6 resultados para Distributed Representations
em DigitalCommons@University of Nebraska - Lincoln
Resumo:
"Cornstalk disease" is the name given to the cause or causes of death of cattle allowed to run in fields of standing cornstalks from which the ears have been gathered. It is probable that "many different maladies have been included under this name." In Nebraska, however, there is such a similarity in the symptoms reported by the farmers that it seems probable that the great majority of the losses attributed to cornstalk disease are really due to some common cause. As to the exact nature of this cause nothing is known. However, various theories have been advanced, and methods of prevention or treatment based upon these theories have been described.
Resumo:
In this article, I analyze the representation of the Other in three texts that were published during the Spanish Civil War: El infierno azul (1938?), by Republican Isidro R. Mendieta, and two closely related works by Falangist Jacinto Miquelarena: Cómo fui ejecutado en Madrid (1937) and El otro mundo: La vida en las embajadas de Madrid (1938). Although these texts adhere to different political ideologies and are stylistically very divergent, they are similar in their constant criticisms of the enemy. Furthermore, both Republicans and rebels tend to depict the enemy as possessing an inadequate masculinity. He is described, on one hand, as a beast or an animal, unable to control his instincts, and, on the other hand, as an unmanly and effeminate coward. Thus, for the construction of the nation, the Other presents an inappropriate masculinity, which is either excessive and uncontainable, or insufficient. Therefore, national ideologies seem to propose a normative masculinity that is located in an ambiguous middle ground: a masculinity that is able to control animal instincts yet capable of heroic acts.
Resumo:
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).
Resumo:
Wireless LANs are growing rapidly and security has always been a concern. We have implemented a hybrid system, which will not only detect active attacks like identity theft causing denial of service attacks, but will also detect the usage of access point discovery tools. The system responds in real time by sending out an alert to the network administrator.
Resumo:
Centralized and Distributed methods are two connection management schemes in wavelength convertible optical networks. In the earlier work, the centralized scheme is said to have lower network blocking probability than the distributed one. Hence, much of the previous work in connection management has focused on the comparison of different algorithms in only distributed scheme or in only centralized scheme. However, we believe that the network blocking probability of these two connection management schemes depends, to a great extent, on the network traffic patterns and reservation times. Our simulation results reveal that the performance improvement (in terms of blocking probability) of centralized method over distributed method is inversely proportional to the ratio of average connection interarrival time to reservation time. After that ratio increases beyond a threshold, those two connection management schemes yield almost the same blocking probability under the same network load. In this paper, we review the working procedure of distributed and centralized schemes, discuss the tradeoff between them, compare these two methods under different network traffic patterns via simulation and give our conclusion based on the simulation data.
Resumo:
A dominant account of perseverative errors in early development contends that such errors reflect a failure to inhibit a prepotent response. This study investigated whether perseveration might also arise from a failure to inhibit a prepotent representation. Children watched as a toy was hidden at an A location, waited during a delay, and then watched the experimenter find the toy. After six observation-only A trials, the toy was hidden at a B location, and children were allowed to search for the toy. Two- and 4-year-olds’ responses on the B trials were significantly biased toward A even though they had never overtly responded to this location. Thus, perseverative biases in early development can arise as a result of prepotent representations, demonstrating that the prepotent-response account is incomplete. We discuss three alternative interpretations of these results, including the possibility that representational and response-based biases reflect the operation of a single, integrated behavioral system.