key: cord-0898000-1b5vq59u authors: Zhang, Cheng; Pan, Yunze; Zhang, Yunqi; Champion, Adam C.; Shen, Zhaohui; Xuan, Dong; Lin, Zhiqiang; Shroff, Ness B. title: WLAN-Log-Based Superspreader Detection in the COVID-19 Pandemic date: 2021-03-22 journal: nan DOI: 10.1016/j.hcc.2021.100005 sha: 5f5cfa4088b7f03a569362d30fa5081ea6489141 doc_id: 898000 cord_uid: 1b5vq59u Identifying “superspreaders” of disease is a pressing concern for society during pandemics such as COVID-19. Superspreaders represent a group of people who have much more social contacts than others. The widespread deployment of WLAN infrastructure enables non-invasive contact tracing via people’s ubiquitous mobile devices. This technology offers promise for detecting superspreaders. In this paper, we propose a general framework for WLAN-log-based superspreader detection. In our framework, we first use WLAN logs to construct contact graphs by jointly considering human symmetric and asymmetric interactions. Next, we adopt three vertex centrality measurements over the contact graphs to generate three groups of superspreader candidates. Finally, we leverage SEIR simulation to determine groups of superspreaders among these candidates, who are the most critical individuals for the spread of disease based on the simulation results. We have implemented our framework and evaluate it over a WLAN dataset with 41 million log entries from a large-scale university. Our evaluation shows superspreaders exist on university campuses. They change over the first few weeks of a semester, but stabilize throughout the rest of the term. The data also demonstrate that both symmetric and asymmetric contact tracing can discover superspreaders, but the latter performs better with daily contact graphs. Further, the evaluation shows no consistent differences among three vertex centrality measures for long-term (i.e., weekly) contact graphs, which necessitates the inclusion of SEIR simulation in our framework. We believe our proposed framework and these results can provide timely guidance for public health administrators regarding effective testing, intervention, and vaccination policies. The COVID-19 pandemic has devastated many communities worldwide. The presence of the novel coronavirus (that causes COVID-19) in a community with high population density, such as a large public university, significantly increases the risk of contracting the disease. To fight COVID-19, contact trac- 5 ing [1, 2, 3, 4, 5] is especially important to discover active individuals, known as superspreaders, 1 who lead to numerous COVID-19 transmission cases. Tracing human contacts to understand superspreader events is vital for preventing the spread of disease in communities such as university campuses, and such tracing has thus attracted a flurry of research interest [7, 8, 9, 10] . 10 Typically, contact tracing is conducted manually [11] (e.g., through questionnaires and interviews), initially collecting necessary information from infected patients (such as locations they visited and people with whom they had contact). Unfortunately, manual contact tracing can result in inaccurate results due to peoples unreliable memories and long delays. Hence, to fight the COVID-19 15 pandemic, researchers have developed numerous (partially) automated contact tracing systems. Recent efforts can be divided into two categories: client-based and infrastructure-based. Client-based approaches require pervasive deployment of apps on people's mobile devices. Client-side apps leverage a wide variety of sources to track "encounters," including records of credit card transactions [12], 20 1 There is no scientific definition of a "superspreader". We use a definition similar to that in [6] : superspreaders are people with far more social connections than others, are more likely to be infected, and, if infected, will infect many more people than the median. cryptographic tokens exchanged via Bluetooth Low Energy (BLE) [13, 14, 15, 16] , or acoustic channels [10] . In contrast, infrastructure-based methods exploit existing infrastructure deployed worldwide, such as CCTV footage [17] , locations measured using cellular networks [18] , Wi-Fi hotspots [9] , and GPS [19] , without requiring client-side involvement. In this context, our paper presents an 25 approach leveraging Wi-Fi local area network (WLAN) logs to identify potential superspreaders on the campus of a large public university. However, leveraging WLAN logs for superspreader detection is nontrivial, with two major issues. First, conventional WLAN-based solutions (e.g., WiFi-Trace [9]) infer whether students have contacted with each other based on their 30 associations with specific access points (APs) during certain time intervals (e.g., > 15 minutes). Such symmetric contact detection neglects an important fact: the virus carried by people who have tested positive may infect others and replicate via pathogens in the environment. Therefore, others may be infected even if they linger in the environment over very short periods of time (e.g., < 15 min- 35 utes). Obviously, the current definition of human contact cannot handle this scenario. Second, existing Wi-Fi-based methods [9] quantify a superspreader by the number of associated devices from the same access point. However, the