42 resultados para Peer-to-Peer networks
Resumo:
This paper provides an extended guide to reviewing for ESPL in particular and geomorphology in general. After a brief consideration of both how we choose reviewers and why we hope that reviewers will accept, I consider what makes a fair and constructive review. I note that we aim to publish papers with the rigour (r) necessary to sustain an original and significant contribution (q). I note that judging q is increasingly difficult because of the ever-growing size of the discipline (the Q). This is the sense in which we rarely have a full appreciation of Q, and our reviews are inevitably going to contain some bias. It is this bias that cannot be avoided (cf. Nicholas and Gordon, 2011) and makes the job of ESPL's Editors of critical importance. With this in mind, I identify six elements of a good review: (1) an introductory statement that explains your assessment of your competences in relation to the manuscript (r and Q); (2) a summative view of the originality and significance of the manuscript (q) in relation to Q: (3) a summative view of the methodological rigour of the manuscript (r); (4) identification and justification of any major concerns; (5) identification of any minor issues to be corrected if you think the manuscript merits eventual publication; and (6) note of any typographical or presentation issues to be addressed although this latter activity is also an editorial responsibility. In addition, I note the importance of a constructive review, grounded in what is written in the manuscript, justified where appropriate and avoiding reference to personal views as far as is possible. I conclude with a discussion of whether or not you should sign your review openly and the importance of reviewer confidentiality. Copyright (C) 2012 John Wiley & Sons, Ltd.
Resumo:
This PhD thesis addresses the issue of scalable media streaming in large-scale networking environments. Multimedia streaming is one of the largest sink of network resources and this trend is still growing as testified by the success of services like Skype, Netflix, Spotify and Popcorn Time (BitTorrent-based). In traditional client-server solutions, when the number of consumers increases, the server becomes the bottleneck. To overcome this problem, the Content-Delivery Network (CDN) model was invented. In CDN model, the server copies the media content to some CDN servers, which are located in different strategic locations on the network. However, they require heavy infrastructure investment around the world, which is too expensive. Peer-to-peer (P2P) solutions are another way to achieve the same result. These solutions are naturally scalable, since each peer can act as both a receiver and a forwarder. Most of the proposed streaming solutions in P2P networks focus on routing scenarios to achieve scalability. However, these solutions cannot work properly in video-on-demand (VoD) streaming, when resources of the media server are not sufficient. Replication is a solution that can be used in these situations. This thesis specifically provides a family of replication-based media streaming protocols, which are scalable, efficient and reliable in P2P networks. First, it provides SCALESTREAM, a replication-based streaming protocol that adaptively replicates media content in different peers to increase the number of consumers that can be served in parallel. The adaptiveness aspect of this solution relies on the fact that it takes into account different constraints like bandwidth capacity of peers to decide when to add or remove replicas. SCALESTREAM routes media blocks to consumers over a tree topology, assuming a reliable network composed of homogenous peers in terms of bandwidth. Second, this thesis proposes RESTREAM, an extended version of SCALESTREAM that addresses the issues raised by unreliable networks composed of heterogeneous peers. Third, this thesis proposes EAGLEMACAW, a multiple-tree replication streaming protocol in which two distinct trees, named EAGLETREE and MACAWTREE, are built in a decentralized manner on top of an underlying mesh network. These two trees collaborate to serve consumers in an efficient and reliable manner. The EAGLETREE is in charge of improving efficiency, while the MACAWTREE guarantees reliability. Finally, this thesis provides TURBOSTREAM, a hybrid replication-based streaming protocol in which a tree overlay is built on top of a mesh overlay network. Both these overlays cover all peers of the system and collaborate to improve efficiency and low-latency in streaming media to consumers. This protocol is implemented and tested in a real networking environment using PlanetLab Europe testbed composed of peers distributed in different places in Europe.
