869 resultados para Conflict avoidance
Resumo:
Software transaction memory (STM) systems have been used as an approach to improve performance, by allowing the concurrent execution of atomic blocks. However, under high-contention workloads, STM-based systems can considerably degrade performance, as transaction conflict rate increases. Contention management policies have been used as a way to select which transaction to abort when a conflict occurs. In general, contention managers are not capable of avoiding conflicts, as they can only select which transaction to abort and the moment it should restart. Since contention managers act only after a conflict is detected, it becomes harder to effectively increase transaction throughput. More proactive approaches have emerged, aiming at predicting when a transaction is likely to abort, postponing its execution. Nevertheless, most of the proposed proactive techniques are limited, as they do not replace the doomed transaction by another or, when they do, they rely on the operating system for that, having little or no control on which transaction to run. This article proposes LUTS, a lightweight user-level transaction scheduler. Unlike other techniques, LUTS provides the means for selecting another transaction to run in parallel, thus improving system throughput. We discuss LUTS design and propose a dynamic conflict-avoidance heuristic built around its scheduling capabilities. Experimental results, conducted with the STAMP and STMBench7 benchmark suites, running on TinySTM and SwissTM, show how our conflict-avoidance heuristic can effectively improve STM performance on high contention applications. © 2012 Springer Science+Business Media, LLC.
Resumo:
State responses to external threats and aggression are studied with focus on two different rationales: (1) to make credible deterrent threats to avoid being exploited, and (2) to minimize the risk of escalation to unwanted war. Given external aggression, the target state's responding behavior has three possibilities: concession (under-response), reciprocation, and escalation. This study focuses on the first two possibilities and investigates how the strategic nature of crisis interaction can explain the intentional choice of concession or avoidance of retaliation. I build a two-level bargaining model that accounts for the domestic bargaining situation between the leader and the challenger for each state. The model's equilibrium shows that the responding behavior is determined not only by inter-state level variables (e.g. balance of power between two states, or cost of war that each state is supposed to pay), but also the domestic variables of both states. Next, the strategic interaction is rationally explained by the model: as the responding state believes that the initiating state has strong domestic challenges and, hence, the aggression is believed to be initiated for domestic political purposes (a rally-around-the-flag effect), the response tends to decrease. The concession is also predicted if the target state leader has strong bargaining power against her domestic challengers \emph{and} she believes that the initiating leader suffers from weak domestic standing. To test the model's prediction, I conduct a lab experiment and case studies. The experimental result shows that under an incentivized bargaining situation, individual actors are observed to react to hostile action as the model predicts: if the opponent is believed to suffer from internally driven difficulties, the subject will not punish hostile behavior of the other player as severely as she would without such a belief. The experiment also provides supporting evidence for the choice of concession: when the player finds herself in a favorable situation while the other has disadvantages, the player is more likely to make concessions in the controlled dictator game. Two cases are examined to discuss how the model can explain the choice of either reciprocation or concession. From personal interviews and fieldwork in South Korea, I find that South Korea's reciprocating behavior during the 2010 Yeonpyeong Island incident is explained by a combination of `low domestic power of initiating leader (Kim Jong-il)' and `low domestic power of responding leader (Lee Myung-bak).' On the other hand, the case of EC-121 is understood as a non-response or concession outcome. Declassified documents show that Nixon and his key advisors interpreted the attack as a result of North Korea's domestic political instabilities (low domestic power of initiating leader) and that Nixon did not have difficulties at domestic politics during the first few months of his presidency (high domestic power of responding leader).
Resumo:
The evaluation of satisfaction levels related to performance is an important aspect in increasing market share, improving profitability and enlarging opportunities for repeat business and can lead to the determination of areas to be improved, improving harmonious working relationships and conflict avoidance. In the construction industry, this can also result in improved project quality, enhanced reputation and increased competitiveness. Many conceptual models have been developed to measure satisfaction levels - typically to gauge client satisfaction, customer satisfaction and home buyer satisfaction - but limited empirical research has been carried out, especially in investigating the satisfaction of construction contractors. In addressing this, this paper provides a unique conceptual model or framework for contractor satisfaction based on attributes identified by interviews with practitioners in Malaysia. In addition to progressing research in this topic and being of potential benefit to Malaysian contractors, it is anticipated that the framework will also be useful for other parties - clients, designers, subcontractors and suppliers - in enhancing the quality of products and/or services generally.