number of contacts may be unable to truly reflect how critical an individual is to spreading disease amidst the population. For example, previous work on ver-40 tex centrality measurement for social network analysis [20] demonstrates that the "importance" of a specific vertex in message-passing not only depends on the number of connected vertices, but is relevant to the vertex's location in social networks. Moreover, ground truth remains unknown in WLAN-based contact graphs, making it hard to understand how fast the disease propagates 45 and progresses in order to determine superspreaders. To tackle the first issue, we introduce asymmetric contact, a new type of human contact. Two persons in asymmetric contact are not necessarily associated with specific APs for the same period. For example, assume Persons A and B are in asymmetric contact. Person A may stay with one specific AP for a 50 short time (e.g., 5 minutes) whereas Person B stays longer (50 minutes). Due to the Arts (not shown). We generate the map using Mapzen [22] with OpenStreetMap data [23] . Person B's longer stay time, he generates a much stronger "environment" with his microbes than Person A does. If B tests positive, he may infect A even if the latter's stay time is only 5 minutes. On the other hand, A will not infect B due to her short stay. Hence the contact between these two persons is asymmetric. When we count the contact number, B's contact with A is counted, but A's contact with B is not. The concept of asymmetric contact partially captures the notion of environmental infection 2 [21] . As to the second issue, ideally, we can choose a vertex measure to determine superspreaders using either analytical solutions or prior experimental tests. Un-60 fortunately, due to the diversity of contact graphs and the complexity of virus propagation, it is very difficult (if not impossible) to do so. In this paper, we propose an empirical approach. We include SEIR simulation, a necessary component in our solution, to ultimately determine superspreaders among the vertex-measure outputs. Specifically, we use the SEIR model to simulate the spread of the virus, followed by adaptive interventions on groups of superspreaders identified via different measures. We then finalize superspreaders who have the most crucial virus spread impacts, over the given contact graph, according to the simulations. Incorporating the above two ideas, we propose a general framework for 70 WLAN-log-based superspreader detection, which includes three key steps. First, we extract the individual's trajectory from wireless local area network (WLAN) logs to construct contact graphs, where vertices correspond to individual students and edges indicate physical contacts. In particular, we include both symmetric and asymmetric contact tracing to reveal potential directional interac-75 tions. Second, we adopt three vertex centrality measurements to identify three groups of potential superspreaders given a contact graph. Finally, we leverage the SEIR model to compare different vertex centrality measures and determine superspreaders based on simulation results. The WLAN dataset [24] used in this paper contains over 5,000 students 80 at a large public university, which represents a random sample of the overall student body. Over 8,000 APs are deployed among more than 200 buildings on campus, including lecture halls, dormitories, and restaurants. There are over 41 million device (dis)associations with WLAN APs at the university over a 139-day observation period in 2015. Although insufficient WLAN logs are 85 available in the year 2020 due to school closures by COVID-19, the patterns of students mobility in 2015 share similarities to those in the years afterward. Figure 1 shows the locations of APs in multiple buildings on campus. Since the whole campus spans over 1,500 acres, our findings should complement mobility patterns in a large community. The main findings of this work include the following: (1) We find that there is a group of students that is critical in spreading the virus throughout the university's social contact networks. (2) We show the importance of symmet-ric and asymmetric contact tracing in superspreader detection. Specifically, we show that asymmetric contact tracing helps to discover hidden superspreaders 95 in daily contact graphs and proper interventions with identified superspreaders greatly boosts efforts to contain the spread of disease. (3) We find that simple betweenness centrality better reveals the most critical individuals in daily contact graphs. We do not observe notable differences between vertex centrality measures in longer-term (i.e., weekly) contact graphs with epidemic control. ing the rank-biased overlap metric [25] , opening up opportunities to discover superspreaders as early as possible for efficient pandemic mitigation. Practical significance for university/city administrators: We believe our proposed contact tracing method will enable both proactive and reactive interventions. For the former, our method can help administrators rapidly identify 110 superspreaders for health warnings and frequent testing, using data from just the first few weeks of the semester. For the latter, our method can assist efforts in contact tracing, quarantine, medical