-
Extrinsically-Focused Evaluation of Omissions in Medical Summarization
Authors:
Elliot Schumacher,
Daniel Rosenthal,
Varun Nair,
Luladay Price,
Geoffrey Tso,
Anitha Kannan
Abstract:
The goal of automated summarization techniques (Paice, 1990; Kupiec et al, 1995) is to condense text by focusing on the most critical information. Generative large language models (LLMs) have shown to be robust summarizers, yet traditional metrics struggle to capture resulting performance (Goyal et al, 2022) in more powerful LLMs. In safety-critical domains such as medicine, more rigorous evaluati…
▽ More
The goal of automated summarization techniques (Paice, 1990; Kupiec et al, 1995) is to condense text by focusing on the most critical information. Generative large language models (LLMs) have shown to be robust summarizers, yet traditional metrics struggle to capture resulting performance (Goyal et al, 2022) in more powerful LLMs. In safety-critical domains such as medicine, more rigorous evaluation is required, especially given the potential for LLMs to omit important information in the resulting summary. We propose MED-OMIT, a new omission benchmark for medical summarization. Given a doctor-patient conversation and a generated summary, MED-OMIT categorizes the chat into a set of facts and identifies which are omitted from the summary. We further propose to determine fact importance by simulating the impact of each fact on a downstream clinical task: differential diagnosis (DDx) generation. MED-OMIT leverages LLM prompt-based approaches which categorize the importance of facts and cluster them as supporting or negating evidence to the diagnosis. We evaluate MED-OMIT on a publicly-released dataset of patient-doctor conversations and find that MED-OMIT captures omissions better than alternative metrics.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Optimal Strategies and Rules for the Game of Horse
Authors:
Daniel Rosenthal,
Jeffrey S. Rosenthal
Abstract:
We investigate the probability of scoring a point when playing the basketball shooting game called "Horse". We show that under the Traditional Rules, it is optimal to choose very easy shots. We propose alternative rules called Pops Rules, and show that they lead to more difficult optimal shots, and thus to a more interesting game.
We investigate the probability of scoring a point when playing the basketball shooting game called "Horse". We show that under the Traditional Rules, it is optimal to choose very easy shots. We propose alternative rules called Pops Rules, and show that they lead to more difficult optimal shots, and thus to a more interesting game.
△ Less
Submitted 17 January, 2022;
originally announced January 2022.
-
Finitely $\mathcal{F}$-amenable actions and Decomposition Complexity of Groups
Authors:
Andrew Nicas,
David Rosenthal
Abstract:
In his work on the Farrell-Jones Conjecture, Arthur Bartels introduced the concept of a "finitely $\mathcal{F}$-amenable" group action, where $\mathcal{F}$ is a family of subgroups. We show how a finitely $\mathcal{F}$-amenable action of a countable group $G$ on a compact metric space, where the asymptotic dimensions of the elements of $\mathcal{F}$ are bounded from above, gives an upper bound for…
▽ More
In his work on the Farrell-Jones Conjecture, Arthur Bartels introduced the concept of a "finitely $\mathcal{F}$-amenable" group action, where $\mathcal{F}$ is a family of subgroups. We show how a finitely $\mathcal{F}$-amenable action of a countable group $G$ on a compact metric space, where the asymptotic dimensions of the elements of $\mathcal{F}$ are bounded from above, gives an upper bound for the asymptotic dimension of $G$ viewed as a metric space with a proper left invariant metric. We generalize this to families $\mathcal{F}$ whose elements are contained in a collection, $\mathfrak{C}$, of metric families that satisfies some basic permanence properties: If $G$ is a countable group and each element of $\mathcal{F}$ belongs to $\mathfrak{C}$ and there exists a finitely $\mathcal{F}$-amenable action of $G$ on a compact metrizable space, then $G$ is in $\mathfrak{C}$. Examples of such collections of metric families include: metric families with weak finite decomposition complexity, exact metric families, and metric families that coarsely embed into Hilbert space.
△ Less
Submitted 31 July, 2020; v1 submitted 24 April, 2018;
originally announced April 2018.
-
Regular Finite Decomposition Complexity
Authors:
Daniel Kasprowski,
Andrew Nicas,
David Rosenthal
Abstract:
We introduce the notion of regular finite decomposition complexity of a metric family. This generalizes Gromov's finite asymptotic dimension and is motivated by the concept of finite decomposition complexity (FDC) due to Guentner, Tessera and Yu. Regular finite decomposition complexity implies FDC and has all the permanence properties that are known for FDC, as well as a new one called Finite Quot…
▽ More
We introduce the notion of regular finite decomposition complexity of a metric family. This generalizes Gromov's finite asymptotic dimension and is motivated by the concept of finite decomposition complexity (FDC) due to Guentner, Tessera and Yu. Regular finite decomposition complexity implies FDC and has all the permanence properties that are known for FDC, as well as a new one called Finite Quotient Permanence. We show that for a collection containing all metric families with finite asymptotic dimension all other permanence properties follow from Fibering Permanence.