Resumo:
Drinking habits are socially patterned and social networks influence individuals' drinking behaviors. Previous studies have focused primarily upon the influence from family members to drink less. Those studies that have focused upon peer influence have been largely confined to social norms among adolescent and college-age drinkers. By contrast, based in adult populations, this article examines exhortations from friends not only to reduce alcohol consumption but also to increase it. Survey data in 15 countries that participate in the Gender, Alcohol and Culture: An International Study project (GENACIS) were used to test whether there were country and gender differences concerning the influence to drink less or to drink more by friends and examine if this was affected by the drinking behavior. The findings revealed that those influenced to drink less had more heavy episodic drinking (HED) occasions than those who did not report such influence. By contrast, influence to drink more, originating mainly from same-sex friends, may be more the result of social situations that encourage all drinkers, regardless of their frequency of HED occasions. At the country level, influence to drink less for both sexes decreased with the proportion of drinkers in a country. Similarly, influence to drink less for both sexes also decreased in countries where gender roles were more egalitarian. Thus, in countries where alcohol use is more widespread and fewer differences are observed between male and female gender role expectations, fewer people were influenced to drink less. These findings have implications for social and behavioral strategies designed to reduce alcohol-related harm across a wide range of cultures.
Resumo:
This field study assesses children's relational attitude when they imitate other children. We observe that 3.7- to 5.4-years-old children show communicative attitude toward the model when they reproduce "effect-less" actions, but not when they copy target actions.
Resumo:
The majority of diseases in the retina are caused by genetic mutations affecting the development and function of photoreceptor cells. The transcriptional networks directing these processes are regulated by genes such as nuclear hormone receptors. The nuclear hormone receptor gene Rev-erb alpha/Nr1d1 has been widely studied for its role in the circadian cycle and cell metabolism, however its role in the retina is unknown. In order to understand the role of Rev-erb alpha/Nr1d1 in the retina, we evaluated the effects of loss of Nr1d1 to the developing retina and its co-regulation with the photoreceptor-specific nuclear receptor gene Nr2e3 in the developing and mature retina. Knock-down of Nr1d1 expression in the developing retina results in pan-retinal spotting and reduced retinal function by electroretinogram. Our studies show that NR1D1 protein is co-expressed with NR2E3 in the outer neuroblastic layer of the developing mouse retina. In the adult retina, NR1D1 is expressed in the ganglion cell layer and is co-expressed with NR2E3 in the outer nuclear layer, within rods and cones. Several genes co-targeted by NR2E3 and NR1D1 were identified that include: Nr2c1, Recoverin, Rgr, Rarres2, Pde8a, and Nupr1. We examined the cyclic expression of Nr1d1 and Nr2e3 over a twenty-four hour period and observed that both nuclear receptors cycle in a similar manner. Taken together, these studies reveal a novel role for Nr1d1, in conjunction with its cofactor Nr2e3, in regulating transcriptional networks critical for photoreceptor development and function.
Resumo:
Dating violence prevention programs, which originated in the United States, are beginning to be implemented elsewhere. This article presents the first adaptation of a violence prevention program for a European culture, Francophone Switzerland. A U.S. dating violence prevention program, Safe Dates (Foshee & Langwick, 1994), was reviewed in 19 youth and 4 professional focus groups. The most fundamental program concepts--"dating" and "violence"--are not the same in Switzerland and the United States. Swiss youth were not very focused on establishing monogamous romantic relationships, and there is no ready translation for "dating." Violence has not become the focus of a social movement in Switzerland to the same extent that it has in the United States, and distinctions among terms such as "dating violence" and "domestic violence" are not well known. Psychoeducational approaches are also less common in the Swiss context. As the movement to prevent violence extends worldwide, these issues need greater consideration.
Resumo:
The geometry and connectivity of fractures exert a strong influence on the flow and transport properties of fracture networks. We present a novel approach to stochastically generate three-dimensional discrete networks of connected fractures that are conditioned to hydrological and geophysical data. A hierarchical rejection sampling algorithm is used to draw realizations from the posterior probability density function at different conditioning levels. The method is applied to a well-studied granitic formation using data acquired within two boreholes located 6 m apart. The prior models include 27 fractures with their geometry (position and orientation) bounded by information derived from single-hole ground-penetrating radar (GPR) data acquired during saline tracer tests and optical televiewer logs. Eleven cross-hole hydraulic connections between fractures in neighboring boreholes and the order in which the tracer arrives at different fractures are used for conditioning. Furthermore, the networks are conditioned to the observed relative hydraulic importance of the different hydraulic connections by numerically simulating the flow response. Among the conditioning data considered, constraints on the relative flow contributions were the most effective in determining the variability among the network realizations. Nevertheless, we find that the posterior model space is strongly determined by the imposed prior bounds. Strong prior bounds were derived from GPR measurements and helped to make the approach computationally feasible. We analyze a set of 230 posterior realizations that reproduce all data given their uncertainties assuming the same uniform transmissivity in all fractures. The posterior models provide valuable statistics on length scales and density of connected fractures, as well as their connectivity. In an additional analysis, effective transmissivity estimates of the posterior realizations indicate a strong influence of the DFN structure, in that it induces large variations of equivalent transmissivities between realizations. The transmissivity estimates agree well with previous estimates at the site based on pumping, flowmeter and temperature data.
