153,517 research outputs found

    Conservation Contracting in Heterogeneous Landscapes: an application to watershed protection with threshold constraints

    Get PDF
    A key issue in the design of land use policy is how to integrate information about spatially variable biophysical and economic conditions into a cost-effective conservation plan. Using common biophysical scoring methods, in combination with economic data and simple optimization methods, we illustrate how one can identify a set of priority land parcels for conservation investment. We also demonstrate a way in which conservation agencies can incorporate concerns about biophysical thresholds in the identification of their priority land parcels. We apply these methods using Geographic Information System data from a New York conservation easement acquisition initiative for water quality protection. Working Paper # 2002-01

    All Politics is Local: The Renminbi's Prospects as a Future Global Currency

    Get PDF
    . In this article we describe methods for improving the RWTH German speech recognizer used within the VERBMOBIL project. In particular, we present acceleration methods for the search based on both within-word and across-word phoneme models. We also study incremental methods to reduce the response time of the online speech recognizer. Finally, we present experimental off-line results for the three VERBMOBIL scenarios. We report on word error rates and real-time factors for both speaker independent and speaker dependent recognition. 1 Introduction The goal of the VERBMOBIL project is to develop a speech-to-speech translation system that performs close to real-time. In this system, speech recognition is followed by subsequent VERBMOBIL modules (like syntactic analysis and translation) which depend on the recognition result. Therefore, in this application it is particularly important to keep the recognition time as short as possible. There are VERBMOBIL modules which are capable to work ..

    From Personal Memories to Sharable Memories

    Get PDF
    The exchange of personal experiences is a way of supporting decision making and interpersonal communication. In this article, we discuss how augmented personal memories could be exploited in order to support such a sharing. We start with a brief summary of a system implementing an augmented memory for a single user. Then, we exploit results from interviews to define an example scenario involving sharable memories. This scenario serves as background for a discussion of various questions related to sharing memories and potential approaches to their solution. We especially focus on the selection of relevant experiences and sharing partners, sharing methods, and the configuration of those sharing methods by means of reflection

    How was it for you? Experiences of participatory design in the UK health service

    Get PDF
    Improving co-design methods implies that we need to understand those methods, paying attention to not only the effect of method choices on design outcomes, but also how methods affect the people involved in co-design. In this article, we explore participants' experiences from a year-long participatory health service design project to develop ‘Better Outpatient Services for Older People’. The project followed a defined method called experience-based design (EBD), which represented the state of the art in participatory service design within the UK National Health Service. A sample of participants in the project took part in semi-structured interviews reflecting on their involvement in and their feelings about the project. Our findings suggest that the EBD method that we employed was successful in establishing positive working relationships among the different groups of stakeholders (staff, patients, carers, advocates and design researchers), although conflicts remained throughout the project. Participants' experiences highlighted issues of wider relevance in such participatory design: cost versus benefit, sense of project momentum, locus of control, and assumptions about how change takes place in a complex environment. We propose tactics for dealing with these issues that inform the future development of techniques in user-centred healthcare design

    The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

    Full text link
    Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation - something not exposed on commodity 802.11 devices - or valid RSSI observations from multiple trusted sources, e.g., corporate access points - something not directly available in ad hoc and delay-tolerant networks with potentially malicious neighbors. We extend these techniques to be practical for wireless ad hoc networks of commodity 802.11 devices. Specifically, we propose two efficient methods for separating the valid RSSI observations of behaving nodes from those falsified by malicious participants. Further, we note that prior signalprint methods are easily defeated by mobile attackers and develop an appropriate challenge-response defense. Finally, we present the Mason test, the first implementation of these techniques for ad hoc and delay-tolerant networks of commodity 802.11 devices. We illustrate its performance in several real-world scenarios
    corecore