140 research outputs found

    The Non-linear Dynamics of Meaning-Processing in Social Systems

    Full text link
    Social order cannot be considered as a stable phenomenon because it contains an order of reproduced expectations. When the expectations operate upon one another, they generate a non-linear dynamics that processes meaning. Specific meaning can be stabilized, for example, in social institutions, but all meaning arises from a horizon of possible meanings. Using Luhmann's (1984) social systems theory and Rosen's (1985) theory of anticipatory systems, I submit equations for modeling the processing of meaning in inter-human communication. First, a self-referential system can use a model of itself for the anticipation. Under the condition of functional differentiation, the social system can be expected to entertain a set of models; each model can also contain a model of the other models. Two anticipatory mechanisms are then possible: one transversal between the models, and a longitudinal one providing the modeled systems with meaning from the perspective of hindsight. A system containing two anticipatory mechanisms can become hyper-incursive. Without making decisions, however, a hyper-incursive system would be overloaded with uncertainty. Under this pressure, informed decisions tend to replace the "natural preferences" of agents and an order of cultural expectations can increasingly be shaped

    Uncovering Algebraic Structures in the MPC Landscape

    Get PDF
    A fundamental problem in the theory of secure multi-party computation (MPC) is to characterize functions with more than 2 parties which admit MPC protocols with information-theoretic security against passive corruption. This question has seen little progress since the work of Chor and Ishai (1996), which demonstrated difficulties in resolving it. In this work, we make significant progress towards resolving this question in the important case of aggregating functionalities, in which m parties P1, . . . , Pm hold inputs x1, . . . , xm and an aggregating party P0 must learn f(x1,...,xm). We uncover a rich class of algebraic structures that are closely related to secure computability, namely, “Commuting Permutations Systems” (CPS) and its variants. We present an extensive set of results relating these algebraic structures among themselves and to MPC, including new protocols, impossibility results and separations. Our results include a necessary algebraic condition and slightly stronger sufficient algebraic condition for a function to admit information-theoretically secure MPC protocols. We also introduce and study new models of minimally interactive MPC (called UNIMPC and UNIMPC*), which not only help in understanding our positive and negative results better, but also open up new avenues for studying the cryptographic complexity landscape of multi-party functionalities. Our positive results include novel protocols in these models, which may be of independent practical interest. Finally, we extend our results to a definition that requires UC security as well as semi-honest security (which we term strong security). In this model we are able to carry out the characterization of all computable functions, except for a gap in the case of aggregating functionalities

    Expression of AXL receptor tyrosine kinase relates to monocyte dysfunction and severity of cirrhosis

    Get PDF
    Infectious complications in patients with cirrhosis frequently initiate episodes of decompensation and substantially contribute to the high mortality. Mechanisms of the underlying immuneparesis remain underexplored. TAM receptors (TYRO3/AXL/MERTK) are important inhibitors of innate immune responses. To understand the pathophysiology of immuneparesis in cirrhosis, we detailed TAM receptor expression in relation to monocyte function and disease severity prior to the onset of acute decompensation. TNF-α/IL-6 responses to lipopolysaccharide were attenuated in monocytes from patients with cirrhosis (n = 96) compared with controls (n = 27) and decreased in parallel with disease severity. Concurrently, an AXL-expressing (AXL+) monocyte population expanded. AXL+ cells (CD14+CD16highHLA-DRhigh) were characterised by attenuated TNF-α/IL-6 responses and T cell activation but enhanced efferocytosis and preserved phagocytosis of Escherichia coli. Their expansion correlated with disease severity, complications, infection, and 1-yr mortality. AXL+ monocytes were generated in response to microbial products and efferocytosis in vitro. AXL kinase inhibition and down-regulation reversed attenuated monocyte inflammatory responses in cirrhosis ex vivo. AXL may thus serve as prognostic marker and deserves evaluation as immunotherapeutic target in cirrhosis