Resumo:
The Border Gateway Protocol (BGP) is the current inter-domain routing protocol used to exchange reachability information between Autonomous Systems (ASes) in the Internet. BGP supports policy-based routing which allows each AS to independently adopt a set of local policies that specify which routes it accepts and advertises from/to other networks, as well as which route it prefers when more than one route becomes available. However, independently chosen local policies may cause global conflicts, which result in protocol divergence. In this paper, we propose a new algorithm, called Adaptive Policy Management Scheme (APMS), to resolve policy conflicts in a distributed manner. Akin to distributed feedback control systems, each AS independently classifies the state of the network as either conflict-free or potentially-conflicting by observing its local history only (namely, route flaps). Based on the degree of measured conflicts (policy conflict-avoidance vs. -control mode), each AS dynamically adjusts its own path preferences—increasing its preference for observably stable paths over flapping paths. APMS also includes a mechanism to distinguish route flaps due to topology changes, so as not to confuse them with those due to policy conflicts. A correctness and convergence analysis of APMS based on the substability property of chosen paths is presented. Implementation in the SSF network simulator is performed, and simulation results for different performance metrics are presented. The metrics capture the dynamic performance (in terms of instantaneous throughput, delay, routing load, etc.) of APMS and other competing solutions, thus exposing the often neglected aspects of performance.
Resumo:
The purpose of this paper is to demonstrate the potential of the EXODUS evacuation model in building environments. The latest PC/workstation version of EXODUS is described and is also applied to a large hypothetical supermarket/restaurant complex measuring 50 m x 40 m. A range of scenarios is presented where population characteristics (such as size, individual travel speeds, and individual response times), and enclosure configuration characteristics (such as number of exits, size of exits, and opening times of exits) are varied. The results demonstrate a wide range of occupant behavior including overtaking, queuing, redirection, and conflict avoidance. Evacuation performance is measured by a number of model predicted parameters including individual exit flow rates, overall evacuation flow rates, total evacuation time, average evacuation time per occupant, average travel distance, and average wait time. The simulations highlight the profound impact that variations in individual travel speeds and occupant response times have in determining the overall evacuation performance.
Resumo:
The purpose of this paper is to demonstrate the potential of the EXODUS evacuation model in building environments. The latest PC/workstation version of EXODUS is described and is also applied to a large hypothetical supermarket/restaurant complex measuring 50 m x 40 m. A range of scenarios is presented where population characteristics (such as size, individual travel speeds, and individual response times), and enclosure configuration characteristics (such as number of exits, size of exits, and opening times of exits) are varied. The results demonstrate a wide range of occupant behavior including overtaking, queuing, redirection, and conflict avoidance. Evacuation performance is measured by a number of model predicted parameters including individual exit flow rates, overall evacuation flow rates, total evacuation time, average evacuation time per occupant, average travel distance, and average wait time. The simulations highlight the profound impact that variations in individual travel speeds and occupant response times have in determining the overall evacuation performance. 1. Jin, T., and Yamada T., "Experimental Study of Human Behavior in Smoke Filled Corridors," Proceedings of The Second International Symposium on Fire Safety Science, 1988, pp. 511-519. 2. Galea, E.R., and Galparsoro, J.M.P., "EXODUS: An Evacuation Model for Mass Transport Vehicles," UK CAA Paper 93006 ISBN 086039 543X, CAA London, 1993. 3. Galea, E.R., and Galparsoro, J.M.P., "A Computer Based Simulation Model for the Prediction of Evacuation from Mass Transport Vehicles," Fire Safety Journal, Vol. 22, 1994, pp. 341-366. 4. Galea, E.R., Owen, M., and Lawrence, P., "Computer Modeling of Human Be havior in Aircraft Fire Accidents," to appear in the Proceedings of Combus tion Toxicology Symposium, CAMI, Oklahoma City, OK, 1995. 5. Kisko, T.M. and Francis, R.L., "EVACNET+: A Computer Program to Determine Optimal Building Evacuation Plans," Fire Safety Journal, Vol. 9, 1985, pp. 211-220. 6. Levin, B., "EXITT, A Simulation Model of Occupant Decisions and Actions in Residential Fires," Proceedings of The Second International Symposium on Fire Safety Science, 1988, pp. 561-570. 7. Fahy, R.F., "EXIT89: An Evacuation Model for High-Rise Buildings," Pro ceedings of The Third International Sym posium on Fire Safety Science, 1991, pp. 815-823. 