934 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a previous chapter (Dean and Kavanagh, Chapter 37), the authors made a case for applying low intensity (LI) cognitive behaviour therapy (CBT) to people with serious mental illness (SMI). As in other populations, LI CBT interventions typically deal with circumscribed problems or behaviours. LI CBT retains an emphasis on self-management, has restricted content and segment length, and does not necessarily require extensive CBT training. In applying these interventions to SMI, adjustments may be needed to address cognitive and symptomatic difficulties often faced by these groups. What may take a single session in a less affected population may require several sessions or a thematic application of the strategy within case management. In some cases, the LI CBT may begin to appear more like a high-intensity (HI) intervention, albeit simple and with many LI CBT characteristics still retained. So, if goal setting were introduced in one or two sessions, it could clearly be seen as an LI intervention. When applied to several different situations and across many sessions, it may be indistinguishable from a simple HI treatment, even if it retains the same format and is effectively applied by a practitioner with limited CBT training. ----- ----- In some ways, LI CBT should be well suited to case management of patients with SMI. treating staff typically have heavy workloads, and find it difficult to apply time-consuming treatments (Singh et al. 2003). LI CBT may allow provision of support to greater numbers of service users, and allow staff to spend more time on those who need intensive and sustained support. However, the introduction of any change in practice has to address significant challenges, and LI CBT is no exception. ----- ----- Many of the issues that we face in applying LI CBT to routine case management in a mnetal health service and their potential solutions are essentially the same as in a range of other problem domains (Turner and Sanders 2006)- and, indeed, are similar to those in any adoption of innovation (Rogers 2003). Over the last 20 years, several commentators have described barriers to implementing evidence-based innovations in mental health services (Corrigan et al. 1992; Deane et al. 2006; Kavanagh et al. 1993). The aim of the current chapter is to present a cognitive behavioural conceptualisation of problems and potential solutions for dissemination of LI CBT.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose: The paper seeks to apply the theory of the democratic deficit to school-based management with an emphasis on Australia. This theory was developed to examine managerial restructuring of the Australian Public Service in the 1990s. Given similarities between the use of managerial practices in the public service and government schools, the authors draw on recent literature about school-based management in Australia and apply the democratic deficit theory to it. ----- ----- Design/methodology/approach: This paper is conceptual in focus. The authors analyse literature in terms of the three components of the democratic deficit – i.e. the weakening of accountability, the denial of the roles and values of public employees, and the emergence of a “hollow state” – and in relation to the application of this theory to the Australian Public Service.----- ----- Findings: A trend towards the three components of the democratic deficit is evident in Australia although, to date, its emergence has not been as extensive as in the UK. The authors argue that the democratic principles on which public schooling in Australia was founded are being eroded by managerial and market practices.----- ----- Practical implications: These findings provide policy makers and practitioners with another way of examining managerial and market understandings of school-based management and its impact on teachers and on students. It offers suggestions to reorient practices away from those that are exclusively managerial-based towards those that are public-sector based.----- ----- Originality/value: The value of this paper is that it applies the theory of the democratic deficit to current understandings of school-based management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IEC 61850 Process Bus technology has the potential to improve cost, performance and reliability of substation design. Substantial costs associated with copper wiring (designing, documentation, construction, commissioning and troubleshooting) can be reduced with the application of digital Process Bus technology, especially those based upon international standards. An IEC 61850-9-2 based sampled value Process Bus is an enabling technology for the application of Non-Conventional Instrument Transformers (NCIT). Retaining the output of the NCIT in its native digital form, rather than conversion to an analogue output, allows for improved transient performance, dynamic range, safety, reliability and reduced cost. In this paper we report on a pilot installation using NCITs communicating across a switched Ethernet network using the UCAIug Implementation Guideline for IEC 61850-9-2 (9-2 Light Edition or 9-2LE). This system was commissioned in a 275 kV Line Reactor bay at Powerlink Queensland’s Braemar substation in 2009, with sampled value protection IEDs 'shadowing' the existing protection system. The results of commissioning tests and twelve months of service experience using a Fibre Optic Current Transformer (FOCT) from Smart