149 research outputs found

    Min-Max-Min Robustness for Combinatorial Problems with Discrete Budgeted Uncertainty

    Get PDF
    We consider robust combinatorial optimization problems with cost uncertainty where the decision maker can prepare K solutions beforehand and chooses the best of them once the true cost is revealed. Also known as min-max-min robustness (a special case of K-adaptability), it is a viable alternative to otherwise intractable two-stage problems. The uncertainty set assumed in this paper considers that in any scenario, at most Γ of the components of the cost vectors will be higher than expected, which corresponds to the extreme points of the budgeted uncertainty set. While the classical min-max problem with budgeted uncertainty is essentially as easy as the underlying deterministic problem, it turns out that the min-max-min problem is N P-hard for many easy combinatorial optimization problems, and not approximable in general. We thus present an integer programming formulation for solving the problem through a row-and-column generation algorithm. While exact, this algorithm can only cope with small problems, so we present two additional heuristics leveraging the structure of budgeted uncertainty. We compare our row-and-column generation algorithm and our heuristics on knapsack and shortest path instances previously used in the scientific literature and find that the heuristics obtain good quality solutions in short computational times

    Faster Algorithms for Min-max-min Robustness for Combinatorial Problems with Budgeted Uncertainty

    Get PDF
    International audienceWe consider robust combinatorial optimization problems where the decision maker can react to a scenario by choosing from a finite set of k solutions. This approach is appropriate for decision problems under uncertainty where the implementation of decisions requires preparing the ground. We focus on the case that the set of possible scenarios is described through a budgeted uncertainty set and provide three algorithms for the problem. The first algorithm solves heuristically the dualized problem, a non-convex mixed-integer non-linear program (MINLP), via an alternating optimization approach. The second algorithm solves the MINLP exactly for k = 2 through a dedicated spatial branch-and-bound algorithm. The third approach enumerates k-tuples, relying on strong bounds to avoid a complete enumeration. We test our methods on shortest path instances that were used in the previous literature and on randomly generated knapsack instances, and find that our methods considerably outperform previous approaches. Many instances that were previously not solved within hours can now be solved within few minutes, often even faster

    Defending Against Insider Use of Digital Steganography

    Get PDF
    The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse their privilege of access to the Internet to download, install, and use an information hiding tool, such as one of the hundreds of digital steganography applications available on the Internet, to steal sensitive, classified, or proprietary information. Effective countermeasures to this threat must begin with an organizational policy prohibiting installation of information hiding tools on user workstations and must also include automated tools capable of detecting attempts to download and use digital steganography applications. This paper will describe the threat from insider use of digital steganography applications; a new approach to detecting the presence or use of these applications; and extraction of hidden information when a known signature of one of these applications is detected. The analytical approach to steganalysis involves the development and use of computer forensic tools that can detect fingerprints and signatures of digital steganography applications. These tools can be employed in both an off-line forensic-based mode as well as a real-time network surveillance mode. Detection of fingerprints or signatures in either mode may lead to the discovery and extraction of hidden information. Accordingly, this approach represents a significant improvement over traditional blind detection techniques which typically only provide a probability that information may be hidden in a given file without providing a capability to extract any hidden information. Keywords: insider, steganography, steganalysis, computer forensics, artifacts, fingerprints, hash values, signature

    Spectral classification of the brightest objects in the galactic star forming region W40

    Full text link
    We present high S/N, moderate resolution near-infrared spectra, as well as 10 micron imaging, for the brightest members of the central stellar cluster in the W40 HII region, obtained using the SpeX and MIRSI instruments at NASA's Infrared Telescope Facility. Using these observations combined with archival Spitzer Space Telescope data, we have determined the spectral classifications, extinction, distances, and spectral energy distributions for the brightest members of the cluster. Of the eight objects observed, we identify four main sequence (MS) OB stars, two Herbig Ae/Be stars, and two low-mass young stellar objects. Strong HeI absorption at 1.083 micron in the MS star spectra strongly suggests that at least some of these sources are in fact close binaries. Two out of the four MS stars also show significant infrared excesses typical of circumstellar disks. Extinctions and distances were determined for each MS star by fitting model stellar atmospheres to the SEDs. We estimate a distance to the cluster of between 455 and 535 pc, which agrees well with earlier (but far less precise) distance estimates. We conclude that the late-O star we identify is the dominant source of LyC luminosity needed to power the W40 HII region and is the likely source of the stellar wind that has blown a large (~4 pc) pinched-waist bubble observed in wide field mid-IR images. We also suggest that 3.6 cm radio emission observed from some of the sources in the cluster is likely not due to emission from ultra-compact HII regions, as suggested in other work, due to size constraints based on our derived distance to the cluster. Finally, we also present a discussion of the curious source IRS 3A, which has a very strong mid-IR excess (despite its B3 MS classification) and appears to be embedded in a dusty envelope roughly 2700 AU in size.Comment: Accepted for publication in The Astronomical Journal. 29 pages, 10 figure

    Mauve Assembly Metrics

    Get PDF
    Summary: High-throughput DNA sequencing technologies have spurred the development of numerous novel methods for genome assembly. With few exceptions, these algorithms are heuristic and require one or more parameters to be manually set by the user. One approach to parameter tuning involves assembling data from an organism with an available high-quality reference genome, and measuring assembly accuracy using some metrics

    Temporal Expression of Bacterial Proteins Instructs Host CD4 T Cell Expansion and Th17 Development

    Get PDF
    Pathogens can substantially alter gene expression within an infected host depending on metabolic or virulence requirements in different tissues, however, the effect of these alterations on host immunity are unclear. Here we visualized multiple CD4 T cell responses to temporally expressed proteins in Salmonella-infected mice. Flagellin-specific CD4 T cells expanded and contracted early, differentiated into Th1 and Th17 lineages, and were enriched in mucosal tissues after oral infection. In contrast, CD4 T cells responding to Salmonella Type-III Secretion System (TTSS) effectors steadily accumulated until bacterial clearance was achieved, primarily differentiated into Th1 cells, and were predominantly detected in systemic tissues. Thus, pathogen regulation of antigen expression plays a major role in orchestrating the expansion, differentiation, and location of antigen-specific CD4 T cells in vivo
    corecore