52 resultados para Majority Rule
Resumo:
Norms constitute a powerful coordination mechanism among heterogeneous agents. In this paper, we propose a rule language to specify and explicitly manage the normative positions of agents (permissions, prohibitions and obligations), with which distinct deontic notions and their relationships can be captured. Our rule-based formalism includes constraints for more expressiveness and precision and allows to supplement (and implement) electronic institutions with norms. We also show how some normative aspects are given computational interpretation. © 2008 Springer Science+Business Media, LLC.
Resumo:
Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires unified, adaptive and scalable solutions to integrate and co-ordinate diverse QoS mechanisms of different access technologies with IP-based QoS. Policy-Based Network Management (PBNM) is one approach that could be employed to address this challenge. Hence, a policy-based framework for end-to-end QoS management in converged networks, CNQF (Converged Networks QoS Management Framework) has been proposed within our project. In this paper, the CNQF architecture, a Java implementation of its prototype and experimental validation of key elements are discussed. We then present a fuzzy-based CNQF resource management approach and study the performance of our implementation with real traffic flows on an experimental testbed. The results demonstrate the efficacy of our resource-adaptive approach for practical PBNM systems
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.
Resumo:
Political support for renewable energy development, especially offshore renewables, is particularly conspicuous in Scotland and is a centrepiece of SNP policy. However, this is built on something of a paradox because, put simply, without the subsidies paid by electricity consumers in the rest of the UK, the Scottish Government's ambitious targets for renewable energy would be politically unachievable. We argue in this paper that if Scotland does move towards independence, then there could be little reason for the UK to continue paying (much) of the subsidies since the resulting renewable generation would no longer contribute towards UK renewable energy targets. We suggest that the potential scenarios, and their implications, needs to be far better considered in the arguments around the Scottish constitutional position and the broader aims of UK energy policy.
Resumo:
Researchers have argued that, depending on the framing of the Northern Ireland conflict, each group could either be a minority or a majority relative to the other. This complicates macrosocial explanations of the conflict which make specific predictions on the basis of minority or majority positions. The present paper argues that this conundrum may have arisen from the inherent variability in microidentity processes that do not fit easily with macroexplanations. In this paper the rhetoric of relative group position is analysed in political speeches delivered by leading members of an influential Protestant institution in Northern Ireland. It is apparent that minority and majority claims are not fixed but are
flexibly used to achieve local rhetorical goals. Furthermore, the speeches differ before and after the Good Friday Agreement, with a reactionary “hegemonic” Unionist position giving way to a “majority-rights power sharing” argument and a “pseudo-minority” status giving way to a “disempowered minority” argument. These results suggest a view of the Northern Ireland conflict as a struggle for “symbolic power,” i.e., the ability to flexibly define the intergroup situation to the ingroup’s advantage.
Resumo:
Overall, this special issue provides insights into the mutually constitutive ways in which rapid economic development associated with industrialisation drives institutional change, migration and mobility, and, finally, altered relationships between – and conceptions of – rural and urban. The following papers pose important conceptual, normative as well as practical, policy-relevant questions relating to the human consequences of these processes and point to the applications of population research – a central objective of this journal.
Resumo:
Private rule-making is widely discussed as supporting institutional policy making and legislation at EU level. The following argues for a different perspective on private actor rule-making, focusing on the autonomy of social realms within which self-governance may be possible. From this perspective, private actor rule-making is considered as a potential gain in self-determination. Substantive autonomy and enhanced self-determination of all those affected are considered as prerequisites for accepting rules made by private actors. Opening the field for discussion, some manifestations of (envisaged) private rule-making at EU level are explored and discussed as to whether they should be accepted as legitimate forms of self-governance.
Resumo:
Multi-bit trie is a popular approach performing the longest prefix matching for packet classification. However, it requires a long lookup time and inefficiently consumes memory space. This paper presents an in-depth study of different variations of multi-bit trie for IP address lookup. Our main aim is to study a method of data structure which reduces memory space. The proposed approach has been implemented using the label method in two approaches. Both methods present better results regarding lookup speed, update time and memory bit consumptions.