7,322 research outputs found
Binary data corruption due to a Brownian agent
We introduce a model of binary data corruption induced by a Brownian agent
(active random walker) on a d-dimensional lattice. A continuum formulation
allows the exact calculation of several quantities related to the density of
corrupted bits \rho; for example the mean of \rho, and the density-density
correlation function. Excellent agreement is found with the results from
numerical simulations. We also calculate the probability distribution of \rho
in d=1, which is found to be log-normal, indicating that the system is governed
by extreme fluctuations.Comment: 39 pages, 10 figures, RevTe
The Corruption Game: Health Systems, International Agencies, and the State in South Asia
Drawing on ethnographic material collected in Pakistan, India, and Nepal, this
article analyzes patterns of corruption in vaccination programs in South Asia. Corrupt
practices—which required substantial work—were deeply shaped by both the
money and systems of accountability of the global health system. Bilateral and multilateral
donors provided substantial funding for immunization programs across
South Asia. International agencies and governments instituted systems of accountability,
including documentation requirements and a parallel UN bureaucracy in
problematic districts, to try to ensure that health workers did what they wanted.
Some immunization program staff skillfully bent these systems of accountability to
their own ends, diverting vaccination funding into their own pockets. Corruption
operates not in opposition to the official rules, but in spaces opened up by them.
These practices sometimes transform Weber’s rational bureaucracy into a sophisticated
game with many players, whose aims are more complex than the stated goals
of the bureaucracy
Measuring information security breach impact and uncertainties under various information sharing scenarios
This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain performance. We find that the supply chain behaves differently under various levels of integration when a security breach occurs. The entropy analysis revealed that the wholesaler experience the most uncertainty under system failure and data corruption. This sort of impact-uncertainty information will aid in designing and managing a resilient supply chain poised for minimal breach impact
Tools for modelling and simulating migration-based preservation
This report describes two tools for modelling and simulating the costs and risks of using IT storage systems for the long-term archiving of file-based AV assets. The tools include a model of storage costs, the ingest and access of files, the possibility of data corruption and loss from a range of mechanisms, and the impact of having limited resources with which to fulfill access requests and preservation actions. Applications include archive planning, development of a technology strategy, cost estimation for business planning, operational decision support, staff training and generally promoting awareness of the issues and challenges archives face in digital preservation
- …