△ Less
Submitted 14 December, 2017; v1 submitted 16 August, 2016;
originally announced August 2016.
-
Web Infrastructure to Support e-Journal Preservation (and More)
Authors:
Herbert Van de Sompel,
David S. H. Rosenthal,
Michael L. Nelson
Abstract:
E-journal preservation systems have to ingest millions of articles each year. Ingest, especially of the "long tail" of journals from small publishers, is the largest element of their cost. Cost is the major reason that archives contain less than half the content they should. Automation is essential to minimize these costs. This paper examines the potential for automation beyond the status quo base…
▽ More
E-journal preservation systems have to ingest millions of articles each year. Ingest, especially of the "long tail" of journals from small publishers, is the largest element of their cost. Cost is the major reason that archives contain less than half the content they should. Automation is essential to minimize these costs. This paper examines the potential for automation beyond the status quo based on the API provided by CrossRef, ANSI/NISO Z39.99 ResourceSync, and the provision of typed links in publishers' HTTP response headers. These changes would not merely assist e-journal preservation and other cross-venue scholarly applications, but would help remedy the gap that research has revealed between DOIs' potential and actual benefits.
△ Less
Submitted 19 May, 2016;
originally announced May 2016.
-
Hyperbolic Dimension and Decomposition Complexity
Authors:
Andrew Nicas,
David Rosenthal
Abstract:
The aim of this paper is to provide some new tools to aid the study of decomposition complexity, a notion introduced by Guentner, Tessera and Yu. In this paper, three equivalent definitions for decomposition complexity are established. We prove that metric spaces with finite hyperbolic dimension have finite (weak) decomposition complexity, and we prove that the collection of metric families that a…
▽ More
The aim of this paper is to provide some new tools to aid the study of decomposition complexity, a notion introduced by Guentner, Tessera and Yu. In this paper, three equivalent definitions for decomposition complexity are established. We prove that metric spaces with finite hyperbolic dimension have finite (weak) decomposition complexity, and we prove that the collection of metric families that are coarsely embeddable into Hilbert space is closed under decomposition. A method for showing that certain metric spaces do not have finite decomposition complexity is also discussed.
△ Less
Submitted 21 September, 2015;
originally announced September 2015.
-
Inclusive weak decays of heavy hadrons with power suppressed terms at NLO
Authors:
Thomas Mannel,
Alexei A. Pivovarov,
Denis Rosenthal
Abstract:
Within the heavy quark expansion techniques for the heavy hadron weak decays we analytically compute the coefficient of the power suppressed dimension five chromo-magnetic operator at next-to-leading order of QCD perturbation theory with the full dependence on the final state quark mass. We present explicit expressions for the total width of inclusive semileptonic decays including the power suppre…
▽ More
Within the heavy quark expansion techniques for the heavy hadron weak decays we analytically compute the coefficient of the power suppressed dimension five chromo-magnetic operator at next-to-leading order of QCD perturbation theory with the full dependence on the final state quark mass. We present explicit expressions for the total width of inclusive semileptonic decays including the power suppressed terms and for a few moments of decay differential distributions. One of the important phenomenological applications of our results is precision analysis of the decays of bottom mesons to charmed final states and extraction of the numerical value for the CKM matrix entry |V_{cb}|.
△ Less
Submitted 26 June, 2015;
originally announced June 2015.
-
Metric dimensions of minor excluded graphs and minor exclusion in groups
Authors:
Mikhail I. Ostrovskii,
David Rosenthal
Abstract:
An infinite graph G is minor excluded if there is a finite graph that is not a minor of G. We prove that minor excluded graphs have finite Assouad-Nagata dimension and study minor exclusion for Cayley graphs of finitely generated groups. Our main results and observations are: (1) minor exclusion is not a group property: it depends on the choice of generating set; (2) a group with one end has a gen…
▽ More
An infinite graph G is minor excluded if there is a finite graph that is not a minor of G. We prove that minor excluded graphs have finite Assouad-Nagata dimension and study minor exclusion for Cayley graphs of finitely generated groups. Our main results and observations are: (1) minor exclusion is not a group property: it depends on the choice of generating set; (2) a group with one end has a generating set for which the Cayley graph is not minor excluded; (3) there are groups that are not minor excluded for any set of generators; (4) minor exclusion is preserved under free products; and (5) virtually free groups are minor excluded for any choice of finite generating set.
△ Less
Submitted 10 September, 2014;
originally announced September 2014.
