12 research outputs found
A Multi-Scale Approach to Directional Field Estimation
This paper proposes a robust method for directional field estimation from fingerprint images that combines estimates at multiple scales. The method is able to provide accurate estimates in scratchy regions, while at the same time maintaining correct estimates around singular points. Compared to other methods, the penalty for detecting false singular points is much smaller, because this does not deteriorate the directional field estimate
Queues with random back-offs
We consider a broad class of queueing models with random state-dependent
vacation periods, which arise in the analysis of queue-based back-off
algorithms in wireless random-access networks. In contrast to conventional
models, the vacation periods may be initiated after each service completion,
and can be randomly terminated with certain probabilities that depend on the
queue length. We examine the scaled queue length and delay in a heavy-traffic
regime, and demonstrate a sharp trichotomy, depending on how the activation
rate and vacation probability behave as function of the queue length. In
particular, the effect of the vacation periods may either (i) completely vanish
in heavy-traffic conditions, (ii) contribute an additional term to the queue
lengths and delays of similar magnitude, or even (iii) give rise to an
order-of-magnitude increase. The heavy-traffic asymptotics are obtained by
combining stochastic lower and upper bounds with exact results for some
specific cases. The heavy-traffic trichotomy provides valuable insight in the
impact of the back-off algorithms on the delay performance in wireless
random-access networks
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
Cramer and Damg\aa{}rd were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For linear equations and unknowns, and for the case , the computational complexity of their protocol is . Follow-up work (by Cramer, Kiltz, and PadrĆ³) proposes another constant-rounds protocol for solving this problem, which has complexity . For certain applications, such asymptotic complexities might be prohibitive. In this work, we improve the asymptotic computational complexity of solving a linear system over a finite field, thereby sacrificing the constant-rounds property. We propose two protocols: (1) a protocol based on pivoting-free Gaussian elimination with computational complexity and linear round complexity, and (2) a protocol based on block-recursive matrix decomposition, having computational complexity (assuming ``cheap\u27\u27 secure inner products as in Shamir\u27s secret-sharing scheme) and (super-linear) round complexity
Proactive and integrated primary care for frail older people: design and methodological challenges of the Utrecht primary care PROactive frailty intervention trial (U-PROFIT)
<p>Abstract</p> <p>Background</p> <p>Currently, primary care for frail older people is reactive, time consuming and does not meet patients' needs. A transition is needed towards proactive and integrated care, so that daily functioning and a good quality of life can be preserved. To work towards these goals, two interventions were developed to enhance the care of frail older patients in general practice: a screening and monitoring intervention using routine healthcare data (U-PRIM) and a nurse-led multidisciplinary intervention program (U-CARE). The U-PROFIT trial was designed to evaluate the effectiveness of these interventions. The aim of this paper is to describe the U-PROFIT trial design and to discuss methodological issues and challenges.</p> <p>Methods/Design</p> <p>The effectiveness of U-PRIM and U-CARE is being tested in a three-armed, cluster randomized trial in 58 general practices in the Netherlands, with approximately 5000 elderly individuals expected to participate. The primary outcome is the effect on activities of daily living as measured with the Katz ADL index. Secondary outcomes are quality of life, mortality, nursing home admission, emergency department and out-of-hours General Practice (GP), surgery visits, and caregiver burden.</p> <p>Discussion</p> <p>In a large, pragmatic trial conducted in daily clinical practice with frail older patients, several challenges and methodological issues will occur. Recruitment and retention of patients and feasibility of the interventions are important issues. To enable broad generalizability of results, careful choices of the design and outcome measures are required. Taking this into account, the U-PROFIT trial aims to provide robust evidence for a structured and integrated approach to provide care for frail older people in primary care.</p> <p>Trial registration</p> <p><a href="http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=2288">NTR2288</a></p
Real-time control of an ensemble of heterogeneous resources
This paper focuses on the problem of controlling an ensemble of heterogeneous resources connected to an electrical grid at the same point of common coupling (PCC). The controller receives an aggregate power setpoint for the ensemble in real time and tracks this setpoint by issuing individual optimal setpoints to the resources. The resources can have continuous or discrete nature (e.g., heating systems consisting of a finite number of heaters that each can be either switched on or off) and/or can be highly uncertain (e.g., photovoltaic (PV) systems or residential loads). A naĆÆve approach would lead to a stochastic mixed-integer optimization problem to be solved at the controller at each time step, which might be infeasible in real time. Instead, we allow the controller to solve a continuous convex optimization problem and compensate for the errors at the resource level by using a variant of the well-known error diffusion algorithm. We give conditions guaranteeing that our algorithm tracks the power setpoint at the PCC on average while issuing optimal setpoints to individual resources. We illustrate the approach numerically by controlling a collection of batteries, PV systems, and discrete loads
Efficient Secure Ridge Regression from Randomized Gaussian Elimination
In this paper we present a practical protocol for secure ridge regression. We develop the necessary secure linear algebra tools, using only basic arithmetic over prime fields. In particular, we will show how to solve linear systems of equations and compute matrix inverses efficiently, using appropriate secure random self-reductions of these problems. The distinguishing feature of our approach is that the use of secure fixed-point arithmetic is avoided entirely, while circumventing the need for rational reconstruction at any stage as well.
We demonstrate the potential of our protocol in a standard setting for information-theoretically secure multiparty computation, tolerating a dishonest minority of passively corrupt parties. Using the MPyC framework, which is based on threshold secret sharing over finite fields, we show how to handle large datasets efficiently, achieving practically the same root-mean-square errors as Scikit-learn. Moreover, we do not assume that any (part) of the datasets is held privately by any of the parties, which makes our protocol much more versatile than existing solutions
Energy minimization of repelling particles on a toric grid
We explore the minimum energy configurations of repelling particles distributed over possible locations forming a toric grid. We conjecture that the most energy-efficient way to distribute particles over this space is to place them in a checkerboard pattern. Numerical experiments validate this conjecture for reasonable choices of the repelling force. In the present paper, we prove this conjecture in a large number of special cases---most notably, when the sizes of the torus are either two or multiples of four in all dimensions and the repelling force is a completely monotonic function of the Lee distance between the particles