support, and prioritized patient care. In summary, our main contributions are threefold: • We propose a general framework for WLAN-log-based contact analysis 115 and superspreader detection. The framework applies to a wide range of working scenarios based on users' preferences, environmental dynamics, and resource availability. • We present a set of initial work using the WLAN-log-based superspreader detection framework, including asymmetric contact tracing, vertex cen-120 trality measurement, and simulation-based superspreader determination. • We implement the framework and evaluate it on a large-scale real-world WLAN log dataset. Our empirical results show the efficacy of the pro-posed contact tracing approaches and uncover insightful findings for public health administrators. The rest of this paper is organized as follows. Section 2 provides background on epidemic models. Section 3 presents our framework on WLAN-log-based superspreader detection. Section 4 illustrates our evaluation results and analyses. Section 5 reviews related work. Finally, Section 6 concludes the paper. In this section, we discuss the background of compartmental epidemic models, which are simplified mathematical models of infectious diseases [26, 27, 28, 29, 30] . Recently, the SEIR (Susceptible, Exposed, Infectious, Recovered) model has shown promise combating COVID-19 in disease modeling [31, 6] , forecasting [32, 33] , and intervention [34] . In the SEIR model, the population 135 is assigned to labeled compartments between which people move based on their health status. Following the equivalent compartmental diagram shown in Figure 2 , we can use the following differential equations to describe the SEIR model involving variables S, E, I, and R and their rates of change with respect to time t: where β is the probability of transmitting disease between a susceptible and an infectious individual, σ is the inverse of the average incubation time (the rate of latent individuals becoming infectious), and γ is the recovery rate. In The population is assigned to one of several labeled compartments: Susceptible, Exposed, Infectious, or Recovered. The order of the labels usually shows flow patterns between the compartments with epidemiological parameters β, σ, and γ. Details are explained in the text. 3. Methodology Figure 3 shows an overall framework of our WLAN-log-based superspreader detection. We describe each component as follows. The WLAN logs often include the (dis)association of mobile devices with 150 respect to APs. In this paper, we use the same dataset in [24] . A sample log entry has the following format: timestamp,process,ap-name,student-id,role,MAC,SSID,result The fields in the log represent the events UNIX timestamp, the process that generated the log entry, the AP name, the encrypted student ID, the role 155 assigned to the device, the anonymized MAC address (preserving the OUI), the SSID name, and the authentication result (success or failure), respectively. Our WLAN dataset collection consists of three steps: (1) We first filter out students who use the university's unsecured WLAN from the dataset. Some information is missing regarding student ID and AP's name. We consider these log entries invalid in this work. After removing invalid entries from the dataset, 39 million log entries remain. (2) Since WLAN logs only provide the association (arrival) time of the person at the corresponding AP, we need to estimate the disassociation (leave) time. We first sort the log entries of each student in ascending order (based on timestamps) to ensure sequential order. For APs within the same building, the stay time of each AP is the duration between the arrival time of the next AP and the current one. Following [24] , we also we perform vertex centrality measurement to discover potential superspreaders. Finally, we simulate adaptive interventions using the SEIR model. calculate the estimated walking time between two buildings using the Google Maps API [35] . (3) In [24] , the location granularity is building-level as that work focuses on human mobility measurement [36] . In contrast, we treat the AP as the base unit in the trajectory in order to study human proximity tracing. Therefore, after data processing, each user/MACs trajectory becomes a time series of APs and their corresponding stay times. A person's trajectory T can be defined as: where AP i is the ith AP in trajectory T , t i is the arrival time of the person at AP i , and ST i is the stay time of the person at AP i . We refer to (AP i , t i , ST i ) as a tracklet. Figure 4 (top) shows how we estimate stay time for intra-and inter-160 building AP connections for a person's trajectory and illustrate Bob's trajectory between two buildings. Next, we describe the contact tracing method using persons' trajectories. Given a student's trajectory T with sequential tracklets, we take each tracklet 165 as a query and apply beam search on all other students' tracklets to determine if there is an overlapping duration for physical interaction between two persons. Symmetric contact tracing. Intuitively, if Bob and Alice connect to the same AP with a certain overlapping period, we assume there may be a potential physical interaction between them. Thus, given a tracklet (AP q , t q , ST q ) from student q (e.g., Bob) and a tracklet (AP p , t p , ST p ) from student p (e.g., Alice), we assign a bidirectional 3 contact edge between q and p if AP q = AP p and the following criterion is satisfied: where d sym is a constant value of symmetric contact duration. Empirically, we set d sym to 15 minutes in the experiments. Asymmetric contact tracing. However, the above symmetric tracing method omits environmental infection (cf. section 1). In that situation, Bob may stay at AP 2 for a long enough period, making the environment infected. Thus, the virus will spread to another person, Trudy, even though the overlapping contact duration is short. To resolve this problem, we propose a new asymmetric contact tracing method that can discover such directional interactions. Concretely, we take Bob's tracklet whose stay time ST q exceeds a certain duration d env and assign a directional 4 contact edge between q (e.g., Bob) and p (e.g., Trudy) if AP q = AP p and the following criterion is satisfied: where d env and d asym are constant values of environmental infection time and asymmetric contact duration, respectively. Empirically, we set d env to 50 minutes and d asym to 5 minutes in the experiments. Graph Merging. Once both symmetric and asymmetric contact graphs are obtained, we merge two graphs into one hybrid graph by aligning nodes and edges. The hybrid graph can reveal realistic contacts in our social interactions evidenced by WLAN logs. Figure 5 gives an example for each graph. The reader may ask a key question about a vertex in the hybrid graph: How "important" is a specific person in the spread of disease? Centrality measurements [20] are designed to quantify a person's importance, helping answer this question. Accordingly, the purpose of this subsection is not to propose a new metric for vertex measurement. Rather, we investigate the efficacy of three met-185 rics in representing superspreaders in the Wi-Fi-based contact graphs. Figure 6 shows their differences. Degree centrality. Degree centrality is defined as the number of edges incident upon a vertex (i.e., the vertex's number of social ties). If the network is directed, then two separate measures of degree centrality are defined: in-degree and outdegree. In this paper, we define each vertex's out-degree as follows: where |E o u | is the total number of edges directed out of a vertex u in a directed hybrid contact graph, and N is the number of vertices in the graph. Closeness Centrality. One common notion of centrality is a vertex's "nearness" to many other vertices, which closeness centrality metrics aim to capture. For a given vertex, closeness centrality varies inversely with the vertex's distance of a vertex from all others. Formally, for a connected graph, this measure is defined as: where dist(u, v) denotes the geodesic (shortest-path) distance between vertices 190 u and v. Intuitively, this measure looks at how fast information can spread from one vertex to all others. For example, a vertex that is close to many other vertices may easily transmit the disease to them. Betweenness centrality. Another popular class of centralities is based upon the perspective that "importance" relates to a vertex's position regarding paths in the graph. If we picture those paths as the routes by which communication takes place, vertices situated on many paths tend to be more critical to the communication process. Betweenness centrality metrics are aimed at summarizing the extent to which a vertex is located "between" other pairs of vertices: where σ(s, t|v) is the total number of shortest paths between s and t that pass through v and σ(s, t) = v σ(s, t|v). Vertices with high betweenness centrality 195 are critical for maintaining graph connectivity. SEIR Measurement. Based on these centrality measures, we are able to identify potential superspreaders. Next, we perform adaptive interventions on those active nodes using SEIR simulations to measure who are the most critical individuals for the spread of disease based on the simulation results. In this section, we first describe our methodology. Next, we present our experimental results. WLAN dataset. We use the WLAN dataset from Cao et al. [24] , which contains 205 WLAN log data with demographic information at a large public university spanning 139 days in 2015. Cao et al. [24] found that university students' mobility patterns change periodically on a weekly basis. In our study, we focus on analyzing the contact graph from a specific day of the week in the dataset. Specifically, we use the WLAN log information to compute the contact graph for each week-210 day from a randomly selected week in the dataset. We also report results on the contact graphs computed from a weekly period. We construct three types of contact graphs: symmetric, asymmetric, and hybrid. Experimental comparison. We quarantine persons with higher centrality based on the hybrid contact graph and simulate the epidemic on the hybrid graph. 