897 resultados para Consensus protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three experiments are reported which examine the effects of consensus information on majority and minority influence. In all experiments two levels of consensus difference were examined; large (82% versus 18%) and small (52% versus 48%). Experiment 1 showed that a majority source had more influence than a minority source, irrespective of consensus level. Experiment 2 examined the cause of this effect by presenting only the source label (‘majority’ versus ‘minority’), only the consensus information (percentages) or both. The superior influence of the majority was again found when either (a) both source label and consensus information were given (replicating Experiment 1) and (b) only consensus information was given, but not when (c) only the source label was given. The results showed majority influence was due to the consensus information indicating more than 50% of the population supported that position. Experiment 3 also manipulated message quality (strong versus weak arguments) to identify whether systematic processing had occurred. Message quality only had an impact with the minority of 18%. These studies show that consensus information has different effects for majority and minority influence. For majority influence, having over 50% support is sufficient to cause compliance while for a minority there are advantages to being numerically small, in terms of leading to detailed processing of its message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three experiments investigated the effect of consensus information on majority and minority influence. Experiment 1 examined the effect of consensus expressed by descriptive adjectives (large vs. small) on social influence. A large source resulted in more influence than a small source, irrespective of source status (majority vs. minority). Experiment 2 showed that large sources affected attitudes heuristically, whereas only a small minority instigated systematic processing of the message. Experiment 3 manipulated the type of consensus information, either in terms of descriptive adjectives (large, small) or percentages (82%, 18%, 52%, 48%). When consensus was expressed in terms of descriptive adjectives, the findings of Experiments 1 and 2 were replicated (large sources were more influential than small sources), but when consensus was expressed in terms of percentages, the majority was more influential than the minority, irrespective of group consensus.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article compares the cases of ozone layer protection and climate change. In both cases, scientific expertise has played a comparatively important role in the policy process. The author argues that against conventional assumptions, scientific consensus is not necessary to achieve ambitious political goals. However, the architects of the Intergovernmental Panel on Climate Change operated under such assumptions. The author argues that this is problematic both from a theoretical viewpoint and from empirical evidence. Contrary to conventional assumptions, ambitious political regulations in the ozone case were agreed under scientific uncertainty, whereas the negotiations on climate change were much more modest albeit based on a large scientific consensus. On the basis of a media analysis, the author shows that the creation of a climate of expectation plus pressure from leader countries is crucial for success. © 2006 Sage Publication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research is concerned with the development of distributed real-time systems, in which software is used for the control of concurrent physical processes. These distributed control systems are required to periodically coordinate the operation of several autonomous physical processes, with the property of an atomic action. The implementation of this coordination must be fault-tolerant if the integrity of the system is to be maintained in the presence of processor or communication failures. Commit protocols have been widely used to provide this type of atomicity and ensure consistency in distributed computer systems. The objective of this research is the development of a class of robust commit protocols, applicable to the coordination of distributed real-time control systems. Extended forms of the standard two phase commit protocol, that provides fault-tolerant and real-time behaviour, were developed. Petri nets are used for the design of the distributed controllers, and to embed the commit protocol models within these controller designs. This composition of controller and protocol model allows the analysis of the complete system in a unified manner. A common problem for Petri net based techniques is that of state space explosion, a modular approach to both the design and analysis would help cope with this problem. Although extensions to Petri nets that allow module construction exist, generally the modularisation is restricted to the specification, and analysis must be performed on the (flat) detailed net. The Petri net designs for the type of distributed systems considered in this research are both large and complex. The top down, bottom up and hybrid synthesis techniques that are used to model large systems in Petri nets are considered. A hybrid approach to Petri net design for a restricted class of communicating processes is developed. Designs produced using this hybrid approach are modular and allow re-use of verified modules. In order to use this form of modular analysis, it is necessary to project an equivalent but reduced behaviour on the modules used. These projections conceal events local to modules that are not essential for the purpose of analysis. To generate the external behaviour, each firing sequence of the subnet is replaced by an atomic transition internal to the module, and the firing of these transitions transforms the input and output markings of the module. Thus local events are concealed through the projection of the external behaviour of modules. This hybrid design approach preserves properties of interest, such as boundedness and liveness, while the systematic concealment of local events allows the management of state space. The approach presented in this research is particularly suited to distributed systems, as the underlying communication model is used as the basis for the interconnection of modules in the design procedure. This hybrid approach is applied to Petri net based design and analysis of distributed controllers for two industrial applications that incorporate the robust, real-time commit protocols developed. Temporal Petri nets, which combine Petri nets and temporal logic, are used to capture and verify causal and temporal aspects of the designs in a unified manner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern distributed control systems comprise of a set of processors which are interconnected using a suitable communication network. For use in real-time control environments, such systems must be deterministic and generate specified responses within critical timing constraints. Also, they should be sufficiently robust to survive predictable events such as communication or processor faults. This thesis considers the problem of coordinating and synchronizing a distributed real-time control system under normal and abnormal conditions. Distributed control systems need to periodically coordinate the actions of several autonomous sites. Often the type of coordination required is the all or nothing property of an atomic action. Atomic commit protocols have been used to achieve this atomicity in distributed database systems which are not subject to deadlines. This thesis addresses the problem of applying time constraints to atomic commit protocols so that decisions can be made within a deadline. A modified protocol is proposed which is suitable for real-time applications. The thesis also addresses the problem of ensuring that atomicity is provided even if processor or communication failures