1,147,907 research outputs found

    Comparative Evaluation of Packet Classification Algorithms for Implementation on Resource Constrained Systems

    Get PDF
    This paper provides a comparative evaluation of a number of known classification algorithms that have been considered for both software and hardware implementation. Differently from other sources, the comparison has been carried out on implementations based on the same principles and design choices. Performance measurements are obtained by feeding the implemented classifiers with various traffic traces in the same test scenario. The comparison also takes into account implementation feasibility of the considered algorithms in resource constrained systems (e.g. embedded processors on special purpose network platforms). In particular, the comparison focuses on achieving a good compromise between performance, memory usage, flexibility and code portability to different target platforms

    Duplexing methods for PON systems using multimode fiber with multicarrier transmission

    Get PDF
    Deploying a PON using multimode fiber in the access network is viewed as a costeffective solution. However, a multimode fiber link exhibits a time-dispersive nature. To cope with this problem, an OFDM transmission method is used. In this work, a comparison study on several duplexing methods for this system was performed to decide upon the recommended method for the system. The choices that were examined are: TDD, FDD, WDD and SDD (time-, frequency-, wavelength- and space- division duplexing). Based on the following criteria: channel characterization, flexible bandwidth proportion, crosstalk & beat noise impairment, components-saving and system capacity, it was concluded that SDD is the most feasible one among other choices, immediately followed by WDD

    Simulatable security for quantum protocols

    Full text link
    The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.Comment: Added proof of combination lemma; added comparison to the model of Ben-Or, Mayers; minor correction

    Fair Wages When Employers Face the Risk of Losing Money

    Get PDF
    We study the behavior of employers and employees in a gift exchange game and find that employers offer lower wages when there is the risk of losing money. This, however, does not lead to lower effort level choices. In fact, effort per wage unit is significantly higher in the treatment with potential employer losses. This result can be in line with social comparison theories that are based on relative payoff differences. Alternatively, this result is also in line with the hypothesis that the risk of losing money increases the credibility of the employer's trust signal and, thus, the employee's reciprocity.fair wage, efficiency wage, social comparison, loss aversion

    Sustainability strategies for organic food and farming

    Get PDF
    Local organic food should be an accessible alternative, both concerning availability and price, for a citizen-consumer influencing through food choices, and for the rural poor. This sets a challenge to the politicians, as also addressed in the European Action Plan for Organic Food and Farming. Its is based on two pillars - consumer markets and public goods, and conclusively on two payers. The society pays through allocation of subsidizes and taxes as well as through legislation, which regulate the price relations. The economic interventions by society increase the equity and access to food in comparison to a price premium

    A Next-to-Leading-Order Study of Dihadron Production

    Get PDF
    The production of pairs of hadrons in hadronic collisions is studied using a next-to-leading-order Monte Carlo program based on the phase space slicing technique. Up-to-date fragmentation functions based on fits to LEP data are employed, together with several versions of current parton distribution functions. Good agreement is found with data for the dihadron mass distribution. A comparison is also made with data for the dihadron angular distribution. The scale dependence of the predictions and the dependence on the choices made for the fragmentation and parton distribution functions are also presented. The good agreement between theory and experiment is contrasted to the case for single π0\pi^0 production where significant deviations between theory and experiment have been observed.Comment: 22 pages, 15 figures; 3 references added, one figure modified for clarit
    • 

    corecore