1,329 research outputs found
Bandit Models of Human Behavior: Reward Processing in Mental Disorders
Drawing an inspiration from behavioral studies of human decision making, we
propose here a general parametric framework for multi-armed bandit problem,
which extends the standard Thompson Sampling approach to incorporate reward
processing biases associated with several neurological and psychiatric
conditions, including Parkinson's and Alzheimer's diseases,
attention-deficit/hyperactivity disorder (ADHD), addiction, and chronic pain.
We demonstrate empirically that the proposed parametric approach can often
outperform the baseline Thompson Sampling on a variety of datasets. Moreover,
from the behavioral modeling perspective, our parametric framework can be
viewed as a first step towards a unifying computational model capturing reward
processing abnormalities across multiple mental conditions.Comment: Conference on Artificial General Intelligence, AGI-1
Order of Magnitude Smaller Limit on the Electric Dipole Moment of the Electron
The Standard Model of particle physics is known to be incomplete. Extensions to the Standard Model, such as weak-scale supersymmetry, posit the existence of new particles and interactions that are asymmetric under time reversal (T) and nearly always predict a small yet potentially measurable electron electric dipole moment (EDM), d_e, in the range of 10^(−27) to 10^(−30) e·cm. The EDM is an asymmetric charge distribution along the electron spin (S) that is also asymmetric under T. Using the polar molecule thorium monoxide, we measured d_e = (–2.1±3.7_(stat)±2.5_(syst)) × 10−29 e·cm. This corresponds to an upper limit of ❘d_e❘ < 8.7 × 10^(−29) e·cm with 90% confidence, an order of magnitude
improvement in sensitivity relative to the previous best limit. Our result constrains T-violating physics at the TeV energy scale
Stateful protocol composition
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this recordWe prove a parallel compositionality result for protocols with a shared mutable state, i.e., stateful protocols. For protocols satisfying certain compositionality conditions our result shows that verifying the component protocols in isolation is sufficient to prove security of their composition. Our main contribution is an extension of the compositionality paradigm to stateful protocols where participants maintain shared databases. Because of the generality of our result we also cover many forms of sequential composition as a special case of stateful parallel composition. Moreover, we support declassification of shared secrets. As a final contribution we prove the core of our result in Isabelle/HOL, providing a strong correctness guarantee of our proofs.Danish Council for Independent Research
Stateful protocol composition and typing
This is the final version. Available from the publisher via the link in this record.We provide in this AFP entry several relative soundness results for security protocols. In particular, we prove typing and compositionality results for stateful protocols (i.e., protocols with mutable state that may span several sessions), and that focuses on reachability properties. Such results are useful to simplify protocol verification by reducing it to a simpler problem: Typing results give conditions under which it is safe to verify a protocol in a typed model where only "well-typed" attacks can occur whereas compositionality results allow us to verify a composed protocol by only verifying the component protocols in isolation. The conditions on the protocols under which the results hold are furthermore syntactic in nature allowing for full automation. The foundation presented here is used in another entry to provide fully automated and formalized security proofs of stateful protocols
Recommended from our members
Memory for medication side effects in younger and older adults: the role of subjective and objective importance
Older adults often experience memory impairments, but can sometimes use selective processing and schematic support to remember important information. The current experiments investigate to what degree younger and healthy older adults remember medication side effects that were subjectively or objectively important to remember. Participants studied a list of common side effects, and rated how negative these effects were if they were to experience them, and were then given a free recall test. In Experiment 1, the severity of the side effects ranged from mild (e.g., itching) to severe (e.g., stroke), and in Experiment 2, certain side effects were indicated as critical to remember (i.e., “contact your doctor if you experience this”). There were no age differences in terms of free recall of the side effects, and older adults remembered more severe side effects relative to mild effects. However, older adults were less likely to recognize critical side effects on a later recognition test, relative to younger adults. The findings suggest that older adults can selectively remember medication side effects, but have difficulty identifying familiar but potentially critical side effects, and this has implications for monitoring medication use in older age
Complete chloroplast genome sequence of Holoparasite Cistanche Deserticola (Orobanchaceae) reveals gene loss and horizontal gene transfer from Its host Haloxylon Ammodendron (Chenopodiaceae)
The central function of chloroplasts is to carry out photosynthesis, and its gene content and structure are highly conserved across land plants. Parasitic plants, which have reduced photosynthetic ability, suffer gene losses from the chloroplast (cp) genome accompanied by the relaxation of selective constraints. Compared with the rapid rise in the number of cp genome sequences of photosynthetic organisms, there are limited data sets from parasitic plants. The authors report the complete sequence of the cp genome of Cistanche deserticola, a holoparasitic desert species belonging to the family Orobanchaceae
Automated stateful protocol verification
This is the final version. Available from the publisher via the link in this record.In protocol verification we observe a wide spectrum from fully automated methods to interactive theorem proving with proof assistants like Isabelle/HOL. In this AFP entry, we present a fully-automated approach for verifying stateful security protocols, i.e., protocols with mutable state that may span several sessions. The approach supports reachability goals like secrecy and authentication. We also include a simple user-friendly transaction-based protocol specification language that is embedded into Isabelle
Pan-Cancer Analysis of lncRNA Regulation Supports Their Targeting of Cancer Genes in Each Tumor Context
Long noncoding RNAs (lncRNAs) are commonly dys-regulated in tumors, but only a handful are known toplay pathophysiological roles in cancer. We inferredlncRNAs that dysregulate cancer pathways, onco-genes, and tumor suppressors (cancer genes) bymodeling their effects on the activity of transcriptionfactors, RNA-binding proteins, and microRNAs in5,185 TCGA tumors and 1,019 ENCODE assays.Our predictions included hundreds of candidateonco- and tumor-suppressor lncRNAs (cancerlncRNAs) whose somatic alterations account for thedysregulation of dozens of cancer genes and path-ways in each of 14 tumor contexts. To demonstrateproof of concept, we showed that perturbations tar-geting OIP5-AS1 (an inferred tumor suppressor) andTUG1 and WT1-AS (inferred onco-lncRNAs) dysre-gulated cancer genes and altered proliferation ofbreast and gynecologic cancer cells. Our analysis in-dicates that, although most lncRNAs are dysregu-lated in a tumor-specific manner, some, includingOIP5-AS1, TUG1, NEAT1, MEG3, and TSIX, synergis-tically dysregulate cancer pathways in multiple tumorcontexts
Genomic, Pathway Network, and Immunologic Features Distinguishing Squamous Carcinomas
This integrated, multiplatform PanCancer Atlas study co-mapped and identified distinguishing
molecular features of squamous cell carcinomas (SCCs) from five sites associated with smokin
Study of decays to the final state and evidence for the decay
A study of decays is performed for the first time
using data corresponding to an integrated luminosity of 3.0
collected by the LHCb experiment in collisions at centre-of-mass energies
of and TeV. Evidence for the decay
is reported with a significance of 4.0 standard deviations, resulting in the
measurement of
to
be .
Here denotes a branching fraction while and
are the production cross-sections for and mesons.
An indication of weak annihilation is found for the region
, with a significance of
2.4 standard deviations.Comment: All figures and tables, along with any supplementary material and
additional information, are available at
https://lhcbproject.web.cern.ch/lhcbproject/Publications/LHCbProjectPublic/LHCb-PAPER-2016-022.html,
link to supplemental material inserted in the reference
- …
