934 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘Practice Forum’ provides a forum for social work practitioners to share their practice with others; to describe what they are doing and assess its effectiveness. The practice of case management is applied in a wide range of service delivery models to meet complex client needs. Unfortunately, cost containment and lack of clarity of the role of the case manager has blurred the definition and practice of case management for both the consumer and professional providers. This article examines two cases of a small non-government agency in Melbourne called Alcohol Related Brain Injury Assessment, Accommodation & Support Inc. (ARBIAS) where case management services are delivered to people with alcohol acquired brain damage. The analysis presented here supports the view that continuity of care and intensive relationship building with clients is vital for successful client outcomes and has application to a variety of programs which service chronically disabled clients.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Bandwidth allocation for multimedia applications in case of network congestion and failure poses technical challenges due to bursty and delay sensitive nature of the applications. The growth of multimedia services on Internet and the development of agent technology have made us to investigate new techniques for resolving the bandwidth issues in multimedia communications. Agent technology is emerging as a flexible promising solution for network resource management and QoS (Quality of Service) control in a distributed environment. In this paper, we propose an adaptive bandwidth allocation scheme for multimedia applications by deploying the static and mobile agents. It is a run-time allocation scheme that functions at the network nodes. This technique adaptively finds an alternate patchup route for every congested/failed link and reallocates the bandwidth for the affected multimedia applications. The designed method has been tested (analytical and simulation)with various network sizes and conditions. The results are presented to assess the performance and effectiveness of the approach. This work also demonstrates some of the benefits of the agent based schemes in providing flexibility, adaptability, software reusability, and maintainability. (C) 2004 Elsevier Inc. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Service researchers and practitioners have repeatedly claimed that customer service experiences are essential to all businesses. Therefore comprehension of how service experience is characterised in research is an essential element for its further development through research. The importance of greater in-depth understanding of the phenomenon of service experience has been acknowledged by several researchers, such as Carú and Cova and Vargo and Lusch. Furthermore, Service-Dominant (S-D) logic has integrated service experience to value by emphasising in its foundational premises that value is phenomenologically (experientially) determined. The present study analyses how the concept of service experience has been characterised in previous research. As such, it puts forward three ways to characterise it in relation to that research: 1) phenomenological service experience relates to the value discussion in S-D logic and interpretative consumer research, 2) process-based service experience relates to understanding service as a process, and 3) outcome-based service experience relates to understanding service experience as one element in models linking a number of variables or attributes to various outcomes. Focusing on the phenomenological service experience, the theoretical purpose of the study is to characterise service experience based on the phenomenological approach. In order to do so, an additional methodological purpose was formulated: to find a suitable methodology for analysing service experience based on the phenomenological approach. The study relates phenomenology to a philosophical Husserlian and social constructionist tradition studying phenomena as they appear in our experience in a social context. The study introduces Event-Based Narrative Inquiry Technique (EBNIT), which combines critical events with narratives and metaphors. EBNIT enabled the analysis of lived and imaginary service experiences as expressed in individual narratives. The study presents findings of eight case studies within service innovation of Web 2.0, mobile service, location aware service and public service in the municipal sector. Customers’ and service managers’ stories about their lived private and working lifeworld were the foundation for their ideal service experiences. In general, the thesis finds that service experiences are (1) subjective, (2) context-specific, (3) cumulative, (4) partially socially constructed, (5) both lived and imaginary, (6) temporally multiple-dimensional, and (7) iteratively related to perceived value. In addition to customer service experience, the thesis brings empirical evidence of managerial service experience of front-line managers experiencing the service they manage and develop in their working lifeworld. The study contributes to S-D logic, service innovation and service marketing and management in general by characterising service experience based on the phenomenological approach and integrating it to the value discussion. Additionally, the study offers a methodological approach for further exploration of service experiences. The study discusses managerial implications in conjunction with the case studies and discusses them in relation to service innovation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The study concerns service management, and specifically the action service firms take with regard to customer dissatisfaction, customer complaints and complaining customers in high touch services. Customer dissatisfaction, customer complaints and complaining customers are called negative incidents in the study. The study fills a research gap in service management studies by investigating negative incidents as a part of an open service system. In contrast to main stream service management