166 research outputs found
Pressure Induced Topological Phase Transitions in Membranes
Some highly unusual features of a lipid-water liquid crystal are revealed by
high pressure x-ray diffraction, light scattering and dilatometric studies of
the lamellar (bilayer ) to nonlamellar inverse hexagonal ()
phase transition. (i) The size of the unit cell of the phase increases
with increasing pressure. (ii) The transition volume, ,
decreases and appears to vanish as the pressure is increased. (iii) The
intensity of scattered light increases as decreases. Data are
presented which suggest that this increase is due to the formation of an
intermediate cubic phase, as predicted by recent theoretical suggestions of the
underlying universal phase sequence.Comment: 12 pages, typed using REVTEX 2.
Pressure Induced Hydration Dynamics of Membranes
Pressure-jump initiated time-resolved x-ray diffraction studies of dynamics
of the hydration of the hexagonal phase in biological membranes show that (i)
the relaxation of the unit cell spacing is non-exponential in time; (ii) the
Bragg peaks shift smoothly to their final positions without significant
broadening or loss in crystalline order. This suggests that the hydration is
not diffusion limited but occurs via a rather homogeneous swelling of the whole
lattice, described by power law kinetics with an exponent .Comment: REVTEX 3, 10 pages,3 figures(available on request),#
I Always Feel Like Somebody's Watching Me. Measuring Online Behavioural Advertising
Online Behavioural targeted Advertising (OBA) has risen in prominence as a
method to increase the effectiveness of online advertising. OBA operates by
associating tags or labels to users based on their online activity and then
using these labels to target them. This rise has been accompanied by privacy
concerns from researchers, regulators and the press. In this paper, we present
a novel methodology for measuring and understanding OBA in the online
advertising market. We rely on training artificial online personas representing
behavioural traits like 'cooking', 'movies', 'motor sports', etc. and build a
measurement system that is automated, scalable and supports testing of multiple
configurations. We observe that OBA is a frequent practice and notice that
categories valued more by advertisers are more intensely targeted. In addition,
we provide evidences showing that the advertising market targets sensitive
topics (e.g, religion or health) despite the existence of regulation that bans
such practices. We also compare the volume of OBA advertising for our personas
in two different geographical locations (US and Spain) and see little
geographic bias in terms of intensity of OBA targeting. Finally, we check for
targeting with do-not-track (DNT) enabled and discovered that DNT is not yet
enforced in the web.Comment: To appear in ACM CoNEXT 2015, Heidelberg, Germany. Please cite the
conference version of this pape
The Gross-Neveu-Yukawa Archipelago
We perform a bootstrap analysis of a mixed system of four-point functions of
bosonic and fermionic operators in parity-preserving 3d CFTs with O(N) global
symmetry. Our results provide rigorous bounds on the scaling dimensions of the
O(N)-symmetric Gross-Neveu-Yukawa (GNY) fixed points, constraining these
theories to live in isolated islands in the space of CFT data. We focus on the
cases N = 1, 2, 4, 8, which have applications to phase transitions in condensed
matter systems, and compare our bounds to previous analytical and numerical
results.Comment: 51 pages, 8 figures, 3 appendices; v2: small corrections and
clarifications to match JHEP versio
blocks_3d: Software for general 3d conformal blocks
We introduce the software blocks_3d for computing four-point conformal blocks of operators with arbitrary Lorentz representations in 3d CFTs. It uses Zamolodchikov-like recursion relations to numerically compute derivatives of blocks around a crossing-symmetric configuration. It is implemented as a heavily optimized, multithreaded, C++ application. We give performance benchmarks for correlators containing scalars, fermions, and stress tensors. As an example application, we recompute bootstrap bounds on four-point functions of fermions and study whether a previously observed sharp jump can be explained using the "fake primary" effect. We conclude that the fake primary effect cannot fully explain the jump and the possible existence of a "dead-end" CFT near the jump merits further study
blocks_3d: Software for general 3d conformal blocks
We introduce the software blocks_3d for computing four-point conformal blocks
of operators with arbitrary Lorentz representations in 3d CFTs. It uses
Zamolodchikov-like recursion relations to numerically compute derivatives of
blocks around a crossing-symmetric configuration. It is implemented as a
heavily optimized, multithreaded, C++ application. We give performance
benchmarks for correlators containing scalars, fermions, and stress tensors. As
an example application, we recompute bootstrap bounds on four-point functions
of fermions and study whether a previously observed sharp jump can be explained
using the "fake primary" effect. We conclude that the fake primary effect
cannot fully explain the jump and the possible existence of a "dead-end" CFT
near the jump merits further study.Comment: 33 pages + appendice
Global delivery models: the role of talent, speed and time zones in the global outsourcing industry
Global delivery models (GDMs) are transforming the global IT and business process outsourcing industry. GDMs are a new form of client-specific investment promoting service integration with clients by combining client proximity with time-zone spread for 24/7 service operations. We investigate antecedents and contingencies of setting up GDM structures. Based on comprehensive data we show that providers are likely to establish GDM location configurations when clients value access to globally distributed talent and speed of service delivery, in particular when services are highly commoditized. Findings imply that coordination across time zones increasingly affects international operations in business-to-business and born-global industries
On the nature and impact of self-similarity in real-time systems
In real-time systems with highly variable task execution times simplistic task models are insufficient to accurately model and to analyze the system. Variability can be tackled using distributions rather than a single value, but the proper charac- terization depends on the degree of variability. Self-similarity is one of the deep- est kinds of variability. It characterizes the fact that a workload is not only highly variable, but it is also bursty on many time-scales. This paper identifies in which situations this source of indeterminism can appear in a real-time system: the com- bination of variability in task inter-arrival times and execution times. Although self- similarity is not a claim for all systems with variable execution times, it is not unusual in some applications with real-time requirements, like video processing, networking and gaming.