225 We test three vertex centrality measurement methods and compare our results to the following baselines: • No quarantine: we let the virus spread naturally on the hybrid graph without intervention. • Random: we randomly quarantine a certain number of persons and sim-230 ulate the epidemic on the hybrid graph. • Symmetric contact tracing (SymC): we quarantine persons with higher centrality based on the symmetric contact graph and simulate the epidemic on the hybrid graph. • Symmetric and asymmetric contact tracing (Hybrid): we quaran-235 tine persons with higher centrality based on the hybrid contact graph and simulate the epidemic on the hybrid graph. Implementation details. We follow [6] in order to simulate an epidemic using the SEIR model. We use the default SEIR parameters, as they are calculated from a real-world infectious dataset. 5 In particular, the total population size in 240 the our experiments is 3748. We set the initial number of infected persons to 50, which we fix across all experiments. In order to achieve stable observations, We run our simulation 50 times in each group of experiments until convergence is reached. Main results on single-day contact graph. We report the main results of a singleday contact graph in Table 1 . Identifying superspreaders using a hybrid graph with asymmetric and symmetric contact tracing outperforms baseline methods substantially in terms of all centralities, justifying our motivation: symmetric and asymmetric contact tracing, which naturally reflects environmental infec-250 tion, can be a valuable factor to contain the spread of disease. In addition, we find similar observations from other days of the week in the WLAN dataset. Next, we detail our analyses. Superspreaders exist on the university campus. We notice that both SymC and Hybrid significantly outperform baseline and "random quarantine," 255 suggesting the existence of superspreaders and the importance of contact tracing to limit the spread of disease. To analyze these superspreaders' extent of spread, we conduct a simulated comparison by initializing different groups of individuals. As shown in Figure 7 , we observe that the virus carried by students with higher centrality causes a much faster spread than with randomly selected students. Further, students with higher betweenness centrality are critical to the spread. Asymmetric contact tracing is efficient. We found that asymmetric contact tracing with a simple vertex measure leads to a notable gain for all metrics. Especially for the total infected fraction (T-Inf), Hybrid is ∼1% better than symmetric contact tracing (SymC), which represents around 40 persons both symmetric and asymmetric contact tracing methods significantly outperform random quarantine methods, demonstrating the effectiveness of our superspreader detection framework. Betweenness centrality strongly limits the total infected population 270 on daily contact graphs. By comparing different centrality measurements for the selection of quarantine populations, we found that betweenness centrality leads to the strongest reduction in the total infected fraction (from 42.61% to 37.41%) in the daily contact graph (cf. Table 1 ). One reason is that betweenness metrics can effectively discover vertices that sit on many paths are likely more 275 critical to the spread process in social graphs. This verifies our observation in Figure 6 that betweenness centrality identifies a very different group of persons compared to degree centrality and closeness centrality (cf. subsection 3.3). Further, we extend the simulation on contact graphs computed over longer weekly periods. Compared to daily contact graphs, weekly graphs generated 280 from the WLAN logs are more densely connected. We focus on betweenness centrality and Table 2 shows the results. We find that the difference between the symmetric and the hybrid graphs is marginal. This is because, in longterm contact tracing, the top superspreaders between the symmetric and hybrid graphs overlap highly, suggesting that early-stage pandemic control helps iden- Table 2 : Results on one-week contact graph. We compare different methods using a one-week contact graph. We perform SEIR simulation by quarantining 100 persons based on centrality metrics. We use betweenness centrality to discover superspreaders. for other weeks throughout the study period. How to perform quarantine with constrained resources? Next, we study suitable proportions of the population for intervention. We show the total infected fraction with respect to different amounts of infectious and quarantined 290 populations. Figure 9 shows the results based on the betweenness centrality Will superspreaders change during the whole semester? To further analyze the stability of superspreaders among different periods, we compute the similarities of the identified superspreaders from any two accumulated weeks, whose results are shown in Figure 10 . In this study, we first generate the contact graphs based on the first N weeks in the WLAN dataset, where N ranges from 300 1 to 20. Next, we select the top 100 students based on our centrality measurements. We adopt rank-biased overlap (RBO) [25] to compute the similarity of two ranked student lists from any two accumulated weeks. Our results show that the superspreaders change during the first few weeks, but remain stable throughout the rest of the semester. For example, the similarity between the 305 first 20 weeks and 15 weeks is around 0.8, opening up opportunities to discover the superspreaders as early as possible for efficient pandemic mitigation. Researchers