8. Thompson, P.A., and Marchant, E.W., "A Computer Model for the Evacuation of Large Building Populations," Fire Safety Journal, Vol. 24, 1995, pp. 131-148. 9. Still, K., "New Computer System Can Predict Human Behavior Response to Building Fires," FIRE 84, 1993, pp. 40-41. 10. Ketchell, N., Cole, S.S., Webber, D.M., et.al., "The Egress Code for Human Move ment and Behavior in Emergency Evacu ations," Engineering for Crowd Safety (Smith, R.A., and Dickie, J.F., Eds.), Elsevier, 1993, pp. 361-370. 11. Takahashi, K., Tanaka, T. and Kose, S., "An Evacuation Model for Use in Fire Safety Design of Buildings," Proceedings of The Second International Symposium on Fire Safety Science, 1988, pp. 551- 560. 12. G2 Reference Manual, Version 3.0, Gensym Corporation, Cambridge, MA. 13. XVT Reference Manual, Version 3.0 XVT Software Inc., Boulder, CO. 14. Galea, E.R., "On the Field Modeling Approach to the Simulation of Enclosure Fires, Journal of Fire Protection Engineering, Vol. 1, No. 1, 1989, pp. 11-22. 15. Purser, D.A., "Toxicity Assessment of Combustion Products," SFPE Handbook of Fire Protection Engineering, National Fire Protection Association, Quincy, MA, pp. 1-200 - 1-245, 1988. 16. Hankin, B.D., and Wright, R.A., "Pas senger Flows in Subways," Operational Research Quarterly, Vol. 9, 1958, pp. 81-88. 17. HMSO, The Building Regulations 1991 - Approved Document B, section B 1 (1992 edition), HMSO publications, London, pp. 9-40. 18. Polus A., Schofer, J.L., and Ushpiz, A., "Pedestrian Flow and Level of Service," Journal of Transportation Engineering, Vol. 109, 1983, pp. 46-47. 19. Muir, H., Marrison, C., and Evans, A., "Aircraft Evacuations: the Effect of Passenger Motivation and Cabin Con figuration Adjacent to the Exit," CAA Paper 89019, ISBN 0 86039 406 9, 1989. 20. Muir, H., Private communication to appear as a CAA report, 1996.
Resumo:
For persons with disabilities, the activities that able-bodied people take for granted can be major, often insurmountable challenges. Attempting to enter a restaurant for lunch with friends can result in lengthy and adversarial litigation if the facility is not accessible to a person with a disability or other mobility impairment. This litigation would be initiated after the individual was effectively refused service; a refusal based on hislher personal physical characteristics. If a shopping mall is not equipped with "access amenities", then the disabled person may be excluded from shopping there and thus exercising consumer freedom. If workplaces are not equipped to accommodate the access needs of persons with disabilities, then those people are effectively barred from gainful employment there. If a municipal goveniment building is inaccessible to disabled persons, then they may be excluded from participating in council meetings. These are all activities that the majority of the population enjoys as a matter of course, in that they represent the functions of a free citizen in a free society. If a person is excluded from such activities because of some personal characteristic, then that person is subjected to differential or discr~minatory treatment. The guarantees provided in Canadian feden! and provincial rights legislation, are such that people are not to be discriminated againsL Where buildings and facilities othen\iise open to the public are not accessible for persens with disabilities, then those people are being discriminated against. To challenge these discriminatory practices, individuals initiate complaints through the administrative justice system. To address the extent to which this is a problem, many sources were consulted. Constitutional lawyers, tribunal members, advocates for the disabled and land use planners were interviewed. Case law and legislation were reviewed. Literature on citizenship theory, dispute resolution and dispute avoidance was compiled and assessed. And, the field of land use planning was analyzed (drawing on the WTiter's educational and experiential background) as a possible alternative method for effecting systemic access for persons with disabilities. The conclusion of this study is that there does exist a proactive method for assuring access, a method that can apply the systemic remedy needed to deal with this problem. The current method, which is an adversarial and piecemeal complaint process, has proven ineffective in remedying this discrimination problem~ Failure to provide an appropriate remedy means that persons with disabilities will not enjoy the degree of citizen status enjoyed by the able-bodied. This is the current circumstance, and since equity is the aim of rights legislation, and since such legislative and administrative frameworks have failed in that purpose, then an alternative method is necessary. An alternative model is the one in which land use planning is based. It has conflict avoidance and conflict minimization as underpinnings. And, most importantly, land use planning is already a proyen method of combatting discrimination.