occur. Previous work has considered the design of atomic commit protocols for use in non time critical distributed database systems. However, in a distributed real-time control system a fault must not allow stringent timing constraints to be violated. This thesis proposes commit protocols using synchronous communications which can be made resilient to a single processor or communication failure and still satisfy deadlines. Previous formal models used to design commit protocols have had adequate state coverability but have omitted timing properties. They also assumed that sites communicated asynchronously and omitted the communications from the model. Timed Petri nets are used in this thesis to specify and design the proposed protocols which are analysed for consistency and timeliness. Also the communication system is mcxielled within the Petri net specifications so that communication failures can be included in the analysis. Analysis of the Timed Petri net and the associated reachability tree is used to show the proposed protocols always terminate consistently and satisfy timing constraints. Finally the applications of this work are described. Two different types of applications are considered, real-time databases and real-time control systems. It is shown that it may be advantageous to use synchronous communications in distributed database systems, especially if predictable response times are required. Emphasis is given to the application of the developed commit protocols to real-time control systems. Using the same analysis techniques as those used for the design of the protocols it can be shown that the overall system performs as expected both functionally and temporally.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay attempts to ascertain whether a particular meaning of globalisation, and view on its effects and the appropriate response to it, are becoming standardised across academia. To do so, it content-analyses a representative sample of new scholarship, mapping the various approaches of current researchers towards globalisation. The essay shows how globalisation remains a contested concept within studies of higher education, as in many other fields. Rather than globalisation being taken to refer unambiguously to global flows, pressures or trends, its meaning continues to depend on the particular perspective adopted by contemporary researchers. The same conflict is apparent concerning the impacts which are reputed to globalisation and with regard to the appropriate response to globalisation amongst academics and higher education institutions (HEIs) more generally. Perhaps the only apparent point of consensus amongst contemporary researchers is the claim that globalisation affects HEIs, rather than HEIs themselves being implicated in the promotion of globalisation. This position underplays the often important role of HEIs in encouraging cross-border flows and pressures, and global trends such as marketisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent advances in technology have produced a significant increase in the availability of free sensor data over the Internet. With affordable weather monitoring stations now available to individual meteorology enthusiasts a reservoir of real time data such as temperature, rainfall and wind speed can now be obtained for most of the United States and Europe. Despite the abundance of available data, obtaining useable information about the weather in your local neighbourhood requires complex processing that poses several challenges. This paper discusses a collection of technologies and applications that harvest, refine and process this data, culminating in information that has been tailored toward the user. In this case we are particularly interested in allowing a user to make direct queries about the weather at any location, even when this is not directly instrumented, using interpolation methods. We also consider how the uncertainty that the interpolation introduces can then be communicated to the user of the system, using UncertML, a developing standard for uncertainty representation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers the staging of violence, atrocities, and sexuality in the conduct of the war on terror. The piece discusses the manner in which the terms of the war on terror appear to shut down possible debate and examines the rhetorical and representational strategies that cause this. The paper argues that the war on terror includes a cultural project that seeks to create a consenting global audience. This cultural project appears more diffuse and less immediately instrumental than the military and diplomatic activities of this global battle. The piece argues that it is through the circulation of open secrets and accounts of torture and abuse that a global audience is constructed as both witness and participant in the practices and objectives of the war and that this positioning is designed to corral audience understanding into the suggested narratives of the proponents of the war. Este documento considera el escenario de la violencia, las atrocidades y la sexualidad en la conducta de la guerra contra el terror. El artículo plantea la manera en que los términos de la guerra contra el terror parecen suspender un posible debate y examina las estrategias retóricas y representativas que causaron esto. El documento plantea que la guerra contra el terror incluye un proyecto cultural que busca crear una audiencia global de común acuerdo. Este proyecto cultural parece más difuso y menos útil en el momento, que las actividades militares y diplomáticas de esta batalla global. El artículo sostiene que es mediante la circulación de secretos abiertos y de informes sobre la tortura y el abuso, que se forma una audiencia global tanto testigos como participantes de las prácticas y los objetivos de la guerra y que esa posición está designada a encerrar el conocimiento de la audiencia dentro de los relatos sugeridos por los proponentes de guerra.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Water passes through cell membranes relatively slowly by diffusion. In order to maintain water homeostasis, the rapid and specific regulation of cellular water flow is mediated by the aquaporin (AQP) family of membrane protein water channels. The wide range of tissues that are known to express AQPs is reflected by their involvement in many physiological processes and diseases; thirteen human AQPs have been identified to date and the majority are highly specific for water while others show selectivity for water, glycerol and other small solutes. Receptor mediated translocation, via hormone activation, is an established method of AQP regulation, especially for AQP2. There is now an emerging consensus that the rapid and reversible translocation of other AQPs from intracellular vesicles to the plasma membrane, triggered by a range of stimuli, confers altered membrane permeability thereby acting as a regulatory mechanism. This review examines the molecular components that may enable such AQP regulation; these include cytoskeletal proteins, kinases, calcium and retention or localization signals. Current knowledge on the dynamic regulation of sub-cellular AQP translocation in response to a specific trigger is explored in the context of the regulation of cellular water flow. © 2013 Informa UK, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of soft state (i.e., the state that will expire unless been refreshed) has been widely used in the design of network signaling protocols. The approaches of refreshing state in multi-hop networks can be classified to end-to-end (E2E) and hop-by-hop (HbH) refreshes. In this article we propose an effective Markov chain based analytical model for both E2E and HbH refresh approaches. Simulations verify the analytical models, which can be used to study the impacts of link characteristics on the performance (e.g., state synchronization and message overhead), as a guide on configuration and optimization of soft state signaling protocols. © 2009 IEEE.