Digital Optics (SDO) are presented, including the response of the system to fault conditions. A number of remaining issues to be resolved to enable wide-scale deployment of NCITs and IEC 61850-9-2 Process Bus technology are also discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report examines the involvement of manufacturers in value-adding through service-enhancement of product offerings. This focus has been prompted by:  emphasis in the knowledge-economy literature on the increasing role played by services in economic growth; and  recent analysis which suggests that the most dynamic sector of many economies is an integrated manufacturing-services sector (see Part One of this report). The report initially describes the emergence of an integrated manufacturing-services sector in the context of increasingly knowledge-based economic systems. Part Two reports on the results of a survey of manufacturers in the building and construction product system, investigating their involvement in service provision. Parts Three and Four present two case studies of exemplary manufacturers involved in adding value to their manufacturing operations through services offered on building and construction projects. The report examines manufacturers of materials, products, equipment and machinery used on building and construction projects. The two case study sections of the report, in part, focus on a major project undertaken by each of the manufacturers. This project element of activity is focussed on (as opposed to wholesale or retail supply), because this area of activity involves a broader array of service-enhancement mechanisms and more complex bundling of products and services.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As online social spaces continue to grow in importance, the complex relationship between users and the private providers of the platforms continues to raise increasingly difficult questions about legitimacy in online governance. This article examines two issues that go to the core of egitimate governance in online communities: how are rules enforced and punishments imposed, and how should the law support legitimate governance and protect participants from the illegitimate exercise of power? Because the rules of online communities are generally ultimately backed by contractual terms of service, the imposition of punishment for the breach of internal rules exists in a difficult conceptual gap between criminal law and the predominantly compensatory remedies of contractual doctrine. When theorists have addressed the need for the rules of virtual communities to be enforced, a dichotomy has generally emerged between the appropriate role of criminal law for 'real' crimes, and the private, internal resolution of 'virtual' or 'fantasy' crimes. In this structure, the punitive effect of internal measures is downplayed and the harm that can be caused to participants by internal sanctions is systemically undervalued.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In order to tackle the growth of air travelers in airports worldwide, it is important to simulate and understand passenger flows to predict future capacity constraints and levels of service. We discuss the ability of agent-based models to understand complicated pedestrian movement in built environments. In this paper we propose advanced passenger traits to enable more detailed modelling of behaviors in terminal buildings, particularly in the departure hall around the check-in facilities. To demonstrate the concepts, we perform a series of passenger agent simulations in a virtual airport terminal. In doing so, we generate a spatial distribution of passengers within the departure hall to ancillary facilities such as cafes, information kiosks and phone booths as well as common check-in facilities, and observe the effects this has on passenger check-in and departure hall dwell times, and facility utilization.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports an empirical study on measuring transit service reliability using the data from a Web-based passenger survey on a major transit corridor in Brisbane, Australia. After an introduction of transit service reliability measures, the paper presents the results from the case study including study area, data collection, and reliability measures obtained. This includes data exploration of boarding/arrival lateness, in-vehicle time variation, waiting time variation, and headway adherence. Impacts of peak-period effects and separate operation on service reliability are examined. Relationships between transit service characteristics and passenger waiting time are also discussed. A summary of key findings and an agenda of future research are offered in conclusions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article analyses the legality of Israel’s 2007 airstrike on an alleged Syrian nuclear facility at Al-Kibar—an incident that has been largely overlooked by international lawyers to date. The absence of a threat of imminent attack from Syria means Israel’s military action was not a lawful exercise of anticipatory self-defence. Yet, despite Israel’s clear violation of the prohibition on the use of force there was remarkably little condemnation from other states, suggesting the possibility of growing international support for the doctrine of pre-emptive self-defence. This article argues that the muted international reaction to Israel’s pre-emptive action was the result of political factors, and should not be seen as endorsement of the legality of the airstrike. As such, a lack of opinio juris means the Al-Kibar episode cannot be viewed as extending the scope of the customary international law right of self-defence so as to permit the use of force against non-imminent threats. However, two features of this incident—namely, Israel’s failure to offer any legal justification for its airstrike, and the international community’s apparent lack of concern over legality—are also evident in other recent uses of force in the ‘war on terror’ context. These developments may indicate a shift in state practice involving a downgrading of the role of international law in discussions of the use of force. This may signal a declining perception of the legitimacy of the jus ad bellum, at least in cases involving minor uses of force.