![128004-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-04/128004-Thumbnail%20Image.png?versionId=zr9AFYI6yAdmqAEUD2lpnl4NSwPCrpwR&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T135049Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=1f411e3de02fcc12e3a677a199023a691e2067f88e09cdf919f645ca736d6ec9&itok=4nDZhv9a)
Evolutionary games model a common type of interactions in a variety of complex, networked, natural systems and social systems. Given such a system, uncovering the interacting structure of the underlying network is key to understanding its collective dynamics. Based on compressive sensing, we develop an efficient approach to reconstructing complex networks under game-based interactions from small amounts of data. The method is validated by using a variety of model networks and by conducting an actual experiment to reconstruct a social network. While most existing methods in this area assume oscillator networks that generate continuous-time data, our work successfully demonstrates that the extremely challenging problem of reverse engineering of complex networks can also be addressed even when the underlying dynamical processes are governed by realistic, evolutionary-game type of interactions in discrete time.
![128602-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-04/128602-Thumbnail%20Image.png?versionId=t97GgqPXh5sHCJq3s8nrdPESol6giteL&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T151719Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=64679a3e8cc0c2498834d1b59c40fc8d15dfda73d1e2aea2213d89a4feb6339b&itok=szig9x9E)
At least since the late nineteenth century, researchers have sought an explanation for infantile amnesia (IA)—the lack of autobiographical memories dating from early childhood—and childhood amnesia (CA), faster forgetting of events up until the age of about seven. Evidence suggests that IA occurs across altricial species, and a number of studies using animal models have converged on the hypothesis that maturation of the hippocampus is an important factor. But why does the hippocampus mature at one time and not another, and how does that maturation relate to memory? Our hypothesis is rooted in theories of embodied cognition, and it provides an explanation both for hippocampal development and the end of IA. Specifically, the onset of locomotion prompts the alignment of hippocampal place cells and grid cells to the environment, which in turn facilitates the ontogeny of long-term episodic memory and the end of IA. That is, because the animal can now reliably discriminate locations, location becomes a stable cue for memories. Furthermore, as the mode of human locomotion shifts from crawling to walking, there is an additional shift in the alignment of the hippocampus that marks the beginning of adult-like episodic memory and the end of CA. Finally, given a reduction in self-locomotion and exploration with aging, the hypothesis suggests a partial explanation for cognitive decline with aging.
![128373-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-04/128373-Thumbnail%20Image.png?versionId=eefKx20rFmh1Csud1eQuxxXX2A9smlph&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T151719Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=93732d2fa4f2489614a43bcbddcee6d244c30355215326a06b482614b2f6b00b&itok=aEpjkNP4)
Despite wide applications of high-throughput biotechnologies in cancer research, many biomarkers discovered by exploring large-scale omics data do not provide satisfactory performance when used to predict cancer treatment outcomes. This problem is partly due to the overlooking of functional implications of molecular markers. Here, we present a novel computational method that uses evolutionary conservation as prior knowledge to discover bona fide biomarkers. Evolutionary selection at the molecular level is nature's test on functional consequences of genetic elements. By prioritizing genes that show significant statistical association and high functional impact, our new method reduces the chances of including spurious markers in the predictive model. When applied to predicting therapeutic responses for patients with acute myeloid leukemia and to predicting metastasis for patients with prostate cancers, the new method gave rise to evolution-informed models that enjoyed low complexity and high accuracy. The identified genetic markers also have significant implications in tumor progression and embrace potential drug targets. Because evolutionary conservation can be estimated as a gene-specific, position-specific, or allele-specific parameter on the nucleotide level and on the protein level, this new method can be extended to apply to miscellaneous “omics” data to accelerate biomarker discoveries.
![128330-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-04/128330-Thumbnail%20Image.png?versionId=t4Tjw3G7ICHeZcC7lQf19Z7i8AcDO_Kk&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T151719Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=e279e17fda8b26cf5e6fe4bb8578d21e4ae735e66217710b6e6e24d9b9810d6b&itok=FpswIwFn)
Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs), which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may consequently occur. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.
![155500-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-09/155500-Thumbnail%20Image.png?versionId=4ziuMTkLNHnDPzP9ge_VhCwPTs.JkrjG&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T151719Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=1230195f4066c0f47d80b254a25e65af066632a266034f66c60b2a3f04b29507&itok=SfYXTid3)
![153437-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-09/153437-Thumbnail%20Image.png?versionId=DZM__BvaA1qZu6ahoOPE2ypuz0TZcXLz&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T151719Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=7d35dee07ddf8c1fc250a69d2645c5d49c22f91cfe60eec750dd57f467d87515&itok=XM8fQrom)
![135808-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-05/135808-Thumbnail%20Image.png?versionId=VISIw_tuwMzTO10dLws6Lf1hzzmSrrb6&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240619/us-west-2/s3/aws4_request&X-Amz-Date=20240619T013730Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=ba15287ead05dbdc6c1bbd92d824f50973bb0c2671e74bb53dfdc793dd7f65a7&itok=g_sZvIwV)