studies defining service quality as how the customer as a consumer defines it, in the present study, the concept of interactive service quality is adopted. The customer is considered as a co-producer of service who thus has a role to play in service quality and productivity. Additionally, the study juxtaposes the often opposed perspectives of the manager and the customer as well as the often forgotten silent voices of service employees and supervisors. The study proposes that the service firm as an entity does not act but it is the actors at the different hierarchical layers who act. Additionally, it is acknowledged in the study that the different actors at the different hierarchical layers have different knowledge of the service system and different objectives for service encounters. Therefore, they interpret the negative incidents from different perspectives and their actions upon negative incidents are subsequently guided by their interpretations. The research question is: how do service firms act upon negative incidents in high touch services? In order to answer to the research question a narrative research approach was chosen. The actors at the different hierarchical layers acted as informants of the study and provided stories about customer dissatisfaction, customer complaining and complaint handling in high touch services. Through storytelling, access to the socially constructed reality of service firms’ action was achieved. Stemming from the literature review, analysis of empirical data and my theoretical thinking, a theory about service firms’ action upon negative incidents in high touch services was developed and the research question was answered. The study contributes to service recovery and complaint management studies as well as to studies on customer orientation and its implementation in service firms. Additionally, the study has a methodological contribution to service management studies since it reflects service firms’ action with narratives from multiple perspectives. The study is positioned in the tradition of the Nordic School of Marketing Thought and presents service firms’ action upon negative incidents in high touch services as a complex human-centered phenomenon in which the actors at the different hierarchical layers have crucial roles to play. Ritva Höykinpuro is associated with CERS, the Centre for Relationship Marketing and Service Management at Hanken School of Economics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The IEEE 802.1le medium access control (MAC) standard provides distributed service differentiation or Quality-of- Service (QoS) by employing a priority system. In 802.1 le networks, network traffic is classified into different priorities or access categories (ACs). Nodes maintain separate queues for each AC and packets at the head-of-line (HOL) of each queue contend for channel access using AC-specific parameters. Such a mechanism allows the provision of differentiated QoS where high priority, performance sensitive traffic such as voice and video applications will enjoy less delay, greater throughput and smaller loss, compared to low priority traffic (e. g. file transfer). The standard implicitly assumes that nodes are honest and will truthfully classify incoming traffic into its appropriate AC. However, in the absence of any additional mechanism, selfish users can gain enhanced performance by selectively classifying low priority traffic as high priority, potentially destroying the QoS capability of the system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scholarly research has produced conceptual knowledge that is based on real-life marketing phenomena. An initial aim of past research has been to produce marketing knowledge as a base for efficient business operation and for the improvement of productivity. Thus, an assumption has been that the knowledge would be applied by organisations. This study focuses on understanding the use of marketing knowledge within the field of service marketing. Hence, even if marketing knowledge about service-oriented principles and marketing of services is based on empirical research, there is a lack of knowledge on how this marketing knowledge is in fact applied by businesses. The study focuses on four essential concepts of services marketing knowledge, namely service quality, servicescape, internal marketing, and augmented service offering. The research involves four case companies. Data is based on in depth interviews and questionnaire-based surveys conducted with managers, employees, and customers of these companies. All organisations were currently developing in a service-oriented and customer-oriented direction. However, we found limitations, gaps, and barriers for the implementation of service-oriented and customer-oriented principles. Hence, we argue that the organisations involved in the study exploited conceptual knowledge symbolically and conceptually, but the instrumental use of knowledge was limited. Due to the shortcomings found, we also argue that the implementation of the various practices and processes that are related to becoming service-oriented and customer-oriented has not been fully successful. Further, we have come to the conclusion that the shortcomings detected were at least in some respect related to the fact that the understanding and utilisation of conceptual knowledge of service-oriented principles and marketing of services were somewhat limited.