897 resultados para entrepreneurial opportunities on the Internet
Resumo:
This paper explores reasons for the high degree of variability in the sizes of ASes that have recently been observed, and the processes by which this variable distribution develops. AS size distribution is important for a number of reasons. First, when modeling network topologies, an AS size distribution assists in labeling routers with an associated AS. Second, AS size has been found to be positively correlated with the degree of the AS (number of peering links), so understanding the distribution of AS sizes has implications for AS connectivity properties. Our model accounts for AS births, growth, and mergers. We analyze two models: one incorporates only the growth of hosts and ASes, and a second extends that model to include mergers of ASes. We show analytically that, given reasonable assumptions about the nature of mergers, the resulting size distribution exhibits a power law tail with the exponent independent of the details of the merging process. We estimate parameters of the models from measurements obtained from Internet registries and from BGP tables. We then compare the models solutions to empirical AS size distribution taken from Mercator and Skitter datasets, and find that the simple growth-based model yields general agreement with empirical data. Our analysis of the model in which mergers occur in a manner independent of the size of the merging ASes suggests that more detailed analysis of merger processes is needed.
Resumo:
Recent studies have noted that vertex degree in the autonomous system (AS) graph exhibits a highly variable distribution [15, 22]. The most prominent explanatory model for this phenomenon is the Barabási-Albert (B-A) model [5, 2]. A central feature of the B-A model is preferential connectivity—meaning that the likelihood a new node in a growing graph will connect to an existing node is proportional to the existing node’s degree. In this paper we ask whether a more general explanation than the B-A model, and absent the assumption of preferential connectivity, is consistent with empirical data. We are motivated by two observations: first, AS degree and AS size are highly correlated [11]; and second, highly variable AS size can arise simply through exponential growth. We construct a model incorporating exponential growth in the size of the Internet, and in the number of ASes. We then show via analysis that such a model yields a size distribution exhibiting a power-law tail. In such a model, if an AS’s link formation is roughly proportional to its size, then AS degree will also show high variability. We instantiate such a model with empirically derived estimates of growth rates and show that the resulting degree distribution is in good agreement with that of real AS graphs.
Resumo:
With the increasing demand for document transfer services such as the World Wide Web comes a need for better resource management to reduce the latency of documents in these systems. To address this need, we analyze the potential for document caching at the application level in document transfer services. We have collected traces of actual executions of Mosaic, reflecting over half a million user requests for WWW documents. Using those traces, we study the tradeoffs between caching at three levels in the system, and the potential for use of application-level information in the caching system. Our traces show that while a high hit rate in terms of URLs is achievable, a much lower hit rate is possible in terms of bytes, because most profitably-cached documents are small. We consider the performance of caching when applied at the level of individual user sessions, at the level of individual hosts, and at the level of a collection of hosts on a single LAN. We show that the performance gain achievable by caching at the session level (which is straightforward to implement) is nearly all of that achievable at the LAN level (where caching is more difficult to implement). However, when resource requirements are considered, LAN level caching becomes much more desirable, since it can achieve a given level of caching performance using a much smaller amount of cache space. Finally, we consider the use of organizational boundary information as an example of the potential for use of application-level information in caching. Our results suggest that distinguishing between documents produced locally and those produced remotely can provide useful leverage in designing caching policies, because of differences in the potential for sharing these two document types among multiple users.
Resumo:
This report describes our attempt to add animation as another data type to be used on the World Wide Web. Our current network infrastructure, the Internet, is incapable of carrying video and audio streams for them to be used on the web for presentation purposes. In contrast, object-oriented animation proves to be efficient in terms of network resource requirements. We defined an animation model to support drawing-based and frame-based animation. We also extended the HyperText Markup Language in order to include this animation mode. BU-NCSA Mosanim, a modified version of the NCSA Mosaic for X(v2.5), is available to demonstrate the concept and potentials of animation in presentations an interactive game playing over the web.
Resumo:
As the Internet has evolved and grown, an increasing number of nodes (hosts or autonomous systems) have become multihomed, i.e., a node is connected to more than one network. Mobility can be viewed as a special case of multihoming—as a node moves, it unsubscribes from one network and subscribes to another, which is akin to one interface becoming inactive and another active. The current Internet architecture has been facing significant challenges in effectively dealing with multihoming (and consequently mobility). The Recursive INternet Architecture (RINA) [1] was recently proposed as a clean-slate solution to the current problems of the Internet. In this paper, we perform an average-case cost analysis to compare the multihoming / mobility support of RINA, against that of other approaches such as LISP and MobileIP. We also validate our analysis using trace-driven simulation.
Resumo:
In this position paper, we review basic control strategies that machines acting as "traffic controllers" could deploy in order to improve the management of Internet services. Such traffic controllers are likely to spur the widespread emergence of advanced applications, which have (so far) been hindered by the inability of the networking infrastructure to deliver on the promise of Quality-of-Service (QoS).