have devoted considerable attention to mobile application (app) 310 technology for COVID-19 contact tracing. For example, Covid Watch [13] uses Bluetooth signals to detect when users are near each other and alerts them anonymously if they were in contact with someone who is later diagnosed with COVID-19. Similarly, PACT [14] uses inter-phone Bluetooth communications (including energy measurements) as a proxy for inter-person distance measure-315 ment. Through applied cryptography, this system can collect and maintain weeks of contact events. Later, PACT augments these events with infection notifications leading to exposure notifications to all mobile phone owners who have had medically significant contact (in terms of distance and time) with infected people in the past medically significant period (e.g., two weeks). In 320 addition, Singapore launched the TraceTogether [16] app to boost COVID-19 contact tracing efforts. By downloading the app and consenting to participate in it, TraceTogether lets users "proactively help" in the contact tracing process [16] . The app works by exchanging short-range Bluetooth signals between Infrastructure-based methods take advantage of existing infrastructure deployed worldwide such as CCTV footage [17] , locations measured using cellular 335 networks [18] , Wi-Fi hotspots [9, 37] , and GPS [19] , without requiring client-side involvement. Similar to our approach, recent efforts [9, 37] use passive Wi-Fi sensing for network-based contact tracing for infectious diseases, particularly focused on the COVID-19 pandemic. Those works mainly use location occupancy or number of contact as the measure to identify the superspreaders while 340 we consider different types of centrality for measuring the "importance" of the vertex in the social networks. Moreover, we adopt SEIR simulation to justify which measure is better in discovering the superspearders. In this paper, we focused on WLAN-log-based superspreader detection in the 345 COVID-19 pandemic. We proposed a general framework with applications to a wide range of working scenarios based on users' preferences, environmental dynamics, and resource availability. Moreover, we presented asymmetric contact, a new type of human contact. The concept of asymmetric contact partially captured the notion of environmental infection. We required that persons in 350 asymmetric contact must have had a certain overlap time between their association times with a specific AP. In fact, we can generalize by eliminating this constraint. We can treat the overlap time as a control knob to adjust the degree of "asymmetry". Due to space limitations, this remains part of our future work. We have implemented our framework, conducted an extensive evaluation, 355 and obtained a set of important findings. Our proposed contact tracing framework and our findings provided a tool as well as guidelines for public health administrators regarding both proactive and reactive interventions against the pandemic. Contact tracing and disease control, Proceedings of the Royal Society of London. Series B: Biological Sciences Feasibility 370 of controlling covid-19 outbreaks by isolation of cases and contacts, The Lancet Global Health The effectiveness of contact tracing in emerging epidemics Covid-19 epidemic in switzerland: on the importance of testing, contact tracing and isolation Aa blueprint for effective pandemic mitigation Modeling covid-19 on a network: superspreaders, testing and containment, medRxiv A study of the privacy of covid-19 contact tracing apps On the accuracy of measured proximity of bluetooth-based contact tracing apps Network-based contact tracing for infectious diseasesusing passive wifi sensing Acoustic-turf: Acoustic-based privacy-preserving covid-19 con-395 tact tracing Contact Tracing for COVID-19 partner on COVID-19 contact tracing technology Trace together, safer together Covid-19 testing and infection surveillance: Is a combined digital contact tracing and mass testing solution feasible in the united states? Characterizing human mobility patterns during covid-19 using cellular network data Bluetrace: A privacy-preserving protocol for community-driven contact tracing 420 across borders Statistical analysis of network data with R Guidelines for Environmental Infection Control in Health-Care Facilities OpenStreetMap On human 430 mobility predictability via wlan logs A similarity measure for indefinite rankings A contribution to the mathemati-435 cal theory of epidemics Three basic epidemiological models, in: Applied mathematical ecology Infectious diseases of humans: dynamics and control The mathematics of infectious diseases An introduction to infectious disease modelling Impact of non-pharmaceutical interventions (npis) to 450 reduce covid-19 mortality and healthcare demand The challenges of modeling and forecasting the spread of covid-19 Forecasting hospitalization and icu rates of the covid-19 outbreak: An efficient seir model Contact graph epidemic 460 modelling of covid-19 for transmission and intervention strategies Extracting a mobility model from real user 465 traces Analyzing the impact of covid-19 control policies on campus occupancy and mobility via passive wifi sensing 470 The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.