416 research outputs found

    Normal edge-colorings of cubic graphs

    Get PDF
    A normal kk-edge-coloring of a cubic graph is an edge-coloring with kk colors having the additional property that when looking at the set of colors assigned to any edge ee and the four edges adjacent it, we have either exactly five distinct colors or exactly three distinct colors. We denote by χN(G)\chi'_{N}(G) the smallest kk, for which GG admits a normal kk-edge-coloring. Normal kk-edge-colorings were introduced by Jaeger in order to study his well-known Petersen Coloring Conjecture. More precisely, it is known that proving χN(G)5\chi'_{N}(G)\leq 5 for every bridgeless cubic graph is equivalent to proving Petersen Coloring Conjecture and then, among others, Cycle Double Cover Conjecture and Berge-Fulkerson Conjecture. Considering the larger class of all simple cubic graphs (not necessarily bridgeless), some interesting questions naturally arise. For instance, there exist simple cubic graphs, not bridgeless, with χN(G)=7\chi'_{N}(G)=7. On the other hand, the known best general upper bound for χN(G)\chi'_{N}(G) was 99. Here, we improve it by proving that χN(G)7\chi'_{N}(G)\leq7 for any simple cubic graph GG, which is best possible. We obtain this result by proving the existence of specific no-where zero Z22\mathbb{Z}_2^2-flows in 44-edge-connected graphs.Comment: 17 pages, 6 figure

    Zynga’s FarmVille, social games, and the ethics of big data mining

    Get PDF
    The increasing necessity of engaging in social interaction through online commercial providers such as Facebook, alongside the ability of providers to extract, aggregate, analyse, and commercialise the data and metadata such activities produce, have attracted considerable attention amongst the media and academic commentators alike. While much of the attention has been focused on the data mining of social networking services such as Facebook, it is equally important to recognise the widespread adoption of large-scale data mining practices in a number of realms, including social games such as the well-known FarmVille and its sequels, created by Zynga. The implicit contract that the public who use these services necessarily engage in requires them to trade information about their friends, their likes, their desires, and their consumption habits in return for their participation in the service. This paper will critically explore the realm of social games utilising Zynga as a central example, with a view to examine the practices, politics, and ethics of data mining and the inherent social media contradiction. In determining whether this contradiction is accidental or purposeful, this paper will ask, in effect, whether Zynga and other big data miners behind social games are entrepreneurial heroes, more sinister FarmVillains, or whether it is possible at all to draw a line between the two? In doing so, Zynga’s data mining approach and philosophy provide an important indicator about the broader integration of data analytics into a range of everyday activities

    Orbital photogalvanic effects in quantum-confined structures

    Full text link
    We report on the circular and linear photogalvanic effects caused by free-carrier absorption of terahertz radiation in electron channels on (001)-oriented and miscut silicon surfaces. The photocurrent behavior upon variation of the radiation polarization state, wavelength, gate voltage and temperature is studied. We present the microscopical and phenomenological theory of the photogalvanic effects, which describes well the experimental results. In particular, it is demonstrated that the circular (photon-helicity sensitive) photocurrent in silicon-based structures is of pure orbital nature originating from the quantum interference of different pathways contributing to the absorption of monochromatic radiation.Comment: 8 pages, 5 figures, two culumne

    Gab2 deficiency prevents Flt3-ITD driven acute myeloid leukemia in vivo

    Get PDF
    Internal tandem duplications (ITD) of the FMS-like tyrosine kinase 3 (FLT3) predict poor prognosis in acute myeloid leukemia (AML) and often co-exist with inactivating DNMT3A mutations. In vitro studies implicated Grb2-associated binder 2 (GAB2) as FLT3-ITD effector. Utilizing a Flt3-ITD knock-in, Dnmt3a haploinsufficient mouse model, we demonstrate that Gab2 is essential for the development of Flt3-ITD driven AML in vivo, as Gab2 deficient mice displayed prolonged survival, presented with attenuated liver and spleen pathology and reduced blast counts. Furthermore, leukemic bone marrow from Gab2 deficient mice exhibited reduced colony-forming unit capacity and increased FLT3 inhibitor sensitivity. Using transcriptomics, we identify the genes encoding for Axl and the Ret co-receptor Gfra2 as targets of the Flt3-ITD/Gab2/Stat5 axis. We propose a pathomechanism in which Gab2 increases signaling of these receptors by inducing their expression and by serving as downstream effector. Thereby, Gab2 promotes AML aggressiveness and drug resistance as it incorporates these receptor tyrosine kinases into the Flt3-ITD signaling network. Consequently, our data identify GAB2 as a promising biomarker and therapeutic target in human AML

    Catching the flu: Syndromic surveillance, algorithmic governmentality and global health security

    Get PDF
    How do algorithms shape the imaginary and practice of security? Does their proliferation point to a shift in the political rationality of security? If so, what is the nature and extent of that shift? This article explores these questions in relation to global health security. Prompted by an epidemic of new infectious disease outbreaks – from HIV, SARS and pandemic flu, through to MERS and Ebola – many governments are making health security an integral part of their national security strategies. Algorithms are central to these developments because they underpin a number of nextgeneration syndromic surveillance systems now routinely used by governments and international organizations to rapidly detect new outbreaks globally. This article traces the origins, design and evolution of three such internet-based surveillance systems: 1) the Program for Monitoring Emerging Diseases, 2) the Global Public Health Intelligence Network, and 3) HealthMap. The article shows how the successive introduction of those three syndromic surveillance systems has propelled algorithmic technologies into the heart of global outbreak detection. This growing recourse to algorithms for the purposes of strengthening global health security, the article argues, signals a significant shift in the underlying problem, nature, and role of knowledge in contemporary security practices

    Learning and Matching Multi-View Descriptors for Registration of Point Clouds

    Full text link
    Critical to the registration of point clouds is the establishment of a set of accurate correspondences between points in 3D space. The correspondence problem is generally addressed by the design of discriminative 3D local descriptors on the one hand, and the development of robust matching strategies on the other hand. In this work, we first propose a multi-view local descriptor, which is learned from the images of multiple views, for the description of 3D keypoints. Then, we develop a robust matching approach, aiming at rejecting outlier matches based on the efficient inference via belief propagation on the defined graphical model. We have demonstrated the boost of our approaches to registration on the public scanning and multi-view stereo datasets. The superior performance has been verified by the intensive comparisons against a variety of descriptors and matching methods

    Direct Image to Point Cloud Descriptors Matching for 6-DOF Camera Localization in Dense 3D Point Cloud

    Full text link
    We propose a novel concept to directly match feature descriptors extracted from RGB images, with feature descriptors extracted from 3D point clouds. We use this concept to localize the position and orientation (pose) of the camera of a query image in dense point clouds. We generate a dataset of matching 2D and 3D descriptors, and use it to train a proposed Descriptor-Matcher algorithm. To localize a query image in a point cloud, we extract 2D keypoints and descriptors from the query image. Then the Descriptor-Matcher is used to find the corresponding pairs 2D and 3D keypoints by matching the 2D descriptors with the pre-extracted 3D descriptors of the point cloud. This information is used in a robust pose estimation algorithm to localize the query image in the 3D point cloud. Experiments demonstrate that directly matching 2D and 3D descriptors is not only a viable idea but also achieves competitive accuracy compared to other state-of-the-art approaches for camera pose localization

    The future of social is personal: the potential of the personal data store

    No full text
    This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges
    corecore