80 research outputs found

    Comparison of methods to determine point-to-point resistance in nearly rectangular networks with application to a ‘hammock’ network

    Get PDF
    Considerable progress has recently been made in the development of techniques to exactly determine two-point resistances in networks of various topologies. In particular, two types of method have emerged. One is based on potentials and the evaluation of eigenvalues and eigenvectors of the Laplacian matrix associated with the network or its minors. The second method is based on a recurrence relation associated with the distribution of currents in the network. Here, these methods are compared and used to determine the resistance distances between any two nodes of a network with topology of a hammock

    Effective p-value computations using Finite Markov Chain Imbedding (FMCI): application to local score and to pattern statistics

    Get PDF
    The technique of Finite Markov Chain Imbedding (FMCI) is a classical approach to complex combinatorial problems related to sequences. In order to get efficient algorithms, it is known that such approaches need to be first rewritten using recursive relations. We propose here to give here a general recursive algorithms allowing to compute in a numerically stable manner exact Cumulative Distribution Function (CDF) or complementary CDF (CCDF). These algorithms are then applied in two particular cases: the local score of one sequence and pattern statistics. In both cases, asymptotic developments are derived. For the local score, our new approach allows for the very first time to compute exact p-values for a practical study (finding hydrophobic segments in a protein database) where only approximations were available before. In this study, the asymptotic approximations appear to be completely unreliable for 99.5% of the considered sequences. Concerning the pattern statistics, the new FMCI algorithms dramatically outperform the previous ones as they are more reliable, easier to implement, faster and with lower memory requirements

    A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals

    Get PDF
    Solving linear systems of equations is a universal problem. In the context of secure multiparty computation (MPC), a method to solve such systems, especially for the case in which the rank of the system is unknown and should remain private, is an important building block. We devise an efficient and data-oblivious algorithm (meaning that the algorithm\u27s execution time and branching behavior are independent of all secrets) for solving a bounded integral linear system of unknown rank over the rational numbers via the Moore-Penrose pseudoinverse, using finite-field arithmetic. I.e., we compute the Moore-Penrose inverse over a finite field of sufficiently large order, so that we can recover the rational solution from the solution over the finite field. While we have designed the algorithm with an MPC context in mind, it could be valuable also in other contexts where data-obliviousness is required, like secure enclaves in CPUs. Previous work by Cramer, Kiltz and Padró (CRYPTO 2007) proposes a constant-rounds protocol for computing the Moore-Penrose pseudoinverse over a finite field. The asymptotic complexity (counted as the number of secure multiplications) of their solution is O(m4+n2m)O(m^4 + n^2 m), where mm and nn, m≤nm\leq n, are the dimensions of the linear system. To reduce the number of secure multiplications, we sacrifice the constant-rounds property and propose a protocol for computing the Moore-Penrose pseudoinverse over the rational numbers in a linear number of rounds, requiring only O(m2n)O(m^2n) secure multiplications. To obtain the common denominator of the pseudoinverse, required for constructing an integer-representation of the pseudoinverse, we generalize a result by Ben-Israel for computing the squared volume of a matrix. Also, we show how to precondition a symmetric matrix to achieve generic rank profile while preserving symmetry and being able to remove the preconditioner after it has served its purpose. These results may be of independent interest

    Balancing repair and tolerance of DNA damage caused by alkylating agents

    Get PDF
    Alkylating agents constitute a major class of frontline chemotherapeutic drugs that inflict cytotoxic DNA damage as their main mode of action, in addition to collateral mutagenic damage. Numerous cellular pathways, including direct DNA damage reversal, base excision repair (BER) and mismatch repair (MMR), respond to alkylation damage to defend against alkylation-induced cell death or mutation. However, maintaining a proper balance of activity both within and between these pathways is crucial for a favourable response of an organism to alkylating agents. Furthermore, the response of an individual to alkylating agents can vary considerably from tissue to tissue and from person to person, pointing to genetic and epigenetic mechanisms that modulate alkylating agent toxicity

    Linear Algebra and Linear Models

    No full text
    The main purpose of Linear Algebra and Linear Models is to provide a rigorous introduction to the basic aspects of the theory of linear estimation and hypothesis testing. The necessary prerequisites in matrices, multivariate normal distribution and distributions of quadratic forms are developed along the way. The book is aimed at advanced undergraduate and first-year graduate masters students taking courses in linear algebra, linear models, multivariate analysis, and design of experiments. It should also be of use to research mathematicians and statisticians as a source of standard results an

    On the adjacency matrix of a block graph

    No full text

    Distance Matrix of a Tree

    No full text
    • …
    corecore