930 resultados para isolado protéico (IP)
Resumo:
This demonstration highlights the applications of our research work i.e. second generation (Scalable Fault Tolerant Agent Grooming Environment - SAGE) Multi Agent System, Integration of Software Agents and Grid Computing and Autonomous Agent Architecture in the Agent Platform. It is a conference planner application that uses collaborative effort of services deployed geographically wide in different technologies i.e. Software Agents, Grid computing and Web services to perform useful tasks as required. Copyright 2005 ACM.
Resumo:
Previous studies have shown that buffering packets in DRAM is a performance bottleneck. In order to understand the impediments in accessing the DRAM, we developed a detailed Petri net model of IP forwarding application on IXP2400 that models the different levels of the memory hierarchy. The cell based interface used to receive and transmit packets in a network processor leads to some small size DRAM accesses. Such narrow accesses to the DRAM expose the bank access latency, reducing the bandwidth that can be realized. With real traces up to 30% of the accesses are smaller than the cell size, resulting in 7.7% reduction in DRAM bandwidth. To overcome this problem, we propose buffering these small chunks of data in the on chip scratchpad memory. This scheme also exploits greater degree of parallelism between different levels of the memory hierarchy. Using real traces from the internet, we show that the transmit rate can be improved by an average of 21% over the base scheme without the use of additional hardware. Further, the impact of different traffic patterns on the network processor resources is studied. Under real traffic conditions, we show that the data bus which connects the off-chip packet buffer to the micro-engines, is the obstacle in achieving higher throughput.
Resumo:
Pricing is an effective tool to control congestion and achieve quality of service (QoS) provisioning for multiple differentiated levels of service. In this paper, we consider the problem of pricing for congestion control in the case of a network of nodes under a single service class and multiple queues, and present a multi-layered pricing scheme. We propose an algorithm for finding the optimal state dependent price levels for individual queues, at each node. The pricing policy used depends on a weighted average queue length at each node. This helps in reducing frequent price variations and is in the spirit of the random early detection (RED) mechanism used in TCP/IP networks. We observe in our numerical results a considerable improvement in performance using our scheme over that of a recently proposed related scheme in terms of both throughput and delay performance. In particular, our approach exhibits a throughput improvement in the range of 34 to 69 percent in all cases studied (over all routes) over the above scheme.
Resumo:
Free software is viewed as a revolutionary and subversive practice, and in particular has dealt a strong blow to the traditional conception of intellectual property law (although in its current form could be considered a 'hack' of IP rights). However, other (capitalist) areas of law have been swift to embrace free software, or at least incorporate it into its own tenets. One area in particular is that of competition (antitrust) law, which itself has long been in theoretical conflict with intellectual property, due to the restriction on competition inherent in the grant of ‘monopoly’ rights by copyrights, patents and trademarks. This contribution will examine how competition law has approached free software by examining instances in which courts have had to deal with such initiatives, for instance in the Oracle Sun Systems merger, and the implications that these decisions have on free software initiatives. The presence or absence of corporate involvement in initiatives will be an important factor in this investigation, with it being posited that true instances of ‘commons-based peer production’ can still subvert the capitalist system, including perplexing its laws beyond intellectual property.
Cultures of sharing in 3D printing: What can we learn from the licence choices of Thingiverse users?
Resumo:
This article contributes to the discussion by analysing how users of the leading online 3D printing design repository Thingiverse manage their intellectual property (IP). 3D printing represents a fruitful case study for exploring the relationship between IP norms and practitioner culture. Although additive manufacturing technology has existed for decades, 3D printing is on the cusp of a breakout into the technological mainstream – hardware prices are falling; designs are circulating widely; consumer-friendly platforms are multiplying; and technological literacy is rising. Analysing metadata from more than 68,000 Thingiverse design files collected from the site, we examine the licensing choices made by users and explore the way this shapes the sharing practices of the site’s users. We also consider how these choices and practices connect with wider attitudes towards sharing and intellectual property in 3D printing communities. A particular focus of the article is how Thingiverse structures its regulatory framework to avoid IP liability, and the extent to which this may have a bearing on users’ conduct. The paper has three sections. First, we will offer a description of Thingiverse and how it operates in the 3D printing ecosystem, noting the legal issues that have arisen regarding Thingiverse’s Terms of Use and its allocation of intellectual property rights. Different types of Thingiverse licences will be detailed and explained. Second, the empirical metadata we have collected from Thingiverse will be presented, including the methods used to obtain this information. Third, we will present findings from this data on licence choice and the public availability of user designs. Fourth, we will look at the implications of these findings and our conclusions regarding the particular kind of sharing ethic that is present in Thingiverse; we also consider the “closed” aspects of this community and what this means for current debates about “open” innovation.
