590 research outputs found

    Star-factors of tournaments

    Full text link
    Let S_m denote the m-vertex simple digraph formed by m-1 edges with a common tail. Let f(m) denote the minimum n such that every n-vertex tournament has a spanning subgraph consisting of n/m disjoint copies of S_m. We prove that m lg m - m lg lg m <= f(m) <= 4m^2 - 6m for sufficiently large m.Comment: 5 pages, 1 figur

    Computational Identification of Novel MicroRNAs and Their Targets in Vigna unguiculata

    Get PDF
    MicroRNAs (miRNAs) are a class of endogenous, noncoding, short RNAs directly involved in regulating gene expression at the posttranscriptional level. High conservation of miRNAs in plant provides the foundation for identification of new miRNAs in other plant species through homology alignment. Here, previous known plant miRNAs were BLASTed against the Expressed Sequence Tag (EST) and Genomic Survey Sequence (GSS) databases of Vigna unguiculata, and according to a series of filtering criteria, a total of 47 miRNAs belonging to 13 miRNA families were identified, and 30 potential target genes of them were subsequently predicted, most of which seemed to encode transcription factors or enzymes participating in regulation of development, growth, metabolism, and other physiological processes. Overall, our findings lay the foundation for further researches of miRNAs function in Vigna unguiculata

    Star-factors of tournaments

    Get PDF

    HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code

    Get PDF
    Virtual Machine Introspection (VMI) is an approach to inspecting and analyzing the software running inside a virtual machine from the hypervisor. Similarly, memory forensics analyzes the memory snapshots or dumps to understand the runtime state of a physical or virtual machine. The existing VMI and memory forensic tools rely on up-to-date kernel information of the target operating system (OS) to work properly, which often requires the availability of the kernel source code. This requirement prevents these tools from being widely deployed in real cloud environments. In this paper, we present a VMI tool called HyperLink that partially retrieves running process information from a guest virtual machine without its source code. While current introspection and memory forensic solutions support only one or a limited number of kernel versions of the target OS, HyperLink is a one-for-many introspection and forensic tool, i.e., it supports most, if not all, popular OSes regardless of their versions. We implement both online and offline versions of HyperLink.We validate the efficacy of HyperLink under different versions of Linux, Windows, FreeBSD, and Mac OS X. For all the OSes we tested, HyperLink can successfully retrieve the process information in one minute or several seconds. Through online and offline analyses, we demonstrate that HyperLink can help users detect real-world kernel rootkits and play an important role in intrusion detection. Due to its version-agnostic property, HyperLink could become the first introspection and forensic tool that works well in autonomic cloud computing environments

    What Makes Video Ads Viral: Quantifying the Impact of Marketer- and User-Generated Content

    Get PDF
    Past research on viral advertising focuses on the direct impact of MGC (i.e. Marketer-Generated Content) on the content viral ability. However, it is not clear how this impact of MGC takes place through the mediating effect of UGC (i.e. User-Generated Content) in this process. In this study, we examine the mechanism that makes a video ad viral by taking into account the impact of both MGC (i.e. video content) and UGC (i.e. video comments) in YouTube. AMT (Amazon Mechanical Turk) and Text-Mining Method are combined to extract the characteristics embedded in MGC and UGC
    corecore