Resumo:
Software Transactional Memory (STM) systems have poor performance under high contention scenarios. Since many transactions compete for the same data, most of them are aborted, wasting processor runtime. Contention management policies are typically used to avoid that, but they are passive approaches as they wait for an abort to happen so they can take action. More proactive approaches have emerged, trying to predict when a transaction is likely to abort so its execution can be delayed. Such techniques are limited, as they do not replace the doomed transaction by another or, when they do, they rely on the operating system for that, having little or no control on which transaction should run. In this paper we propose LUTS, a Lightweight User-Level Transaction Scheduler, which is based on an execution context record mechanism. Unlike other techniques, LUTS provides the means for selecting another transaction to run in parallel, thus improving system throughput. Moreover, it avoids most of the issues caused by pseudo parallelism, as it only launches as many system-level threads as the number of available processor cores. We discuss LUTS design and present three conflict-avoidance heuristics built around LUTS scheduling capabilities. Experimental results, conducted with STMBench7 and STAMP benchmark suites, show LUTS efficiency when running high contention applications and how conflict-avoidance heuristics can improve STM performance even more. In fact, our transaction scheduling techniques are capable of improving program performance even in overloaded scenarios. © 2011 Springer-Verlag.
Resumo:
One of the most interesting challenge of the next years will be the Air Space Systems automation. This process will involve different aspects as the Air Traffic Management, the Aircrafts and Airport Operations and the Guidance and Navigation Systems. The use of UAS (Uninhabited Aerial System) for civil mission will be one of the most important steps in this automation process. In civil air space, Air Traffic Controllers (ATC) manage the air traffic ensuring that a minimum separation between the controlled aircrafts is always provided. For this purpose ATCs use several operative avoidance techniques like holding patterns or rerouting. The use of UAS in these context will require the definition of strategies for a common management of piloted and piloted air traffic that allow the UAS to self separate. As a first employment in civil air space we consider a UAS surveillance mission that consists in departing from a ground base, taking pictures over a set of mission targets and coming back to the same ground base. During all mission a set of piloted aircrafts fly in the same airspace and thus the UAS has to self separate using the ATC avoidance as anticipated. We consider two objective, the first consists in the minimization of the air traffic impact over the mission, the second consists in the minimization of the impact of the mission over the air traffic. A particular version of the well known Travelling Salesman Problem (TSP) called Time-Dependant-TSP has been studied to deal with traffic problems in big urban areas. Its basic idea consists in a cost of the route between two clients depending on the period of the day in which it is crossed. Our thesis supports that such idea can be applied to the air traffic too using a convenient time horizon compatible with aircrafts operations. The cost of a UAS sub-route will depend on the air traffic that it will meet starting such route in a specific moment and consequently on the avoidance maneuver that it will use to avoid that conflict. The conflict avoidance is a topic that has been hardly developed in past years using different approaches. In this thesis we purpose a new approach based on the use of ATC operative techniques that makes it possible both to model the UAS problem using a TDTSP framework both to use an Air Traffic Management perspective. Starting from this kind of mission, the problem of the UAS insertion in civil air space is formalized as the UAS Routing Problem (URP). For this reason we introduce a new structure called Conflict Graph that makes it possible to model the avoidance maneuvers and to define the arc cost function of the departing time. Two Integer Linear Programming formulations of the problem are proposed. The first is based on a TDTSP formulation that, unfortunately, is weaker then the TSP formulation. Thus a new formulation based on a TSP variation that uses specific penalty to model the holdings is proposed. Different algorithms are presented: exact algorithms, simple heuristics used as Upper Bounds on the number of time steps used, and metaheuristic algorithms as Genetic Algorithm and Simulated Annealing. Finally an air traffic scenario has been simulated using real air traffic data in order to test our algorithms. Graphic Tools have been used to represent the Milano Linate air space and its air traffic during different days. Such data have been provided by ENAV S.p.A (Italian Agency for Air Navigation Services).