-
Inclusive semileptonic B decays from QCD with NLO accuracy for power suppressed terms
Authors:
Thomas Mannel,
Alexei A. Pivovarov,
Denis Rosenthal
Abstract:
We present the results of a calculation of the perturbative QCD corrections for the semileptonic inclusive width of a heavy flavored meson. Within the Heavy Quark Expansion we analytically compute the QCD correction to the coefficient of power suppressed contribution of the chromo-magnetic operator in the limit of vanishing mass of the final state quark. The important phenomenological applications…
▽ More
We present the results of a calculation of the perturbative QCD corrections for the semileptonic inclusive width of a heavy flavored meson. Within the Heavy Quark Expansion we analytically compute the QCD correction to the coefficient of power suppressed contribution of the chromo-magnetic operator in the limit of vanishing mass of the final state quark. The important phenomenological applications are decays of bottom mesons, and to the less extend, charmed mesons.
△ Less
Submitted 20 May, 2014;
originally announced May 2014.
-
Radial excitations of heavy-light mesons from QCD sum rules
Authors:
P. Gelhausen,
A. Khodjamirian,
A. A. Pivovarov,
D. Rosenthal
Abstract:
QCD sum rules are commonly used to predict the characteristics of ground-state hadrons. We demonstrate that two-point sum rules for the decay constants of charmed ($D^{(*)},D_s^{(*)}$) and bottom ($B^{(*)},B_s^{(*)}$) mesons can also be modified to estimate the decay constants of the first radial excitations, $D^{(*)'},D_s^{(*)'}$ and $B^{(*)'},B_s^{(*)'}$, respectively, provided the masses of the…
▽ More
QCD sum rules are commonly used to predict the characteristics of ground-state hadrons. We demonstrate that two-point sum rules for the decay constants of charmed ($D^{(*)},D_s^{(*)}$) and bottom ($B^{(*)},B_s^{(*)}$) mesons can also be modified to estimate the decay constants of the first radial excitations, $D^{(*)'},D_s^{(*)'}$ and $B^{(*)'},B_s^{(*)'}$, respectively, provided the masses of these resonances are used as an input. For the radially excited charmed mesons we use available experimental data, whereas the masses of analogous bottom mesons are estimated from the heavy-quark limit. The decay constants predicted for the radial excitations of heavy-light pseudoscalar and vector mesons are systematically smaller than those of the ground states and we comment on the possible origin of this difference. Our results can be used in the sum rule calculations of heavy-to-light form factors and in the factorization approximations for nonleptonic $B$-meson decays where the decay constants of charmed mesons enter as input parameters.
△ Less
Submitted 18 July, 2014; v1 submitted 23 April, 2014;
originally announced April 2014.
-
Decay constants of heavy-light vector mesons from QCD sum rules
Authors:
Patrick Gelhausen,
Alexander Khodjamirian,
Alexei A. Pivovarov,
Denis Rosenthal
Abstract:
We revisit QCD sum rules for the decay constants of heavy-light mesons. In the sum rules for the vector mesons B^*_(s) and D^*_(s) we improve the accuracy of OPE, taking into account the O(alpha_s^2) terms in the perturbative part and calculating the O(alpha_s) corrections to the quark-condensate contribution. With this accuracy, we obtain the ratios of decay constants: f_B^*/f_B=1.02 +0.07 -0.03,…
▽ More
We revisit QCD sum rules for the decay constants of heavy-light mesons. In the sum rules for the vector mesons B^*_(s) and D^*_(s) we improve the accuracy of OPE, taking into account the O(alpha_s^2) terms in the perturbative part and calculating the O(alpha_s) corrections to the quark-condensate contribution. With this accuracy, we obtain the ratios of decay constants: f_B^*/f_B=1.02 +0.07 -0.03, f_D^*/f_D=1.20 +0.10 -0.07. The sum rule predictions for the decay constants of pseudoscalar mesons are updated with the results f_B=(207 +17 -9) MeV, f_B_s=(242 +17 -12) MeV, f_D=(201 +12 -13) MeV, f_D_s=(238 +13 -23) MeV. In order to assess the sensitivity of our calculation to the form of the sum rule, we consider alternative versions such as the power moments and Borel sum rules with different weights of the spectral density. We also investigated the heavy quark limit of the sum rules for vector and pseudoscalar mesons, estimating the violations of the heavy-quark spin and flavour symmetry.
△ Less
Submitted 27 March, 2015; v1 submitted 23 May, 2013;
originally announced May 2013.
