70 research outputs found
Fully decentralized computation of aggregates over data streams
In several emerging applications, data is collected in massive streams at several distributed points of observation. A basic and challenging task is to allow every node to monitor a neighbourhood of interest by issuing continuous aggregate queries on the streams observed in its vicinity. This class of algorithms is fully decentralized and diffusive in nature: collecting all data at few central nodes of the network is unfeasible in networks of low capability devices or in the presence of massive data sets. The main difficulty in designing diffusive algorithms is to cope with duplicate detections. These arise both from the observation of the same event at several nodes of the network and/or receipt of the same aggregated information along multiple paths of diffusion. In this paper, we consider fully decentralized algorithms that answer locally continuous aggregate queries on the number of distinct events, total number of events and the second frequency moment in the scenario outlined above. The proposed algorithms use in the worst case or on realistic distributions sublinear space at every node. We also propose strategies that minimize the communication needed to update the aggregates when new events are observed. We experimentally evaluate for the efficiency and accuracy of our algorithms on realistic simulated scenarios
Unconditionally Secure Computation with Reduced Interaction
We study the question of how much interaction is needed for unconditionally secure multiparty
computation. We first consider the number of messages that need to be sent to compute a Boolean function with semi-honest security,
where all parties learn the result.
We consider two classes of functions called -difficult and -very difficult functions,
here refers to the number of corrupted players. One class is contained in the other.
For instance, the AND of an input bit from
each player is -very difficult while the XOR is -difficult but not -very difficult.
We show lower bounds on the message complexity of both types of functions,
considering two notions of message complexity
called conservative and liberal, where the conservative one is the more standard one.
In all cases the bounds are . We also show
upper bounds for and functions in deterministic log-space, as well as a stronger upper bound for the XOR function.
This matches the lower bound for conservative complexity, so we find that the
conservative message complexity of -very difficult functions in deterministic log space is ,
while the conservative message complexity for XOR (and ) is .
Next, we consider round complexity.
It is a long-standing open problem to determine whether all efficiently computable functions can also be efficiently computed in constant-round with {\em unconditional} security.
Motivated by this, we consider the question of whether we can compute any function securely, while minimizing the interaction of {\em some of} the players? And if so, how many players can this apply to? Note that we still want the standard security guarantees (correctness, privacy, termination) and we consider the standard communication model with secure point-to-point channels. We answer the questions as follows: for passive security, with players and corruptions, up to players can have minimal interaction, i.e., they send 1 message in the first round to each of the remaining players and receive one message from each of them in the last round. Using our result on message complexity, we show that this is (unconditionally) optimal. For malicious security with players and corruptions, up to players can have minimal interaction, and we show that this is also optimal
Age-Related Changes in the Daily Rhythm of Photoreceptor Functioning and Circuitry in a Melatonin-Proficient Mouse Strain
Retinal melatonin is involved in the modulation of many important retinal functions. Our previous studies have shown that the viability of photoreceptors and ganglion cells is reduced during aging in mice that lack melatonin receptor type 1. This demonstrates that melatonin signaling is important for the survival of retinal neurons. In the present study, we investigate the effects of aging on photoreceptor physiology and retinal organization in CH3-f+/+ mice, a melatonin proficient mouse strain. Our data indicate that the amplitude of the a and b waves of the scotopic and photopic electroretinogram decreases with age. Moreover, the daily rhythm in the amplitude of the a- and b- waves is lost during the aging process. Similarly, the scotopic threshold response is significantly affected by aging, but only when it is measured during the night. Interestingly, the changes observed in the ERGs are not paralleled by relevant changes in retinal morphological features, and administration of exogenous melatonin does not affect the ERGs in C3H-f+/+ at 12 months of age. This suggests that the responsiveness of the photoreceptors to exogenous melatonin is reduced during aging
Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition)