Resumo:
The Bush administration's continuing emphasis on US military deterrence of the PRC on behalf of Taiwan threatens to undermine the posture of 'strategic ambiguity' that the United States has proclaimed since 1979. This article argues for the retention of 'strategic ambiguity' and traces the origins of revisionist sentiment towards this effective conflict avoidance mechanism to reactions within the US foreign policy community to the 1995-96 Taiwan Strait crisis. Case studies of this crisis and its predecessors in 1954-55 and 1958 demonstrate that US military deterrence was not a decisive factor in their resolution. US and PRC initiatives and responses in the 1950s crises introduced the essential elements of 'strategic ambiguity' into the triangular relationship between themselves and Taiwan. In particular, they established a precedent for the United States and the PRC in circumscribing the issue of Taiwan so as to achieve a political accommodation.
Resumo:
A study was conducted to examine the factorial validity of the Flinders Decision Making Questionnaire (Mann, 1982), a 31-item self-report inventory designed to measure tendencies to use three major coping patterns identified in the conflict theory of decision making (Janis and Mann, 1977): vigilance, hypervigilance, and defensive avoidance (procrastination, buck-passing, and rationalization). A sample of 2051 university students, comprising samples from Australia (n=262), New Zealand (n=260), the USA (n=475), Japan (n=359), Hong Kong (n=281) and Taiwan (n=414) was administered the DMQ. Factorial validity of the instrument was tested by confirmatory factor analysis with LISREL. Five different substantive models, representing different structural relationships between the decision-coping patterns had unsatisfactory fit to the data and could not be validated. A shortened instrument, containing 22 items, yielded a revised model comprising four identifiable factors-vigilance, hypervigilance, buck-passing, and procrastination. The revised model had adequate fit with data for each country sample and for the total sample, and was confirmed. It is recommended that the 22-item instrument, named the Melbourne DMQ, replace the Flinders DMQ for measurement of decision-coping patterns.
Resumo:
Approximately 20 years have passed now since the NTSB issued its original recommendation to expedite development, certification and production of low-cost proximity warning and conflict detection systems for general aviation [1]. While some systems are in place (TCAS [2]), ¡¨see-and-avoid¡¨ remains the primary means of separation between light aircrafts sharing the national airspace. The requirement for a collision avoidance or sense-and-avoid capability onboard unmanned aircraft has been identified by leading government, industry and regulatory bodies as one of the most significant challenges facing the routine operation of unmanned aerial systems (UAS) in the national airspace system (NAS) [3, 4]. In this thesis, we propose and develop a novel image-based collision avoidance system to detect and avoid an upcoming conflict scenario (with an intruder) without first estimating or filtering range. The proposed collision avoidance system (CAS) uses relative bearing ƒÛ and angular-area subtended ƒê , estimated from an image, to form a test statistic AS C . This test statistic is used in a thresholding technique to decide if a conflict scenario is imminent. If deemed necessary, the system will command the aircraft to perform a manoeuvre based on ƒÛ and constrained by the CAS sensor field-of-view. Through the use of a simulation environment where the UAS is mathematically modelled and a flight controller developed, we show that using Monte Carlo simulations a probability of a Mid Air Collision (MAC) MAC RR or a Near Mid Air Collision (NMAC) RiskRatio can be estimated. We also show the performance gain this system has over a simplified version (bearings-only ƒÛ ). This performance gain is demonstrated in the form of a standard operating characteristic curve. Finally, it is shown that the proposed CAS performs at a level comparable to current manned aviations equivalent level of safety (ELOS) expectations for Class E airspace. In some cases, the CAS may be oversensitive in manoeuvring the owncraft when not necessary, but this constitutes a more conservative and therefore safer, flying procedures in most instances.
