42 resultados para stopping rule


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fixed and wireless networks are increasingly converging towards common connectivity with IP-based core networks. Providing effective end-to-end resource and QoS management in such complex heterogeneous converged network scenarios requires unified, adaptive and scalable solutions to integrate and co-ordinate diverse QoS mechanisms of different access technologies with IP-based QoS. Policy-Based Network Management (PBNM) is one approach that could be employed to address this challenge. Hence, a policy-based framework for end-to-end QoS management in converged networks, CNQF (Converged Networks QoS Management Framework) has been proposed within our project. In this paper, the CNQF architecture, a Java implementation of its prototype and experimental validation of key elements are discussed. We then present a fuzzy-based CNQF resource management approach and study the performance of our implementation with real traffic flows on an experimental testbed. The results demonstrate the efficacy of our resource-adaptive approach for practical PBNM systems

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Political support for renewable energy development, especially offshore renewables, is particularly conspicuous in Scotland and is a centrepiece of SNP policy. However, this is built on something of a paradox because, put simply, without the subsidies paid by electricity consumers in the rest of the UK, the Scottish Government's ambitious targets for renewable energy would be politically unachievable. We argue in this paper that if Scotland does move towards independence, then there could be little reason for the UK to continue paying (much) of the subsidies since the resulting renewable generation would no longer contribute towards UK renewable energy targets. We suggest that the potential scenarios, and their implications, needs to be far better considered in the arguments around the Scottish constitutional position and the broader aims of UK energy policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private rule-making is widely discussed as supporting institutional policy making and legislation at EU level. The following argues for a different perspective on private actor rule-making, focusing on the autonomy of social realms within which self-governance may be possible. From this perspective, private actor rule-making is considered as a potential gain in self-determination. Substantive autonomy and enhanced self-determination of all those affected are considered as prerequisites for accepting rules made by private actors. Opening the field for discussion, some manifestations of (envisaged) private rule-making at EU level are explored and discussed as to whether they should be accepted as legitimate forms of self-governance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multi-bit trie is a popular approach performing the longest prefix matching for packet classification. However, it requires a long lookup time and inefficiently consumes memory space. This paper presents an in-depth study of different variations of multi-bit trie for IP address lookup. Our main aim is to study a method of data structure which reduces memory space. The proposed approach has been implemented using the label method in two approaches. Both methods present better results regarding lookup speed, update time and memory bit consumptions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A study of Ireland's border.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Association rule mining is an indispensable tool for discovering
insights from large databases and data warehouses.
The data in a warehouse being multi-dimensional, it is often
useful to mine rules over subsets of data defined by selections
over the dimensions. Such interactive rule mining
over multi-dimensional query windows is difficult since rule
mining is computationally expensive. Current methods using
pre-computation of frequent itemsets require counting
of some itemsets by revisiting the transaction database at
query time, which is very expensive. We develop a method
(RMW) that identifies the minimal set of itemsets to compute
and store for each cell, so that rule mining over any
query window may be performed without going back to the
transaction database. We give formal proofs that the set of
itemsets chosen by RMW is sufficient to answer any query
and also prove that it is the optimal set to be computed
for 1 dimensional queries. We demonstrate through an extensive
empirical evaluation that RMW achieves extremely
fast query response time compared to existing methods, with
only moderate overhead in pre-computation and storage

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Book review of Slavery by Any Other Name: African Life under Company Rule in Colonial Mozambique, by Eric Allina, Charlottesville, University of Virginia Press, 2012, 255 pp., £44.50, ISBN 978-0-8139-3272-9.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper showcases the weaknesses of EU enlargement law and demonstrates how one Member State – namely, Greece – is notable for abusing this weakness, for harming the candidate countries, the EU, and the institutions alike, for stripping the EU position of its predictability, and for undermining the EU Commission’s efforts. Accordingly, Greece has severely incapacitated the key procedural rule of law component of the EU’s enlargement regulation, turning it into a randomised political game and ignoring any long-term goals of stability, prosperity, and peace that the process is to stand for. Following a walk through Greece’s engagement throughout a number of enlargement rounds, the paper concludes that the duty of loyalty – which is presumably able to discipline Member States that undermine the common effort – should find a new meaning in the context of EU enlargement.