Resumo:
"A large proportion of people who experience drug problems also experience a range of mental health problems. Similarly, many people who experience mental health problems engage in hazardous drug use. The experience of these co-occurring disorders increases use of treatment services, but is associated with poorer prognosis. The implementation of effective responses has been hindered by the disaggregated systems of care that have been adopted in many countries; many problems are the outcome of poorly organised systems of care that do not reflect the needs of a large proportion of clients who experience various problems. There is a dearth of quality research to guide the development of evidence-based responses to co-occurring drug and mental health problems. This book introduces the reader to the issues, guided by a series of questions. These encourage the reader to consider the evidence about the nature and prevalence of co-occurring disorders and the challenges they create for individuals, the community and service providers. The diverse range of expertise of the contributors provides the opportunity to consider the challenges of navigating the various systems of care from the perspective of consumers, parents and clinicians. Researchers and clinicians examine the available evidence about the links between the various disorders and discuss the implications for treatment through a series of case studies. The reader is guided through evidence-based clinical decision-making. The editor and contributors argue that, while our knowledge and expertise is improving, there is a need to better resource and integrate treatment services to foster the adoption of evidence-based and effective responses. Poor systems of care don’t necessarily cause co-occurring mental health and drug problems, but they can contribute to poor outcomes."--Publisher website
Resumo:
Starting point in the European individualistic copyright ideology is that an individual author creates a work and controls the use of it. However, this paper argues that it is (and has always been) impossible to control the use of works after their publication. This has also been acknowledged by the legislator, who has introduced collective licensing agreements because of this impossibility. Since it is impossible to rigorously control the use of works this writing "Rough Justice or Zero Tolerance - Reassessing the Nature of Copyright in Light of Collective Licensing" examines what reality of copyright is actually about. Finding alternative (and hopefully more "true") ways to understand copyright helps us to create alternative solutions in order to solve possible problems we have as it comes e.g. to use of content in online environment. The paper makes a claim that copyright is actually about defining negotiation points for different stakeholders and that nothing in the copyright reality prevents us from defining e.g. a new negotiation point where representatives of consumers would meet representatives of right holders in order to agree on the terms of use for certain content types in online environment.
Resumo:
Cuscuta stem (vines) exhibits two modes of growth—longitudinal elongation forming free-hanging vines, or coiling growth to twine around the host. The elongation zone of free-hanging vine extended up to 160 mm from the stem apex and in vivo growth rate (during 8 h of growth) was maximal in the 20-to-40-mm region. While gibberellic acid (GA3) or fusicoccin (FC) could maintain (GA3) or enhance (FC) the growth rate of apical (10 or 25 mm) segments, indole-3-acetic acid (IAA) (10 mgrM) induced growth only in subapical (5–160 mm) segments. In vitro growth rate induced by IAA (10 mgrM) was similar to the in vivo growth rate up to 40 mm. Thereafter, up to 100 mm, IAA induced growth rate exceeded in vivo growth. p ]Subapical segments (sim13 mm) from 5- to 40-mm regions responded to a cytokinin (BA, Z, or iP) or to low IAA (0.1 mgrM) with curved growth, whereas the segments grew straight in the presence of high IAA (10 mgrM). Curvature (measured as the angle subtended at the center of the circle of which the segment formed an arc) induced by BA and low (0.1 mgrM) IAA was greater than either added separately. Besides, segments induced to curve in BA + low-IAA solution could be made to straighten out by transferring to a solution containing high IAA (10 mgrM) with or without BA. Thus in vivo patterns of straight and coiling growth could be mimicked reversibly in vitro by adjusting the relative concentrations of cytokinin and auxin; low auxin and cytokinin induced coiling growth, whereas high auxin and cytokinin induced straight growth. p ]Beyond 40 mm, BA had no growth-promoting or curvative-inducing effect.Cuscuta vine segments thus showed sequential sensitivity to applied hormones, the apical region (0–25 mm) to GA3, the subapical (5–40 mm) region to BA and IAA and the region beyond (40–160 mm) to IAA alone.
Resumo:
Cytokinins induced haustoria formation in excised 10-mm segments ofCuscuta vine, the subapical 25-to-50-mm region being most responsive, producing a mean of 4–6 haustoria per segment. The order of effectiveness of cytokinins continuously applied (72 h) was 6-benzylaminopurine (BA) ges isopentenyladenine (iP) Gt zeatin (Z). Ribosides of BA and Z were as effective as the bases, whereas riboside of iP ([9R]iP) was half as effective as iP. Haustoria induction was influenced by weather and seasonal conditions at the time of vine collection; materials obtained on warm, sunny days responded better than those obtained on rainy, cloudy, or cool days. Haustoria were induced equally well all around the segment, and no thigmostimulus was needed for induction. p ]A 10-min pulse of 100 mgrM BA induced half as many haustoria as a 60-min pulse or continuous application of BA. White light inhibited haustoria induction elicited by a short (30-min) pulse of BA, whereas a longer (120-min) BA application overcame this light inhibition. Auxins (IAA or NAA, 1–10 mgrM), gibberellin (GA3, 1–10 mgrM), ethylene (as ethrel, 10–100 mgrM), and abscisic acid (ABA, 100 mgrM) were individually inhibitory (60–80%) with respect to haustoria induction when given continuously with 50 mgrM BA. A 60-min pulse of auxins (10 mgrM), GA3 (100 mgrM), or ethrel (10 mgrM), given at various time intervals during or after a 60-min pulse of 100 mgrM BA, showed that inhibition was maximal (70–95%) between 4 and 16 h of BA application and negligible (GA3) or much reduced (auxin, ethrel) at 20 h, indicating a ldquocommitmentrdquo to haustoria formation by this time.