The paper shows how to properly model and to analyze self-similar task sets and how improper modeling can mask deadline misses. The paper derives an analyti- cal expression for the dependence of the deadline miss ratio on the degree of self- similarity and proofs its negative impact on real-time systems performance through system¿s modeling and simulation. This study about the nature and impact of self- similarity on soft real-time systems can help to reduce its effects, to choose the proper scheduling policies, and to avoid its causes at system design time.This work was developed under a grant from the European Union (FRESCOR-FP6/2005/IST/5-03402).Enrique Hernández-Orallo; Vila Carbó, JA. (2012). On the nature and impact of self-similarity in real-time systems. Real-Time Systems. 48(3):294-319. doi:10.1007/s11241-012-9146-0S294319483Abdelzaher TF, Sharma V, Lu C (2004) A utilization bound for aperiodic tasks and priority driven scheduling. IEEE Trans Comput 53(3):334–350Abeni L, Buttazzo G (1999) QoS guarantee using probabilistic deadlines. In: Proc of the Euromicro confererence on real-time systemsAbeni L, Buttazzo G (2004) Resource reservation in dynamic real-time systems. Real-Time Syst 37(2):123–167Anantharam V (1999) Scheduling strategies and long-range dependence. Queueing Syst 33(1–3):73–89Beran J (1994) Statistics for long-memory processes. Chapman and Hall, LondonBeran J, Sherman R, Taqqu M, Willinger W (1995) Long-range dependence in variable-bit-rate video traffic. IEEE Trans Commun 43(2):1566–1579Boxma O, Zwart B (2007) Tails in scheduling. SIGMETRICS Perform Eval Rev 34(4):13–20Brichet F, Roberts J, Simonian A, Veitch D (1996) Heavy traffic analysis of a storage model with long range dependent on/off sources. Queueing Syst 23(1):197–215Crovella M, Bestavros A (1997) Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans Netw 5(6):835–846Dìaz J, Garcìa D, Kim K, Lee C, Bello LL, López J, Min LS, Mirabella O (2002) Stochastic analysis of periodic real-time systems. In: Proc of the 23rd IEEE real-time systems symposium, pp 289–300Erramilli A, Narayan O, Willinger W (1996) Experimental queueing analysis with long-range dependent packet traffic. IEEE/ACM Trans Netw 4(2):209–223Erramilli A, Roughan M, Veitch D, Willinger W (2002) Self-similar traffic and network dynamics. Proc IEEE 90(5):800–819Gardner M (1999) Probabilistic analysis and scheduling of critical soft real-time systems. Phd thesis, University of Illinois, Urbana-ChampaignGarrett MW, Willinger W (1994) Analysis, modeling and generation of self-similar vbr video traffic. In: ACM SIGCOMMHarchol-Balter M (2002) Task assignment with unknown duration. J ACM 49(2):260–288Harchol-Balter M (2007) Foreword: Special issue on new perspective in scheduling. SIGMETRICS Perform Eval Rev 34(4):2–3Harchol-Balter M, Downey AB (1997) Exploiting process lifetime distributions for dynamic load balancing. ACM Trans Comput Syst 15(3):253–285Hernandez-Orallo E, Vila-Carbo J (2007) Network performance analysis based on histogram workload models. In: Proceedings of the 15th international symposium on modeling, analysis, and simulation of computer and telecommunication systems (MASCOTS), pp 331–336Hernandez-Orallo E, Vila-Carbo J (2010) Analysis of self-similar workload on real-time systems. In: IEEE real-time and embedded technology and applications symposium (RTAS). IEEE Computer Society, Washington, pp 343–352Hernández-Orallo E, Vila-Carbó J (2010) Network queue and loss analysis using histogram-based traffic models. Comput Commun 33(2):190–201Hughes CJ, Kaul P, Adve SV, Jain R, Park C, Srinivasan J (2001) Variability in the execution of multimedia applications and implications for architecture. SIGARCH Comput Archit News 29(2):254–265Leland W, Ott TJ (1986) Load-balancing heuristics and process behavior. SIGMETRICS Perform Eval Rev 14(1):54–69Leland WE, Taqqu MS, Willinger W, Wilson DV (1994) On the self-similar nature of ethernet traffic (extended version). IEEE/ACM Trans Netw 2(1):1–15Liu CL, Layland JW (1973) Scheduling algorithms