce compressed trees in O(n log n) work. We present and evaluate parallel implementations for the algorithm that can take advantage of multi-core architectures.The Science and Technology Facilities Council, UK

    Deterministic Sampling and Range Counting in Geometric Data Streams

    Get PDF
    We present memory-efficient deterministic algorithms for constructing epsilon-nets and epsilon-approximations of streams of geometric data. Unlike probabilistic approaches, these deterministic samples provide guaranteed bounds on their approximation factors. We show how our deterministic samples can be used to answer approximate online iceberg geometric queries on data streams. We use these techniques to approximate several robust statistics of geometric data streams, including Tukey depth, simplicial depth, regression depth, the Thiel-Sen estimator, and the least median of squares. Our algorithms use only a polylogarithmic amount of memory, provided the desired approximation factors are inverse-polylogarithmic. We also include a lower bound for non-iceberg geometric queries.Comment: 12 pages, 1 figur
    corecore