34 resultados para unconditional guarantees


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: Intrauterine, early life and maternal exposures may have important consequences for cancer development in later life. The aim of this study was to examine perinatal and birth characteristics with respect to Cutaneous malignant melanoma (CMM) risk. Methods: The Northern Ireland Child Health System database was used to examine gestational age adjusted birth weight, infant feeding practices, parental age and socioeconomic factors at birth in relation to CMM risk amongst 447,663 infants delivered between January 1971 and December 1986. Follow-up of histologically verified CMM cases was undertaken from the beginning of 1993 to 31st December 2007. Multivariable adjusted unconditional logistic regression was used to calculate odds ratios (OR) and 95% confidence intervals (CI) of CMM risk. Results: A total of 276 CMM cases and 440,336 controls contributed to the final analysis. In reference to normal (gestational age-adjusted) weight babies, those heaviest at birth were twice as likely to develop CMM OR 2.4 (95% CI 1.1-5.1). Inverse associations with CMM risk were observed with younger (

Relevância:

10.00% 10.00%

Publicador:

Resumo:

DNA methyltransferase (DNMT) 3A and DNMT3B are both active de novo DNA methyltransferases required for development, whereas DNMT3L, which has no demonstrable methyltransferase activity, is required for methylation of imprinted genes in the oocyte. We show here that different mechanisms are used to restrict access by these proteins to their targets during germ cell development. Transcriptional control of the Dnmt3l promoter guarantees that message is low or absent except during periods of de novo activity. Use of an alternative promoter at the Dnmt3a locus produces the shorter Dnmt3a2 transcript in the germ line and postimplantation embryo only, whereas alternative splicing of the Dnmt3b transcript ensures that Dnmt3b1 is absent in the male prospermatogonia. Control of subcellular protein localization is a common theme for DNMT3A and DNMT3B, as proteins were seen in the nucleus only when methylation was occurring. These mechanisms converge to ensure that the only time that functional products from each locus are present in the germ cell nuclei is around embryonic day 17.5 in males and after birth in the growing oocytes in females.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: Polymorphisms in the vitamin D receptor (VDR) gene may be of etiological importance in determining cancer risk. The aim of this study was to assess the association between common VDR gene polymorphisms and esophageal adenocarcinoma (EAC) risk in an all-Ireland population-based case-control study. Methods: EAC cases and frequency-matched controls by age and gender recruited between March 2002 and December 2004 throughout Ireland were included. Participants were interviewed, and a blood sample collected for DNA extraction. Twenty-seven single nucleotide polymorphisms in the VDR gene were genotyped using Sequenom or TaqMan assays while the poly(A) microsatellite was genotyped by fluorescent fragment analysis. Unconditional logistic regression was applied to assess the association between VDR polymorphisms and EAC risk. Results: A total of 224 cases of EAC and 256 controls were involved in analyses. After adjustment for potential confounders, TT homozygotes at rs2238139 and rs2107301 had significantly reduced risks of EAC compared with CC homozygotes. In contrast, SS alleles of the poly(A) microsatellite had significantly elevated risks of EAC compared with SL/LL alleles. However, following permutation analyses to adjust for multiple comparisons, no significant associations were observed between any VDR gene polymorphism and EAC risk. Conclusions: VDR gene polymorphisms were not significantly associated with EAC development in this Irish population. Confirmation is required from larger studies. © Springer Science+Business Media, LLC 2011.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of self-healing in reconfigurable networks e.g., peer-to-peer and wireless mesh networks. For such networks under repeated attack by an omniscient adversary, we propose a fully distributed algorithm, Xheal, that maintains good expansion and spectral properties of the network, while keeping the network connected. Moreover, Xheal does this while allowing only low stretch and degree increase per node. The algorithm heals global properties like expansion and stretch while only doing local changes and using only local information. We also provide bounds on the second smallest eigenvalue of the Laplacian which captures key properties such as mixing time, conductance, congestion in routing etc. Xheal has low amortized latency and bandwidth requirements. Our work improves over the self-healing algorithms Forgiving tree [PODC 2008] andForgiving graph [PODC 2009] in that we are able to give guarantees on degree and stretch, while at the same time preserving the expansion and spectral properties of the network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present a unified approach to an energy-efficient variation-tolerant design of Discrete Wavelet Transform (DWT) in the context of image processing applications. It is to be noted that it is not necessary to produce exactly correct numerical outputs in most image processing applications. We exploit this important feature and propose a design methodology for DWT which shows energy quality tradeoffs at each level of design hierarchy starting