230 research outputs found

    BriskStream: Scaling Data Stream Processing on Shared-Memory Multicore Architectures

    Full text link
    We introduce BriskStream, an in-memory data stream processing system (DSPSs) specifically designed for modern shared-memory multicore architectures. BriskStream's key contribution is an execution plan optimization paradigm, namely RLAS, which takes relative-location (i.e., NUMA distance) of each pair of producer-consumer operators into consideration. We propose a branch and bound based approach with three heuristics to resolve the resulting nontrivial optimization problem. The experimental evaluations demonstrate that BriskStream yields much higher throughput and better scalability than existing DSPSs on multi-core architectures when processing different types of workloads.Comment: To appear in SIGMOD'1

    The progestin levonorgestrel affects sex differentiation in zebrafish at environmentally relevant concentrations

    Get PDF
    Synthetic progestins have become widespread environmental contaminants and may cause adverse effects on fish. In the present study, we investigated the effects of levonorgestrel (LNG) on sex differentiation in zebrafish (Danio rerio). Embryos were exposed to LNG at environmentally relevant concentrations (0, 1, 10, 33, and 100 ng/L) and allowed to develop until sexual maturity. Histological examination at 63 days post fertilization (dpf) caused complete sex reversal and 100% males were observed in the 10,33 and 100 ng/L treatments; gross morphological and histological examination of gonads at 142 dpf further confirmed 100% males at these exposure concentrations. The results indicate androgenic activity of LNG, and masculinization during zebrafish gonadal differentiation. The mRNA expression levels of genes involved in fish sex differentiation and gonadal development were examined at 28 and 42 dpf. Down-regulation of the mRNA expression of aromatase (e.g., cyp19a1 a, cyp19a1b), the forkhead transcription factor gene L2 (foxl2) and the Fushi tarazu factor-1d (nr5a1b) were observed. In contrast, transcription of the doublesex and mab-3-related transcription factor 1 (dmrt1) gene was up-regulated. Androgen receptor (ar) mRNA expression was significantly down-regulated at 28 and 42 dpf. Co-exposure to flutamide (an androgen antagonist) and LNG, led to a decrease in the sex inversion potency of LNG. Our study has demonstrated that environmentally relevant concentrations of LNG could alter sex differentiation and gonadal development in zebrafish. Our results also suggest a potentially high ecological risk of LNG to fish populations in LNG-contaminated aquatic environments. (C) 2015 Elsevier B.V. All rights reserved

    Brief announcement:statement voting and liquid democracy

    Get PDF
    The existing (election) voting systems, e.g., representative democracy, have many limitations and often fail to serve the best interest of the people in collective decision making. To address this issue, the concept of liquid democracy has been emerging as an alternative decision-making model to make better use of "the wisdom of crowds". Very recently, a few liquid democracy implementations, e.g. Google Votes and Decentralized Autonomous Organization (DAO), are released; however, those systems only focus on the functionality aspect, as no privacy/anonymity is considered. In this work, we, for the first time, provide a rigorous study of liquid democracy under the Universal Composability (UC) frame- work. In the literature, liquid democracy was achieved via two separate stages -- delegation and voting. We propose an efficient liquid democracy e-voting scheme that uni es these two stages. At the core of our design is a new voting concept called statement voting, which can be viewed as a natural extension of the conventional voting approaches. We remark that our statement voting can be extended to enable more complex voting and generic ledger-based non-interactive multi-party computation. We believe that the statement voting concept opens a door for constructing a new class of e-voting schemes

    GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility

    Get PDF
    In the UC framework, protocols must be subroutine respecting; therefore, shared trusted setup might cause security issues. To address this drawback, Generalized UC (GUC) framework is introduced by Canetti \emph{et al.} (TCC 2007). In this work, we investigate the impossibility and feasibility of GUC-secure commitments using global random oracles (GRO) as the trusted setup. In particular, we show that it is impossible to have a 2-round (1-round committing and 1-round opening) GUC-secure commitment in the global observable RO model by Canetti \emph{et al.} (CCS 2014). We then give a new round-optimal GUC-secure commitment that uses only Minicrypt assumptions (i.e. the existence of one-way functions) in the global observable RO model. Furthermore, we also examine the complete picture on round complexity of the GUC-secure commitments in various global RO models

