278 research outputs found

    Combinatorial Bounds and Characterizations of Splitting Authentication Codes

    Full text link
    We present several generalizations of results for splitting authentication codes by studying the aspect of multi-fold security. As the two primary results, we prove a combinatorial lower bound on the number of encoding rules and a combinatorial characterization of optimal splitting authentication codes that are multi-fold secure against spoofing attacks. The characterization is based on a new type of combinatorial designs, which we introduce and for which basic necessary conditions are given regarding their existence.Comment: 13 pages; to appear in "Cryptography and Communications

    Lassoing and corraling rooted phylogenetic trees

    Full text link
    The construction of a dendogram on a set of individuals is a key component of a genomewide association study. However even with modern sequencing technologies the distances on the individuals required for the construction of such a structure may not always be reliable making it tempting to exclude them from an analysis. This, in turn, results in an input set for dendogram construction that consists of only partial distance information which raises the following fundamental question. For what subset of its leaf set can we reconstruct uniquely the dendogram from the distances that it induces on that subset. By formalizing a dendogram in terms of an edge-weighted, rooted phylogenetic tree on a pre-given finite set X with |X|>2 whose edge-weighting is equidistant and a set of partial distances on X in terms of a set L of 2-subsets of X, we investigate this problem in terms of when such a tree is lassoed, that is, uniquely determined by the elements in L. For this we consider four different formalizations of the idea of "uniquely determining" giving rise to four distinct types of lassos. We present characterizations for all of them in terms of the child-edge graphs of the interior vertices of such a tree. Our characterizations imply in particular that in case the tree in question is binary then all four types of lasso must coincide

    Construction of an Immigrant Integration Composite Indicator through the Partial Least Squares Structural Equation Model K-Means

    Get PDF
    Integration is a multidimensional process, which can take place in different ways and at different times in relation to each of the single economic, social, cultural, and political dimensions. Hence, examining every single dimension is important as well as building composite indexes simultaneously inclusive of all dimensions in order to obtain a complete description of a complex phenomenon and to convey a coherent set of information. In this paper, we aim at building an immigrant integration composite indicator (IICI), able to measure the different aspects related to integration such as employment, education, social inclusion, active citizenship, and on the basis of which to simultaneously classify territorial areas such as European regions. For this application, the data collected in 274 European regions from the European Social Survey (ESS), Round 8, on immigration have been used

    Recognizing Treelike k-Dissimilarities

    Full text link
    A k-dissimilarity D on a finite set X, |X| >= k, is a map from the set of size k subsets of X to the real numbers. Such maps naturally arise from edge-weighted trees T with leaf-set X: Given a subset Y of X of size k, D(Y) is defined to be the total length of the smallest subtree of T with leaf-set Y . In case k = 2, it is well-known that 2-dissimilarities arising in this way can be characterized by the so-called "4-point condition". However, in case k > 2 Pachter and Speyer recently posed the following question: Given an arbitrary k-dissimilarity, how do we test whether this map comes from a tree? In this paper, we provide an answer to this question, showing that for k >= 3 a k-dissimilarity on a set X arises from a tree if and only if its restriction to every 2k-element subset of X arises from some tree, and that 2k is the least possible subset size to ensure that this is the case. As a corollary, we show that there exists a polynomial-time algorithm to determine when a k-dissimilarity arises from a tree. We also give a 6-point condition for determining when a 3-dissimilarity arises from a tree, that is similar to the aforementioned 4-point condition.Comment: 18 pages, 4 figure

    E-commerce transactions in a virtual environment: Virtual transactions

    Get PDF
    E-commerce is a fundamental method of doing business, such that for a firm to say it is trading at all in the modern market-place it must have some element of on-line presence. Coupled with this is the explosion of the "population" of Massively Multiplayer On-line Role Playing Games and other shared virtual environments. Many suggest this will lead to a further dimension of commerce: virtual commerce. We discuss here the issues, current roadblocks and present state of an e-commerce transaction carried out completely within a virtual environment; a virtual transaction. Although technically such transactions are in a sense trivial, they raise many other issues in complex ways thus making V-transactions a highly interesting cross-disciplinary issue. We also discuss the social, ethical and regulatory implications for the virtual communities in these environments of such v-transactions, how their implementation affects the nature and management of a virtual environment, and how they represent a fundamental merging of the real and virtual worlds for the purpose of commerce. We highlight the minimal set of features a v-transaction capable virtual environment requires and suggest a model of how in the medium term they could be carried out via a methodology we call click-through, and that the developers of such environments will need to take on the multi-modal behavior of their users, as well as elements of the economic and political sciences in order to fully realize the commercial potential of the v-transaction. © 2012 Springer Science+Business Media, LLC