Resumo:
The cost and complexity of deploying measurement infrastructure in the Internet for the purpose of analyzing its structure and behavior is considerable. Basic questions about the utility of increasing the number of measurements and/or measurement sites have not yet been addressed which has lead to a "more is better" approach to wide-area measurements. In this paper, we quantify the marginal utility of performing wide-area measurements in the context of Internet topology discovery. We characterize topology in terms of nodes, links, node degree distribution, and end-to-end flows using statistical and information-theoretic techniques. We classify nodes discovered on the routes between a set of 8 sources and 1277 destinations to differentiate nodes which make up the so called "backbone" from those which border the backbone and those on links between the border nodes and destination nodes. This process includes reducing nodes that advertise multiple interfaces to single IP addresses. We show that the utility of adding sources goes down significantly after 2 from the perspective of interface, node, link and node degree discovery. We show that the utility of adding destinations is constant for interfaces, nodes, links and node degree indicating that it is more important to add destinations than sources. Finally, we analyze paths through the backbone and show that shared link distributions approximate a power law indicating that a small number of backbone links in our study are very heavily utilized.
Resumo:
Recent research have exposed new breeds of attacks that are capable of denying service or inflicting significant damage to TCP flows, without sustaining the attack traffic. Such attacks are often referred to as "low-rate" attacks and they stand in sharp contrast against traditional Denial of Service (DoS) attacks that can completely shut off TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable of mitigating the attack's impact. Through adopting a simple discrete-time model with a single TCP flow and a nonoblivious adversary, we were able to expose new variants of these low-rate attacks that could potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded as upper bounds on the impact of low-rate attacks rather than a real assessment under a specific attack scenario.
Resumo:
This Portfolio of Exploration (PoE) tracks a transformative learning developmental journey that is directed at changing meaning making structures and mental models within an innovation practice. The explicit purpose of the Portfolio is to develop new and different perspectives that enable the handling of new and more complex phenomena through self transformation and increased emotional intelligence development. The Portfolio provides a response to the question: ‘What are the key determinants that enable a Virtual Team (VT) to flourish where flourishing means developing and delivering on the firm’s innovative imperatives?’ Furthermore, the PoE is structured as an investigation into how higher order meaning making promotes ‘entrepreneurial services’ within an intra-firm virtual team, with a secondary aim to identify how reasoning about trust influence KGPs to exchange knowledge. I have developed a framework which specifically focuses on the effectiveness of any firms’ Virtual Team (VT) through transforming the meaning making of the VT participants. I hypothesized it is the way KGPs make meaning (reasoning about trust) which differentiates the firm as a growing firm in the sense of Penrosean resources: ‘inducement to expand and a limit of expansion’ (1959). Reasoning about trust is used as a higher order meaning-making concept in line with Kegan’s (1994) conception of complex meaning making, which is the combining of ideas and data in ways that transform meaning and implicates participants to find new ways of knowledge generation. Simply, it is the VT participants who develop higher order meaning making that hold the capabilities to transform the firm from within, providing a unique competitive advantage that enables the firm to grow.
Resumo:
This Portfolio is about the changes that can be supported and achieved through transformational education that impacts on personal, professional and organisational levels. Having lived through an era of tremendous change over the second half of the twentieth century and into the twenty-first the author has a great drawing board to contemplate in the context of professional career experience as an engineer. The ability to engage in ‘subject-object’ separation is the means by which Kegan (1994, 2009) explains that transformation takes place and the Essays in this Portfolio aim to support and bring about such change. Exploration of aspects of ‘Kerry’ is the material selected to both challenge support change in the way of knowing from being subject to certain information and knowledge that to being able to consider it more objectively. The task of being able to distance judgement about the economy and economic development of Kerry was facilitated by various readings around of a number of key thinkers including Kegan, Drucker, Porter and Penrose. The central themes of Kerry or the potential for economic development are built into each Essay. Essay One focuses on reflections of Kerry life - on Kerry people within and without Kerry - and events as they affected understandings of how people related to and worked with one another. These reflections formed the basis for transformational goals identified which required a shift from an engineering mindset to encompass an economics-based view. In Essay Two knowledge of economic concepts is developed by exploring the writings of Drucker, Penrose, and Porter with pertinence to considering economic development generally, and for Kerry in particular in the form of an ‘entrepreneurial platform’. The concepts and theories were the basis of explorations presented in Essays Three and Four. Essay Three focuses on Kerry’s potential for economic development give its current economic profile and includes results from interviews with selected businesses. Essay Four is an exercise in the application of Porter’s ‘Cluster’ concept to the equine sector.