Resumo:
We provide a comparative performance evaluation of packet queuing and link admission strategies for low-speed wide area network Links (e.g. 9600 bps, 64 kbps) that interconnect relatively highspeed, connectionless local area networks (e.g. 10 Mbps). In particular, we are concerned with the problem of providing differential quality of service to interLAN remote terminal and file transfer sessions, and throughput fairness between interLAN file transfer sessions. We use analytical and simulation models to study a variety of strategies. Our work also serves to address the performance comparison of connectionless vs. connection-oriented interconnection of CLNS LANS. When provision of priority at the physical transmission level is not feasible, we show, for low-speed WAN links (e.g. 9600 bps), the superiority of connection-oriented interconnection of connectionless LANs, with segregation of traffic streams with different QoS requirements into different window flow controlled connections. Such an implementation can easily be obtained by transporting IP packets over an X.25 WAN. For 64 kbps WAN links, there is a drop in file transfer throughputs, owing to connection overheads, but the other advantages are retained, The same solution also helps to provide throughput fairness between interLAN file transfer sessions. We also provide a corroboration of some of our modelling results with results from an experimental test-bed.
Resumo:
In this paper, we study how TCP and UDP flows interact with each other when the end system is a CPU resource constrained thin client. The problem addressed is twofold, 1) the throughput of TCP flows degrades severely in the presence of heavily loaded UDP flows 2) fairness and minimum QoS requirements of UDP are not maintained. First, we identify the factors affecting the TCP throughput by providing an in-depth analysis of end to end delay and packet loss variations. The results obtained from the first part leads us to our second contribution. We propose and study the use of an algorithm that ensures fairness across flows. The algorithm improves the performance of TCP flows in the presence of multiple UDP flows admitted under an admission algorithm and maintains the minimum QoS requirements of the UDP flows. The advantage of the algorithm is that it requires no changes to TCP/IP stack and control is achieved through receiver window control.
Resumo:
Pricing is an effective tool to control congestion and achieve quality of service (QoS) provisioning for multiple differentiated levels of service. In this paper, we consider the problem of pricing for congestion control in the case of a network of nodes under a single service class and multiple queues, and present a multi-layered pricing scheme. We propose an algorithm for finding the optimal state dependent price levels for individual queues, at each node. The pricing policy used depends on a weighted average queue length at each node. This helps in reducing frequent price variations and is in the spirit of the random early detection (RED) mechanism used in TCP/IP networks. We observe in our numerical results a considerable improvement in performance using our scheme over that of a recently proposed related scheme in terms of both throughput and delay performance. In particular, our approach exhibits a throughput improvement in the range of 34 to 69 percent in all cases studied (over all routes) over the above scheme.
Resumo:
With the advent of Internet, video over IP is gaining popularity. In such an environment, scalability and fault tolerance will be the key issues. Existing video on demand (VoD) service systems are usually neither scalable nor tolerant to server faults and hence fail to comply to multi-user, failure-prone networks such as the Internet. Current research areas concerning VoD often focus on increasing the throughput and reliability of single server, but rarely addresses the smooth provision of service during server as well as network failures. Reliable Server Pooling (RSerPool), being capable of providing high availability by using multiple redundant servers as single source point, can be a solution to overcome the above failures. During a possible server failure, the continuity of service is retained by another server. In order to achieve transparent failover, efficient state sharing is an important requirement. In this paper, we present an elegant, simple, efficient and scalable approach which has been developed to facilitate the transfer of state by the client itself, using extended cookie mechanism, which ensures that there is no noticeable change in disruption or the video quality.
Resumo:
The success of an ABV IP depends highly on the associated debugging environment. An efficient debugging environment helps the user to find out the exact location of the failure. Moreover, it provides information to the user in a refined detail of abstraction and permit adequate interaction. It has also been realized that adequate visualization support helps in tracking the behavioral aspects of the Design Under Test (DUT). Currently, the debugging tools provide information in the signal level and do not provide any information about the high-level behavior of the DUT. We present a debugging framework that takes the design specification, assertions and the user intent in a simple format and provides detailed information by processing the design trace on-line, or off-line. We also present a visualization framework to ease the debugging procedure. We have experimented with industrial standard on-chip bus protocols that ensure that this utility can be incorporated successfully in the present functional verification flow.