1000 resultados para Crossbar network


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

These slides cover aspects of network design and technology relevant to a campus network deployment such as that at the University of Southampton.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A run through various aspects of Distributed Denial of Service attacks

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Describes different approaches to authentication for wireless networks, and the evolution of eduroam

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Notes on revision topics for TJC's network and campus security lectures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Speaker(s): Prof. Steffen Staab Organiser: Dr Tim Chown Time: 23/05/2014 10:30-11:30 Location: B53/4025 Abstract The Web is constructed based on our experiences in a multitude of modalities: text, networks, images, physical locations are some examples. Understanding the Web requires from us that we can model these modalities as they appear on the Web. In this talk I will show some examples of how we model text, hyperlink networks and physical-social systems in order to improve our understanding and our use of the Web.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Larry Johnson, Presidente del New Media Consortium y fundador del proyecto “Horizon”, presentó, en el marco del V Encuentro Nacional de Rectores, la ponencia “The Network is Us”. Una exposición en donde se explica la importancia de implementar las nuevas tecnologías en el desarrollo académico de los colegios y las universidades.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The evolution of the drug trafficking network –so-called– ‘Cartel del Norte del Valle’, is studied using network analysis methods. We found that the average length between any pair of its members was bounded by 4 –an attribute of smallworld networks. In this tightly connected network, informational shocks induce fear and the unleashing of searches of threatening nodes, using available paths. Lethal violence ensues in clusters of increasing sizes that fragment the network, without compromising, however, the survival of the largest component, which proved to be resilient to massive violence. In spite of a success from the point of view of head counting, the US’ socialization program for drug traffickers did not effectively change the cyclical dynamics of the drug dealing business: war survivors took over what was left from the old network initiating a new cycle of business and violence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Learn-nett es uno de los proyectos enmarcados dentro del programa Socrates de la Comunidad Económica Europea, un programa que subvenciona y apoya proyectos de investigación y desarrollo de nuestra comunidad tanto en el campo de la educación como en cualquier area de conocimiento. Learn-nett, es un proyecto de participación conjunta entre diferentes universidades europeas y que tiene como objetivo la formación, la experimentación y la reflexión sobre la utilización de las nuevas herramientas de la información y la comunicación en la educación.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study competition in two sided markets with common network externality rather than with the standard inter-group e¤ects. This type of externality occurs when both groups bene t, possibly with di¤erent intensities, from an increase in the size of one group and from a decrease in the size of the other. We explain why common externality is relevant for the health and education sectors. We focus on the symmetric equilibrium and show that when the externality itself satis es an homogeneity condition then platforms pro ts and price structure have some speci c properties. Our results reveal how the rents coming from network externalities are shifted by platforms from one side to other, according to the homogeneity degree. In the speci c but realistic case where the common network externality is homogeneous of degree zero, platform s pro t do not depend on the intensity of the (common) network externality. This is in sharp contrast to conventional results stating that the presence of network externalities in a two-sided market structure increases the intensity of competition when the externality is positive (and decreases it when the externality is negative). Prices are a¤ected but in such a way that platforms only transfer rents from consumers to providers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper uses a two-sided market model of hospital competition to study the implications of di§erent remunerations schemes on the physiciansí side. The two-sided market approach is characterized by the concept of common network externality (CNE) introduced by Bardey et al. (2010). This type of externality occurs when occurs when both sides value, possibly with di§erent intensities, the same network externality. We explicitly introduce e§ort exerted by doctors. By increasing the number of medical acts (which involves a costly e§ort) the doctor can increase the quality of service o§ered to patients (over and above the level implied by the CNE). We Örst consider pure salary, capitation or fee-for-service schemes. Then, we study schemes that mix fee-for-service with either salary or capitation payments. We show that salary schemes (either pure or in combination with fee-for-service) are more patient friendly than (pure or mixed) capitations schemes. This comparison is exactly reversed on the providersíside. Quite surprisingly, patients always loose when a fee-for-service scheme is introduced (pure of mixed). This is true even though the fee-for-service is the only way to induce the providers to exert e§ort and it holds whatever the patientsívaluation of this e§ort. In other words, the increase in quality brought about by the fee-for-service is more than compensated by the increase in fees faced by patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We design a financial network model that explicitly incorporates linkages across institutions through a direct contagion channel, as well as an indirect common exposure channel. In particular, common exposure is setup so as to link the financial to the real sector. The model is calibrated to balance sheet data on the colombian financial sector. Results indicate that commercial banks are the most systemically important financial institutions in the system. Whereas government owned institutions are the most vulnerable institutions in the system.