988 resultados para lithic resources exploitation
Resumo:
In this paper, we expose an unorthodox adversarial attack that exploits the transients of a system's adaptive behavior, as opposed to its limited steady-state capacity. We show that a well orchestrated attack could introduce significant inefficiencies that could potentially deprive a network element from much of its capacity, or significantly reduce its service quality, while evading detection by consuming an unsuspicious, small fraction of that element's hijacked capacity. This type of attack stands in sharp contrast to traditional brute-force, sustained high-rate DoS attacks, as well as recently proposed attacks that exploit specific protocol settings such as TCP timeouts. We exemplify what we term as Reduction of Quality (RoQ) attacks by exposing the vulnerabilities of common adaptation mechanisms. We develop control-theoretic models and associated metrics to quantify these vulnerabilities. We present numerical and simulation results, which we validate with observations from real Internet experiments. Our findings motivate the need for the development of adaptation mechanisms that are resilient to these new forms of attacks.
Resumo:
One relatively unexplored question about the Internet's physical structure concerns the geographical location of its components: routers, links and autonomous systems (ASes). We study this question using two large inventories of Internet routers and links, collected by different methods and about two years apart. We first map each router to its geographical location using two different state-of-the-art tools. We then study the relationship between router location and population density; between geographic distance and link density; and between the size and geographic extent of ASes. Our findings are consistent across the two datasets and both mapping methods. First, as expected, router density per person varies widely over different economic regions; however, in economically homogeneous regions, router density shows a strong superlinear relationship to population density. Second, the probability that two routers are directly connected is strongly dependent on distance; our data is consistent with a model in which a majority (up to 75-95%) of link formation is based on geographical distance (as in the Waxman topology generation method). Finally, we find that ASes show high variability in geographic size, which is correlated with other measures of AS size (degree and number of interfaces). Among small to medium ASes, ASes show wide variability in their geographic dispersal; however, all ASes exceeding a certain threshold in size are maximally dispersed geographically. These findings have many implications for the next generation of topology generators, which we envisage as producing router-level graphs annotated with attributes such as link latencies, AS identifiers and geographical locations.
Resumo:
Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node’s resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage of each node. Motivated by content networking applications – including web caching, CDNs, and P2P – this paper extends our previous work on the off-line version of the problem, which was limited to object replication and was conducted under a game-theoretic framework. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache replacement/redirection/admission policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that online cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. When this becomes possible, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to the exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the “outlier” characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes.
Resumo:
Although cooperation generally increases the amount of resources available to a community of nodes, thus improving individual and collective performance, it also allows for the appearance of potential mistreatment problems through the exposition of one node's resources to others. We study such concerns by considering a group of independent, rational, self-aware nodes that cooperate using on-line caching algorithms, where the exposed resource is the storage at each node. Motivated by content networking applications -- including web caching, CDNs, and P2P -- this paper extends our previous work on the on-line version of the problem, which was conducted under a game-theoretic framework, and limited to object replication. We identify and investigate two causes of mistreatment: (1) cache state interactions (due to the cooperative servicing of requests) and (2) the adoption of a common scheme for cache management policies. Using analytic models, numerical solutions of these models, as well as simulation experiments, we show that on-line cooperation schemes using caching are fairly robust to mistreatment caused by state interactions. To appear in a substantial manner, the interaction through the exchange of miss-streams has to be very intense, making it feasible for the mistreated nodes to detect and react to exploitation. This robustness ceases to exist when nodes fetch and store objects in response to remote requests, i.e., when they operate as Level-2 caches (or proxies) for other nodes. Regarding mistreatment due to a common scheme, we show that this can easily take place when the "outlier" characteristics of some of the nodes get overlooked. This finding underscores the importance of allowing cooperative caching nodes the flexibility of choosing from a diverse set of schemes to fit the peculiarities of individual nodes. To that end, we outline an emulation-based framework for the development of mistreatment-resilient distributed selfish caching schemes. Our framework utilizes a simple control-theoretic approach to dynamically parameterize the cache management scheme. We show performance evaluation results that quantify the benefits from instantiating such a framework, which could be substantial under skewed demand profiles.
