119 research outputs found

    Group Polarization in the Team Dictator Game reconsidered

    Get PDF
    While most papers on team decision-making find teams to behave more selfish, less trusting and less altruistic than individuals, Cason and Mui (1997) report that teams are more altruistic than individuals in a dictator game. Using a within-subjects design we re-examine group polarization by letting subjects make individual as well as team decisions in an experimental dictator game. In our experiment teams are more selfish than individuals, and the most selfish team member has the strongest influence on team decisions. Various sources of the different findings in Cason and Mui (1997) and in our paper are discussed

    Social preferences, accountability, and wage bargaining

    Get PDF
    We assess the extent of preferences for employment in a collective wage bargaining situation with heterogeneous workers. We vary the size of the union and introduce a treatment mechanism transforming the voting game into an individual allocation task. Our results show that highly productive workers do not take employment of low productive workers into account when making wage proposals, regardless of whether insiders determine the wage or all workers. The level of pro-social preferences is small in the voting game, while it increases as the game is transformed into an individual allocation task. We interpret this as an accountability effect

    The Cryptic African Wolf: Canis aureus lupaster Is Not a Golden Jackal and Is Not Endemic to Egypt

    Get PDF
    The Egyptian jackal (Canis aureus lupaster) has hitherto been considered a large, rare subspecies of the golden jackal (C. aureus). It has maintained its taxonomical status to date, despite studies demonstrating morphological similarities to the grey wolf (C. lupus). We have analyzed 2055 bp of mitochondrial DNA from C. a. lupaster and investigated the similarity to C. aureus and C. lupus. Through phylogenetic comparison with all wild wolf-like canids (based on 726 bp of the Cytochrome b gene) we conclusively (100% bootstrap support) place the Egyptian jackal within the grey wolf species complex, together with the Holarctic wolf, the Indian wolf and the Himalayan wolf. Like the two latter taxa, C. a. lupaster seems to represent an ancient wolf lineage which most likely colonized Africa prior to the northern hemisphere radiation. We thus refer to C. a. lupaster as the African wolf. Furthermore, we have detected C. a. lupaster individuals at two localities in the Ethiopian highlands, extending the distribution by at least 2,500 km southeast. The only grey wolf species to inhabit the African continent is a cryptic species for which the conservation status urgently needs assessment

    Lineage diversification and historical demography of a montane bird Garrulax elliotii - implications for the Pleistocene evolutionary history of the eastern Himalayas

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Pleistocene climate fluctuations have shaped the patterns of genetic diversity observed in many extant species. In montane habitats, species' ranges may have expanded and contracted along an altitudinal gradient in response to environmental fluctuations leading to alternating periods of genetic isolation and connectivity. Because species' responses to climate change are influenced by interactions between species-specific characteristics and local topography, diversification pattern differs between species and locations. The eastern Himalayas is one of the world's most prominent mountain ranges. Its complex topography and environmental heterogeneity present an ideal system in which to study how climatic changes during Pleistocene have influenced species distributions, genetic diversification, and demography. The Elliot's laughing thrush (<it>Garrulax elliotii</it>) is largely restricted to high-elevation shrublands in eastern Himalayas. We used mitochondrial DNA and microsatellites to investigate how genetic diversity in this species was affected by Pleistocene glaciations.</p> <p>Results</p> <p>Mitochondrial data detected two partially sympatric north-eastern and southern lineages. Microsatellite data, however, identified three distinct lineages congruent with the geographically separated southern, northern and eastern eco-subregions of the eastern Himalayas. Geographic breaks occur in steep mountains and deep valleys of the Kangding-Muli-Baoxin Divide. Divergence time estimates and coalescent simulations indicate that lineage diversification occurred on two different geographic and temporal scales; recent divergence, associated with geographic isolation into individual subregions, and historical divergence, associated with displacement into multiple refugia. Despite long-term isolation, genetic admixture among these subregional populations was observed, indicating historic periods of connectivity. The demographic history of <it>Garrulax elliotii </it>shows continuous population growth since late Pleistocene (about 0.125 mya).</p> <p>Conclusion</p> <p>While altitude-associated isolation is typical of many species in other montane regions, our results suggest that eco-subregions in the eastern Himalayas exhibiting island-like characteristics appear to have determined the diversification of <it>Garrulax elliotii</it>. During the Pleistocene, these populations became isolated on subregions during interglacial periods but were connected when these expanded to low altitude during cooler periods. The resultant genetic admixture of lineages might obscure pattern of genetic variation. Our results provide new insights into sky island diversification in a previously unstudied region, and further demonstrate that Pleistocene climatic changes can have profound effects on lineage diversification and demography in montane species.</p

    Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation

    Get PDF
    In this work, we develop a framework for building leakage-resilient cryptosystems in the bounded leakage model from puncturable primitives and indistinguishability obfuscation (iOi\mathcal{O}). The major insight of our work is that various types of puncturable pseudorandom functions (PRFs) can achieve leakage resilience on an obfuscated street. First, we build leakage-resilient weak PRFs from weak puncturable PRFs and iOi\mathcal{O}, which readily imply leakage-resilient secret-key encryption. Second, we build leakage-resilient publicly evaluable PRFs (PEPRFs) from puncturable PEPRFs and iOi\mathcal{O}, which readily imply leakage-resilient key encapsulation mechanism and thus public-key encryption. As a building block of independent interest, we realize puncturable PEPRFs from either newly introduced puncturable objects such as puncturable trapdoor functions and puncturable extractable hash proof systems or existing puncturable PRFs with iOi\mathcal{O}. Finally, we construct the first leakage-resilient public-coin signature from selective puncturable PRFs, leakage-resilient one-way functions and iOi\mathcal{O}. This settles the open problem posed by Boyle, Segev and Wichs (Eurocrypt 2011). By further assuming the existence of lossy functions, all the above constructions achieve optimal leakage rate of 1o(1)1 - o(1). Such a leakage rate is not known to be achievable for weak PRFs, PEPRFs and public-coin signatures before

    Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model

    Get PDF
    We propose a leakage-resilient inner-product functional encryption scheme (IPFE) in the bounded-retrieval model (BRM). This is the first leakage-resilient functional encryption scheme in the BRM. In our leakage model, an adversary is allowed to obtain at most ll-bit knowledge from each secret key. And our scheme can flexibly tolerate arbitrarily leakage bound ll, by only increasing the size of secret keys, while keeping all other parts small and independent of ll. Technically, we develop a new notion: Inner-product hash proof system (IP-HPS). IP-HPS is a variant of traditional hash proof systems. Its output of decapsulation is an inner-product value, instead of the encapsulated key. We propose an IP-HPS scheme under DDH-assumption. Then we show how to make an IP-HPS scheme to tolerate l2˘7l\u27-bit leakage, and we can achieve arbitrary large l2˘7l\u27 by only increasing the size of secret keys. Finally, we show how to build a leakage-resilient IPFE in the BRM with leakage bound l=l2˘7nl=\frac{l\u27}{n} from our IP-HPS scheme

    P2 receptors in atherosclerosis and postangioplasty restenosis

    Get PDF
    Atherosclerosis is an immunoinflammatory process that involves complex interactions between the vessel wall and blood components and is thought to be initiated by endothelial dysfunction [Ross (Nature 362:801–09, 1993); Fuster et al. (N Engl J Med 326:242–50, 1992); Davies and Woolf (Br Heart J 69:S3–S11, 1993)]. Extracellular nucleotides that are released from a variety of arterial and blood cells [Di Virgilio and Solini (Br J Pharmacol 135:831–42, 2002)] can bind to P2 receptors and modulate proliferation and migration of smooth muscle cells (SMC), which are known to be involved in intimal hyperplasia that accompanies atherosclerosis and postangioplasty restenosis [Lafont et al. (Circ Res 76:996–002, 1995)]. In addition, P2 receptors mediate many other functions including platelet aggregation, leukocyte adherence, and arterial vasomotricity. A direct pathological role of P2 receptors is reinforced by recent evidence showing that upregulation and activation of P2Y2 receptors in rabbit arteries mediates intimal hyperplasia [Seye et al. (Circulation 106:2720–726, 2002)]. In addition, upregulation of functional P2Y receptors also has been demonstrated in the basilar artery of the rat double-hemorrhage model [Carpenter et al. (Stroke 32:516–22, 2001)] and in coronary artery of diabetic dyslipidemic pigs [Hill et al. (J Vasc Res 38:432–43, 2001)]. It has been proposed that upregulation of P2Y receptors may be a potential diagnostic indicator for the early stages of atherosclerosis [Elmaleh et al. (Proc Natl Acad Sci U S A 95:691–95, 1998)]. Therefore, particular effort must be made to understand the consequences of nucleotide release from cells in the cardiovascular system and the subsequent effects of P2 nucleotide receptor activation in blood vessels, which may reveal novel therapeutic strategies for atherosclerosis and restenosis after angioplasty

    Rare and low-frequency coding variants alter human adult height

    Get PDF
    Height is a highly heritable, classic polygenic trait with ~700 common associated variants identified so far through genome - wide association studies . Here , we report 83 height - associated coding variants with lower minor allele frequenc ies ( range of 0.1 - 4.8% ) and effects of up to 2 16 cm /allele ( e.g. in IHH , STC2 , AR and CRISPLD2 ) , >10 times the average effect of common variants . In functional follow - up studies, rare height - increasing alleles of STC2 (+1 - 2 cm/allele) compromise d proteolytic inhibition of PAPP - A and increased cleavage of IGFBP - 4 in vitro , resulting in higher bioavailability of insulin - like growth factors . The se 83 height - associated variants overlap genes mutated in monogenic growth disorders and highlight new biological candidates ( e.g. ADAMTS3, IL11RA, NOX4 ) and pathways ( e.g . proteoglycan/ glycosaminoglycan synthesis ) involved in growth . Our results demonstrate that sufficiently large sample sizes can uncover rare and low - frequency variants of moderate to large effect associated with polygenic human phenotypes , and that these variants implicate relevant genes and pathways
    corecore