94 research outputs found

    Streaming Complexity of Spanning Tree Computation

    Get PDF
    The semi-streaming model is a variant of the streaming model frequently used for the computation of graph problems. It allows the edges of an n-node input graph to be read sequentially in p passes using OĢƒ(n) space. If the list of edges includes deletions, then the model is called the turnstile model; otherwise it is called the insertion-only model. In both models, some graph problems, such as spanning trees, k-connectivity, densest subgraph, degeneracy, cut-sparsifier, and (Ī”+1)-coloring, can be exactly solved or (1+Īµ)-approximated in a single pass; while other graph problems, such as triangle detection and unweighted all-pairs shortest paths, are known to require Ī©Ģƒ(n) passes to compute. For many fundamental graph problems, the tractability in these models is open. In this paper, we study the tractability of computing some standard spanning trees, including BFS, DFS, and maximum-leaf spanning trees. Our results, in both the insertion-only and the turnstile models, are as follows. Maximum-Leaf Spanning Trees: This problem is known to be APX-complete with inapproximability constant Ļ āˆˆ [245/244, 2). By constructing an Īµ-MLST sparsifier, we show that for every constant Īµ > 0, MLST can be approximated in a single pass to within a factor of 1+Īµ w.h.p. (albeit in super-polynomial time for Īµ ā‰¤ Ļ-1 assuming P ā‰  NP) and can be approximated in polynomial time in a single pass to within a factor of Ļ_n+Īµ w.h.p., where Ļ_n is the supremum constant that MLST cannot be approximated to within using polynomial time and OĢƒ(n) space. In the insertion-only model, these algorithms can be deterministic. BFS Trees: It is known that BFS trees require Ļ‰(1) passes to compute, but the naĆÆve approach needs O(n) passes. We devise a new randomized algorithm that reduces the pass complexity to O(āˆšn), and it offers a smooth tradeoff between pass complexity and space usage. This gives a polynomial separation between single-source and all-pairs shortest paths for unweighted graphs. DFS Trees: It is unknown whether DFS trees require more than one pass. The current best algorithm by Khan and Mehta [STACS 2019] takes OĢƒ(h) passes, where h is the height of computed DFS trees. Note that h can be as large as Ī©(m/n) for n-node m-edge graphs. Our contribution is twofold. First, we provide a simple alternative proof of this result, via a new connection to sparse certificates for k-node-connectivity. Second, we present a randomized algorithm that reduces the pass complexity to O(āˆšn), and it also offers a smooth tradeoff between pass complexity and space usage.ISSN:1868-896

    Floating Point Arithmetic Protocols for Constructing Secure Data Analysis Application

    Get PDF
    AbstractA large variety of data mining and machine learning techniques are applied to a wide range of applications today. There- fore, there is a real need to develop technologies that allows data analysis while preserving the conļ¬dentiality of the data. Secure multi-party computation (SMC) protocols allows participants to cooperate on various computations while retaining the privacy of their own input data, which is an ideal solution to this issue. Although there is a number of frameworks developed in SMC to meet this challenge, but they are either tailored to perform only on speciļ¬c tasks or provide very limited precision. In this paper, we have developed protocols for ļ¬‚oating point arithmetic based on secure scalar product protocols, which is re- quired in many real world applications. Our protocols follow most of the IEEE-754 standard, supporting the four fundamental arithmetic operations, namely addition, subtraction, multiplication, and division. We will demonstrate the practicality of these protocols through performing various statistical calculations that is widely used in most data analysis tasks. Our experiments show the performance of our framework is both practical and promising

    Mutations in the PKM2 exon-10 region are associated with reduced allostery and increased nuclear translocation.