for multiprogramming in a hard-real-time environment. J ACM 20(1):46–61Mandelbrot B (1965) Self-similar error clusters in communication systems and the concept of conditional stationarity. IEEE Trans Commun 13(1):71–90Mandelbrot BB (1969) Long run linearity, locally Gaussian processes, h-spectra and infinite variances. Int Econ Rev 10:82–113Norros I (1994) A storage model with self-similar input. Queueing Syst 16(3):387–396Norros I (2000) Queueing behavior under fractional Brownian traffic. In: Park K, Willinger W (eds) Self-similar network traffic and performance evaluation. Willey, New York, Chap 4Park K, Willinger W (2000) Self-similar network traffic: An overview. In: Park K, Willinger W (eds) Self-similar network traffic and performance evaluation. Willey, New York, Chap 1Paxson V, Floyd S (1995) Wide area traffic: the failure of Poisson modeling. IEEE/ACM Trans Netw 3(3):226–244Rolls DA, Michailidis G, Hernández-Campos F (2005) Queueing analysis of network traffic: methodology and visualization tools. Comput Netw 48(3):447–473Rose O (1995) Statistical properties of mpeg video traffic and their impact on traffic modeling in atm systems. In: Conference on local computer networksRoy N, Hamm N, Madhukar M, Schmidt DC, Dowdy L (2009) The impact of variability on soft real-time system scheduling. In: RTCSA ’09: Proceedings of the 2009 15th IEEE international conference on embedded and real-time computing systems and applications. IEEE Computer Society, Washington, pp 527–532Sha L, Abdelzaher T, Årzén KE, Cervin A, Baker T, Burns A, Buttazzo G, Caccamo M, Lehoczky J, Mok AK (2004) Real time scheduling theory: A historical perspective. Real-Time Syst 28(2):101–155Taqqu MS, Willinger W, Sherman R (1997) Proof of a fundamental result in self-similar traffic modeling. SIGCOMM Comput Commun Rev 27(2):5–23Tia T, Deng Z, Shankar M, Storch M, Sun J, Wu L, Liu J (1995) Probabilistic performance guarantee for real-time tasks with varying computation times. In: Proc of the real-time technology and applications symposium, pp 164–173Vila-Carbó J, Hernández-Orallo E (2008) An analysis method for variable execution time tasks based on histograms. Real-Time Syst 38(1):1–37Willinger W, Taqqu M, Erramilli A (1996) A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networks. In: Stochastic networks: Theory and applications, pp 339–366Willinger W, Taqqu MS, Sherman R, Wilson DV (1997) Self-similarity through high-variability: statistical analysis of ethernet lan traffic at the source level. IEEE/ACM Trans Netw 5(1):71–8
Social features of online networks: the strength of intermediary ties in online social media
An increasing fraction of today social interactions occur using online social
media as communication channels. Recent worldwide events, such as social
movements in Spain or revolts in the Middle East, highlight their capacity to
boost people coordination. Online networks display in general a rich internal
structure where users can choose among different types and intensity of
interactions. Despite of this, there are still open questions regarding the
social value of online interactions. For example, the existence of users with
millions of online friends sheds doubts on the relevance of these relations. In
this work, we focus on Twitter, one of the most popular online social networks,
and find that the network formed by the basic type of connections is organized
in groups. The activity of the users conforms to the landscape determined by
such groups. Furthermore, Twitter's distinction between different types of
interactions allows us to establish a parallelism between online and offline
social networks: personal interactions are more likely to occur on internal
links to the groups (the weakness of strong ties), events transmitting new
information go preferentially through links connecting different groups (the
strength of weak ties) or even more through links connecting to users belonging
to several groups that act as brokers (the strength of intermediary ties).Comment: 14 pages, 18 figure
- …
