160 resultados para IP routing


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process models define allowed process execution scenarios. The models are usually depicted as directed graphs, with gateway nodes regulating the control flow routing logic and with edges specifying the execution order constraints between tasks. While arbitrarily structured control flow patterns in process models complicate model analysis, they also permit creativity and full expressiveness when capturing non-trivial process scenarios. This paper gives a classification of arbitrarily structured process models based on the hierarchical process model decomposition technique. We identify a structural class of models consisting of block structured patterns which, when combined, define complex execution scenarios spanning across the individual patterns. We show that complex behavior can be localized by examining structural relations of loops in hidden unstructured regions of control flow. The correctness of the behavior of process models within these regions can be validated in linear time. These observations allow us to suggest techniques for transforming hidden unstructured regions into block-structured ones.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Process models are usually depicted as directed graphs, with nodes representing activities and directed edges control flow. While structured processes with pre-defined control flow have been studied in detail, flexible processes including ad-hoc activities need further investigation. This paper presents flexible process graph, a novel approach to model processes in the context of dynamic environment and adaptive process participants’ behavior. The approach allows defining execution constraints, which are more restrictive than traditional ad-hoc processes and less restrictive than traditional control flow, thereby balancing structured control flow with unstructured ad-hoc activities. Flexible process graph focuses on what can be done to perform a process. Process participants’ routing decisions are based on the current process state. As a formal grounding, the approach uses hypergraphs, where each edge can associate any number of nodes. Hypergraphs are used to define execution semantics of processes formally. We provide a process scenario to motivate and illustrate the approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the global intellectual property (IP) system grows and now impacts virtually all citizens, it is crucial that the means to understand these rights and their teachings, as well as their implications and scope become global public goods. To do so requires not only that the primary data is available freely and openly in a standardized and re-useable form, but that tools to visualize, analyse and model that data are similarly open and free public goods, adaptable to diverse needs and uses; this we call ‘transparency’.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

During invasion and metastasis, cancer cells interact closely with the extracellular matrix molecules by attachment, degradation, and migration. We demonstrated previously the local degradation of fluorescently labeled gelatin matrix by cancer cells at invasive membrane protrusions, called invadopodia. Using the newly developed quantitative fluorescence-activated cell sorting-phagocytosis assay and image analysis of localized degradation of fluorescently labeled matrix, we document here that degradation and site- specific removal of cross-linked gelatin matrix is correlated with the extent of phagocytosis in human breast cancer cells. A higher phagocytic capacity is generally associated with increasing invasiveness, documented in other invasion and motility assays as well. Gelatin phagocytosis is time and cell density dependent, and it is mediated by the actin cytoskeleton. Most of the intracellular gelatin is routed to actively acidified vesicles, as demonstrated by the fluorescent colocalization of gelatin with acidic vesicles, indicating the intracellular degradation of the phagocytosed matrix in lysosomes. We show here that normal intracellular routing is blocked after treatment with acidification inhibitors. In addition, the need for partial proteolytic degradation of the matrix prior to phagocytosis is demonstrated by the inhibition of gelatin phagocytosis with different serine and metalloproteinase inhibitors and its stimulation by conditioned medium containing the matrix metalloproteinases MMP-2 and MMP-9. Our results demonstrate that phagocytosis of extracellular matrix is an inherent feature of breast tumor cells that correlates with and may even directly contribute to their invasive capacity. This assay is useful for screening and evaluating potential anti-invasive agents because it is fast, reproducible, and versatile.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate how email users' characteristics influence their response to phishing emails. A user generally goes through three stages of behaviour upon receiving a phishing email: suspicion of the legitimacy of the email, confirmation of its legitimacy and response by either performing the action requested in the phishing email or not. Using a mixed method approach combining experiments, surveys and semi-structured interviews, we found that a user's behaviour at each stage varies with their personal characteristics such as personality traits and ability to perceive information in an email beyond its content. We found, for example, that users who are submissive, extraverted or open tend to be less suspicious of phishing emails while users who can identify cues such as inconsistent IP address, can avoid falling victim to phishing emails. Our findings enable us to draw practical implications for educating and potentially reducing the incidence of phishing emails victimisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the outbreak of Severe Acute Respiratory Syndrome (SARS) in 2003, there has been much discussion about whether the international community has moved into a new post-Westphalian era, where states increasingly recognize certain shared norms that guide what they ought to do in responding to infectious disease outbreaks. In this article I identify this new obligation as the ‘duty to report’, and examine competing accounts on the degree to which states appreciate this new obligation are considered by examining state behaviour during the H5N1 human infectious outbreaks in East Asia (since 2004). The article examines reporting behaviour for H5N1 human infectious cases in Cambodia, China, Indonesia, Thailand and Vietnam from 2004 to 2010. The findings lend strong support to the claim that East Asian states have come to accept and comply with the duty to report infectious disease outbreaks and that the assertions of sovereignty in response to global health governance frameworks have not systematically inhibited reporting compliance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When, in 1977, the Australian electorate provided a double majority to effect a change of section 72 of the Commonwealth Constitution requiring judges of the High Court of Australia to retire at the age of 70 years old, I doubt we understood the continuing capacity of these esteemed members of the judiciary. For the opportunity to sit and talk with Ian Callinan AC who, in compliance with that amendment, retired from the High Court in September 2007, I needed to wait until he returned from The Hague where he was sitting as a Judge ad hoc on the International Court of Justice. Although a native of Casino, New South Wales, Mr Callinan is regarded as a Queenslander. Indeed, he grew up in Brisbane, finished high school at Brisbane Grammar and