150 resultados para ERNEST MILES
em Queensland University of Technology - ePrints Archive
Resumo:
This paper investigates whether the net benefits from owning a vehicle, proxied by annual miles driven, explain the price declines observed over a vehicle's life. We first model the household decision on how much to drive each of its vehicles. Then we empirically establish that variation in household annual miles across brands explains observed price declines. Furthermore, the effect of vehicle age on annual miles decisions (and consequently on market value) depends on household characteristics and the composition of the vehicle stock owned.
Resumo:
This was another in the project of using my three pseudonyms to investigate the strategic potential of the fictocritical as an approach to making visual art. It was large scale single artwork that took place over 21 days and combined 2D, 3D, Time-based elements and performance in an attempt to construct a Gesamtkunstwerk. Over the course of the exhibition I critically and creatively engaged with political, social, economic and cultural issues thorugh opening up a range of rhetorical modes such as the lyrical, the elegiac, the rhapsodic, the humorous, the parodic and the satirical.
Resumo:
In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.