76,823 research outputs found

    Graffiti Networks: A Subversive, Internet-Scale File Sharing Model

    Full text link
    The proliferation of peer-to-peer (P2P) file sharing protocols is due to their efficient and scalable methods for data dissemination to numerous users. But many of these networks have no provisions to provide users with long term access to files after the initial interest has diminished, nor are they able to guarantee protection for users from malicious clients that wish to implicate them in incriminating activities. As such, users may turn to supplementary measures for storing and transferring data in P2P systems. We present a new file sharing paradigm, called a Graffiti Network, which allows peers to harness the potentially unlimited storage of the Internet as a third-party intermediary. Our key contributions in this paper are (1) an overview of a distributed system based on this new threat model and (2) a measurement of its viability through a one-year deployment study using a popular web-publishing platform. The results of this experiment motivate a discussion about the challenges of mitigating this type of file sharing in a hostile network environment and how web site operators can protect their resources

    The state of peer-to-peer network simulators

    Get PDF
    Networking research often relies on simulation in order to test and evaluate new ideas. An important requirement of this process is that results must be reproducible so that other researchers can replicate, validate and extend existing work. We look at the landscape of simulators for research in peer-to-peer (P2P) networks by conducting a survey of a combined total of over 280 papers from before and after 2007 (the year of the last survey in this area), and comment on the large quantity of research using bespoke, closed-source simulators. We propose a set of criteria that P2P simulators should meet, and poll the P2P research community for their agreement. We aim to drive the community towards performing their experiments on simulators that allow for others to validate their results

    Conceptual modelling to assess how the interplay of hydrological connectivity, catchment storage and tracer dynamics controls nonstationary water age estimates

    Get PDF
    Acknowledgements We would like to gratefully acknowledge the data provided by SEPA, Iain Malcolm. Mark Speed, Susan Waldron and many MSS staff helped with sample collection and lab analysis. We thank the European Research Council (project GA 335910 VEWA) for funding and are grateful for the constructive comments provided by three anonymous reviewers.Peer reviewedPostprin

    Overlay networks for smart grids

    Get PDF

    Modeling Spatial Soil Water Dynamics in a Tropical Floodplain, East Africa

    Get PDF
    Analyzing the spatial and temporal distribution of soil moisture is critical for ecohydrological processes and for sustainable water management studies in wetlands. The characterization of soil moisture dynamics and its influencing factors in agriculturally used wetlands pose a challenge in data-scarce regions such as East Africa. High resolution and good-quality time series soil moisture data are rarely available and gaps are frequent due to measurement constraints and device malfunctioning. Soil water models that integrate meteorological conditions and soil water storage may significantly overcome limitations due to data gaps at a point scale. The purpose of this study was to evaluate if the Hydrus-1D model would adequately simulate soil water dynamics at different hydrological zones of a tropical floodplain in Tanzania, to determine controlling factors for wet and dry periods and to assess soil water availability. The zones of the Kilombero floodplain were segmented as riparian, middle, and fringe along a defined transect. The model was satisfactorily calibrated (coefficient of determination; R2 = 0.54–0.92, root mean square error; RMSE = 0.02–0.11) on a plot scale using measured soil moisture content at soil depths of 10, 20, 30, and 40 cm. Satisfying statistical measures (R2 = 0.36–0.89, RMSE = 0.03–0.13) were obtained when calibrations for one plot were validated with measured soil moisture for another plot within the same hydrological zone. Results show the transferability of the calibrated Hydrus-1D model to predict soil moisture for other plots with similar hydrological conditions. Soil water storage increased towards the riparian zone, at 262.8 mm/a while actual evapotranspiration was highest (1043.9 mm/a) at the fringe. Overbank flow, precipitation, and groundwater control soil moisture dynamics at the riparian and middle zone, while at the fringe zone, rainfall and lateral flow from mountains control soil moisture during the long rainy seasons. In the dry and short rainy seasons, rainfall, soil properties, and atmospheric demands control soil moisture dynamics at the riparian and middle zone. In addition to these factors, depths to groundwater level control soil moisture variability at the fringe zone. Our results support a better understanding of groundwater-soil water interaction, and provide references for wetland conservation and sustainable agricultural water management

    Correlated Resource Models of Internet End Hosts

    Get PDF
    Understanding and modelling resources of Internet end hosts is essential for the design of desktop software and Internet-distributed applications. In this paper we develop a correlated resource model of Internet end hosts based on real trace data taken from the SETI@home project. This data covers a 5-year period with statistics for 2.7 million hosts. The resource model is based on statistical analysis of host computational power, memory, and storage as well as how these resources change over time and the correlations between them. We find that resources with few discrete values (core count, memory) are well modeled by exponential laws governing the change of relative resource quantities over time. Resources with a continuous range of values are well modeled with either correlated normal distributions (processor speed for integer operations and floating point operations) or log-normal distributions (available disk space). We validate and show the utility of the models by applying them to a resource allocation problem for Internet-distributed applications, and demonstrate their value over other models. We also make our trace data and tool for automatically generating realistic Internet end hosts publicly available

    Sensor-Based Safety Performance Assessment of Individual Construction Workers

    Get PDF
    Over the last decade, researchers have explored various technologies and methodologies to enhance worker safety at construction sites. The use of advanced sensing technologies mainly has focused on detecting and warning about safety issues by directly relying on the detection capabilities of these technologies. Until now, very little research has explored methods to quantitatively assess individual workers’ safety performance. For this, this study uses a tracking system to collect and use individuals’ location data in the proposed safety framework. A computational and analytical procedure/model was developed to quantify the safety performance of individual workers beyond detection and warning. The framework defines parameters for zone-based safety risks and establishes a zone-based safety risk model to quantify potential risks to workers. To demonstrate the model of safety analysis, the study conducted field tests at different construction sites, using various interaction scenarios. Probabilistic evaluation showed a slight underestimation and overestimation in certain cases; however, the model represented the overall safety performance of a subject quite well. Test results showed clear evidence of the model’s ability to capture safety conditions of workers in pre-identified hazard zones. The developed approach presents a way to provide visualized and quantified information as a form of safety index, which has not been available in the industry. In addition, such an automated method may present a suitable safety monitoring method that can eliminate human deployment that is expensive, error-prone, and time-consuming
    corecore