Resumo:
The objective of my Portfolio is to explore the working hypothesis that the organic growth of a firm is governed by the perspectives of individuals and such perspectives are governed by their meaning-making. The Portfolio presents explorations of the transformation of my meaning making and in adopting new practices to support the organic growth of a firm. I use the work of other theorists to transition my understanding of how the world works. This transition process is an essential tool to engage with and understand the perspectives of others and develop a mental capacity to “train one’s imagination to go visiting” (Arendt, 1982; p.43). The Portfolio, therefore, is primarily located in reflective research. Using Kegan’s (1994) approach to Adult Mental Development, and Sowell’s (2007) understanding of the visions which silently shape our thoughts I organise the developments of my meaning making around three transformation pillars of change. In pillar one I seek to transform an unthinking respect for authority and break down a blind pervasiveness of thought within my reasoning process arising from an instinct for attachment and support from others whom I trust. In pillar two I seek to discontinue using autocratic leadership and learn to use the thoughts and contributions of a wider team to make improved choices about uncertain future events. In pillar three I explore the use of a more reflective thinking framework to test the accuracy of my perceptions and apply a high level of integrity in my reasoning process. The transformation of my meaning making has changed my perspectives and in turn my preferred practices to support the organic growth of a firm. I identify from practice that a transformative form of leadership is far more effective that a transactional form of leadership to stimulate the trust and teamwork required to sustain the growth a firm. Creating an environment where one feels free to share thoughts and feelings with others is an essential tool to build a team to critique the thoughts of one other. Furthermore, the entrepreneurial wisdom to grow a firm must come from a wider team, located both inside and outside the boundaries of a firm. No individual or small team has the mental capacity to provide the entrepreneurship required to drive the organic growth of a firm. I address my Portfolio to leaders in organisations who have no considered framework on the best practices required to lead a social organisation. These individuals may have no sense of what they implicitly believe drives social causation and they may have no understanding if their meaning making supports or curtails the practices required to grow a firm. They may have a very limited capacity to think in a logical manner, with the result they are using guesses from their ‘gut’ to make poor judgements in the management of a firm.
Resumo:
Query processing over the Internet involving autonomous data sources is a major task in data integration. It requires the estimated costs of possible queries in order to select the best one that has the minimum cost. In this context, the cost of a query is affected by three factors: network congestion, server contention state, and complexity of the query. In this paper, we study the effects of both the network congestion and server contention state on the cost of a query. We refer to these two factors together as system contention states. We present a new approach to determining the system contention states by clustering the costs of a sample query. For each system contention state, we construct two cost formulas for unary and join queries respectively using the multiple regression process. When a new query is submitted, its system contention state is estimated first using either the time slides method or the statistical method. The cost of the query is then calculated using the corresponding cost formulas. The estimated cost of the query is further adjusted to improve its accuracy. Our experiments show that our methods can produce quite accurate cost estimates of the submitted queries to remote data sources over the Internet.
Resumo:
We examined whether individual differences in shyness and context influenced the amount of computer-mediated self-disclosure and use of affective language during an unfamiliar dyadic social interaction. Unfamiliar young adults were selected for high and low self-reported shyness and paired in mixed dyads (one shy and one nonshy). Each dyad was randomly assigned to either a live webcam or no webcam condition. Participants then engaged in a 20-minute online free chat over the Internet in the laboratory. Free chat conversations were archived, and the transcripts were objectively coded for traditional communication variables, conversational style, and the use of affective language. As predicted, shy adults engaged in significantly fewer spontaneous self-disclosures than did their nonshy counterparts only in the webcam condition. Shy versus nonshy adults did not differ on spontaneous self-disclosures in the no webcam condition. However, context did not influence the use of computer-mediated affective language. Although shy adults used significantly less active and pleasant words than their nonshy counterparts, these differences were not related to webcam condition. The present findings replicate and extend earlier work on shyness, context, and computer-mediated communication to a selected sample of shy adults. Findings suggest that context may influence some, but not all, aspects of social communication in shy adults.
Resumo:
Put in place to protect the rights of the child, the Convention on the Rights of the Child is a set of non-negotiable standards. A core principle underpinning the Convention is the child's right to participate fully in social arenas and to access sources of social support without excessive interference. Juxtaposing this is the right of the child to be shielded from harm, abuse and exploitation. Over the past several decades the Internet has emerged as a fast and easily accessible medium for people to connect and communicate. While the Internet provides children with a source of support through chat rooms, online communities and social networking sites, just as equally it can expose vulnerable children to predatory and deviant individuals exacerbating the potential for harm. Upholding the Convention in cyberspace is a challenge. The Internet is not owned or regulated by any governing body and accountability is difficult to enforce. This article discusses some of the difficulties of upholding the Convention online and provides recommendations for policy-makers to protect children as they participate in cyberspace.