70 research outputs found

    Fully decentralized computation of aggregates over data streams

    Get PDF
    In several emerging applications, data is collected in massive streams at several distributed points of observation. A basic and challenging task is to allow every node to monitor a neighbourhood of interest by issuing continuous aggregate queries on the streams observed in its vicinity. This class of algorithms is fully decentralized and diffusive in nature: collecting all data at few central nodes of the network is unfeasible in networks of low capability devices or in the presence of massive data sets. The main difficulty in designing diffusive algorithms is to cope with duplicate detections. These arise both from the observation of the same event at several nodes of the network and/or receipt of the same aggregated information along multiple paths of diffusion. In this paper, we consider fully decentralized algorithms that answer locally continuous aggregate queries on the number of distinct events, total number of events and the second frequency moment in the scenario outlined above. The proposed algorithms use in the worst case or on realistic distributions sublinear space at every node. We also propose strategies that minimize the communication needed to update the aggregates when new events are observed. We experimentally evaluate for the efficiency and accuracy of our algorithms on realistic simulated scenarios

    Unconditionally Secure Computation with Reduced Interaction

    Get PDF
    We study the question of how much interaction is needed for unconditionally secure multiparty computation. We first consider the number of messages that need to be sent to compute a Boolean function with semi-honest security, where all nn parties learn the result. We consider two classes of functions called tt-difficult and tt-very difficult functions, here tt refers to the number of corrupted players. One class is contained in the other. For instance, the AND of an input bit from each player is tt-very difficult while the XOR is tt-difficult but not tt-very difficult. We show lower bounds on the message complexity of both types of functions, considering two notions of message complexity called conservative and liberal, where the conservative one is the more standard one. In all cases the bounds are Ω(nt)\Omega(nt). We also show upper bounds for t=1t=1 and functions in deterministic log-space, as well as a stronger upper bound for the XOR function. This matches the lower bound for conservative complexity, so we find that the conservative message complexity of 11-very difficult functions in deterministic log space is 2n2n, while the conservative message complexity for XOR (and t=1t=1) is 2n12n-1. Next, we consider round complexity. It is a long-standing open problem to determine whether all efficiently computable functions can also be efficiently computed in constant-round with {\em unconditional} security. Motivated by this, we consider the question of whether we can compute any function securely, while minimizing the interaction of {\em some of} the players? And if so, how many players can this apply to? Note that we still want the standard security guarantees (correctness, privacy, termination) and we consider the standard communication model with secure point-to-point channels. We answer the questions as follows: for passive security, with n=2t+1n=2t+1 players and tt corruptions, up to tt players can have minimal interaction, i.e., they send 1 message in the first round to each of the t+1t+1 remaining players and receive one message from each of them in the last round. Using our result on message complexity, we show that this is (unconditionally) optimal. For malicious security with n=3t+1n=3t+1 players and tt corruptions, up to tt players can have minimal interaction, and we show that this is also optimal

    Age-Related Changes in the Daily Rhythm of Photoreceptor Functioning and Circuitry in a Melatonin-Proficient Mouse Strain

    Get PDF
    Retinal melatonin is involved in the modulation of many important retinal functions. Our previous studies have shown that the viability of photoreceptors and ganglion cells is reduced during aging in mice that lack melatonin receptor type 1. This demonstrates that melatonin signaling is important for the survival of retinal neurons. In the present study, we investigate the effects of aging on photoreceptor physiology and retinal organization in CH3-f+/+ mice, a melatonin proficient mouse strain. Our data indicate that the amplitude of the a and b waves of the scotopic and photopic electroretinogram decreases with age. Moreover, the daily rhythm in the amplitude of the a- and b- waves is lost during the aging process. Similarly, the scotopic threshold response is significantly affected by aging, but only when it is measured during the night. Interestingly, the changes observed in the ERGs are not paralleled by relevant changes in retinal morphological features, and administration of exogenous melatonin does not affect the ERGs in C3H-f+/+ at 12 months of age. This suggests that the responsiveness of the photoreceptors to exogenous melatonin is reduced during aging

    Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition)

    Get PDF
    In 2008 we published the first set of guidelines for standardizing research in autophagy. Since then, research on this topic has continued to accelerate, and many new scientists have entered the field. Our knowledge base and relevant new technologies have also been expanding. Accordingly, it is important to update these guidelines for monitoring autophagy in different organisms. Various reviews have described the range of assays that have been used for this purpose. Nevertheless, there continues to be confusion regarding acceptable methods to measure autophagy, especially in multicellular eukaryotes. For example, a key point that needs to be emphasized is that there is a difference between measurements that monitor the numbers or volume of autophagic elements (e.g., autophagosomes or autolysosomes) at any stage of the autophagic process versus those that measure fl ux through the autophagy pathway (i.e., the complete process including the amount and rate of cargo sequestered and degraded). In particular, a block in macroautophagy that results in autophagosome accumulation must be differentiated from stimuli that increase autophagic activity, defi ned as increased autophagy induction coupled with increased delivery to, and degradation within, lysosomes (inmost higher eukaryotes and some protists such as Dictyostelium ) or the vacuole (in plants and fungi). In other words, it is especially important that investigators new to the fi eld understand that the appearance of more autophagosomes does not necessarily equate with more autophagy. In fact, in many cases, autophagosomes accumulate because of a block in trafficking to lysosomes without a concomitant change in autophagosome biogenesis, whereas an increase in autolysosomes may reflect a reduction in degradative activity. It is worth emphasizing here that lysosomal digestion is a stage of autophagy and evaluating its competence is a crucial part of the evaluation of autophagic flux, or complete autophagy. Here, we present a set of guidelines for the selection and interpretation of methods for use by investigators who aim to examine macroautophagy and related processes, as well as for reviewers who need to provide realistic and reasonable critiques of papers that are focused on these processes. These guidelines are not meant to be a formulaic set of rules, because the appropriate assays depend in part on the question being asked and the system being used. In addition, we emphasize that no individual assay is guaranteed to be the most appropriate one in every situation, and we strongly recommend the use of multiple assays to monitor autophagy. Along these lines, because of the potential for pleiotropic effects due to blocking autophagy through genetic manipulation it is imperative to delete or knock down more than one autophagy-related gene. In addition, some individual Atg proteins, or groups of proteins, are involved in other cellular pathways so not all Atg proteins can be used as a specific marker for an autophagic process. In these guidelines, we consider these various methods of assessing autophagy and what information can, or cannot, be obtained from them. Finally, by discussing the merits and limits of particular autophagy assays, we hope to encourage technical innovation in the field

    A note on models for non-probabilistic analysis of packet switching networks

    No full text
    We consider two models commonly used in the literature to model adversarial injection of packets into a packet switching network. We establish the relation between these two types of models, and between them and the set of sequences of packets that allow stability. We also consider the adaptive setting in which packets are injected with only their source and destination but without a prescribed path to follow.

    Lower Bounds on the Amount of Randomness in Private Computation

    No full text
    We consider the amount of randomness necessary in information-theoretic private protocols. We prove that at least #ast n) random bits are necessary for the t-private computation of the function xor by n players, for any t 2
    corecore