    Exploring the Limits of Common Coins Using Frontier Analysis of Protocols

    Get PDF
    In 2-party secure computation, access to common, trusted randomness is a fundamental primitive. It is widely employed in the setting of computationally bounded players (under various complexity assumptions) to great advantage. In this work we seek to understand the power of trusted randomness, primarily in the computationally unbounded (or information theoretic) setting. We show that a source of common randomness does not add any additional power for secure evaluation of deterministic functions, even when one of the parties has arbitrary influence over the distribution of the common randomness. Further, common randomness helps only in a trivial sense for realizing randomized functions too (namely, it only allows for sampling from publicly fixed distributions), if UC security is required. To obtain these impossibility results, we employ a recently developed protocol analysis technique, which we call the {\em frontier analysis}. This involves analyzing carefully defined ``frontiers\u27\u27 in a weighted tree induced by the protocol\u27s execution (or executions, with various inputs), and establishing various properties regarding one or more such frontiers. We demonstrate the versatility of this technique by employing carefully chosen frontiers to derive the different results. To analyze randomized functionalities we introduce a frontier argument that involves a geometric analysis of the space of probability distributions. Finally, we relate our results to computational intractability questions. We give an equivalent formulation of the ``cryptomania assumption\u27\u27 (that there is a semi-honest or standalone secure oblivious transfer protocol) in terms of UC-secure reduction among randomized functionalities. Also, we provide an {\em unconditional result} on the uselessness of common randomness, even in the computationally bounded setting. Our results make significant progress towards understanding the exact power of shared randomness in cryptography. To the best of our knowledge, our results are the first to comprehensively characterize the power of large classes of randomized functionalities

    Sociological and Communication-Theoretical Perspectives on the Commercialization of the Sciences

    Get PDF
    Both self-organization and organization are important for the further development of the sciences: the two dynamics condition and enable each other. Commercial and public considerations can interact and "interpenetrate" in historical organization; different codes of communication are then "recombined." However, self-organization in the symbolically generalized codes of communication can be expected to operate at the global level. The Triple Helix model allows for both a neo-institutional appreciation in terms of historical networks of university-industry-government relations and a neo-evolutionary interpretation in terms of three functions: (i) novelty production, (i) wealth generation, and (iii) political control. Using this model, one can appreciate both subdynamics. The mutual information in three dimensions enables us to measure the trade-off between organization and self-organization as a possible synergy. The question of optimization between commercial and public interests in the different sciences can thus be made empirical.Comment: Science & Education (forthcoming

    Athlete brand construction: A perspective based on fans’ perceptions

    Get PDF
    Abstract The purpose of this study was to develop a framework for understanding the antecedents and components of athlete brand. Based on a set of 21 interviews conducted in three different countries, a detailed framework is proposed including five antecedents and two components of athlete brand. The antecedents are media (social media, mass media, video games and major sport events), oral communications (word of mouth, and rumors and narratives), impression management, social agents (parents, family members, friends and community), and teams and sport (sport interest, team interest and team geographical location). In turn, the components of athlete brand are related with on-field attributes (behavior, team, achievements, style of play and skills) and off-field attributes (physical attraction, lifestyle, personal appeal, ethnicity and entertainment). Complementarily, these components of athlete brand are proposed to have an impact on fans' loyalty towards the athlete. Implications of these findings for building and managing athlete brand are discussed, and directions for future studies are provided

    Plasticity of the β-Trefoil Protein Fold in the Recognition and Control of Invertebrate Predators and Parasites by a Fungal Defence System

    Get PDF
    Discrimination between self and non-self is a prerequisite for any defence mechanism; in innate defence, this discrimination is often mediated by lectins recognizing non-self carbohydrate structures and so relies on an arsenal of host lectins with different specificities towards target organism carbohydrate structures. Recently, cytoplasmic lectins isolated from fungal fruiting bodies have been shown to play a role in the defence of multicellular fungi against predators and parasites. Here, we present a novel fruiting body lectin, CCL2, from the ink cap mushroom Coprinopsis cinerea. We demonstrate the toxicity of the lectin towards Caenorhabditis elegans and Drosophila melanogaster and present its NMR solution structure in complex with the trisaccharide, GlcNAcβ1,4[Fucα1,3]GlcNAc, to which it binds with high specificity and affinity in vitro. The structure reveals that the monomeric CCL2 adopts a β-trefoil fold and recognizes the trisaccharide by a single, topologically novel carbohydrate-binding site. Site-directed mutagenesis of CCL2 and identification of C. elegans mutants resistant to this lectin show that its nematotoxicity is mediated by binding to α1,3-fucosylated N-glycan core structures of nematode glycoproteins; feeding with fluorescently labeled CCL2 demonstrates that these target glycoproteins localize to the C. elegans intestine. Since the identified glycoepitope is characteristic for invertebrates but absent from fungi, our data show that the defence function of fruiting body lectins is based on the specific recognition of non-self carbohydrate structures. The trisaccharide specifically recognized by CCL2 is a key carbohydrate determinant of pollen and insect venom allergens implying this particular glycoepitope is targeted by both fungal defence and mammalian immune systems. In summary, our results demonstrate how the plasticity of a common protein fold can contribute to the recognition and control of antagonists by an innate defence mechanism, whereby the monovalency of the lectin for its ligand implies a novel mechanism of lectin-mediated toxicity

    Lessons on fruiting body morphogenesis from genomes and transcriptomes of Agaricomycetes.