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose –This paper explores and expands the roles of customers and companies in creating value by introducing a new a customer-based approach to service. The customer’s logic is examined as being the foundation of a customer-based marketing and business logic. Design/methodology/approach – The authors argue that both goods-dominant logics and service-dominant logics are provider-dominant. Contrasting the customer-dominant logic with provider-dominant logics, the paper examines the creation of service value from the perspectives of value-in-use, the customer’s own context, and the customer’s experience of service. Findings –Moving from a provider-dominant logic to a customer-dominant logic uncovered five major challenges to service marketers: Company involvement, company control in co-creation, visibility of value creation, locus of customer experience, and character of customer experience. Research limitations/implications – The paper is exploratory. It presents and discusses a conceptual model and suggests implications for research and practice. Practical implications –Awareness of the mechanisms of customer logic will provide businesses with new perspectives on the role of the company in their customer’s lives. We propose that understanding the customer’s logic should represent the starting-point for the marketer’s business logic. Originality/value – The paper increases the understanding of how the customer’s logic underpins the customer-dominant business logic. By exploring consequences of applying a customer-dominant logic, we suggest further directions for theoretical and empirical research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Represented by approximately 85 species, Hemidactylus is one of the most diverse and widely distributed genera of reptiles in the world. In the Indian subcontinent, this genus is represented by 28 species out of which at least 13 are endemic to this region. Here, we report the phylogeny of the Indian Hemidactylus geckos based on mitochondrial and nuclear DNA markers sequenced from multiple individuals of widely distributed as well as endemic congeners of India. Results indicate that a majority of the species distributed in India form a distinct clade whose members are largely confined to the Indian subcontinent thus representing a unique Indian radiation. The remaining Hemidactylus geckos of India belong to two other geographical clades representing the Southeast Asian and West-Asian arid zone species. Additionally, the three widely distributed, commensal species (H. brookii, H. frenatus and H. flaviviridis) are nested within the Indian radiation suggesting their Indian origin. Dispersal-vicariance analysis also supports their Indian origin and subsequent dispersal out-of-India into West-Asian arid zone and Southeast Asia. Thus, Indian subcontinent has served as an important arena for diversification amongst the Hemidactylus geckos and in the evolution and spread of its commensal geckos. (C) 2010 Elsevier Inc. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The advent of large and fast digital computers and development of numerical techniques suited to these have made it possible to review the analysis of important fundamental and practical problems and phenomena of engineering which have remained intractable for a long time. The understanding of the load transfer between pin and plate is one such. Inspite of continuous attack on these problems for over half a century, classical solutions have remained limited in their approach and value to the understanding of the phenomena and the generation of design data. On the other hand, the finite element methods that have grown simultaneously with the recent development of computers have been helpful in analysing specific problems and answering specific questions, but are yet to be harnessed to assist in obtaining with economy a clearer understanding of the phenomena of partial separation and contact, friction and slip, and fretting and fatigue in pin joints. Against this background, it is useful to explore the application of the classical simple differential equation methods with the aid of computer power to open up this very important area. In this paper we describe some of the recent and current work at the Indian Institute of Science in this last direction.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

States regularly deploy elements of their armed forces abroad. When that happens, the military personnel concerned largely remain governed by the penal law of the State that they serve. This extraterritorial extension of national criminal law, which has been treated as axiomatic in domestic law and ignored by international law scholarship, is the subject of this dissertation. The first part of the study considers the ambit of national criminal law without any special regard to the armed forces. It explores the historical development of the currently prevailing system of territorial law and looks at the ambit that national legal systems claim today. Turning then to international law, the study debunks the oddly persistent belief that States enjoy a freedom to extend their laws to extraterritorial conduct as they please, and that they are in this respect constrained only by some specific prohibitions in international law. Six arguments historical, empirical, ideological, functional, doctrinal and systemic are advanced to support a contrary view: that States are prohibited from extending the reach of their legal systems abroad, unless they can rely on a permissive principle of international law for doing so. The second part of the study deals specifically with State jurisdiction in a military context, that is to say, as applied to military personnel in the strict sense (service members) and various civilians serving with or accompanying the forces (associated civilians). While the status of armed forces on foreign soil has transformed from one encapsulated in the customary concept of extraterritoriality to a modern regulation of immunities granted by treaties, elements of armed forces located abroad usually do enjoy some degree of insulation from the legal system of the host State. As a corollary, they should generally remain covered by the law of their own State. The extent of this extraterritorial extension of national law is revealed in a comparative review of national legislation, paying particular attention to recent legal reforms in the United States and the United Kingdom two states that have sought to extend the scope of their national law to cover the conduct of military contractor personnel. The principal argument of the dissertation is that applying national criminal law to service members and associated civilians abroad is distinct from other extraterritorial claims of jurisdiction (in particular, the nationality principle or the protective principle of jurisdiction). The service jurisdiction over the armed forces has a distinct aim: ensuring the coherence and indivisibility of the forces and maintaining discipline. Furthermore, the exercise of service jurisdiction seeks to reduce the chances of the State itself becoming internationally liable for the conduct of its service members and associated civilians. Critically, the legal system of the troop-deploying State, by extending its reach abroad, seeks to avoid accountability gaps that might result from immunities from host State law.