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In an attempt to curb online copyright infringement, copyright owners are increasingly seeking to enlist the assistance of Internet Service Providers (‘ISPs’) to enforce copyright and impose sanctions on their users.1 Commonly termed ‘graduated response’ schemes, these measures generally require that the ISP take some action against users suspected of infringing copyright, ranging from issuing warnings, to collating allegations made against subscribers and reporting to copyright owners, to suspension and eventual termination of service.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decision-making situations, increasingly powerful attacks become possible against machine learning systems. In this paper, we present three broad research directions towards the end of developing truly secure learning. First, we suggest that finding bounds on adversarial influence is important to understand the limits of what an attacker can and cannot do to a learning system. Second, we investigate the value of adversarial capabilities-the success of an attack depends largely on what types of information and influence the attacker has. Finally, we propose directions in technologies for secure learning and suggest lines of investigation into secure techniques for learning in adversarial environments. We intend this paper to foster discussion about the security of machine learning, and we believe that the research directions we propose represent the most important directions to pursue in the quest for secure learning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper is based on the premise that universities have an obligation to provide adequate student support services, such as learning assistance (that is, assistance with academic writing and other study skills) and that in order to be effective such services must be responsive to the wider policy and social implications of student attrition and retention. The paper outlines briefly some of the factors that have influenced the development of learning assistance practices in Australia and America. This is followed by an account of experiences at one Australian metropolitan university where learning assistance service provision shifted from a decentralised, faculty-based model to a centralised model of service delivery. This shift was in response to concerns about lack of quality and consistency in a support model dependent upon faculty resources yet a follow up study identified other problems in the centralised delivery of learning assistance services. These problems, clustered under the heading contextualised versus decontextualised learning assistance, include the relevance of generic learning assistance services to students struggling with specific course related demands; the apparent tensions between challenging students and assisting students at risk of failure; and variations in the level of collaboration between learning advisers and academic staff in supporting students in the learning environment. These problems are analysed using the theoretical modelling derived from the tools made available through cultural historical activity theory and expansive visibilisation (Engeström & Miettinen, 1999).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In cloud computing, resource allocation and scheduling of multiple composite web services is an important and challenging problem. This is especially so in a hybrid cloud where there may be some low-cost resources available from private clouds and some high-cost resources from public clouds. Meeting this challenge involves two classical computational problems: one is assigning resources to each of the tasks in the composite web services; the other is scheduling the allocated resources when each resource may be used by multiple tasks at different points of time. In addition, Quality-of-Service (QoS) issues, such as execution time and running costs, must be considered in the resource allocation and scheduling problem. Here we present a Cooperative Coevolutionary Genetic Algorithm (CCGA) to solve the deadline-constrained resource allocation and scheduling problem for multiple composite web services. Experimental results show that our CCGA is both efficient and scalable.