    Get PDF
    Fruiting bodies (sporocarps, sporophores or basidiomata) of mushroom-forming fungi ( Agaricomycetes) are among the most complex structures produced by fungi. Unlike vegetative hyphae, fruiting bodies grow determinately and follow a genetically encoded developmental program that orchestrates their growth, tissue differentiation and sexual sporulation. In spite of more than a century of research, our understanding of the molecular details of fruiting body morphogenesis is still limited and a general synthesis on the genetics of this complex process is lacking. In this paper, we aim at a comprehensive identification of conserved genes related to fruiting body morphogenesis and distil novel functional hypotheses for functionally poorly characterised ones. As a result of this analysis, we report 921 conserved developmentally expressed gene families, only a few dozens of which have previously been reported to be involved in fruiting body development. Based on literature data, conserved expression patterns and functional annotations, we provide hypotheses on the potential role of these gene families in fruiting body development, yielding the most complete description of molecular processes in fruiting body morphogenesis to date. We discuss genes related to the initiation of fruiting, differentiation, growth, cell surface and cell wall, defence, transcriptional regulation as well as signal transduction. Based on these data we derive a general model of fruiting body development, which includes an early, proliferative phase that is mostly concerned with laying out the mushroom body plan (via cell division and differentiation), and a second phase of growth via cell expansion as well as meiotic events and sporulation. Altogether, our discussions cover 1 480 genes of Coprinopsis cinerea, and their orthologs in Agaricus bisporus, Cyclocybe aegerita, Armillaria ostoyae, Auriculariopsis ampla, Laccaria bicolor, Lentinula edodes, Lentinus tigrinus, Mycena kentingensis, Phanerochaete chrysosporium, Pleurotus ostreatus, and Schizophyllum commune, providing functional hypotheses for ~10 % of genes in the genomes of these species. Although experimental evidence for the role of these genes will need to be established in the future, our data provide a roadmap for guiding functional analyses of fruiting related genes in the Agaricomycetes. We anticipate that the gene compendium presented here, combined with developments in functional genomics approaches will contribute to uncovering the genetic bases of one of the most spectacular multicellular developmental processes in fungi. Citation: Nagy LG, Vonk PJ, Künzler M, Földi C, Virágh M, Ohm RA, Hennicke F, Bálint B, Csernetics Á, Hegedüs B, Hou Z, Liu XB, Nan S, M. Pareek M, Sahu N, Szathmári B, Varga T, Wu W, Yang X, Merényi Z (2023). Lessons on fruiting body morphogenesis from genomes and transcriptomes of Agaricomycetes. Studies in Mycology 104: 1-85. doi: 10.3114/sim.2022.104.01

    Silencing of Vlaro2 for chorismate synthase revealed that the phytopathogen Verticillium longisporum induces the cross-pathway control in the xylem

    Get PDF
    The first leaky auxotrophic mutant for aromatic amino acids of the near-diploid fungal plant pathogen Verticillium longisporum (VL) has been generated. VL enters its host Brassica napus through the roots and colonizes the xylem vessels. The xylem contains little nutrients including low concentrations of amino acids. We isolated the gene Vlaro2 encoding chorismate synthase by complementation of the corresponding yeast mutant strain. Chorismate synthase produces the first branch point intermediate of aromatic amino acid biosynthesis. A novel RNA-mediated gene silencing method reduced gene expression of both isogenes by 80% and resulted in a bradytrophic mutant, which is a leaky auxotroph due to impaired expression of chorismate synthase. In contrast to the wild type, silencing resulted in increased expression of the cross-pathway regulatory gene VlcpcA (similar to cpcA/GCN4) during saprotrophic life. The mutant fungus is still able to infect the host plant B. napus and the model Arabidopsis thaliana with reduced efficiency. VlcpcA expression is increased in planta in the mutant and the wild-type fungus. We assume that xylem colonization requires induction of the cross-pathway control, presumably because the fungus has to overcome imbalanced amino acid supply in the xylem
    corecore