-
Exploring Morphology-Activity Relationships: Ab Initio Wulff Construction for RuO2 Nanoparticles under Oxidizing Conditions
Authors:
Tongyu Wang,
Jelena Jelic,
Dirk Rosenthal,
Karsten Reuter
Abstract:
We present a density-functional theory based Wulff construction of the equilibrium shape of RuO2 particles in an oxygen environment. The obtained intricate variations of the crystal habit with the oxygen chemical potential allow for a detailed discussion of the dependence on the oxidizing pretreatment observed in recent powder catalyst studies. The analysis specifically indicates an incomplete par…
▽ More
We present a density-functional theory based Wulff construction of the equilibrium shape of RuO2 particles in an oxygen environment. The obtained intricate variations of the crystal habit with the oxygen chemical potential allow for a detailed discussion of the dependence on the oxidizing pretreatment observed in recent powder catalyst studies. The analysis specifically indicates an incomplete particle shape equilibration in previously employed low temperature calcination. Equilibrated particles could be active CO oxidation catalysts with long-term stability in oxidizing feed and then represent an interesting alternative to the previously suggested core-shell concept.
△ Less
Submitted 18 March, 2013;
originally announced March 2013.
-
Coarse structures on groups
Authors:
Andrew Nicas,
David Rosenthal
Abstract:
We introduce the group-compact coarse structure on a Hausdorff topological group in the context of coarse structures on an abstract group which are compatible with the group operations. We develop asymptotic dimension theory for the group-compact coarse structure generalizing several familiar results for discrete groups. We show that the asymptotic dimension in our sense of the free topological gr…
▽ More
We introduce the group-compact coarse structure on a Hausdorff topological group in the context of coarse structures on an abstract group which are compatible with the group operations. We develop asymptotic dimension theory for the group-compact coarse structure generalizing several familiar results for discrete groups. We show that the asymptotic dimension in our sense of the free topological group on a non-empty topological space that is homeomorphic to a closed subspace of a Cartesian product of metrizable spaces is 1.
△ Less
Submitted 23 January, 2012;
originally announced January 2012.
-
On the K- and L-theory of hyperbolic and virtually finitely generated abelian groups
Authors:
Wolfgang Lueck,
David Rosenthal
Abstract:
We investigate the algebraic K- and L-theory of the group ring RG, where G is a hyperbolic or virtually finitely generated abelian group and R is an associative ring with unit.
We investigate the algebraic K- and L-theory of the group ring RG, where G is a hyperbolic or virtually finitely generated abelian group and R is an associative ring with unit.
△ Less
Submitted 15 May, 2012; v1 submitted 6 July, 2010;
originally announced July 2010.
-
Assembly Maps for Group Extensions in $K$-Theory and $L$-Theory with Twisted Coefficients
Authors:
Ian Hambleton,
Erik K. Pedersen,
David Rosenthal
Abstract:
In this paper we show that the Farrell-Jones isomorphism conjectures are inherited in group extensions for assembly maps in algebraic $K$-theory and $L$-theory with twisted coefficients.
In this paper we show that the Farrell-Jones isomorphism conjectures are inherited in group extensions for assembly maps in algebraic $K$-theory and $L$-theory with twisted coefficients.
△ Less
Submitted 1 April, 2008; v1 submitted 4 September, 2007;
originally announced September 2007.
-
On the K-theory of groups with finite asymptotic dimension
Authors:
Arthur Bartels,
David Rosenthal
Abstract:
It is proved that the assembly maps in algebraic K- and L-theory with respect to the family of finite subgroups is injective for groups with finite asymptotic dimension that admit a finite model for the classifying space for proper actions. The result also applies to certain groups that admit only a finite dimensional model for this space. In particular, it applies to discrete subgroups of virtual…
▽ More
It is proved that the assembly maps in algebraic K- and L-theory with respect to the family of finite subgroups is injective for groups with finite asymptotic dimension that admit a finite model for the classifying space for proper actions. The result also applies to certain groups that admit only a finite dimensional model for this space. In particular, it applies to discrete subgroups of virtually connected Lie groups.
△ Less
Submitted 22 September, 2016; v1 submitted 3 May, 2006;
originally announced May 2006.
-
Requirements for Digital Preservation Systems: A Bottom-Up Approach
Authors:
David S. H. Rosenthal,
Thomas S. Robertson,
Tom Lipkis,
Vicky Reich,
Seth Morabito
Abstract:
The field of digital preservation is being defined by a set of standards developed top-down, starting with an abstract reference model (OAIS) and gradually adding more specific detail. Systems claiming conformance to these standards are entering production use. Work is underway to certify that systems conform to requirements derived from OAIS.
We complement these requirements derived top-down…
▽ More
The field of digital preservation is being defined by a set of standards developed top-down, starting with an abstract reference model (OAIS) and gradually adding more specific detail. Systems claiming conformance to these standards are entering production use. Work is underway to certify that systems conform to requirements derived from OAIS.