Resumo:
While performing a mission, multiple Unmanned Aerial Vehicles (UAVs) need to avoid each other to prevent collisions among them. In this paper, we design a collision avoidance algorithm to resolve the conflict among UAVs that are on a collision course while flying to heir respective destinations. The collision avoidance algorithm consist of each UAV that is on a collision course reactively executing a maneuver that will, as in `inverse' Proportional Navigation (PN), increase Line of Sight (LOS) rate between them, resulting in a `pulling out' of collision course. The algorithm is tested for high density traffic scenarios as well as for robustness in the presence of noise.
Resumo:
Shy children are at risk for later maladjustment due to ineffective coping with social conflicts through reliance on avoidance, rather than approach-focused, coping. The purpose of the present study was to explore whether the relation between shyness and children's coping was mediated by attributions and moderated by personality selftheories and gender. Participants included a classroom-based sample of 175 children (93 boys), aged 9-13 years (M = 10.11 years, SD = 0.92). Children completed self-report measures assessing shyness, attributions, personality self-theories and coping strategies. Results showed that negative attribution biases partially mediated the negative relations between shyness and social support seeking, as well as problem-solving, and the positive association between shyness and externalizing. Moreover, self-theories moderated the relation between shyness and internalizing coping at the trend level, such that the positive relation was exacerbated among entity-oriented children to a greater degree than incrementally-oriented children. In terms of gender differences, shyness was related to lower use of social support and problem-solving among incrementally-oriented boys and entity-oriented girls. Thus, shy children's perceptions of social conflicts as the outcome of an enduring trait (e.g., social incompetence) may partially explain why they do not act assertively and aggress as a means of social coping. Furthermore, entity-oriented beliefs may exacerbate shy children's reliance on internalizing actions, such as crying. Although an incrementally-oriented stance may enhance shy girls' reliance on approach strategies, it does not appear to serve the same protective role for shy boys. Therefore, copingoriented interventions may need to focus on restructuring shy children's social cognitions and implementing gender-specific programming for their personality biases.
Resumo:
Successful management is dependent heavily on the manager’s ability to handle conflict effectively. The workforce has been increasingly becoming diversified vis-à-vis the gender, culture and ethnicity. The present work environment has in itself contributed to sowing seeds of conflict with greater diversity, hostility, complexity and newer business competencies in the work context.The classic study of Mintzberg’s Managerial roles approach (1973) also says that a manager has to spend sufficient time and energy in solving conflict as he has to take roles as a negotiator, and dispute handler. An understanding of the conflict and role that it plays in influencing employee behavior constructively or destructively is immense. Therefore conflict when left unmanaged can lead to diminished cohesiveness amongst employees, productivity and reduced organizational fitness. To manage conflict effective conflict resolution strategies that have constructive outcomes is called for. Conflict resolution style theorists opine that collaborative or integrative style, where there is high concern for task and people is considered to give positive individual and organizational outcomes, while the withdrawing /avoidance style and forcing / dominating style are considered to be ineffective in managing conflict. Though managers have typical preferences in the styles followed it need not necessarily be the typical response as it depends on the context, power relationships, emotions etc. The adoption of conflict styles of managers however is dependent on variables like gender orientation, cultural values, personality orientation, underlying relationships – public/private. The paper attempts to draw the importance of managing conflicts at workplace positively and the need for effective conflict resolution strategies. The conflict style adopted and the variables that affect the adoption of each style are discussed and possible interventions at the workplace are suggested