103 resultados para Network security
Resumo:
We re-examine the literature on mobile termination in the presence of network externalities. Externalities arise when firms discriminate between on- and off-net calls or when subscription demand is elastic. This literature predicts that profit decreases and consumer surplus increases in termination charge in a neighborhood of termination cost. This creates a puzzle since in reality we see regulators worldwide pushing termination rates down while being opposed by network operators. We show that this puzzle is resolved when consumers' expectations are assumed passive but required to be fulfilled in equilibrium (as defined by Katz and Shapiro, AER 1985), instead of being rationally responsive to non-equilibrium prices, as assumed until now.
Resumo:
To describe the collective behavior of large ensembles of neurons in neuronal network, a kinetic theory description was developed in [13, 12], where a macroscopic representation of the network dynamics was directly derived from the microscopic dynamics of individual neurons, which are modeled by conductance-based, linear, integrate-and-fire point neurons. A diffusion approximation then led to a nonlinear Fokker-Planck equation for the probability density function of neuronal membrane potentials and synaptic conductances. In this work, we propose a deterministic numerical scheme for a Fokker-Planck model of an excitatory-only network. Our numerical solver allows us to obtain the time evolution of probability distribution functions, and thus, the evolution of all possible macroscopic quantities that are given by suitable moments of the probability density function. We show that this deterministic scheme is capable of capturing the bistability of stationary states observed in Monte Carlo simulations. Moreover, the transient behavior of the firing rates computed from the Fokker-Planck equation is analyzed in this bistable situation, where a bifurcation scenario, of asynchronous convergence towards stationary states, periodic synchronous solutions or damped oscillatory convergence towards stationary states, can be uncovered by increasing the strength of the excitatory coupling. Finally, the computation of moments of the probability distribution allows us to validate the applicability of a moment closure assumption used in [13] to further simplify the kinetic theory.
Resumo:
This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.
Resumo:
Since the independence processes in the African continent, armed conflicts, peace and security have raised concern and attention both at the domestic level and at the international scale. In recent years, all aspects have undergone significant changes which have given rise to intense debate. The end of some historical conflicts has taken place in a context of slight decrease in the number of armed conflicts and the consolidation of post-conflict reconstruction processes. Moreover, African regional organizations have staged an increasingly more active internal shift in matters related to peace and security, encouraged by the idea of promoting “African solutions to African problems”. This new scenario, has been accompanied by new uncertainties at the security level and major challenges at the operational level, especially for the African Union. This article aims to ascertain the state of affairs on all these issues and raise some key questions to consider.
Resumo:
Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines? decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines ?networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub.
Resumo:
Tal i com estableix la Carta de les Nacions Unides, el Consell de Seguretat determina l’existència d’una amenaça a la pau, un trencament de la pau o un acte d’agressió i decideix les mesures que han de fer-se servir per restaurar la pau i seguretat internacionals, també l’ús de la força. L’objectiu d’aquest article és explorar la legitimitat d’aquest ús de la força. Amb aquest objectiu, el text parteix d’una definició centrada en les seves dimensions legal, normativa i social. En segon lloc, s’analitzarà com aquestes dimensions estan representades als debats del Consell de Seguretat de la guerra d’Irak de 2003, un dels usos de la força més controvertits i que més debat ha generat als darrers anys. Finalment, l’anàlisi proposat permet treure algunes conclusions sobre les bases canviants de la legitimitat de l’ús de la força.
Resumo:
Avui en dia, estem assistint a una expansió de la tecnologia d’agents mòbils i noves aplicacions basades en aquesta s’estan obrint pas constantment. Les aplicacions han de demostrar la seva viabilitat sobretot en entorns heterogenis i complexos com les xarxes MANET. En aquest projecte es desenvolupa un sistema per simular el comportament dels agents mòbils, ampliant l’actual simulador de xarxa NS2, i també es comprova la viabilitat de l’implementació de l’ETTMA pel triatge de víctimes en situacions d’emergència.
Resumo:
Network airlines have been increasingly focusing their operations on hub airports through the exploitation of connecting traffic, allowing them to take advantage of economies of traffic density, which are unequivocal in the airline industry. Less attention has been devoted to airlines' decisions on point-to-point thin routes, which could be served using different aircraft technologies and different business models. This paper examines, both theoretically and empirically, the impact on airlines' networks of the two major innovations in the airline industry in the last two decades: the regional jet technology and the low-cost business model. We show that, under certain circumstances, direct services on point-to-point thin routes can be viable and thus airlines may be interested in deviating passengers out of the hub. Keywords: regional jet technology; low-cost business model; point-to-point network; hub-and-spoke network JEL Classi…fication Numbers: L13; L2; L93
Resumo:
We use a difference-in-difference estimator to examine the effects of a merger involving three airlines. The novelty lies in the examination of this operation in two distinct scenarios: (1) on routes where two low-cost carriers and (2) on routes where a network and one of the low-cost airlines had previously been competing. We report a reduction in frequencies but no substantial effect on prices in the first scenario, while in the second we report an increase in prices but no substantial effect on frequencies. These results may be attributed to the differences in passenger types flying on these routes.