We complement these requirements derived top-down by presenting an alternate, bottom-up view of the field. The fundamental goal of these systems is to ensure that the information they contain remains accessible for the long term. We develop a parallel set of requirements based on observations of how existing systems handle this task, and on an analysis of the threats to achieving the goal. On this basis we suggest disclosures that systems should provide as to how they satisfy their goals.
△ Less
Submitted 6 September, 2005; v1 submitted 6 September, 2005;
originally announced September 2005.
-
A Fresh Look at the Reliability of Long-term Digital Storage
Authors:
Mary Baker,
Mehul Shah,
David S. H. Rosenthal,
Mema Roussopoulos,
Petros Maniatis,
TJ Giuli,
Prashanth Bungale
Abstract:
Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an e…
▽ More
Many emerging Web services, such as email, photo sharing, and web site archives, need to preserve large amounts of quickly-accessible data indefinitely into the future. In this paper, we make the case that these applications' demands on large scale storage systems over long time horizons require us to re-evaluate traditional storage system designs. We examine threats to long-lived data from an end-to-end perspective, taking into account not just hardware and software faults but also faults due to humans and organizations. We present a simple model of long-term storage failures that helps us reason about the various strategies for addressing these threats in a cost-effective manner. Using this model we show that the most important strategies for increasing the reliability of long-term storage are detecting latent faults quickly, automating fault repair to make it faster and cheaper, and increasing the independence of data replicas.
△ Less
Submitted 30 August, 2005;
originally announced August 2005.
-
Notes On The Design Of An Internet Adversary
Authors:
David S. H. Rosenthal,
Petros Maniatis,
Mema Roussopoulos,
T. J. Giuli,
Mary Baker
Abstract:
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary bas…
▽ More
The design of the defenses Internet systems can deploy against attack, especially adaptive and resilient defenses, must start from a realistic model of the threat. This requires an assessment of the capabilities of the adversary. The design typically evolves through a process of simulating both the system and the adversary. This requires the design and implementation of a simulated adversary based on the capability assessment. Consensus on the capabilities of a suitable adversary is not evident. Part of the recent redesign of the protocol used by peers in the LOCKSS digital preservation system included a conservative assessment of the adversary's capabilities. We present our assessment and the implications we drew from it as a step towards a reusable adversary specification.
△ Less
Submitted 21 November, 2004;
originally announced November 2004.
-
Transparent Format Migration of Preserved Web Content
Authors:
David S. H. Rosenthal,
Thomas Lipkis,
Thomas Robertson,
Seth Morabito
Abstract:
The LOCKSS digital preservation system collects content by crawling the web and preserves it in the format supplied by the publisher. Eventually, browsers will no longer understand that format. A process called format migration converts it to a newer format that the browsers do understand. The LOCKSS program has designed and tested an initial implementation of format migration for Web content th…
▽ More
The LOCKSS digital preservation system collects content by crawling the web and preserves it in the format supplied by the publisher. Eventually, browsers will no longer understand that format. A process called format migration converts it to a newer format that the browsers do understand. The LOCKSS program has designed and tested an initial implementation of format migration for Web content that is transparent to readers, building on the content negotiation capabilities of HTTP.
△ Less
Submitted 21 November, 2004;
originally announced November 2004.
-
Attrition Defenses for a Peer-to-Peer Digital Preservation System
Authors:
T. J. Giuli,
Petros Maniatis,
Mary Baker,
David S. H. Rosenthal,
Mema Roussopoulos
Abstract:
In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even from powerful adversaries are less effective than…
▽ More
In peer-to-peer systems, attrition attacks include both traditional, network-level denial of service attacks as well as application-level attacks in which malign peers conspire to waste loyal peers' resources. We describe several defenses for LOCKSS, a peer-to-peer digital preservation system, that help ensure that application-level attacks even from powerful adversaries are less effective than simple network-level attacks, and that network-level attacks must be intense, wide-spread, and prolonged to impair the system.
△ Less
Submitted 27 November, 2004; v1 submitted 28 May, 2004;
originally announced May 2004.
-
Split Injectivity of the Baum-Connes Assembly Map
Authors:
David Rosenthal
Abstract:
In this work, the continuously controlled techniques developed by Carlsson and Pedersen are used to prove that the Baum-Connes map is a split injection for groups satisfying certain geometric conditions.
In this work, the continuously controlled techniques developed by Carlsson and Pedersen are used to prove that the Baum-Connes map is a split injection for groups satisfying certain geometric conditions.
△ Less
Submitted 1 December, 2003;
originally announced December 2003.