Resumo:
Almost 30 years ago, Bayesian networks (BNs) were developed in the field of artificial intelligence as a framework that should assist researchers and practitioners in applying the theory of probability to inference problems of more substantive size and, thus, to more realistic and practical problems. Since the late 1980s, Bayesian networks have also attracted researchers in forensic science and this tendency has considerably intensified throughout the last decade. This review article provides an overview of the scientific literature that describes research on Bayesian networks as a tool that can be used to study, develop and implement probabilistic procedures for evaluating the probative value of particular items of scientific evidence in forensic science. Primary attention is drawn here to evaluative issues that pertain to forensic DNA profiling evidence because this is one of the main categories of evidence whose assessment has been studied through Bayesian networks. The scope of topics is large and includes almost any aspect that relates to forensic DNA profiling. Typical examples are inference of source (or, 'criminal identification'), relatedness testing, database searching and special trace evidence evaluation (such as mixed DNA stains or stains with low quantities of DNA). The perspective of the review presented here is not exclusively restricted to DNA evidence, but also includes relevant references and discussion on both, the concept of Bayesian networks as well as its general usage in legal sciences as one among several different graphical approaches to evidence evaluation.
Resumo:
This study explored the links between having older siblings who get drunk, satisfaction with the parent-adolescent relationship, parental monitoring, and adolescents' risky drinking. Regression models were conducted based on a national representative sample of 3725 8th to 10th graders in Switzerland (mean age 15.0, SD = .93) who indicated having older siblings. Results showed that both parental factors and older siblings' drinking behaviour shape younger siblings' frequency of risky drinking. Parental monitoring showed a linear dose-response relationship, and siblings' influence had an additive effect. There was a non-linear interaction effect between parent-adolescent relationship and older sibling's drunkenness. The findings suggest that, apart from avoiding an increasingly unsatisfactory relationship with their children, parental monitoring appears to be important in preventing risky drinking by their younger children, even if the older sibling drinks in such a way. However, a satisfying relationship with parents does not seem to be sufficient to counterbalance older siblings' influence.
Resumo:
Abstract This PhD thesis addresses the issue of alleviating the burden of developing ad hoc applications. Such applications have the particularity of running on mobile devices, communicating in a peer-to-peer manner and implement some proximity-based semantics. A typical example of such application can be a radar application where users see their avatar as well as the avatars of their friends on a map on their mobile phone. Such application become increasingly popular with the advent of the latest generation of mobile smart phones with their impressive computational power, their peer-to-peer communication capabilities and their location detection technology. Unfortunately, the existing programming support for such applications is limited, hence the need to address this issue in order to alleviate their development burden. This thesis specifically tackles this problem by providing several tools for application development support. First, it provides the location-based publish/subscribe service (LPSS), a communication abstraction, which elegantly captures recurrent communication issues and thus allows to dramatically reduce the code complexity. LPSS is implemented in a modular manner in order to be able to target two different network architectures. One pragmatic implementation is aimed at mainstream infrastructure-based mobile networks, where mobile devices can communicate through fixed antennas. The other fully decentralized implementation targets emerging mobile ad hoc networks (MANETs), where no fixed infrastructure is available and communication can only occur in a peer-to-peer fashion. For each of these architectures, various implementation strategies tailored for different application scenarios that can be parametrized at deployment time. Second, this thesis provides two location-based message diffusion protocols, namely 6Shot broadcast and 6Shot multicast, specifically aimed at MANETs and fine tuned to be used as building blocks for LPSS. Finally this thesis proposes Phomo, a phone motion testing tool that allows to test proximity semantics of ad hoc applications without having to move around with mobile devices. These different developing support tools have been packaged in a coherent middleware framework called Pervaho.