161 research outputs found

    Templeting of Thin Films Induced by Dewetting on Patterned Surfaces

    Full text link
    The instability, dynamics and morphological transitions of patterns in thin liquid films on periodic striped surfaces (consisting of alternating less and more wettable stripes) are investigated based on 3-D nonlinear simulations that account for the inter-site hydrodynamic and surface-energetic interactions. The film breakup is suppressed on some potentially destabilizing nonwettable sites when their spacing is below a characteristic lengthscale of the instability, the upper bound for which is close to the spinodal lengthscale. The thin film pattern replicates the substrate surface energy pattern closely only when, (a) the periodicity of substrate pattern matches closely with the characteristic lengthscale, and (b) the stripe-width is within a range bounded by a lower critical length, below which no heterogeneous rupture occurs, and an upper transition length above which complex morphological features bearing little resemblance to the substrate pattern are formed.Comment: 5 pages TeX (REVTeX 4), other comments: submitted to Phys. Rev.Let

    Privacy Preserving Multi-Server k-means Computation over Horizontally Partitioned Data

    Full text link
    The k-means clustering is one of the most popular clustering algorithms in data mining. Recently a lot of research has been concentrated on the algorithm when the dataset is divided into multiple parties or when the dataset is too large to be handled by the data owner. In the latter case, usually some servers are hired to perform the task of clustering. The dataset is divided by the data owner among the servers who together perform the k-means and return the cluster labels to the owner. The major challenge in this method is to prevent the servers from gaining substantial information about the actual data of the owner. Several algorithms have been designed in the past that provide cryptographic solutions to perform privacy preserving k-means. We provide a new method to perform k-means over a large set using multiple servers. Our technique avoids heavy cryptographic computations and instead we use a simple randomization technique to preserve the privacy of the data. The k-means computed has exactly the same efficiency and accuracy as the k-means computed over the original dataset without any randomization. We argue that our algorithm is secure against honest but curious and passive adversary.Comment: 19 pages, 4 tables. International Conference on Information Systems Security. Springer, Cham, 201
    • …
    corecore