839 resultados para hybrid cloud computing
Resumo:
Monitoring, object-orientation, real-time, execution-time, scheduling
Resumo:
v.32:no.16(1970)
Resumo:
The occurrence of hybrid dysgenesis was investigated in Drosophila sturtevanti Duda, 1927 using diagnostic crosses similar to those used for induction of dysgenics traits in D. melanogaster. Reciprocal test crosses were made, at 27° C, between an old laboratory strain of D. sturtevanti (COL, from Colombia), assumed to be an M'-like strain, and eight freshly collected strains from several natural populations. The gonadal dysgenesis indices were under 10% in most of crosses, except in hybrids of COL with I27, a strain from Minas Gerais (Brazil), in which the index values were moderate in both directions of crosses (25.71 and 12.87). The smallest productivity was also observed in hybrids of females COL mated to I27 males. No causal relationship between the observed gonadal dysgenesis and mobilization of P element or another transposable element could be effectively established.
Resumo:
In this paper, we present a first approach to evolve a cooperative behavior in ad hoc networks. Since wireless nodes are energy constrained, it may not be in the best interest of a node to always accept relay requests. On the other hand, if all nodes decide not to expend energy in relaying, then network throughput will drop dramatically. Both these extreme scenarios are unfavorable to the interests of a user. In this paper we deal with the issue of user cooperation in ad hoc networks by developing the algorithm called Generous Tit-For-Tat. We assume that nodes are rational, i.e., their actions are strictly determined by self-interest, and that each node is associated with a minimum lifetime constraint. Given these lifetime constraints and the assumption of rational behavior, we study the added behavior of the network.
Resumo:
En este proyecto se han visto dos sistemas de computación distribuida diferentes entre ellos: Condor y BOINC. Se exploran las posibilidades para poder conseguir que ambos sistemas logren trabajar conjuntamente, escogiendo la parte más efectiva de cada uno de los sistemas con el fin de complementarse.
Resumo:
This paper contributes to the on-going empirical debate regarding the role of the RBC model and in particular of technology shocks in explaining aggregate fluctuations. To this end we estimate the model’s posterior density using Markov-Chain Monte-Carlo (MCMC) methods. Within this framework we extend Ireland’s (2001, 2004) hybrid estimation approach to allow for a vector autoregressive moving average (VARMA) process to describe the movements and co-movements of the model’s errors not explained by the basic RBC model. The results of marginal likelihood ratio tests reveal that the more general model of the errors significantly improves the model’s fit relative to the VAR and AR alternatives. Moreover, despite setting the RBC model a more difficult task under the VARMA specification, our analysis, based on forecast error and spectral decompositions, suggests that the RBC model is still capable of explaining a significant fraction of the observed variation in macroeconomic aggregates in the post-war U.S. economy.
Resumo:
Time-inconsistency is an essential feature of many policy problems (Kydland and Prescott, 1977). This paper presents and compares three methods for computing Markov-perfect optimal policies in stochastic nonlinear business cycle models. The methods considered include value function iteration, generalized Euler-equations, and parameterized shadow prices. In the context of a business cycle model in which a scal authority chooses government spending and income taxation optimally, while lacking the ability to commit, we show that the solutions obtained using value function iteration and generalized Euler equations are somewhat more accurate than that obtained using parameterized shadow prices. Among these three methods, we show that value function iteration can be applied easily, even to environments that include a risk-sensitive scal authority and/or inequality constraints on government spending. We show that the risk-sensitive scal authority lowers government spending and income-taxation, reducing the disincentive households face to accumulate wealth.
Resumo:
The rise and consequences of polyploidy in vertebrates, whose origin was associated with genome duplications, may be best studied in natural diploid and polyploid populations. In a diploid/tetraploid (2n/4n) geographic contact zone of Palearctic green toads in northern Kyrgyzstan, we examine 4ns and triploids (3n) of unknown genetic composition and origins. Using mitochondrial and nuclear sequence, and nuclear microsatellite markers in 84 individuals, we show that 4n (Bufo pewzowi) are allopolyploids, with a geographically proximate 2n species (B. turanensis) being their maternal ancestor and their paternal ancestor as yet unidentified. Local 3n forms arise through hybridization. Adult 3n mature males (B. turanensis mtDNA) have 2n mothers and 4n fathers, but seem distinguishable by nuclear profiles from partly aneuploid 3n tadpoles (with B. pewzowi mtDNA). These observations suggest multiple pathways to the formation of triploids in the contact zone, involving both reciprocal origins. To explain the phenomena in the system, we favor a hypothesis where 3n males (with B. turanensis mtDNA) backcross with 4n and 2n females. Together with previous studies of a separately evolved, sexually reproducing 3n lineage, these observations reveal complex reproductive interactions among toads of different ploidy levels and multiple pathways to the evolution of polyploid lineages.
Resumo:
Recently we have shown that two hybrid proteins expressed in Escherichia coli confer protective immunity to Aotus monkeys against an experimental Plasmodium falciparum infection (Knapp et al., 1992). Both hybrid proteins carry a sequence containing amino acids 631 to 764 of the serine stretch protein SERP (Knapp et al., 1989b). We have studied the diversity of this SERP region in field isolates of P. falciparum. Genomic DNA was extracted from the blood of six donors from different endemic areas of Brazil and West Africa. The SERP region encoding amino acids 630 to 781 was amplified by polymerase chain reaction (PCR) and sequenced. Only conserved amino acid substitutions in maximally two positions of the analyzed SERP fragment could be detected which supports the suitability of this SERP region as a component of anti-blood stage malaria vaccine.
Resumo:
Nowadays, service providers in the Cloud offer complex services ready to be used as it was a commodity like water or electricity to their customers with any other extra effort for them. However, providing these services implies a high management effort which requires a lot of human interaction. Furthermore, an efficient resource management mechanism considering only provider's resources is, though necessary, not enough, because the provider's profit is limited by the amount of resources it owns. Dynamically outsourcing resources to other providers in response to demand variation avoids this problem and makes the provider to get more profit. A key technology for achieving these goals is virtualization which facilitates provider's management and provides on-demand virtual environments, which are isolated and consolidated in order to achieve a better utilization of the provider's resources. Nevertheless, dealing with some virtualization capabilities implies an effort for the user in order to take benefit from them. In order to avoid this problem, we are contributing the research community with a virtualized environment manager which aims to provide virtual machines that fulfils with the user requirements. Another challenge is sharing resources among different federated Cloud providers while exploiting the features of virtualization in a new approach for facilitating providers' management. This project aims for reducing provider's costs and at the same time fulfilling the quality of service agreed with the customers while maximizing the provider's revenue. It considers resource management at several layers, namely locally to each node in the provider, among different nodes in the provider, and among different federated providers. This latter layer supports the novel capabilities of outsourcing when the local resources are not enough to fulfil the users demand, and offering resources to other providers when the local resources are underused.