graduated in law at The University of Queensland. Appointed in 1978 as a Queen’s Counsel, Mr Callinan enjoyed this period of his legal career and we discussed an aspect of the Christopher Skase case, which reinforced my belief that Mr Callinan is an incredibly skilful advocate. On 14 September 1998, ABC Four Corners broadcasted the views of some prominent Australians on the appointment of Mr Callinan to the High Court. In assessing the type of person Mr Callinan is, Tony Morris QC said: “Ian Callinan isn't a coward”, while former Commonwealth Attorney-General, Michael Lavarch, said: “He was regarded as an absolutely outstanding criminal lawyer within the Queensland legal profession, I mean really a top-notch advocate”. I was not interested in raising any of the controversial issues that Mr Callinan has encountered as an advocate in high profile matters. I wanted to know how he felt about his time on the High Court, what his thoughts are on the operation of the High Court, the IP cases he decided, the real life issues that he feels impact on counsel who are appearing before the High Court and the people he regarded as role models. During our conversation, Mr Callinan laughed often and when he did his eyes lit up, revealing his passion for life. He is an incredibly genuine Australian who loved his time as a barrister, enjoyed his role on the High Court, enjoys his current job as mediator, loves writing novels, has a great desire for continual improvement in the quality of legal education and legal advocacy and sees a need for change in IP law. When I asked: “So, what might the future hold for you?”, he laughed and said: “Well, at my age I don’t have a long horizon time”. I said: “Just enjoy the journey?”, to which Mr Callinan responded: “Exactly”.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To date, designed topologies for DC-AC inversion with both voltage-buck and boost capabilities are mainly focused on two-level circuitries with extensions to three-level possibilities left nearly unexplored. Contributing to this area of research, this paper presents the design of a number of viable buck-boost three-level inverters that can also support bidirectional power conversion. The proposed front-end circuitry is developed from the Cuk-derived buck-boost two-level inverter, and by using the "alternative phase opposition disposition" (APOD) modulation scheme, the buck-boost three-level inverters can perform distinct five-level line voltage and three-level phase voltage switching by simply controlling the active switches located in the designed voltage boost section of the circuits. As a cost saving option, one active switch can further be removed from the voltage-boost section of the circuits by simply re-routing the gating commands of the remaining switches without influencing the ac output voltage amplitude. To verify the validity of the proposed inverters, Matlab/PLECS simulations were performed before a laboratory prototype was implemented for experimental testing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recurrent congestion caused by high commuter traffic is an irritation to motorway users. Ramp metering (RM) is the most effective motorway control means (M Papageorgiou & Kotsialos, 2002) for significantly reducing motorway congestion. However, given field constraints (e.g. limited ramp space and maximum ramp waiting time), RM cannot eliminate recurrent congestion during the increased long peak hours. This paper, therefore, focuses on rapid congestion recovery to further improve RM systems: that is, to quickly clear congestion in recovery periods. The feasibility of using RM for recovery is analyzed, and a zone recovery strategy (ZRS) for RM is proposed. Note that this study assumes no incident and demand management involved, i.e. no re-routing behavior and strategy considered. This strategy is modeled, calibrated and tested in the northbound model of the Pacific Motorway, Brisbane, Australia in a micro-simulation environment for recurrent congestion scenario, and evaluation results have justified its effectiveness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The common reasons for those in organizations adopting large config- urable packaged software products are compelling. Problems with the existing software situation, the supposed predictability and perceived business benefits of packaged software, and various social influences, can lead to packages being preferred to custom approaches. Yet, for every reason, there is a potential associated problem that must be understood before an informed adoption decision can be made...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Self-development resources are a popular billion -dollar industry worldwide used to improve individuals quality of lives. However, there are insufficient studies for a contemporary conceptualization, especially when it comes to live self-development programs. This paper provides a literature review about current self-development definitions, ideology, concepts, and themes; quality of material provided; quality and characteristics of self-development providers; and the features of the participants who seek such programs. The paper will also discuss the relationsh ip between self-development and related disciplines including coaching, training, mentoring, and motivational speaking. Finally, a new definition will be proposed for self-development coaching programs. Gaps of knowledge are highlighted for further research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study quantifies the motivators and barriers to bikeshare program usage in Australia. An online survey was administered to a sample of annual members of Australia’s two bikeshare programs based in Brisbane and Melbourne, to assess motivations for joining the schemes. Non-members of the programs were also sampled in order to identify current barriers to joining bikeshare. Spatial analysis from Brisbane revealed residential and work locations of non-members were more geographically dispersed than for bikeshare members. An analysis of bikeshare usage in Melbourne showed a strong relationship between docking stations in areas with relatively less accessible public transit opportunities. The most influential barriers to bikeshare use related to motorized travel being too convenient and docking stations not being sufficiently close to home, work and other frequented destinations. The findings suggest that bikeshare programs may attract increased membership by ensuring travel times are competitive with motorized travel, for example through efficient bicycle routing and priority progression and, by expanding docking station locations, and by increasing the level of convenience associated with scheme use. Convenience considerations may include strategic location of docking stations, ease of signing up and integration with public transport.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Effective enforcement of intellectual property (IP) rights has become a significant issue due to concerns about the effects of IP infringement, including trade mark counterfeiting. It is an important issue for the Australian Government as IP rights underpin a strong, modern economy. Criminal offences and civil remedies can be an important element of an enforcement regime. This review of penalties and additional damages in the Trade Marks Act 1995 (Cth) (Trade Marks Act) has been prompted by a recommendation made by the Advisory Council on Intellectual Property (ACIP), recent changes to the Copyright Act 1968 (Cth) (Copyright Act) and concerns raised by stakeholders. The purpose of this paper is to elicit comments on options which IP Australia is considering recommending to Government.