Resumo:
The mobile cloud computing model promises to address the resource limitations of mobile devices, but effectively implementing this model is difficult. Previous work on mobile cloud computing has required the user to have a continuous, high-quality connection to the cloud infrastructure. This is undesirable and possibly infeasible, as the energy required on the mobile device to maintain a connection, and transfer sizeable amounts of data is large; the bandwidth tends to be quite variable, and low on cellular networks. The cloud deployment itself needs to efficiently allocate scalable resources to the user as well. In this paper, we formulate the best practices for efficiently managing the resources required for the mobile cloud model, namely energy, bandwidth and cloud computing resources. These practices can be realised with our mobile cloud middleware project, featuring the Cloud Personal Assistant (CPA). We compare this with the other approaches in the area, to highlight the importance of minimising the usage of these resources, and therefore ensure successful adoption of the model by end users. Based on results from experiments performed with mobile devices, we develop a no-overhead decision model for task and data offloading to the CPA of a user, which provides efficient management of mobile cloud resources.
Resumo:
The best wind sites in the United States are often located far from electricity demand centers and lack transmission access. Local sites that have lower quality wind resources but do not require as much power transmission capacity are an alternative to distant wind resources. In this paper, we explore the trade-offs between developing new wind generation at local sites and installing wind farms at remote sites. We first examine the general relationship between the high capital costs required for local wind development and the relatively lower capital costs required to install a wind farm capable of generating the same electrical output at a remote site,with the results representing the maximum amount an investor should be willing to pay for transmission access. We suggest that this analysis can be used as a first step in comparing potential wind resources to meet a state renewable portfolio standard (RPS). To illustrate, we compare the cost of local wind (∼50 km from the load) to the cost of distant wind requiring new transmission (∼550-750 km from the load) to meet the Illinois RPS. We find that local, lower capacity factor wind sites are the lowest cost option for meeting the Illinois RPS if new long distance transmission is required to access distant, higher capacity factor wind resources. If higher capacity wind sites can be connected to the existing grid at minimal cost, in many cases they will have lower costs.
Resumo:
Through an examination of global climate change models combined with hydrological data on deteriorating water quality in the Middle East and North Africa (MENA), we elucidate the ways in which the MENA countries are vulnerable to climate-induced impacts on water resources. Adaptive governance strategies, however, remain a low priority for political leaderships in the MENA region. To date, most MENA governments have concentrated the bulk of their resources on large-scale supply side projects such as desalination, dam construction, inter-basin water transfers, tapping fossil groundwater aquifers, and importing virtual water. Because managing water demand, improving the efficiency of water use, and promoting conservation will be key ingredients in responding to climate-induced impacts on the water sector, we analyze the political, economic, and institutional drivers that have shaped governance responses. While the scholarly literature emphasizes the importance of social capital to adaptive governance, we find that many political leaders and water experts in the MENA rarely engage societal actors in considering water risks. We conclude that the key capacities for adaptive governance to water scarcity in MENA are underdeveloped. © 2010 Springer Science+Business Media B.V.
Resumo:
BACKGROUND: Living related kidney transplantation (LRT) is underutilized, particularly among African Americans. The effectiveness of informational and financial interventions to enhance informed decision-making among African Americans with end stage renal disease (ESRD) and improve rates of LRT is unknown. METHODS/DESIGN: We report the protocol of the Providing Resources to Enhance African American Patients' Readiness to Make Decisions about Kidney Disease (PREPARED) Study, a two-phase study utilizing qualitative and quantitative research methods to design and test the effectiveness of informational (focused on shared decision-making) and financial interventions to overcome barriers to pursuit of LRT among African American patients and their families. Study Phase I involved the evidence-based development of informational materials as well as a financial intervention to enhance African American patients' and families' proficiency in shared decision-making regarding LRT. In Study Phase 2, we are currently conducting a randomized controlled trial in which patients with new-onset ESRD receive 1) usual dialysis care by their nephrologists, 2) the informational intervention (educational video and handbook), or 3) the informational intervention in addition to the option of participating in a live kidney donor financial assistance program. The primary outcome of the randomized controlled trial will include patients' self-reported rates of consideration of LRT (including family discussions of LRT, patient-physician discussions of LRT, and identification of a LRT donor). DISCUSSION: Results from the PREPARED study will provide needed evidence on ways to enhance the decision to pursue LRT among African American patients with ESRD.