-
Continuous Control and the Algebraic L-theory Assembly Map
Authors:
David Rosenthal
Abstract:
In this work, the assembly map in L-theory for the family of finite subgroups is proven to be a split injection for a class of groups. Groups in this class, including virtually polycyclic groups, have universal spaces that satisfy certain geometric conditions. The proof follows the method developed by Carlsson-Pedersen to split the assembly map in the case of torsion free groups. Here, the conti…
▽ More
In this work, the assembly map in L-theory for the family of finite subgroups is proven to be a split injection for a class of groups. Groups in this class, including virtually polycyclic groups, have universal spaces that satisfy certain geometric conditions. The proof follows the method developed by Carlsson-Pedersen to split the assembly map in the case of torsion free groups. Here, the continuously controlled techniques and results are extended to handle groups with torsion.
△ Less
Submitted 1 December, 2003;
originally announced December 2003.
-
2 P2P or Not 2 P2P?
Authors:
Mema Roussopoulos,
Mary Baker,
David S. H. Rosenthal,
TJ Giuli,
Petros Maniatis,
Jeff Mogul
Abstract:
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.
In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.
△ Less
Submitted 14 November, 2003;
originally announced November 2003.
-
On The Cost Distribution of a Memory Bound Function
Authors:
David S. H. Rosenthal
Abstract:
Memory Bound Functions have been proposed for fighting spam, resisting Sybil attacks and other purposes. A particular implementation of such functions has been proposed in which the average effort required to generate a proof of effort is set by parameters E and l to E * l. The distribution of effort required to generate an individual proof about this average is fairly broad. When particular use…
▽ More
Memory Bound Functions have been proposed for fighting spam, resisting Sybil attacks and other purposes. A particular implementation of such functions has been proposed in which the average effort required to generate a proof of effort is set by parameters E and l to E * l. The distribution of effort required to generate an individual proof about this average is fairly broad. When particular uses of these functions are envisaged, the choice of E and l, and the system design surrounding the generation and verification of proofs of effort, need to take the breadth of the distribution into account.
We show the distribution for this implementation, discuss the system design issues in the context of two proposed applications, and suggest an improved implementation.
△ Less
Submitted 6 November, 2003;
originally announced November 2003.
-
Splitting With Continuous Control in Algebraic K-theory
Authors:
David Rosenthal
Abstract:
In this work, the continuously controlled assembly map in algebraic $K$-theory, as developed by Carlsson and Pedersen, is proved to be a split injection for groups $Γ$ that satisfy certain geometric conditions. The group $Γ$ is allowed to have torsion, generalizing a result of Carlsson and Pedersen. Combining this with a result of John Moody, $K_0(kΓ)$ is proved to be isomorphic to the colimit o…
▽ More
In this work, the continuously controlled assembly map in algebraic $K$-theory, as developed by Carlsson and Pedersen, is proved to be a split injection for groups $Γ$ that satisfy certain geometric conditions. The group $Γ$ is allowed to have torsion, generalizing a result of Carlsson and Pedersen. Combining this with a result of John Moody, $K_0(kΓ)$ is proved to be isomorphic to the colimit of $K_0(kH)$ over the finite subgroups $H$ of $Γ$, when $Γ$ is a virtually polycyclic group and $k$ is a field of characteristic zero.
△ Less
Submitted 5 September, 2003;
originally announced September 2003.
-
A Digital Preservation Appliance Based on OpenBSD
Authors:
David S. H. Rosenthal
Abstract:
The LOCKSS program has developed and deployed in a world-wide test a system for preserving access to academic journals published on the Web. The fundamental problem for any digital preservation system is that it must be affordable for the long term. To reduce the cost of ownership, the LOCKSS system uses generic PC hardware, open source software, and peer-to-peer technology. It is packaged as a…
▽ More
The LOCKSS program has developed and deployed in a world-wide test a system for preserving access to academic journals published on the Web. The fundamental problem for any digital preservation system is that it must be affordable for the long term. To reduce the cost of ownership, the LOCKSS system uses generic PC hardware, open source software, and peer-to-peer technology. It is packaged as a ``network appliance'', a single-function box that can be connected to the Internet, configured and left alone to do its job with minimal monitoring or administration. The first version of this system was based on a Linux boot floppy. After three years of testing it was replaced by a second version, based on OpenBSD and booting from CD-ROM.
We focus in this paper on the design, implementation and deployment of a network appliance based on an open source operating system. We provide an overview of the LOCKSS application and describe the experience of deploying and supporting its first version. We list the requirements we took from this to drive the design of the second version, describe how we satisfied them in the OpenBSD environment, and report on the initial
△ Less
Submitted 21 November, 2004; v1 submitted 30 March, 2003;
originally announced March 2003.
