914 resultados para Page, Curtis Hidden
Resumo:
To optimize the performance of wireless networks, one needs to consider the impact of key factors such as interference from hidden nodes, the capture effect, the network density and network conditions (saturated versus non-saturated). In this research, our goal is to quantify the impact of these factors and to propose effective mechanisms and algorithms for throughput guarantees in multi-hop wireless networks. For this purpose, we have developed a model that takes into account all these key factors, based on which an admission control algorithm and an end-to-end available bandwidth estimation algorithm are proposed. Given the necessary network information and traffic demands as inputs, these algorithms are able to provide predictive control via an iterative approach. Evaluations using analytical comparison with simulations as well as existing research show that the proposed model and algorithms are accurate and effective.
Resumo:
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how it's doing it.
Resumo:
The nature of education that children with disabilities should receive has been subject to much debate. This article critically assesses the ways in which the international human rights framework has conceptualised ‘inclusive education’. It argues that the right to education for children with disabilities in international law is constitutive of hidden contradictions and conditionality. This is most evident with respect to conceptualisations of ‘inclusion’ and ‘support’, and their respective emphases upon the extent of individual impairment or ‘deficit’ rather than upon the extent of institutional or structural deficit. It is vital that the new Committee on the Rights of Persons with Disabilities pays close attention to the utilisation of these concepts lest the Convention on the Rights of Persons with Disabilities further legitimises the ‘special needs’ educational discourse to which children with disabilities have been subject.
Resumo:
We report four repetitions of Falk and Kosfeld's (Am. Econ. Rev. 96(5):1611-1630, 2006) low and medium control treatments with 476 subjects. Each repetition employs a sample drawn from a standard subject pool of students and demographics vary across samples. We largely confirm the existence of hidden costs of control but, contrary to the original study, hidden costs of control are usually not substantial enough to significantly undermine the effectiveness of economic incentives. Our subjects were asked, at the end of the experimental session, to complete a questionnaire in which they had to state their work motivation in hypothetical scenarios. Our questionnaires are identical to the ones administered in Falk and Kosfeld's (Am. Econ. Rev. 96(5):1611-1630, 2006) questionnaire study. In contrast to the game play data, our questionnaire data are similar to those of the original questionnaire study. In an attempt to solve this puzzle, we report an extension with 228 subjects where performance-contingent earnings are absent i.e. both principals and agents are paid according to a flat participation fee. We observe that hidden costs significantly outweigh benefits of control under hypothetical incentives.
Resumo:
To examine the functional abilities of extremely low birthweight (ELBW, <or = 800 g) children at school age compared with full term children.
Resumo:
French Seminar Series
Belfast, December 2010
Resumo:
We consider a model of an on-line software market, where an intermediary distributes products from sellers to buyers. When products of sellers are vertically differentiated, an intermediary, earning a proportion of sales, has an incentive to hide the worse product on the second page, and only keep the better product on the front page: that weakens the competition, allowing the seller with the better product to charge a higher price. With heterogeneous visiting costs to the second page, the platform's revenue might improve, but the outcome will become socially suboptimal.
Resumo:
The burial of objects (human remains, explosives, weapons) below or behind concrete, brick, plaster or tiling may be associated with serious crime and are difficult locations to search. These are quite common forensic search scenarios but little has been published on them to-date. Most documented discoveries are accidental or from suspect/witness testimony. The problem in locating such hidden objects means a random or chance-based approach is not advisable. A preliminary strategy is presented here, based on previous studies, augmented by primary research where new technology or applications are required. This blend allows a rudimentary search workflow, from remote desktop study, to non-destructive investigation through to recommendations as to how the above may inform excavation, demonstrated here with a case study from a homicide investigation. Published case studies on the search for human remains demonstrate the problems encountered when trying to find and recover sealed-in and sealed over locations. Established methods include desktop study, photography, geophysics and search dogs:these are integrated with new technology (LiDAR and laser scanning; photographic rectification; close quarter aerial imagery; ground-penetrating radar on walls and gamma-ray/neutron activation radiography) to propose this possible search strategy.