6 resultados para Classic
em Boston University Digital Common
Resumo:
We formulate and study analytically and computationally two families of piecewise linear degree one circle maps. These families offer the rare advantage of being non-trivial but essentially solvable models for the phenomenon of mode-locking and the quasi-periodic transition to chaos. For instance, for these families, we obtain complete solutions to several questions still largely unanswered for families of smooth circle maps. Our main results describe (1) the sets of maps in these families having some prescribed rotation interval; (2) the boundaries between zero and positive topological entropy and between zero length and non-zero length rotation interval; and (3) the structure and bifurcations of the attractors in one of these families. We discuss the interpretation of these maps as low-order spline approximations to the classic ``sine-circle'' map and examine more generally the implications of our results for the case of smooth circle maps. We also mention a possible connection to recent experiments on models of a driven Josephson junction.
Resumo:
This dissertation, an exercise in practical theology, consists of a critical conversation between the evangelistic practice of Campus Crusade for Christ in two American university contexts, Bryan Stone's ecclesiologically grounded theology of evangelism, and William Abraham's eschatologically grounded theology of evangelism. It seeks to provide these evangelizing communities several strategic proposals for a more ecclesiologically and eschatologically grounded practice of evangelism within a university context. The current literature on evangelism is long on evangelistic strategy and activity, but short on theological analysis and reflection. This study focuses on concrete practices, but is grounded in a thick description of two particular contexts (derived from qualitative research methods) and a theological analysis of the ecclesiological and eschatological beliefs embedded within their evangelistic activities. The dissertation provides an historical overview of important figures, ideas, and events that helped mold the practice of evangelism inherited by the two ministries of this study, beginning with the famous Haystack Revival on Williams College in 1806. Both ministries, Campus Crusade for Christ at Bowling Green State University (Ohio) and at Washington State University, inherited an evangelistic practice sorely infected with many of the classic distortions that both Abraham and Stone attempt to correct. Qualitative research methods detail the direction that Campus Crusade for Christ at Bowling Green State University (Ohio) and Washington State University have taken the practice of evangelism they inherited. Applying the analytical categories that emerge from a detailed summary of Stone and Abraham to qualitative data of these two ministries reveals several ways evangelism has morphed in a manner sympathetic to Stone's insistence that the central logic of evangelism is the embodied witness of the church. The results of this analysis reveal the subversive and pervasive influence of modernity on these evangelizing communities—an influence that warrants several corrective strategic proposals including: 1) re-situating evangelism within a reading of the biblical narrative that emphasizes the present, social, public, and realized nature of the gospel of the kingdom of God rather than simply its future, personal, private, and unrealized dimensions; 2) clarifying the nature of the evangelizing communities and their relationship to the church; and 3) emphasizing the virtues that characterize a new evangelistic exemplar who is incarnational, intentional, humble, and courageous.
Resumo:
It is well documented that the presence of even a few air bubbles in water can signifi- cantly alter the propagation and scattering of sound. Air bubbles are both naturally and artificially generated in all marine environments, especially near the sea surface. The abil- ity to measure the acoustic propagation parameters of bubbly liquids in situ has long been a goal of the underwater acoustics community. One promising solution is a submersible, thick-walled, liquid-filled impedance tube. Recent water-filled impedance tube work was successful at characterizing low void fraction bubbly liquids in the laboratory [1]. This work details the modifications made to the existing impedance tube design to allow for submersed deployment in a controlled environment, such as a large tank or a test pond. As well as being submersible, the useable frequency range of the device is increased from 5 - 9 kHz to 1 - 16 kHz and it does not require any form of calibration. The opening of the new impedance tube is fitted with a large stainless steel flange to better define the boundary condition on the plane of the tube opening. The new device was validated against the classic theoretical result for the complex reflection coefficient of a tube opening fitted with an infinite flange. The complex reflection coefficient was then measured with a bubbly liquid (order 250 micron radius and 0.1 - 0.5 % void fraction) outside the tube opening. Results from the bubbly liquid experiments were inconsistent with flanged tube theory using current bubbly liquid models. The results were more closely matched to unflanged tube theory, suggesting that the high attenuation and phase speeds in the bubbly liquid made the tube opening appear as if it were radiating into free space.
Resumo:
We present what we believe to be the first thorough characterization of live streaming media content delivered over the Internet. Our characterization of over five million requests spanning a 28-day period is done at three increasingly granular levels, corresponding to clients, sessions, and transfers. Our findings support two important conclusions. First, we show that the nature of interactions between users and objects is fundamentally different for live versus stored objects. Access to stored objects is user driven, whereas access to live objects is object driven. This reversal of active/passive roles of users and objects leads to interesting dualities. For instance, our analysis underscores a Zipf-like profile for user interest in a given object, which is to be contrasted to the classic Zipf-like popularity of objects for a given user. Also, our analysis reveals that transfer lengths are highly variable and that this variability is due to the stickiness of clients to a particular live object, as opposed to structural (size) properties of objects. Second, based on observations we make, we conjecture that the particular characteristics of live media access workloads are likely to be highly dependent on the nature of the live content being accessed. In our study, this dependence is clear from the strong temporal correlations we observed in the traces, which we attribute to the synchronizing impact of live content on access characteristics. Based on our analyses, we present a model for live media workload generation that incorporates many of our findings, and which we implement in GISMO [19].
Resumo:
As new multi-party edge services are deployed on the Internet, application-layer protocols with complex communication models and event dependencies are increasingly being specified and adopted. To ensure that such protocols (and compositions thereof with existing protocols) do not result in undesirable behaviors (e.g., livelocks) there needs to be a methodology for the automated checking of the "safety" of these protocols. In this paper, we present ingredients of such a methodology. Specifically, we show how SPIN, a tool from the formal systems verification community, can be used to quickly identify problematic behaviors of application-layer protocols with non-trivial communication models—such as HTTP with the addition of the "100 Continue" mechanism. As a case study, we examine several versions of the specification for the Continue mechanism; our experiments mechanically uncovered multi-version interoperability problems, including some which motivated revisions of HTTP/1.1 and some which persist even with the current version of the protocol. One such problem resembles a classic degradation-of-service attack, but can arise between well-meaning peers. We also discuss how the methods we employ can be used to make explicit the requirements for hardening a protocol's implementation against potentially malicious peers, and for verifying an implementation's interoperability with the full range of allowable peer behaviors.
Resumo:
Energy-efficient communication has recently become a key challenge for both researchers and industries. In this paper, we propose a new model in which a Content Provider and an Internet Service Provider cooperate to reduce the total power consumption. We solve the problem optimally and compare it with a classic formulation, whose aim is to minimize user delay. Results, although preliminary, show that power savings can be huge: up to 71% on real ISP topologies. We also show how the degree of cooperation impacts overall power consumption. Finally, we consider the impact of the Content Provider location on the total power savings.