4,998 research outputs found

    The crowd as a cameraman : on-stage display of crowdsourced mobile video at large-scale events

    Get PDF
    Recording videos with smartphones at large-scale events such as concerts and festivals is very common nowadays. These videos register the atmosphere of the event as it is experienced by the crowd and offer a perspective that is hard to capture by the professional cameras installed throughout the venue. In this article, we present a framework to collect videos from smartphones in the public and blend these into a mosaic that can be readily mixed with professional camera footage and shown on displays during the event. The video upload is prioritized by matching requests of the event director with video metadata, while taking into account the available wireless network capacity. The proposed framework's main novelty is its scalability, supporting the real-time transmission, processing and display of videos recorded by hundreds of simultaneous users in ultra-dense Wi-Fi environments, as well as its proven integration in commercial production environments. The framework has been extensively validated in a controlled lab setting with up to 1 000 clients as well as in a field trial where 1 183 videos were collected from 135 participants recruited from an audience of 8 050 people. 90 % of those videos were uploaded within 6.8 minutes

    Existence and stability of solitons for the nonlinear Schr\"odinger equation on hyperbolic space

    Full text link
    We study the existence and stability of ground state solutions or solitons to a nonlinear stationary equation on hyperbolic space. The method of concentration compactness applies and shows that the results correlate strongly to those of Euclidean space.Comment: New: As noted in Banica-Duyckaerts (arXiv:1411.0846), Section 5 should read that for sufficiently large mass, sub-critical problems can be solved via energy minimization for all d \geq 2 and as a result Cazenave-Lions results can be applied in Section 6 with the same restriction. These requirements were addressed by the subsequent work with Metcalfe and Taylor in arXiv:1203.361

    Voluntary disclosures as a form of impression management to reduce evaluative uncertainty during M&A

    Get PDF
    This study develops and tests a set of hypotheses on how to manage investors’ evaluative uncertainty during M&A through a specific form of impression management, namely, interim news events. We suggest that voluntary disclosures are key in influencing investors’ reactions during M&A. Empirical support for our theoretical arguments is shown in a sample of 36,376 deals and 163,023 associated interim news events carried out by NYSE and NSDQ listed organizations over 10 years. Our research contributes to literature on voluntary disclosures, impression management, and managing M&A

    A Type-and-Effect System for Shared Memory, Concurrent Implicit Invocation Systems

    Get PDF
    Driven by the need to utilize multicore platforms, recent language designs aim to bring the concurrency advantages of events in distributed publish-subscribe systems to sequential OO programs that utilize the implicit invocation (II) design style. These proposals face two challenges. First, unlike the publish-subscribe paradigm where publisher and subscriber typically don\u27t share state, communicating via shared state is common in II programs. Second, type-and-effect systems that are generally designed for statically reasoning about a program\u27s execution are often too conservative to handle II that typically entails a virtual method invocation on zero or more dynamically registered handlers. To solve these problems, we present a novel hybrid type-and-effect system for exposing concurrency in programs that use II mechanisms. This type-and-effect system provides deadlock and data race freedom in such usage of II mechanisms. We have also implemented this type-and-effect system. An initial study shows its scalability benefits and acceptable costs

    Expression profiles of TRPV1, TRPV4, TLR4 and ERK1/2 in the dorsal root ganglionic neurons of a cancer-induced neuropathy rat model

    Full text link
    Background: The spread of tumors through neural routes is common in several types of cancer in which patients suffer from a moderate-to-severe neuropathy, neural damage and a distorted quality of life. Here we aim to examine the expression profiles of transient receptor potential vanilloid 1 (TRPV1) and of transient receptor potential vanilloid 4 (TRPV4), toll-like receptor 4 (TLR4) and extracellular signal-regulated kinase (ERK1/2), and to assess the possible therapeutic strategies through blockade of transient receptor potential (TRP) channels. Methods: Cancer was induced within the sciatic nerves of male Copenhagen rats, and tissues from dorsal root ganglia (DRG) were collected and used for measurements of immunofluorescence and Western blotting. The TRPV1 antagonist capsazepine, the selective TRPV4 antagonist HC-067047 and the calcium ions inhibitor ruthenium red were used to treat thermal and/or mechanical hyperalgesia. Results: Transient receptor potential vanilloid 1 showed a lower expression in DRGs on days 7 and 14. The expression of TRPV4, TLR4 and ERK1/2 showed an increase on day 3 then a decrease on days 7 and 14. TRPV1 and TLR4 as well as TRPV4 and ERK1/2 co-existed on the same neuronal cells. The neuropathic pain was reversed in dose-dependent manners by using the TRP antagonists and the calcium ions inhibitor. Conclusion: The decreased expression of TRPV1 and TRPV4 is associated with high activation. The increased expression of TLR4 and ERK1/2 reveals earlier immune response and tumor progression, respectively, and their ultimate decrease is an indicator of nerve damage. We studied the possible role of TRPV1 and TRPV4 in transducing cancer-induced hyperalgesia. The possible treatment strategies of cancer-induced thermal and/or mechanical hyperalgesia using capsazepine, HC-067047 and ruthenium red are examined.Comment: PMID: 29637027, PMCID: PMC588970

    Lightweight protection of cryptographic hardware accelerators against differential fault analysis

    Get PDF
    © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Hardware acceleration circuits for cryptographic algorithms are largely deployed in a wide range of products. The HW implementations of such algorithms often suffer from a number of vulnerabilities that expose systems to several attacks, e.g., differential fault analysis (DFA). The challenge for designers is to protect cryptographic accelerators in a cost-effective and power-efficient way. In this paper, we propose a lightweight technique for protecting hardware accelerators implementing AES and SHA-2 (which are two widely used NIST standards) against DFA. The proposed technique exploits partial redundancy to first detect the occurrence of a fault and then to react to the attack by obfuscating the output values. An experimental campaign demonstrated that the overhead introduced is 8.32% for AES and 3.88% for SHA-2 in terms of area, 0.81% for AES and 12.31% for SHA-2 in terms of power with no working frequency reduction. Moreover, a comparative analysis showed that our proposal outperforms the most recent related countermeasures.Peer ReviewedPostprint (author's final draft

    1961-1962 Xavier University Evening Division Bulletin Course Catalog

    Get PDF
    https://www.exhibit.xavier.edu/coursecatalog/1180/thumbnail.jp

    The Role of Uncertainty in the Term Structure of Interest Rates: A Macro-Finance Perspective

    Get PDF
    Using a macroeconomic perspective, we examine the effect of uncertainty arising from policy-shock volatility on yield-curve dynamics. Many macro-finance models assume that policy shocks are homoskedastic, while observed policy shock processes are significantly time varying and persistent. We allow for this key feature by constructing a no-arbitrage GARCH affine term structure model, in which monetary policy uncertainty is modeled as the conditional volatility of the error term in a Taylor rule. We find that monetary policy uncertainty increases the medium- and longer-term spreads in a model that incorporates macroeconomic dynamics.
    • …
    corecore