191 research outputs found

    Studying the Longest ‘Legal’ U.S. Same-Sex Couples: A Case of Lessons Learned

    Get PDF
    We review methodological opportunities and lessons learned in conducting a longitudinal, prospective study of same-sex couples with civil unions, recruited from a population-based sample, who were compared with same-sex couples in their friendship circle who did not have civil unions, and heterosexual married siblings and their spouse. At Time 1 (2002), Vermont was the only US state to provide legal recognition similar to marriage to same-sex couples; couples came from other US states and other countries to obtain a civil union. At Time 2 (2005), only one US state had legalized same-sex marriage, and at Time 3 (2013) about half of US states had legalized same-sex marriage, some within weeks of the onset of the Time 3 study. Opportunities included sampling legalized same-sex relationships from a population; the use of heterosexual married couples and same-sex couples not in legalized relationships as comparison samples from within the same social network; comparisons between sexual minority and heterosexual women and men with and without children; improvements in statistical methods for non-independence of data and missing data; and the use of mixed methodologies. Lessons learned included obtaining funding, locating participants over time as technologies changed, and on-going shifts in marriage laws during the study

    Integer programming methods for special college admissions problems

    Get PDF
    We develop Integer Programming (IP) solutions for some special college admission problems arising from the Hungarian higher education admission scheme. We focus on four special features, namely the solution concept of stable score-limits, the presence of lower and common quotas, and paired applications. We note that each of the latter three special feature makes the college admissions problem NP-hard to solve. Currently, a heuristic based on the Gale-Shapley algorithm is being used in the application. The IP methods that we propose are not only interesting theoretically, but may also serve as an alternative solution concept for this practical application, and also for other ones

    Asexuality: Classification and characterization

    Get PDF
    This is a post-print version of the article. The official published version can be obtaineed at the link below.The term “asexual” has been defined in many different ways and asexuality has received very little research attention. In a small qualitative study (N = 4), individuals who self-identified as asexual were interviewed to help formulate hypotheses for a larger study. The second larger study was an online survey drawn from a convenience sample designed to better characterize asexuality and to test predictors of asexual identity. A convenience sample of 1,146 individuals (N = 41 self-identified asexual) completed online questionnaires assessing sexual history, sexual inhibition and excitation, sexual desire, and an open-response questionnaire concerning asexual identity. Asexuals reported significantly less desire for sex with a partner, lower sexual arousability, and lower sexual excitation but did not differ consistently from non-asexuals in their sexual inhibition scores or their desire to masturbate. Content analyses supported the idea that low sexual desire is the primary feature predicting asexual identity

    Bounded-Collusion IBE from Key Homomorphism

    Get PDF
    In this work, we show how to construct IBE schemes that are secure against a bounded number of collusions, starting with underlying PKE schemes which possess linear homomorphisms over their keys. In particular, this enables us to exhibit a new (bounded-collusion) IBE construction based on the quadratic residuosity assumption, without any need to assume the existence of random oracles. The new IBE’s public parameters are of size O(tλlogI) where I is the total number of identities which can be supported by the system, t is the number of collusions which the system is secure against, and λ is a security parameter. While the number of collusions is bounded, we note that an exponential number of total identities can be supported. More generally, we give a transformation that takes any PKE satisfying Linear Key Homomorphism, Identity Map Compatibility, and the Linear Hash Proof Property and translates it into an IBE secure against bounded collusions. We demonstrate that these properties are more general than our quadratic residuosity-based scheme by showing how a simple PKE based on the DDH assumption also satisfies these properties.National Science Foundation (U.S.) (NSF CCF-0729011)National Science Foundation (U.S.) (NSF CCF-1018064)United States. Defense Advanced Research Projects Agency (DARPA FA8750-11-2-0225

    On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes

    Get PDF
    Abstract. We propose generic constructions of public-key encryption schemes, satisfying key- dependent message (KDM) security for projections and different forms of key-leakage resilience, from CPA-secure private key encryption schemes with two main abstract properties: (1) additive homomorphism with respect to both messages and randomness, and (2) reproducibility, providing a means for reusing encryption randomness across independent secret keys. More precisely, our construction transforms a private-key scheme with the stated properties (and one more mild condition) into a public-key one, providing: - n-KDM-projection security, an extension of circular security, where the adversary may also ask for encryptions of negated secret key bits; – a (1-o(1)) resilience rate in the bounded-memory leakage model of Akavia et al. (TCC 2009); and – Auxiliary-input security against subexponentially-hard functions. We introduce homomorphic weak pseudorandom functions, a homomorphic version of the weak PRFs proposed by Naor and Reingold (FOCS ’95) and use them to realize our base encryption scheme. We obtain homomorphic weak PRFs under assumptions including subgroup indistinguishability (implied, in particular, by QR and DCR) and homomorphic hash-proof systems (HHPS). As corollaries of our results, we obtain (1) a projection-secure encryption scheme (as well as a scheme with a (1-o(1)) resilience rate) based solely on the HHPS assumption, and (2) a unifying approach explaining the results of Boneh et al (CRYPTO ’08) and Brakerski and Goldwasser (CRYPTO ’10). Finally, by observing that Applebaum’s KDM amplification method (EUROCRYPT ’11) preserves both types of leakage resilience, we obtain schemes providing at the same time high leakage resilience and KDM security against any fixed polynomial-sized circuit family