from the algorithm level down to the architecture and circuit levels by taking advantage of the limited perceptual ability of the Human Visual System. A unique feature of this design methodology is that it guarantees robustness under process variability and facilitates aggressive voltage over-scaling. Simulation results show significant energy savings (74% - 83%) with minor degradations in output image quality and avert catastrophic failures under process variations compared to a conventional design. © 2010 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a fully-distributed self-healing algorithm DEX, that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders - whose expansion properties hold deterministically - that works even under an all-powerful adaptive adversary that controls the dynamic changes to the network (the adversary has unlimited computational power and knowledge of the entire network state, can decide which nodes join and leave and at what time, and knows the past random choices made by the algorithm). Previous distributed expander constructions typically provide only probabilistic guarantees on the network expansion which rapidly degrade in a dynamic setting, in particular, the expansion properties can degrade even more rapidly under adversarial insertions and deletions. Our algorithm provides efficient maintenance and incurs a low overhead per insertion/deletion by an adaptive adversary: only O(log n) rounds and O(log n) messages are needed with high probability (n is the number of nodes currently in the network). The algorithm requires only a constant number of topology changes. Moreover, our algorithm allows for an efficient implementation and maintenance of a distributed hash table (DHT) on top of DEX, with only a constant additional overhead. Our results are a step towards implementing efficient self-healing networks that have guaranteed properties (constant bounded degree and expansion) despite dynamic changes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the problem of learning Bayesian network structures from data based on score functions that are decomposable. It describes properties that strongly reduce the time and memory costs of many known methods without losing global optimality guarantees. These properties are derived for different score criteria such as Minimum Description Length (or Bayesian Information Criterion), Akaike Information Criterion and Bayesian Dirichlet Criterion. Then a branch-and-bound algorithm is presented that integrates structural constraints with data in a way to guarantee global optimality. As an example, structural constraints are used to map the problem of structure learning in Dynamic Bayesian networks into a corresponding augmented Bayesian network. Finally, we show empirically the benefits of using the properties with state-of-the-art methods and with the new algorithm, which is able to handle larger data sets than before.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper (co-written with Dr Maria Lohan, Dr Carmel Kelly & Professor Laura Lundy) will describe the ethical review process to undertake health research in the UK, and explain an approach that can help researchers deal with ethical and methodological dilemmas in their research. Ethical review is necessary to ensure researchers and participants are protected, yet the requirement to ‘pass’ numerous committees may be challenging particularly for health researchers who work with vulnerable groups and sensitive topics. The inclusion of these groups/topics is crucial if health researchers are to understand health disparities and implement appropriate interventions with health benefits for vulnerable populations. It is proposed that to overcome ethical and methodological challenges and pitfalls, researchers must implement strategies that advocate for, and increase the participation of, vulnerable populations in health research. A ‘children’s rights based approach’ using participatory methodology will be described that draws on the jurisprudence of international law, (United Nations Convention on the Rights of the Child, 1989) and provides a framework that may empower ethics committees to carry out their function confidently. The role of the researcher, framed within the context of doctoral level study, will be reviewed in terms of the investment required and benefits of utilising this approach. It will be argued that adopting this approach with vulnerable groups, not only guarantees their meaningful participation in the research process and permits their voices to be heard, but also offers ethics committees an internationally agreed upon legal framework, ratified by their governing States, from which to fulfil their obligations and resolve their ethical dilemmas. Increasing the representation and participation of vulnerable groups in health research can inform the development of health policy and practice based on ‘insider knowledge’ that better engages with and more adequately reflects their specific needs. This is likely to yield numerous health, social and economic benefits for all of society through the delivery of more equitable, effective and sustainable services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: High digestible carbohydrate intakes can induce hyperglycemia and hyperinsulinemia and collectively have been implicated in colorectal tumor development. Our aim was to explore the association between aspects of dietary carbohydrate intake and risk of colorectal adenomas and hyperplastic polyps in a large case–control study.