-
Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS
Authors:
Petros Maniatis,
Mema Roussopoulos,
TJ Giuli,
David S. H. Rosenthal,
Mary Baker,
Yanto Muliadi
Abstract:
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and…
▽ More
The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and simulations of a novel protocol for voting in systems of this kind. It incorporates rate limitation and intrusion detection to ensure that even some very powerful adversaries attacking over many years have only a small probability of causing irrecoverable damage before being detected.
△ Less
Submitted 17 October, 2003; v1 submitted 25 March, 2003;
originally announced March 2003.
-
Excitation of H_2 and HD in shocks and PDRs
Authors:
F. Bertoldi,
B. T. Draine,
D. Rosenthal,
R. Timmermann,
S. K. Ramsay Howat,
T. Geballe,
H. Feuchtgruber,
S. Drapatz
Abstract:
Photodissociation regions (PDRs) and shocks give rise to conspicuous emission from rotationally and vibrationally excited molecular hydrogen. This line emission has now been studied with ISO and from the ground in great detail. A remarkable discovery has been that toward the Orion outflow and other shock-excited regions, the H_2 level populations show a very high excitation component. We suggest…
▽ More
Photodissociation regions (PDRs) and shocks give rise to conspicuous emission from rotationally and vibrationally excited molecular hydrogen. This line emission has now been studied with ISO and from the ground in great detail. A remarkable discovery has been that toward the Orion outflow and other shock-excited regions, the H_2 level populations show a very high excitation component. We suggest that these high-excitation populations may arise from non-thermal pum** processes, such as H_2 formation and high-velocity ion-molecule collision in partially dissociative shocks. In PDRs such as NGC 7023 however, formation pum** is always less important than fluorescent pum**. We furthermore present two HD emission line detections toward Orion Peak 1. This enables the first comparison of the H_2 and the HD excitation, which surprisingly turn out to be identical.
△ Less
Submitted 24 September, 2000;
originally announced September 2000.
-
16 x 25 Ge:Ga Detector Arrays for FIFI LS
Authors:
D. Rosenthal,
J. W. Beeman,
N. Geis,
L. Looney,
A. Poglitsch,
W. K. Park,
W. Raab,
A. Urban
Abstract:
We are develo** two-dimensional 16 x 25 pixel detector arrays of both unstressed and stressed Ge:Ga photoconductive detectors for far-infrared astronomy from SOFIA. The arrays, based on earlier 5 x 5 detector arrays used on the KAO, will be for our new instrument, the Far Infrared Field Imaging Line Spectrometer (FIFI LS). The unstressed Ge:Ga detector array will cover the wavelength range fro…
▽ More
We are develo** two-dimensional 16 x 25 pixel detector arrays of both unstressed and stressed Ge:Ga photoconductive detectors for far-infrared astronomy from SOFIA. The arrays, based on earlier 5 x 5 detector arrays used on the KAO, will be for our new instrument, the Far Infrared Field Imaging Line Spectrometer (FIFI LS). The unstressed Ge:Ga detector array will cover the wavelength range from 40 to 120 microns, and the stressed Ge:Ga detector array from 120 to 210 microns. The detector arrays will be operated with multiplexed integrating amplifiers with cryogenic readout electronics located close to the detector arrays. The design of the stressed detector array and results of current measurements on several prototype 16 pixel linear arrays are reported. They demonstrate the feasibility of the current concept. ***This paper does not include Figures due to astro-ph size limitations. Please download entire file at http://fifi-ls.mpe-garching.mpg.de/spie.det.ps.gz ***
△ Less
Submitted 23 March, 2000;
originally announced March 2000.
-
Realizing 3D Spectral Imaging in the Far-Infrared: FIFI LS
Authors:
L. W. Looney,
N. Geis,
R. Genzel,
W. K. Park,
A. Poglitsch,
W. Raab,
D. Rosenthal,
A. Urban,
T. Henning
Abstract:
We present a progress report on the design and construction of the Field-Imaging Far-Infrared Line Spectrometer (FIFI LS) for the SOFIA airborne observatory. The design of the instrument is driven by the goal of maximizing observing efficiency, especially for observations of faint, extragalactic objects. Thus, FIFI LS utilizes an integral field technique that uses slicer mirrors to optically re-…
▽ More
We present a progress report on the design and construction of the Field-Imaging Far-Infrared Line Spectrometer (FIFI LS) for the SOFIA airborne observatory. The design of the instrument is driven by the goal of maximizing observing efficiency, especially for observations of faint, extragalactic objects. Thus, FIFI LS utilizes an integral field technique that uses slicer mirrors to optically re-arrange the two-dimensional field into a single slit for a long slit spectrometer. Effectively, a 5x5 pixel spatial field of view is imaged to a 25x1 pixel slit and dispersed to a 25x16 pixel, two-dimensional detector array, providing diffraction-limited spatial and spectral multiplexing. In this manner, the instrument employs two parallel, medium resolution (R~2000) grating spectrometers for simultaneous observations in two bands: a short wavelength band (42 to 110 micron) and a long wavelength band (110 to 210 micron). Overall, for each of the 25 spatial pixels, the instrument can cover a velocity range of ~1500 km/s around selected far-infrared lines with an estimated sensitivity of 2x10^-15 W Hz^1/2 per pixel. This arrangement provides good spectral coverage with high responsivity.