    Graded structure in sexual definitions: categorizations of having “had sex” and virginity loss among homosexual and heterosexual men and women

    Get PDF
    Definitions of sexual behavior display a robust hierarchy of agreement regarding whether or not acts should be classed as, for example, sex or virginity loss. The current research offers a theoretical explanation for this hierarchy, proposing that sexual definitions display graded categorical structure, arising from goodness of membership judgments. Moderation of this graded structure is also predicted, with the focus here on how sexual orientation identity affects sexual definitions. A total of 300 18- to 30-year-old participants completed an online survey, rating 18 behaviors for how far each constitutes having “had sex” and virginity loss. Participants fell into one of four groups: heterosexual male or female, gay male or lesbian. The predicted ratings hierarchy emerged, in which bidirectional genital acts were rated significantly higher than unidirectional or nonpenetrative contact, which was in turn rated significantly higher than acts involving no genital contact. Moderation of graded structure was also in line with predictions. Compared to the other groups, the lesbian group significantly upgraded ratings of genital contact that was either unidirectional or nonpenetrative. There was also evidence of upgrading by the gay male sample of anal intercourse ratings. These effects are theorized to reflect group-level variation in experience, contextual perspective, and identity-management. The implications of the findings in relation to previous research are discussed. It is suggested that a graded structure approach can greatly benefit future research into sexual definitions, by permitting variable definitions to be predicted and explained, rather than merely identified

    Single parenting: Interventions in the transitional stage

    Full text link
    Following divorce or separation, many mother-headed families need to mourn losses, including reduced economic resources. They need to reestablish family rituals, confront such issues as time management and structural changes that can result in scapegoating or over-reliance on a parental child. Normalizing difficulties associated with parenting is important because single parents tend to internalize societal attribution of family difficulties to inadequate family structure rather than developmental stages, limited economic resources, and negative expectations about the capacity of women to head families.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/44289/1/10591_2004_Article_BF00891869.pd

    Cell cycle and growth stimuli regulate different steps of RNA polymerase I transcription

    Get PDF
    Transcription of the ribosomal RNA genes (rDNA) by RNA polymerase I (Pol I) is a major control step for ribosome synthesis and is tightly linked to cellular growth. However, the question of whether this process is modulated primarily at the level of transcription initiation or elongation is controversial. Studies in markedly different cell types have identified either initiation or elongation as the major control point. In this study, we have re-examined this question in NIH3T3 fibroblasts using a combination of metabolic labeling of the 47S rRNA, chromatin immunoprecipitation analysis of Pol I and overexpression of the transcription initiation factor Rrn3. Acute manipulation of growth factor levels altered rRNA synthesis rates over 8-fold without changing Pol I loading onto the rDNA. In fact, robust changes in Pol I loading were only observed under conditions where inhibition of rDNA transcription was associated with chronic serum starvation or cell cycle arrest. Overexpression of the transcription initiation factor Rrn3 increased loading of Pol I on the rDNA but failed to enhance rRNA synthesis in either serum starved, serum treated or G0/G1 arrested cells. Together these data suggest that transcription elongation is rate limiting for rRNA synthesis. We propose that transcription initiation is required for rDNA transcription in response to cell cycle cues, whereas elongation controls the dynamic range of rRNA synthesis output in response to acute growth factor modulation

    Circular Security Is Complete for KDM Security

    Get PDF
    Circular security is the most elementary form of key-dependent message (KDM) security, which allows us to securely encrypt only a copy of secret key bits. In this work, we show that circular security is complete for KDM security in the sense that an encryption scheme satisfying this security notion can be transformed into one satisfying KDM security with respect to all functions computable by a-priori bounded-size circuits (bounded-KDM security). This result holds in the presence of any number of keys and in any of secret-key/public-key and CPA/CCA settings. Such a completeness result was previously shown by Applebaum (EUROCRYPT 2011) for KDM security with respect to projection functions (projection-KDM security) that allows us to securely encrypt both a copy and a negation of secret key bits. Besides amplifying the strength of KDM security, our transformation in fact can start from an encryption scheme satisfying circular security against CPA attacks and results in one satisfying bounded-KDM security against CCA attacks. This result improves the recent result by Kitagawa and Matsuda (TCC 2019) showing a CPA-to-CCA transformation for KDM secure public-key encryption schemes

    Apocalyptic public health: exploring discourses of fatness in childhood ‘obesity’ policy

    Get PDF
    Recent‘ obesity’ preventions focus heavily on children, widely regarded as the future of society. The National Child Measurement Programme (NCMP) is a flagship government programme in England that annually measures the Body Mass Index (BMI) of children in Reception (aged 4–5) and Year 6 (aged 10 –11) in order to identify ‘at risk’ children and offer advice to parents. Using Foucauldian discourse analysis this study explore show discourses within the programme construct fatness. The NCMP materials contain three key interrelated themes (concerning the hidden threat of ‘obesity’, the burden of ‘obesity’, and bodies that pose a greater risk) that combine to construct a ‘grotesque discourse’ of apocalyptic public health. ‘Obesity’ is constructed as a social and economic catastrophe where certain bodies pose a greater threat than others. We argue that this discourse has the potential to change health service policy in markedly regressive ways that will disproportionately impact working-class, Black, Asian, and mixed race families
    corecore