Methods: Colorectal polyp cases (n = 1,315 adenomas only, n = 566 hyperplastic polyps only and n = 394 both) and controls (n = 3,184) undergoing colonoscopy were recruited between 2003 and 2010 in Nashville, Tennessee, USA. Dietary intakes were estimated by a 108-item food frequency questionnaire. Unconditional logistic regression analysis was applied to determine odds ratios (OR) and corresponding 95 % confidence intervals (CI) for colorectal polyps according to dietary carbohydrate intakes, after adjustment for potential confounders.

Results: No significant associations were detected for risk of colorectal adenomas when comparing the highest versus lowest quartiles of intake for total sugars (OR 1.03; 95 % CI 0.84–1.26), starch (OR 1.01; 95 % CI 0.81–1.26), total or available carbohydrate intakes. Similar null associations were observed between dietary carbohydrate intakes and risk of hyperplastic polyps, or concurrent adenomas and hyperplastic polyps.

Conclusion: In this US population, digestible carbohydrate intakes were not associated with risk of colorectal polyps, suggesting that dietary carbohydrate does not have an etiological role in the early stages of colorectal carcinogenesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe, for the first time, considerations in the sterile manufacture of polymeric microneedle arrays. Microneedles (MN) made from dissolving polymeric matrices and loaded with the model drugs ovalbumin (OVA) and ibuprofen sodium and hydrogel-forming MN composed of "super-swelling" polymers and their corresponding lyophilised wafer drug reservoirs loaded with OVA and ibuprofen sodium were prepared aseptically or sterilised using commonly employed sterilisation techniques. Moist and dry heat sterilisation, understandably, damaged all devices, leaving aseptic production and gamma sterilisation as the only viable options. No measureable bioburden was detected in any of the prepared devices, and endotoxin levels were always below the US Food & Drug Administration limits (20 endotoxin units/device). Hydrogel-forming MN were unaffected by gamma irradiation (25 kGy) in terms of their physical properties or capabilities in delivering OVA and ibuprofen sodium across excised neonatal porcine skin in vitro. However, OVA content in dissolving MN (down from approximately 101.1 % recovery to approximately 58.3 % recovery) and lyophilised wafer-type drug reservoirs (down from approximately 99.7 % recovery to approximately 60.1 % recovery) was significantly reduced by gamma irradiation, while the skin permeation profile of ibuprofen sodium from gamma-irradiated dissolving MN was markedly different from their non-irradiated counterparts. It is clear that MN poses a very low risk to human health when used appropriately, as evidenced here by low endotoxin levels and absence of microbial contamination. However, if guarantees of absolute sterility of MN products are ultimately required by regulatory authorities, it will be necessary to investigate the effect of lower gamma doses on dissolving MN loaded with active pharmaceutical ingredients and lyophilised wafers loaded with biomolecules in order to avoid the expense and inconvenience of aseptic processing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motivated by the need for designing efficient and robust fully-distributed computation in highly dynamic networks such as Peer-to-Peer (P2P) networks, we study distributed protocols for constructing and maintaining dynamic network topologies with good expansion properties. Our goal is to maintain a sparse (bounded degree) expander topology despite heavy {\em churn} (i.e., nodes joining and leaving the network continuously over time). We assume that the churn is controlled by an adversary that has complete knowledge and control of what nodes join and leave and at what time and has unlimited computational power, but is oblivious to the random choices made by the algorithm. Our main contribution is a randomized distributed protocol that guarantees with high probability the maintenance of a {\em constant} degree graph with {\em high expansion} even under {\em continuous high adversarial} churn. Our protocol can tolerate a churn rate of up to $O(n/\poly\log(n))$ per round (where $n$ is the stable network size). Our protocol is efficient, lightweight, and scalable, and it incurs only $O(\poly\log(n))$ overhead for topology maintenance: only polylogarithmic (in $n$) bits needs to be processed and sent by each node per round and any node's computation cost per round is also polylogarithmic. The given protocol is a fundamental ingredient that is needed for the design of efficient fully-distributed algorithms for solving fundamental distributed computing problems such as agreement, leader election, search, and storage in highly dynamic P2P networks and enables fast and scalable algorithms for these problems that can tolerate a large amount of churn.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We study the fundamental Byzantine leader election problem in dynamic networks where the topology can change from round to round and nodes can also experience heavy {\em churn} (i.e., nodes can join and leave the network continuously over time). We assume the full information model where the Byzantine nodes have complete knowledge about the entire state of the network at every round (including random choices made by all the nodes), have unbounded computational power and can deviate arbitrarily from the protocol. The churn is controlled by an adversary that has complete knowledge and control over which nodes join and leave and at what times and also may rewire the topology in every round and has unlimited computational power, but is oblivious to the random choices made by the algorithm. Our main contribution is an $O(\log^3 n)$ round algorithm that achieves Byzantine leader election under the presence of up to $O({n}^{1/2 - \epsilon})$ Byzantine nodes (for a small constant $\epsilon > 0$) and a churn of up to \\$O(\sqrt{n}/\poly\log(n))$ nodes per round (where $n$ is the stable network size).The algorithm elects a leader with probability at least $1-n^{-\Omega(1)}$ and guarantees that it is an honest node with probability at least $1-n^{-\Omega(1)}$; assuming the algorithm succeeds, the leader's identity will be known to a $1-o(1)$ fraction of the honest nodes. Our algorithm is fully-distributed, lightweight, and is simple to implement. It is also scalable, as it runs in polylogarithmic (in $n$) time and requires nodes to send and receive messages of only polylogarithmic size per round.To the best of our knowledge, our algorithm is the first scalable solution for Byzantine leader election in a dynamic network with a high rate of churn; our protocol can also be used to solve Byzantine agreement in a straightforward way.We also show how to implement an (almost-everywhere) public coin with constant bias in a dynamic network with Byzantine nodes and provide a mechanism for enabling honest nodes to store information reliably in the network, which might be of independent interest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a fully-distributed self-healing algorithm dex that maintains a constant degree expander network in a dynamic setting. To the best of our knowledge, our algorithm provides the first efficient distributed construction of expanders—whose expansion properties holddeterministically—that works even under an all-powerful adaptive adversary that controls the dynamic changes to the network (the adversary has unlimited computational power and knowledge of the entire network state, can decide which nodes join and leave and at what time, and knows the past random choices made by the algorithm). Previous distributed expander constructions typically provide only probabilistic guarantees on the network expansion whichrapidly degrade in a dynamic setting; in particular, the expansion properties can degrade even more rapidly under adversarial insertions and deletions. Our algorithm provides efficient maintenance and incurs a low overhead per insertion/deletion by an adaptive adversary: only O(logn)O(log⁡n) rounds and O(logn)O(log⁡n) messages are needed with high probability (n is the number of nodes currently in the network). The algorithm requires only a constant number of topology changes. Moreover, our algorithm allows for an efficient implementation and maintenance of a distributed hash table on top of dex  with only a constant additional overhead. Our results are a step towards implementing efficient self-healing networks that have guaranteed properties (constant bounded degree and expansion) despite dynamic changes.

