1,147,907 research outputs found
Comparative Evaluation of Packet Classification Algorithms for Implementation on Resource Constrained Systems
This paper provides a comparative evaluation of a number of known classification algorithms that have been considered for both software and hardware implementation. Differently from other sources, the comparison has been carried out on implementations based on the same principles and design choices. Performance measurements are obtained by feeding the implemented classifiers with various traffic traces in the same test scenario. The comparison also takes into account implementation feasibility of the considered algorithms in resource constrained systems (e.g. embedded processors on special purpose network platforms). In particular, the comparison focuses on achieving a good compromise between performance, memory usage, flexibility and code portability to different target platforms
Duplexing methods for PON systems using multimode fiber with multicarrier transmission
Deploying a PON using multimode fiber in the access network is viewed as a costeffective solution. However, a multimode fiber link exhibits a time-dispersive nature. To cope with this problem, an OFDM transmission method is used. In this work, a comparison study on several duplexing methods for this system was performed to decide upon the recommended method for the system. The choices that were examined are: TDD, FDD, WDD and SDD (time-, frequency-, wavelength- and space- division duplexing). Based on the following criteria: channel characterization, flexible bandwidth proportion, crosstalk & beat noise impairment, components-saving and system capacity, it was concluded that SDD is the most feasible one among other choices, immediately followed by WDD
Simulatable security for quantum protocols
The notion of simulatable security (reactive simulatability, universal
composability) is a powerful tool for allowing the modular design of
cryptographic protocols (composition of protocols) and showing the security of
a given protocol embedded in a larger one. Recently, these methods have
received much attention in the quantum cryptographic community.
We give a short introduction to simulatable security in general and proceed
by sketching the many different definitional choices together with their
advantages and disadvantages.
Based on the reactive simulatability modelling of Backes, Pfitzmann and
Waidner we then develop a quantum security model. By following the BPW
modelling as closely as possible, we show that composable quantum security
definitions for quantum protocols can strongly profit from their classical
counterparts, since most of the definitional choices in the modelling are
independent of the underlying machine model.
In particular, we give a proof for the simple composition theorem in our
framework.Comment: Added proof of combination lemma; added comparison to the model of
Ben-Or, Mayers; minor correction
Fair Wages When Employers Face the Risk of Losing Money
We study the behavior of employers and employees in a gift exchange game and find that employers offer lower wages when there is the risk of losing money. This, however, does not lead to lower effort level choices. In fact, effort per wage unit is significantly higher in the treatment with potential employer losses. This result can be in line with social comparison theories that are based on relative payoff differences. Alternatively, this result is also in line with the hypothesis that the risk of losing money increases the credibility of the employer's trust signal and, thus, the employee's reciprocity.fair wage, efficiency wage, social comparison, loss aversion
Sustainability strategies for organic food and farming
Local organic food should be an accessible alternative, both concerning availability and price, for a citizen-consumer influencing through food choices, and for the rural poor. This sets a challenge to the politicians, as also addressed in the European Action Plan for Organic Food and Farming. Its is based on two pillars - consumer markets and public goods, and conclusively on two payers. The society pays through allocation of subsidizes and taxes as well as through legislation, which regulate the price relations. The economic interventions by society increase the equity and access to food in comparison to a price premium
A Next-to-Leading-Order Study of Dihadron Production
The production of pairs of hadrons in hadronic collisions is studied using a
next-to-leading-order Monte Carlo program based on the phase space slicing
technique. Up-to-date fragmentation functions based on fits to LEP data are
employed, together with several versions of current parton distribution
functions. Good agreement is found with data for the dihadron mass
distribution. A comparison is also made with data for the dihadron angular
distribution. The scale dependence of the predictions and the dependence on the
choices made for the fragmentation and parton distribution functions are also
presented. The good agreement between theory and experiment is contrasted to
the case for single production where significant deviations between
theory and experiment have been observed.Comment: 22 pages, 15 figures; 3 references added, one figure modified for
clarit
- âŠ