    A simulated annealing methodology for clusterwise linear regression

    Full text link
    In many regression applications, users are often faced with difficulties due to nonlinear relationships, heterogeneous subjects, or time series which are best represented by splines. In such applications, two or more regression functions are often necessary to best summarize the underlying structure of the data. Unfortunately, in most cases, it is not known a priori which subset of observations should be approximated with which specific regression function. This paper presents a methodology which simultaneously clusters observations into a preset number of groups and estimates the corresponding regression functions' coefficients, all to optimize a common objective function. We describe the problem and discuss related procedures. A new simulated annealing-based methodology is described as well as program options to accommodate overlapping or nonoverlapping clustering, replications per subject, univariate or multivariate dependent variables, and constraints imposed on cluster membership. Extensive Monte Carlo analyses are reported which investigate the overall performance of the methodology. A consumer psychology application is provided concerning a conjoint analysis investigation of consumer satisfaction determinants. Finally, other applications and extensions of the methodology are discussed.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/45745/1/11336_2005_Article_BF02296405.pd

    A spatial interaction model for deriving joint space maps of bundle compositions and market segments from pick-any/J data: An application to new product options

    Full text link
    We propose an approach for deriving joint space maps of bundle compositions and market segments from three-way (e.g., consumers x product options/benefits/features x usage situations/scenarios/time periods) pick-any/J data. The proposed latent structure multidimensional scaling procedure simultaneously extracts market segment and product option positions in a joint space map such that the closer a product option is to a particlar segment, the higher the likelihood of its being chosen by that segment. A segment-level threshold parameter is estimated that spatially delineates the bundle of product options that are predicted to be chosen by each segment. Estimates of the probability of each consumer belonging to the derived segments are simultaneously obtained. Explicit treatment of product and consumer characteristics are allowed via optional model reparameterizations of the product option locations and segment memberships. We illustrate the use of the proposed approach using an actual commercial application involving pick-any/J data gathered by a major hi-tech firm for some 23 advanced technological options for new automobiles.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/47207/1/11002_2004_Article_BF00434905.pd

    Scoring method of a Situational Judgment Test:influence on internal consistency reliability, adverse impact and correlation with personality?

    Get PDF
    textabstractSituational Judgment Tests (SJTs) are increasingly used for medical school selection. Scoring an SJT is more complicated than scoring a knowledge test, because there are no objectively correct answers. The scoring method of an SJT may influence the construct and concurrent validity and the adverse impact with respect to non-traditional students. Previous research has compared only a small number of scoring methods and has not studied the effect of scoring method on internal consistency reliability. This study compared 28 different scoring methods for a rating SJT on internal consistency reliability, adverse impact and correlation with personality. The scoring methods varied on four aspects: the way of controlling for systematic error, and the type of reference group, distance and central tendency statistic. All scoring methods were applied to a previously validated integrity-based SJT, administered to 931 medical school applicants. Internal consistency reliability varied between .33 and .73, which is likely explained by the dependence of coefficient alpha on the total score variance. All scoring methods led to significantly higher scores for the ethnic majority than for the non-Western minorities, with effect sizes ranging from 0.48 to 0.66. Eighteen scoring methods showed a significant small positive correlation with agreeableness. Four scoring methods showed a significant small positive correlation with conscientiousness. The way of controlling for systematic error was the most influential scoring method aspect. These results suggest that the increased use of SJTs for selection into medical school must be accompanied by a thorough examination of the scoring method to be used

    Genomic Data Reveal Toxoplasma gondii Differentiation Mutants Are Also Impaired with Respect to Switching into a Novel Extracellular Tachyzoite State

    Get PDF
    Toxoplasma gondii pathogenesis includes the invasion of host cells by extracellular parasites, replication of intracellular tachyzoites, and differentiation to a latent bradyzoite stage. We present the analysis of seven novel T. gondii insertional mutants that do not undergo normal differentiation to bradyzoites. Microarray quantification of the variation in genome-wide RNA levels for each parasite line and times after induction allowed us to describe states in the normal differentiation process, to analyze mutant lines in the context of these states, and to identify genes that may have roles in initiating the transition from tachyzoite to bradyzoite. Gene expression patterns in wild-type parasites undergoing differentiation suggest a novel extracellular state within the tachyzoite stage. All mutant lines exhibit aberrant regulation of bradyzoite gene expression and notably some of the mutant lines appear to exhibit high proportions of the intracellular tachyzoite state regardless of whether they are intracellular or extracellular. In addition to the genes identified by the insertional mutagenesis screen, mixture model analysis allowed us to identify a small number of genes, in mutants, for which expression patterns could not be accounted for using the three parasite states – genes that may play a mechanistic role in switching from the tachyzoite to bradyzoite stage
    corecore