***This paper does not include Figures due to astro-ph size limitations. Please download entire file at http://fifi-ls.mpe-garching.mpg.de/fifils.ps.gz ****
△ Less
Submitted 21 March, 2000;
originally announced March 2000.
-
ISO-SWS Observations of OMC-1: H_2 and Fine Structure Lines
Authors:
Dirk Rosenthal,
Frank Bertoldi,
Siegfried Drapatz
Abstract:
Using the Short-Wavelength-Spectrometer on the Infrared Space Observatory (ISO), we obtained near- and mid-infrared spectra toward the brightest H_2 emission peak of the Orion OMC-1 outflow. A wealth of emission and absorption features were detected, dominated by 56 H_2 ro-vibrational and pure rotational lines reaching from H_2 0-0 S(1) to 0-0 S(25). The spectra also show a number of H I recombi…
▽ More
Using the Short-Wavelength-Spectrometer on the Infrared Space Observatory (ISO), we obtained near- and mid-infrared spectra toward the brightest H_2 emission peak of the Orion OMC-1 outflow. A wealth of emission and absorption features were detected, dominated by 56 H_2 ro-vibrational and pure rotational lines reaching from H_2 0-0 S(1) to 0-0 S(25). The spectra also show a number of H I recombination lines, atomic and ionic fine structure lines, and molecular lines of CO and H_2O. Between 6 and 12 mu the emission is dominated by PAH features. The H_2 level column density distribution shows no signs of fluorescent excitation or a deviation from an ortho-to-para ratio of three. It shows an excitation temperature which increases from about 600 K for the lowest rotational and vibrational levels to about 3200 K at level energies E(v,J)/k > 14 000 K. No single steady state shock model can reproduce the observed H_2 excitation. The higher energy H_2 levels may be excited either thermally in non-dissociative J-shocks, through non-thermal collisions between fast ions and molecules with H_2 in C-shocks, or they are pumped by newly formed H_2 molecules. The highest rotational levels may be populated by yet another mechanism, such as the gas phase formation of H_2 through H^-.
△ Less
Submitted 24 February, 2000;
originally announced February 2000.
-
Detection of HD in the Orion molecular outflow
Authors:
Frank Bertoldi,
Ralf Timmermann,
Dirk Rosenthal,
Siegfried Drapatz,
Christopher M. Wright
Abstract:
We report a detection in the interstellar medium of an infrared transition within the electronic ground state of the deuterated hydrogen molecule, HD. Through a deep integration with the Short-Wavelength-Spectrometer on ISO, the pure rotational v=0-0 R(5) line at 19.43um was detected toward the Orion (OMC-1) outflow at its brightest H_2 emission region, Peak 1. The ~20" beam-averaged observed fl…
▽ More
We report a detection in the interstellar medium of an infrared transition within the electronic ground state of the deuterated hydrogen molecule, HD. Through a deep integration with the Short-Wavelength-Spectrometer on ISO, the pure rotational v=0-0 R(5) line at 19.43um was detected toward the Orion (OMC-1) outflow at its brightest H_2 emission region, Peak 1. The ~20" beam-averaged observed flux of the line is (1.84 +- 0.4) 10^-5 erg cm^-2 s^-1 sr^-1. Upper flux limits were derived for sixteen other rotational and ro-vibrational HD lines in the wavelength range 2.5 to 38 um. We utilize the rich spectrum of H_2 lines observed at the same position to correct for extinction, and to derive a total warm HD column density under the assumption that similar excitation conditions apply to H_2 and HD. Accounting for non-LTE HD level populations in a partially dissociated gas, our best estimate for the total warm HD column density is N(HD)=(2.0+-0.75)10^16 cm^-2. The warm molecular hydrogen column density is (2.21+-0.24)10^21 cm^-2, so that the relative abundance is [HD]/[H_2]=(9.0+-3.5)10^-6. Accounting for HD depletion relative to H_2 in partially dissociative shocks we derive a deuterium abundance in the warm shocked gas, [D]/[H]= (7.6+-2.9)10^-6. Our implied deuterium abundance is low compared to previous determinations in the local interstellar medium, but it is consistent with two other recent observations toward Orion, suggesting that deuterium may be significantly depleted there.
△ Less
Submitted 23 April, 1999; v1 submitted 20 April, 1999;
originally announced April 1999.