Resumo:
In the recent years most libraries have focused on mass digitization programs and keeping electronic born documents, showing and organizing them in a repository. While those repositories have evolved to a much more manageable systems focusing on the user expectations and introducing web 2.0 tools, digital preservation is still in the to-do list of most of them. There is quite a lot of studies focused on preservation and some complex models exist, unfortunately, very few practical systems are running and its quite difficult for a library to get involved in a solution already tested by others. The CBUC (Consortium of University Catalan Libraries) runs TDX, an ETD repository now keeping more than 10.000 full text thesis from any of the 12 university members. After 10 years running TDX a solid preservation system was needed to ensure every thesis would be kept as it was regardless what happens to the repository. The perfect solution was found in the MetaArchive cooperative, this is the effort of many insitutions to keep a copy of each other content through a newtwork using the LOCKSS software as a mechanism to keep track of any change. The presentation will shortly introduce what TDX and MetaArchive is but will, in a practical way, show how the LOCKSS network for presrervation works. Finally a summary of the benefits of the overall experience will be shown.
Resumo:
Report for the scientific sojourn at the UC Berkeley, USA, from march until july 2008. This document starts by surveying the literature on economic federalism and relating it to network industries. The insights and some new developments (which focus on the role of interjurisdictional externalities, multiple objectives and investment incentives) are used to analyze regulatory arrangements in telecommunications and energy in the EU and the US. In the long history of vertically integrated monopolies in telecommunications and energy, there was a historical trend to move regulation up in the vertical structure of government, at least form the local level to the state or nation-state level. This move alleviated the pressure on regulators to renege on the commitment not to expropriate sunk investments, although it did not eliminate the practice of taxation by regulation that was the result of multiple interest group action. Although central or federal policy making is more focused and especialized and makes it difficult for more interest groups to organize, it is not clear that under all conditions central powers will not be associated with underinvestment. When technology makes the introduction of competition in some segments possible, the possibilities for organizing the institutional architechture of regulation expand. The central level may focus on structural regulation and the location of behavioral regulation of the remaining monopolists may be resolved in a cooperative way or concentrated at the level where the relevant spillovers are internalized.
New developments of peace research: The impact of recent campaigns on disarmament and human security
Resumo:
The present text, based on previous work done by the authors on peace research (Grasa 1990 and 2010) and the disarmament campaigns linked to Human Security (Alcalde 2009 and 2010), has two objectives. First, to present a new agenda for peace research, based on the resolution/transformation of conflicts and the promotion of collective action in furtherance of human security and human development. Second, to focus specifically on collective action and on a positive reading of some of the campaigns that have taken place during the last decades in order to see how the experiences of such will affect the future agenda for peace research and action for peace.
Resumo:
The electromagnetic radiation at a terahertz frequencies (from 0.1 THz to 10 THz) is situated in the frequency band comprised between the optical band and the radio band. The interest of the scientific community in this frequency band has grown up due to its large capabilities to develop innovative imaging systems. The terahertz waves are able to generate extremely short pulses that achieve good spatial resolution, good penetration capabilities and allow to identify microscopic structures using spectral analysis. The work carried out during the period of the grant has been based on the developement of system working at the aforementioned frequency band. The main system is based on a total power radiometer working at 0.1 THz to perform security imaging. Moreover, the development of this system has been useful to gain knowledge in the behavior of the component systems at this frequency band. Moreover, a vectorial network analyzer has been used to characterize materials and perform active raster imaging. A materials measurement system has been designed and used to measure material properties as permittivity, losses and water concentration. Finally, the design of a terahertz time-domain spectrometer (THz-TDS) system has been started. This system will allow to perform tomographic measurement with very high penetration resolutions while allowing the spectral characterization of the sample material. The application range of this kind of system is very wide: from the identification of cancerous tissues of a skin to the characterization of the thickness of a painted surface of a car.
Resumo:
Aquest projecte es proposa dissenyar i implementar un sistema de gestió d'historials mèdics per a ser usat remotament a través d'una xarxa de comunicacions, amb un èmfasi principal enl'assoliment d'un nivell de seguretat considerat alt.
Resumo:
Desenvolupament d'un esquema criptogràfic per gestionar de forma segura els historials mèdics dels pacients através d'una xarxa de comunicacions. L'aplicació proporciona les propietatsbàsiques de seguretat que hem esmentat, a més de la propietat de no-repudique permet assegurar que una informació referent a una visita ha estat introduïda per un metge autoritzat i concret.