    Endemic Oblivious Transfer via Random Oracles, Revisited

    Get PDF
    The notion of Endemic Oblivious Transfer (EOT) was introduced by Masny and Rindal (CCS\u2719). EOT offers a weaker security guarantee than the conventional random OT; namely, the malicious parties can fix their outputs arbitrarily. The authors presented a 1-round UC-secure EOT protocol under a tailor-made and non-standard assumption, Choose-and-Open DDH, in the RO model. In this work, we systematically study EOT in the UC/GUC framework. We present a new 1-round UC-secure EOT construction in the RO model under the DDH assumption. Under the GUC framework, we propose the first 1-round EOT construction under the CDH assumption in the Global Restricted Observable RO (GroRO) model proposed by Canetti et al. (CCS\u2714). We also provide an impossibility result, showing there exist no 1-round GUC-secure EOT protocols in the Global Restricted Programmable RO (GrpRO) model proposed by Camenisch et al. (Eurocrypt\u2718). Subsequently, we provide the first round-optimal (2-round) EOT protocol with adaptive security under the DDH assumption in the GrpRO model. Finally, we investigate the relations between EOT and other cryptographic primitives. As side products, we present the first 2-round GUC-secure commitment in the GroRO model as well as a separation between the GroRO and the GrpRO models, which may be of independent interest

    Practical Constructions for Single Input Functionality against a Dishonest Majority

    Get PDF
    Single Input Functionality (SIF) is a special case of MPC, where only one distinguished party called dealer holds the secret input. SIF allows the dealer to complete a computation task and send to other parties their respective outputs without revealing any additional information about its secret input. SIF has many applications, including multiple-verifier zero-knowledge and verifiable relation sharing, etc. Recently, several works devote to round-efficient realization of SIF, and achieve 2-round communication in the honest majority setting (Applebaum et al., Crypto 2022; Baum et al., CCS 2022; Yang and Wang, Asiacrypt 2022). In this work, we propose the first practical 2-round protocol for SIF against \emph{a dishonest majority} in the preprocessing model; moreover, the online phase is highly efficient as it requires no cryptographic operations and achieves information theoretical security. For SIF among 5 parties, our construction takes 152.34ms (total) to evaluate an AES-128 circuit with 7.36ms online time. Compared to the state-of-the-art (honest majority) solution (Baum et al., CCS 2022), our construction is roughly 2×\times faster in the online phase, although more preprocessing time is needed. Compared to the state-of-the-art generic MPC against a dishonest majority (Wang et al., CCS 2017; Cramer et al., Crypto 2018), our construction outperforms them w.r.t. both total running time and online running time

    Structure-Based Investigation on the Binding and Activation of Typical Pesticides With Thyroid Receptor

    Get PDF
    A broad range of pesticides have been reported to interfere with the normal function of the thyroid endocrine system. However, the precise mechanism(s) of action has not yet been thoroughly elucidated. In this study, 21 pesticides were assessed for their binding interactions and the potential to disrupt thyroid homeostasis. In the GH3 luciferase reporter gene assays, 5 of the pesticides tested had agonistic effects in the order of procymidone &gt; imidacloprid &gt; mancozeb &gt; fluroxypyr &gt; atrazine. 11 pesticides inhibited luciferase activity of T3 to varying degrees, demonstrating their antagonistic activity. And there are 4 pesticides showed mixed effects when treated with different concentrations. Surface plasmon resonance (SPR) biosensor technique was used to directly measure the binding interactions of these pesticides to the human thyroid hormone receptor (hTR). 13 pesticides were observed to bind directly with TR, with a KD ranging from 4.80E-08 M to 9.44E-07 M. The association and disassociation of the hTR/pesticide complex revealed 2 distinctive binding modes between the agonists and antagonists. At the same time, a different binding mode was displayed by the pesticides showed mix agonist and antagonist activity. In addition, the molecular docking simulation analyses indicated that the interaction energy calculated by CDOCKER for the agonists and antagonists correlated well with the KD values measured by the surface plasmon resonance assay. These results help to explain the differences of the TR activities of these tested pesticides.</p
    corecore