    Get PDF
    PKM2 is a key metabolic enzyme central to glucose metabolism and energy expenditure. Multiple stimuli regulate PKM2's activity through allosteric modulation and post-translational modifications. Furthermore, PKM2 can partner with KDM8, an oncogenic demethylase and enter the nucleus to serve as a HIF1Ī± co-activator. Yet, the mechanistic basis of the exon-10 region in allosteric regulation and nuclear translocation remains unclear. Here, we determined theĀ crystal structures and kinetic coupling constants of exon-10 tumor-related mutants (H391Y and R399E), showing altered structural plasticity and reduced allostery. Immunoprecipitation analysis revealed increased interaction with KDM8 for H391Y, R399E, and G415R. We also found a higher degree of HIF1Ī±-mediated transactivation activity, particularly in the presence of KDM8. Furthermore, overexpression of PKM2 mutants significantly elevated cell growth and migration. Together, PKM2 exon-10 mutations lead to structure-allostery alterations and increased nuclear functions mediated by KDM8 in breast cancer cells. Targeting the PKM2-KDM8 complex may provide a potential therapeutic intervention

    Information theoretical analysis of two-party secret computation

    Get PDF
    Abstract. Privacy protection has become one of the most important issues in the information era. Consequently, many protocols have been developed to achieve the goal of accomplishing a computational task cooperatively without revealing the participants' private data. Practical protocols, however, do not guarantee perfect privacy protection, as some degree of privacy leakage is allowed so that resources can be used efficiently, e.g., the number of random bits required and the computation time. A metric for measuring the degree of information leakage based on an information theoretical framework was proposed i

    Serologic and Molecular Biologic Methods for SARS-associated Coronavirus Infection, Taiwan

    Get PDF
    Severe acute respiratory syndrome (SARS) has raised a global alert since March 2003. After its causative agent, SARS-associated coronavirus (SARS-CoV), was confirmed, laboratory methods, including virus isolation, reverse transcriptaseā€“polymerase chain reaction (RT-PCR), and serologic methods, have been quickly developed. In this study, we evaluated four serologic tests ( neutralization test, enzyme-linked immunosorbent assay [ELISA], immunofluorescent assay [IFA], and immunochromatographic test [ICT]) for detecting antibodies to SARS-CoV in sera of 537 probable SARS case-patients with correlation to the RT-PCR . With the neutralization test as a reference method, the sensitivity, specificity, positive predictive value, and negative predictive value were 98.2%, 98.7%, 98.7%, and 98.4% for ELISA; 99.1%, 87.8%, 88.1% and 99.1% for IFA; 33.6%, 98.2%, 95.7%, and 56.1% for ICT, respectively. We also compared the recombinant-based western blot with the whole virusā€“based IFA and ELISA; the data showed a high correlation between these methods, with an overall agreement of >90%. Our results provide a systematic analysis of serologic and molecular methods for evaluating SARS-CoV infection

    Exploring the Design Space of Static and Incremental Graph Connectivity Algorithms on GPUs

    Full text link
    Connected components and spanning forest are fundamental graph algorithms due to their use in many important applications, such as graph clustering and image segmentation. GPUs are an ideal platform for graph algorithms due to their high peak performance and memory bandwidth. While there exist several GPU connectivity algorithms in the literature, many design choices have not yet been explored. In this paper, we explore various design choices in GPU connectivity algorithms, including sampling, linking, and tree compression, for both the static as well as the incremental setting. Our various design choices lead to over 300 new GPU implementations of connectivity, many of which outperform state-of-the-art. We present an experimental evaluation, and show that we achieve an average speedup of 2.47x speedup over existing static algorithms. In the incremental setting, we achieve a throughput of up to 48.23 billion edges per second. Compared to state-of-the-art CPU implementations on a 72-core machine, we achieve a speedup of 8.26--14.51x for static connectivity and 1.85--13.36x for incremental connectivity using a Tesla V100 GPU

    New Variants and Age Shift to High Fatality Groups Contribute to Severe Successive Waves in the 2009 Influenza Pandemic in Taiwan

