4,998 research outputs found
The crowd as a cameraman : on-stage display of crowdsourced mobile video at large-scale events
Recording videos with smartphones at large-scale events such as concerts and festivals is very common nowadays. These videos register the atmosphere of the event as it is experienced by the crowd and offer a perspective that is hard to capture by the professional cameras installed throughout the venue. In this article, we present a framework to collect videos from smartphones in the public and blend these into a mosaic that can be readily mixed with professional camera footage and shown on displays during the event. The video upload is prioritized by matching requests of the event director with video metadata, while taking into account the available wireless network capacity. The proposed framework's main novelty is its scalability, supporting the real-time transmission, processing and display of videos recorded by hundreds of simultaneous users in ultra-dense Wi-Fi environments, as well as its proven integration in commercial production environments. The framework has been extensively validated in a controlled lab setting with up to 1 000 clients as well as in a field trial where 1 183 videos were collected from 135 participants recruited from an audience of 8 050 people. 90 % of those videos were uploaded within 6.8 minutes
Existence and stability of solitons for the nonlinear Schr\"odinger equation on hyperbolic space
We study the existence and stability of ground state solutions or solitons to
a nonlinear stationary equation on hyperbolic space. The method of
concentration compactness applies and shows that the results correlate strongly
to those of Euclidean space.Comment: New: As noted in Banica-Duyckaerts (arXiv:1411.0846), Section 5
should read that for sufficiently large mass, sub-critical problems can be
solved via energy minimization for all d \geq 2 and as a result
Cazenave-Lions results can be applied in Section 6 with the same restriction.
These requirements were addressed by the subsequent work with Metcalfe and
Taylor in arXiv:1203.361
Voluntary disclosures as a form of impression management to reduce evaluative uncertainty during M&A
This study develops and tests a set of hypotheses on how to manage investors’ evaluative uncertainty during M&A through a specific form of impression management, namely, interim news events. We suggest that voluntary disclosures are key in influencing investors’ reactions during M&A. Empirical support for our theoretical arguments is shown in a sample of 36,376 deals and 163,023 associated interim news events carried out by NYSE and NSDQ listed organizations over 10 years. Our research contributes to literature on voluntary disclosures, impression management, and managing M&A
A Type-and-Effect System for Shared Memory, Concurrent Implicit Invocation Systems
Driven by the need to utilize multicore platforms, recent language designs aim to bring the concurrency advantages of events in distributed publish-subscribe systems to sequential OO programs that utilize the implicit invocation (II) design style. These proposals face two challenges. First, unlike the publish-subscribe paradigm where publisher and subscriber typically don\u27t share state, communicating via shared state is common in II programs. Second, type-and-effect systems that are generally designed for statically reasoning about a program\u27s execution are often too conservative to handle II that typically entails a virtual method invocation on zero or more dynamically registered handlers. To solve these problems, we present a novel hybrid type-and-effect system for exposing concurrency in programs that use II mechanisms. This type-and-effect system provides deadlock and data race freedom in such usage of II mechanisms. We have also implemented this type-and-effect system. An initial study shows its scalability benefits and acceptable costs
Recommended from our members
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services. Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the srevice owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offer a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer- to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results carried out on two commercial clouds
Expression profiles of TRPV1, TRPV4, TLR4 and ERK1/2 in the dorsal root ganglionic neurons of a cancer-induced neuropathy rat model
Background: The spread of tumors through neural routes is common in several
types of cancer in which patients suffer from a moderate-to-severe neuropathy,
neural damage and a distorted quality of life. Here we aim to examine the
expression profiles of transient receptor potential vanilloid 1 (TRPV1) and of
transient receptor potential vanilloid 4 (TRPV4), toll-like receptor 4 (TLR4)
and extracellular signal-regulated kinase (ERK1/2), and to assess the possible
therapeutic strategies through blockade of transient receptor potential (TRP)
channels. Methods: Cancer was induced within the sciatic nerves of male
Copenhagen rats, and tissues from dorsal root ganglia (DRG) were collected and
used for measurements of immunofluorescence and Western blotting. The TRPV1
antagonist capsazepine, the selective TRPV4 antagonist HC-067047 and the
calcium ions inhibitor ruthenium red were used to treat thermal and/or
mechanical hyperalgesia. Results: Transient receptor potential vanilloid 1
showed a lower expression in DRGs on days 7 and 14. The expression of TRPV4,
TLR4 and ERK1/2 showed an increase on day 3 then a decrease on days 7 and 14.
TRPV1 and TLR4 as well as TRPV4 and ERK1/2 co-existed on the same neuronal
cells. The neuropathic pain was reversed in dose-dependent manners by using the
TRP antagonists and the calcium ions inhibitor. Conclusion: The decreased
expression of TRPV1 and TRPV4 is associated with high activation. The increased
expression of TLR4 and ERK1/2 reveals earlier immune response and tumor
progression, respectively, and their ultimate decrease is an indicator of nerve
damage. We studied the possible role of TRPV1 and TRPV4 in transducing
cancer-induced hyperalgesia. The possible treatment strategies of
cancer-induced thermal and/or mechanical hyperalgesia using capsazepine,
HC-067047 and ruthenium red are examined.Comment: PMID: 29637027, PMCID: PMC588970
Lightweight protection of cryptographic hardware accelerators against differential fault analysis
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Hardware acceleration circuits for cryptographic algorithms are largely deployed in a wide range of products. The HW implementations of such algorithms often suffer from a number of vulnerabilities that expose systems to several attacks, e.g., differential fault analysis (DFA). The challenge for designers is to protect cryptographic accelerators in a cost-effective and power-efficient way. In this paper, we propose a lightweight technique for protecting hardware accelerators implementing AES and SHA-2 (which are two widely used NIST standards) against DFA. The proposed technique exploits partial redundancy to first detect the occurrence of a fault and then to react to the attack by obfuscating the output values. An experimental campaign demonstrated that the overhead introduced is 8.32% for AES and 3.88% for SHA-2 in terms of area, 0.81% for AES and 12.31% for SHA-2 in terms of power with no working frequency reduction. Moreover, a comparative analysis showed that our proposal outperforms the most recent related countermeasures.Peer ReviewedPostprint (author's final draft
1961-1962 Xavier University Evening Division Bulletin Course Catalog
https://www.exhibit.xavier.edu/coursecatalog/1180/thumbnail.jp
The Role of Uncertainty in the Term Structure of Interest Rates: A Macro-Finance Perspective
Using a macroeconomic perspective, we examine the effect of uncertainty arising from policy-shock volatility on yield-curve dynamics. Many macro-finance models assume that policy shocks are homoskedastic, while observed policy shock processes are significantly time varying and persistent. We allow for this key feature by constructing a no-arbitrage GARCH affine term structure model, in which monetary policy uncertainty is modeled as the conditional volatility of the error term in a Taylor rule. We find that monetary policy uncertainty increases the medium- and longer-term spreads in a model that incorporates macroeconomic dynamics.
- …