In 2008 we published the first set of guidelines for standardizing research in autophagy. Since then, research on this topic has continued to accelerate, and many new scientists have entered the field. Our knowledge base and relevant new technologies have also been expanding. Accordingly, it is important to update these guidelines for monitoring autophagy in different organisms. Various reviews have described the range of assays that have been used for this purpose. Nevertheless, there continues to be confusion regarding acceptable methods to measure autophagy, especially in multicellular eukaryotes. For example, a key point that needs to be emphasized is that there is a difference between measurements that monitor the numbers or volume of autophagic elements (e.g., autophagosomes or autolysosomes) at any stage of the autophagic process versus those that measure fl ux through the autophagy pathway (i.e., the complete process including the amount and rate of cargo sequestered and degraded). In particular, a block in macroautophagy that results in autophagosome accumulation must be differentiated from stimuli that increase autophagic activity, defi ned as increased autophagy induction coupled with increased delivery to, and degradation within, lysosomes (inmost higher eukaryotes and some protists such as Dictyostelium ) or the vacuole (in plants and fungi). In other words, it is especially important that investigators new to the fi eld understand that the appearance of more autophagosomes does not necessarily equate with more autophagy. In fact, in many cases, autophagosomes accumulate because of a block in trafficking to lysosomes without a concomitant change in autophagosome biogenesis, whereas an increase in autolysosomes may reflect a reduction in degradative activity. It is worth emphasizing here that lysosomal digestion is a stage of autophagy and evaluating its competence is a crucial part of the evaluation of autophagic flux, or complete autophagy. Here, we present a set of guidelines for the selection and interpretation of methods for use by investigators who aim to examine macroautophagy and related processes, as well as for reviewers who need to provide realistic and reasonable critiques of papers that are focused on these processes. These guidelines are not meant to be a formulaic set of rules, because the appropriate assays depend in part on the question being asked and the system being used. In addition, we emphasize that no individual assay is guaranteed to be the most appropriate one in every situation, and we strongly recommend the use of multiple assays to monitor autophagy. Along these lines, because of the potential for pleiotropic effects due to blocking autophagy through genetic manipulation it is imperative to delete or knock down more than one autophagy-related gene. In addition, some individual Atg proteins, or groups of proteins, are involved in other cellular pathways so not all Atg proteins can be used as a specific marker for an autophagic process. In these guidelines, we consider these various methods of assessing autophagy and what information can, or cannot, be obtained from them. Finally, by discussing the merits and limits of particular autophagy assays, we hope to encourage technical innovation in the field
Recommended from our members
SOX2 is an amplified lineage-survival oncogene in lung and esophageal squamous cell carcinomas
Lineage survival oncogenes are activated by somatic DNA alterations in cancers arising from the cell lineages in which these genes play a role in normal development.1,2 Here we show that a peak of genomic amplification on chromosome 3q26.33, found in squamous cell carcinomas (SCCs) of the lung and esophagus, contains the transcription factor gene SOX2—which is mutated in hereditary human esophageal malformations3 and necessary for normal esophageal squamous development4, promotes differentiation and proliferation of basal tracheal cells5 and co-operates in induction of pluripotent stem cells.6,7,8 SOX2 expression is required for proliferation and anchorage-independent growth of lung and esophageal cell lines, as shown by RNA interference experiments. Furthermore, ectopic expression of SOX2 cooperated with FOXE1 or FGFR2 to transform immortalized tracheobronchial epithelial cells. SOX2-driven tumors show expression of markers of both squamous differentiation and pluripotency. These observations identify SOX2 as a novel lineage survival oncogene in lung and esophageal SCC
A note on models for non-probabilistic analysis of packet switching networks
We consider two models commonly used in the literature to model adversarial injection of packets into a packet switching network. We establish the relation between these two types of models, and between them and the set of sequences of packets that allow stability. We also consider the adaptive setting in which packets are injected with only their source and destination but without a prescribed path to follow.
Lower Bounds on the Amount of Randomness in Private Computation
We consider the amount of randomness necessary in information-theoretic private protocols. We prove that at least #ast n) random bits are necessary for the t-private computation of the function xor by n players, for any t 2
- …