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Male flowering was studied at the canopy level in 10 silver birch (Betula pendula Roth) stands from 8 localities and in 14 downy birch (B. pubescens Ehrh.) stands from 10 localities in Finland from 1963 to 1973. Distributions of cumulative pollen catches were compared to the normal Gaussian distribution. The basis for the timing of flowering was the 50 per cent point of the anthesis-fitted normal distribution. To eliminate effects of background pollen, only the central, normally distributed part of the cumulative distribution was used. Development up to the median point of the distribution was measured and tested in calendar days, in degree days (> 5 °C) and in period units. The count of each parameter began on and included March 19. Male flowering in silver birch occurred from late April to late June depending on latitude, and flowering in downy birch took place from early May to early July. The heat sums needed for male flowering varied in downy birch stands latitudinally but there was practically no latitudinal variation in heat sums needed for silver birch flowering. The amount of male flowering in stands of both birch species were found to have a large annual variation but without any clear periodicity. The between years pollen catch variation in stands of either birch species did not show any significant latitudinal correlation in contrast to Norway spruce stands. The period unit heat sum gave the most accurate forecast of the timing of flowering for 60 per cent of the silver birch stands and for 78.6 per cent of the for downy birch stands. Calendar days, however, gave the best forecast for silver birch in 25 per cent of the cases, while degree days gave the best forecast for downy birch in 21.4 per cent of the cases. Silver birch seems to have a local inclination for a more fixed flowering date compared to downy birch, which could mean a considerable photoperiodic influence on flowering time of silver birch. Silver birch and downy birch had different geographical correlations. Frequent hybridization of birch species occurs more often in northern Finland in than in more southern latitudes. The different timing in flowering caused increasing scatter in flowering times in the north, especially in the case of downy birch. The chance of simultaneous flowering of silver birch and downy birch so increased northwards due to a more variable climate and also higher altitudinal variations. Compared with conifers, the reproduction cycles of both birch species were found to be well protected from damage by frost.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The high cost and extraordinary demands made on sophisticated air defence systems, pose hard challenges to the managers and engineers who plan the operation and maintenance of such systems. This paper presents a study aimed at developing simulation and systems analysis techniques for the effective planning and efficient operation of small fleets of aircraft, typical of the air force of a developing country. We consider an important aspect of fleet management: the problem of resource allocation for achieving prescribed operational effectiveness of the fleet. At this stage, we consider a single flying-base, where the operationally ready aircraft are stationed, and a repair-depot, where the planes are overhauled. An important measure of operational effectiveness is ‘ availability ’, which may be defined as the expected fraction of the fleet fit for use at a given instant. The tour of aircraft in a flying-base, repair-depot system through a cycle of ‘ operationally ready ’ and ‘ scheduled overhaul ’ phases is represented first by a deterministic flow process and then by a cyclic queuing process. Initially the steady-state availability at the flying-base is computed under the assumptions of Poisson arrivals, exponential service times and an equivalent singleserver repair-depot. This analysis also brings out the effect of fleet size on availability. It defines a ‘ small ’ fleet essentially in terms of the important ‘ traffic ’ parameter of service rate/maximum arrival rate.A simulation model of the system has been developed using GPSS to study sensitivity to distributional assumptions, to validate the principal assumptions of the analytical model such as the single-server assumption and to obtain confidence intervals for the statistical parameters of interest.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The open development model of software production has been characterized as the future model of knowledge production and distributed work. Open development model refers to publicly available source code ensured by an open source license, and the extensive and varied distributed participation of volunteers enabled by the Internet. Contemporary spokesmen of open source communities and academics view open source development as a new form of volunteer work activity characterized by hacker ethic and bazaar governance . The development of the Linux operating system is perhaps the best know example of such an open source project. It started as an effort by a user-developer and grew quickly into a large project with hundreds of user-developer as contributors. However, in hybrids , in which firms participate in open source projects oriented towards end-users, it seems that most users do not write code. The OpenOffice.org project, initiated by Sun Microsystems, in this study represents such a project. In addition, the Finnish public sector ICT decision-making concerning open source use is studied. The purpose is to explore the assumptions, theories and