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The presence of High Speed Rail (HSR) systems influences market shares of road and air transport, and the development of cities and regions they serve. With the deployment of HSR infrastructure, changes in accessibility have occurred. These changes have lead researchers to investigate effects on the economic and spatial derived variables. Contention exists when managing the trade off between efficiency, and access points which are usually in the range of hundreds of kilometres apart. In short, it is argued that intermediate cities, bypassed by HSR services, suffer a decline in their accessibility and developmental opportunities. The present Chapter will analyse possible impacts derived from the presence of HSR infrastructure. In particular, it will consider small and medium agglomerations in the vicinity of HSR corridors, not always served by HSR stations. Thus, a methodology is developed to quantify accessibility benefits and their distribution. These benefits will be investigated in relation to different rail transit strategies integrating HSR infrastructure where a HSR station cannot be positioned. These strategies are selected principally for the type of service offered: (i) cadenced, (ii) express, (iii) frequent or (iv) non-stopping. Furthermore, to ground the theoretical approach linking accessibility and competitiveness, a case study in the North-Eastern Italian regions will be used for the application of the accessibility distributive patterns between the HSR infrastructure and the selected strategies. Results indicate that benefits derive from well informed decisions on HSR station positioning and the appropriate blend of complementary services in the whole region to interface HSR infrastructure. The results are significant for all countries in Europe and worldwide, not only for investing in HSR infrastructure, but mostly in terms of building territorial cohesion, while seeking international recognition for developing successful new technology and systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Web service technology is increasingly being used to build various e-Applications, in domains such as e-Business and e-Science. Characteristic benefits of web service technology are its inter-operability, decoupling and just-in-time integration. Using web service technology, an e-Application can be implemented by web service composition — by composing existing individual web services in accordance with the business process of the application. This means the application is provided to customers in the form of a value-added composite web service. An important and challenging issue of web service composition, is how to meet Quality-of-Service (QoS) requirements. This includes customer focused elements such as response time, price, throughput and reliability as well as how to best provide QoS results for the composites. This in turn best fulfils customers’ expectations and achieves their satisfaction. Fulfilling these QoS requirements or addressing the QoS-aware web service composition problem is the focus of this project. From a computational point of view, QoS-aware web service composition can be transformed into diverse optimisation problems. These problems are characterised as complex, large-scale, highly constrained and multi-objective problems. We therefore use genetic algorithms (GAs) to address QoS-based service composition problems. More precisely, this study addresses three important subproblems of QoS-aware web service composition; QoS-based web service selection for a composite web service accommodating constraints on inter-service dependence and conflict, QoS-based resource allocation and scheduling for multiple composite services on hybrid clouds, and performance-driven composite service partitioning for decentralised execution. Based on operations research theory, we model the three problems as a constrained optimisation problem, a resource allocation and scheduling problem, and a graph partitioning problem, respectively. Then, we present novel GAs to address these problems. We also conduct experiments to evaluate the performance of the new GAs. Finally, verification experiments are performed to show the correctness of the GAs. The major outcomes from the first problem are three novel GAs: a penaltybased GA, a min-conflict hill-climbing repairing GA, and a hybrid GA. These GAs adopt different constraint handling strategies to handle constraints on interservice dependence and conflict. This is an important factor that has been largely ignored by existing algorithms that might lead to the generation of infeasible composite services. Experimental results demonstrate the effectiveness of our GAs for handling the QoS-based web service selection problem with constraints on inter-service dependence and conflict, as well as their better scalability than the existing integer programming-based method for large scale web service selection problems. The major outcomes from the second problem has resulted in two GAs; a random-key GA and a cooperative coevolutionary GA (CCGA). Experiments demonstrate the good scalability of the two algorithms. In particular, the CCGA scales well as the number of composite services involved in a problem increases, while no other algorithms demonstrate this ability. The findings from the third problem result in a novel GA for composite service partitioning for decentralised execution. Compared with existing heuristic algorithms, the new GA is more suitable for a large-scale composite web service program partitioning problems. In addition, the GA outperforms existing heuristic algorithms, generating a better deployment topology for a composite web service for decentralised execution. These effective and scalable GAs can be integrated into QoS-based management tools to facilitate the delivery of feasible, reliable and high quality composite web services.