Gopal Pandurangan has been supported in part by Nanyang Technological University Grant M58110000, Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 2 Grant MOE2010-T2-2-082, MOE AcRF Tier 1 Grant MOE2012-T1-001-094, and the United States-Israel Binational Science Foundation (BSF) Grant 2008348. Peter Robinson has been supported by Grant MOE2011-T2-2-042 “Fault-tolerant Communication Complexity in Wireless Networks” from the Singapore MoE AcRF-2. Work done in part while the author was at the Nanyang Technological University and at the National University of Singapore. Amitabh Trehan has been supported by the Israeli Centers of Research Excellence (I-CORE) program (Center No. 4/11). Work done in part while the author was at Hebrew University of Jerusalem and at the Technion and supported by a Technion fellowship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The West has failed to properly integrate Russia into its worldview since 1991, and there is an obvious vacuum of ideas for how to deal with it. The default reaction is to fall back on the Cold War paradigm - sanctions, containment, and hopes of Russian regime change.

This is folly. There’s no knowing how long it will take for Russia to change tack, if it ever does; nothing guarantees that a new regime in Russia would be any more pro-Western. There’s also apparently no idea how to handle Russia in the meantime, especially while it remains a crucial part of crises like those in Iran and Syria.

Ukraine has shown that the placeholder post-Cold War order Europe and Russia inherited urgently needs replacing. With a ceasefire in place at last, the search for an alternative is on. The Geneva talks in April this year could be its basis; but nothing truly transformative will be achieved until the US, EU, Russia and Ukraine all recognise the need for compromise.