myths related to the open development model by analysing the discursive construction of the OpenOffice.org community: its developers, users and management. The qualitative study aims at shedding light on the dynamics and challenges of community construction and maintenance, and related power relations in hybrid open source, by asking two main research questions: How is the structure and membership constellation of the community, specifically the relation between developers and users linguistically constructed in hybrid open development? What characterizes Internet-mediated virtual communities and how can they be defined? How do they differ from hierarchical forms of knowledge production on one hand and from traditional volunteer communities on the other? The study utilizes sociological, psychological and anthropological concepts of community for understanding the connection between the real and the imaginary in so-called virtual open source communities. Intermediary methodological and analytical concepts are borrowed from discourse and rhetorical theories. A discursive-rhetorical approach is offered as a methodological toolkit for studying texts and writing in Internet communities. The empirical chapters approach the problem of community and its membership from four complementary points of views. The data comprises mailing list discussion, personal interviews, web page writings, email exchanges, field notes and other historical documents. The four viewpoints are: 1) the community as conceived by volunteers 2) the individual contributor s attachment to the project 3) public sector organizations as users of open source 4) the community as articulated by the community manager. I arrive at four conclusions concerning my empirical studies (1-4) and two general conclusions (5-6). 1) Sun Microsystems and OpenOffice.org Groupware volunteers failed in developing necessary and sufficient open code and open dialogue to ensure collaboration thus splitting the Groupware community into volunteers we and the firm them . 2) Instead of separating intrinsic and extrinsic motivations, I find that volunteers unique patterns of motivations are tied to changing objects and personal histories prior and during participation in the OpenOffice.org Lingucomponent project. Rather than seeing volunteers as a unified community, they can be better understood as independent entrepreneurs in search of a collaborative community . The boundaries between work and hobby are blurred and shifting, thus questioning the usefulness of the concept of volunteer . 3) The public sector ICT discourse portrays a dilemma and tension between the freedom to choose, use and develop one s desktop in the spirit of open source on one hand and the striving for better desktop control and maintenance by IT staff and user advocates, on the other. The link between the global OpenOffice.org community and the local end-user practices are weak and mediated by the problematic IT staff-(end)user relationship. 4) Authoring community can be seen as a new hybrid open source community-type of managerial practice. The ambiguous concept of community is a powerful strategic tool for orienting towards multiple real and imaginary audiences as evidenced in the global membership rhetoric. 5) The changing and contradictory discourses of this study show a change in the conceptual system and developer-user relationship of the open development model. This change is characterized as a movement from hacker ethic and bazaar governance to more professionally and strategically regulated community. 6) Community is simultaneously real and imagined, and can be characterized as a runaway community . Discursive-action can be seen as a specific type of online open source engagement. Hierarchies and structures are created through discursive acts. Key words: Open Source Software, open development model, community, motivation, discourse, rhetoric, developer, user, end-user

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We develop new scheduling algorithms for the IEEE 802.16d OFDMA/TDD based broadband wireless access system, in which radio resources of both time and frequency slots are dynamically shared by all users. Our objective is to provide a fair and efficient allocation to all the users to satisfy their quality of service.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports new results concerning the capabilities of a family of service disciplines aimed at providing per-connection end-to-end delay (and throughput) guarantees in high-speed networks. This family consists of the class of rate-controlled service disciplines, in which traffic from a connection is reshaped to conform to specific traffic characteristics, at every hop on its path. When used together with a scheduling policy at each node, this reshaping enables the network to provide end-to-end delay guarantees to individual connections. The main advantages of this family of service disciplines are their implementation simplicity and flexibility. On the other hand, because the delay guarantees provided are based on summing worst case delays at each node, it has also been argued that the resulting bounds are very conservative which may more than offset the benefits. In particular, other service disciplines such as those based on Fair Queueing or Generalized Processor Sharing (GPS), have been shown to provide much tighter delay bounds. As a result, these disciplines, although more complex from an implementation point-of-view, have been considered for the purpose of providing end-to-end guarantees in high-speed networks. In this paper, we show that through ''proper'' selection of the reshaping to which we subject the traffic of a connection, the penalty incurred by computing end-to-end delay bounds based on worst cases at each node can be alleviated. Specifically, we show how rate-controlled service disciplines can be designed to outperform the Rate Proportional Processor Sharing (RPPS) service discipline. Based on these findings, we believe that rate-controlled service disciplines provide a very powerful and practical solution to the problem of providing end-to-end guarantees in high-speed networks.