Resumo:
We conduct the first empirical investigation of common-pool resource users' dynamic and strategic behavior at the micro level using real-world data. Fishermen's strategies in a fully dynamic game account for latent resource dynamics and other players' actions, revealing the profit structure of the fishery. We compare the fishermen's actual and socially optimal exploitation paths under a time-specific vessel allocation policy and find a sizable dynamic externality. Individual fishermen respond to other users by exerting effort above the optimal level early in the season. Congestion is costly instantaneously but is beneficial in the long run because it partially offsets dynamic inefficiencies.
Resumo:
This paper introduces new results obtained from a statistical investigation into a 3071-observation data set collected from a Vietnamese nationwide entrepreneurship survey. From established relationships, such factors as preparedness, financial resources and participation in social networks are confirmed to have significant effects on entrepreneurial decisions. Entrepreneurs, both financially constrained and unconstrained, who have a business plan tend to start their entrepreneurial ventures earlier. Also, financial constraints have a profound impact on the entrepreneurial decisions. When perceiving the likelihood of success to be high, an entrepreneur shows the tendency for prompt action on business ideas. But when seeing the risk of prolonging the waiting time to first revenue, a prospective entrepreneur would be more likely to wait for more favorable conditions despite the vagueness of "favorable". Additionally, empirical computations indicate that there is a 41.3% probability that an extant entrepreneur who is generating revenue sees high chance of success. Past work and entrepreneurial experiences also have positive impacts on both the entrepreneurial decisions and perceived chance of success.
Resumo:
This article documents the addition of 220 microsatellite marker loci to the Molecular Ecology Resources Database. Loci were developed for the following species: Allanblackia floribunda, Amblyraja radiata, Bactrocera cucurbitae, Brachycaudus helichrysi, Calopogonium mucunoides, Dissodactylus primitivus, Elodea canadensis, Ephydatia fluviatilis, Galapaganus howdenae howdenae, Hoplostethus atlanticus, Ischnura elegans, Larimichthys polyactis, Opheodrys vernalis, Pelteobagrus fulvidraco, Phragmidium violaceum, Pistacia vera, and Thunnus thynnus. These loci were cross-tested on the following species: Allanblackia gabonensis, Allanblackia stanerana, Neoceratitis cyanescens, Dacus ciliatus, Dacus demmerezi, Bactrocera zonata, Ceratitis capitata, Ceratitis rosa, Ceratits catoirii, Dacus punctatifrons, Ephydatia mülleri, Spongilla lacustris, Geodia cydonium, Axinella sp. Ischnura graellsii, Ischnura ramburii, Ischnura pumilio, Pistacia integerrima and Pistacia terebinthus. © 2010 Blackwell Publishing Ltd.
Resumo:
"Im Zuge der weiteren Verbreitung der Social Media und der internetbasierten Lehre, gewinnen eLearning Inhalte immer mehr an Bedeutung. In den Kontext von eLearning und internetbasierter Lehre gehören auch Open Educational Resources (OER). OER sind digitale Lern- und Lehrmaterialien, die frei für Lehrende und Studierende zugänglich sind und auch frei verbreitet werden dürfen. [...] Um OER auszutauschen, zu finden, zu beschaffen und sie auf einer breiten Basis zugänglich zu machen, insbesondere auch über Suchmaschinen und dadurch verwenden zu können, werden für die jeweiligen Materialien Metadaten benötigt. [...] Um die Frage nach dem Handlungs- und Forschungsbedarf zum Thema Metadaten für Open Educational Resources zu untersuchen, wird zunächst ein Überblick über die momentan bestehenden nationalen und internationalen Metadatenstandards für eLearning Objekte gegeben. [...] Hieraus ergeben sich Empfehlungen, welche Metadaten-Standards für die weitere Nutzung und Förderung geeignet sein könnten. Es werden außerdem die Möglichkeiten der Erstellung eines neuen Metadaten-Standards sowie eines gemeinsamen Portals für OER erörtert. Hierbei wird vor allem auf die zu erwartenden Probleme und die damit verbundenen Anforderungen eingegangen." (DIPF/Orig.)