    Get PDF
    Past influenza pandemics have been characterized by the signature feature of multiple waves. However, the reasons for multiple waves in a pandemic are not understood. Successive waves in the 2009 influenza pandemic, with a sharp increase in hospitalized and fatal cases, occurred in Taiwan during the winter of 2010. In this study, we sought to discover possible contributors to the multiple waves in this influenza pandemic. We conducted a large-scale analysis of 4703 isolates in an unbiased manner to monitor the emergence, dominance and replacement of various variants. Based on the data from influenza surveillance and epidemic curves of each variant clade, we defined virologically and temporally distinct waves of the 2009 pandemic in Taiwan from May 2009 to April 2011 as waves 1 and 2, an interwave period and wave 3. Except for wave 3, each wave was dominated by one distinct variant. In wave 3, three variants emerged and co-circulated, and formed distinct phylogenetic clades, based on the hemagglutinin (HA) genes and other segments. The severity of influenza was represented as the case fatality ratio (CFR) in the hospitalized cases. The CFRs in waves 1 and 2, the interwave period and wave 3 were 6.4%, 5.1%, 15.2% and 9.8%, respectively. The results highlight the association of virus evolution and variable influenza severity. Further analysis revealed that the major affected groups were shifted in the waves to older individuals, who had higher age-specific CFRs. The successive pandemic waves create challenges for the strategic preparedness of health authorities and make the pandemic uncertain and variable. Our findings indicate that the emergence of new variants and age shift to high fatality groups might contribute potentially to the occurrence of successive severe pandemic waves and offer insights into the adjustment of national responses to mitigate influenza pandemics

    Reassortment and Mutations Associated with Emergence and Spread of Oseltamivir-Resistant Seasonal Influenza A/H1N1 Viruses in 2005ā€“2009

    Get PDF
    A dramatic increase in the frequency of the H275Y mutation in the neuraminidase (NA), conferring resistance to oseltamivir, has been detected in human seasonal influenza A/H1N1 viruses since the influenza season of 2007ā€“2008. The resistant viruses emerged in the ratio of 14.3% and quickly reached 100% in Taiwan from September to December 2008. To explore the mechanisms responsible for emergence and spread of the resistant viruses, we analyzed the complete genome sequences of 25 viruses collected during 2005ā€“2009 in Taiwan, which were chosen from various clade viruses, 1, 2A, 2B-1, 2B-2, 2C-1 and 2C-2 by the classification of hemagglutinin (HA) sequences. Our data revealed that the dominant variant, clade 2B-1, in the 2007ā€“2008 influenza emerged through an intra-subtype 4+4 reassortment between clade 1 and 2 viruses. The dominant variant acquired additional substitutions, including A206T in HA, H275Y and D354G in NA, L30R and H41P in PB1-F2, and V411I and P453S in basic polymerase 2 (PB2) proteins and subsequently caused the 2008ā€“2009 influenza epidemic in Taiwan, accompanying the widespread oseltamivir-resistant viruses. We also characterized another 3+5 reassortant virus which became double resistant to oseltamivir and amantadine. Comparison of oseltamivir-resistant influenza A/H1N1 viruses belonging to various clades in our study highlighted that both reassortment and mutations were associated with emergence and spread of these viruses and the specific mutation, H275Y, conferring to antiviral resistance, was acquired in a hitch-hiking mechanism during the viral evolutionary processes

    Epsteinā€“Barr Virus DNase (BGLF5) induces genomic instability in human epithelial cells

    Get PDF
    Epsteinā€“Barr Virus (EBV) DNase (BGLF5) is an alkaline nuclease and has been suggested to be important in the viral life cycle. However, its effect on host cells remains unknown. Serological and histopathological studies implied that EBV DNase seems to be correlated with carcinogenesis. Therefore, we investigate the effect of EBV DNase on epithelial cells. Here, we report that expression of EBV DNase induces increased formation of micronucleus, an indicator of genomic instability, in human epithelial cells. We also demonstrate, using Ī³H2AX formation and comet assay, that EBV DNase induces DNA damage. Furthermore, using host cell reactivation assay, we find that EBV DNase expression repressed damaged DNA repair in various epithelial cells. Western blot and quantitative PCR analyses reveal that expression of repair-related genes is reduced significantly in cells expressing EBV DNase. Host shut-off mutants eliminate shut-off expression of repair genes and repress damaged DNA repair, suggesting that shut-off function of BGLF5 contributes to repression of DNA repair. In addition, EBV DNase caused chromosomal aberrations and increased the microsatellite instability (MSI) and frequency of genetic mutation in human epithelial cells. Together, we propose that EBV DNase induces genomic instability in epithelial cells, which may be through induction of DNA damage and also repression of DNA repair, subsequently increases MSI and genetic mutations, and may contribute consequently to the carcinogenesis of human epithelial cells
    • ā€¦
    corecore