230 research outputs found
The Strategic Justification for BGP
The Internet consists of many administrative domains, or
\emph{Autonomous Systems} (ASes), each owned by an economic entity
(Microsoft, AT\&T, The Hebrew University, etc.). The task of
ensuring interconnectivity between ASes, known as \emph{interdomain
routing}, is currently handled by the \emph{Border Gateway Protocol}
(BGP).
ASes are self-interested and might be willing to manipulate BGP for
their benefit. In this paper we present the strategic justification
for using BGP for interdomain routing in today's Internet: We show
that, in the realistic Gao-Rexford setting, BGP is immune to almost
all forms of rational manipulation by ASes, and can easily be made
immune to all such manipulations. The Gao-Rexford setting is said to
accurately depict the current commercial relations between ASes in
the Internet. Formally, we prove that a slight modification of BGP
is incentive-compatible in \emph{ex-post Nash equilibrium}.
Moreover, we show that, if a certain reasonable condition holds,
then this slightly modified BGP is also \emph{collusion-proof} in
ex-post Nash -- i.e., immune to rational manipulations even by
\emph{coalitions} of \emph{any} size.
Unlike previous works on achieving incentive-compatibility in
interdomain routing, our results \emph{do not require any monetary
transfer between ASes} (as is the case in practice). We also
strengthen the Gao-Rexford constraints by proving that one of the
three constraints can actually be enforced by the rationality of
ASes if the two other constraints hold
The Uttilization of Jogja Smart Service Application: an E-Readiness Approach
This study will analyze the readiness of the Yogyakarta City Government in Jogja Smart Service services. This study will use the E-Readiness approach to measure government preparedness. The four indicators of the E-Readiness model are Policy, infrastructure, financial resources, and human resources. This research uses a qualitative approach. The findings show the Yogyakarta City Information and Bath Communication Office is ready in the implementation process in developing the concept of the smart city through the Jogja Smart service application. Policy readiness can be seen from the availability of the legal basis stated in Yogyakarta Mayor Regulation No. 15 of 2015 concerning e-Government and the decision of the mayor of Yogyakarta number 373 regarding the application of Jogja smart services related to the position, duties, and functions of technical managers. From the aspect of the development of Jogja Smart Service application infrastructure, it is ready to implement the application of Jogja smart service. It is intended that the infrastructure has been available from previous years. Overall readiness of musty budget resources can be seen from a very significant budget allocation from year to year where the application of these funds comes from the budget, and there is no allocation of funds from the private sector. If viewed from the aspect of internal human resources, there is still a lack of human resources in the field of programmers so that the government cooperates with programmers in developing Jogja Smart Service applications
The Strategic Justification for BGP
The Internet consists of many administrative domains, or
\emph{Autonomous Systems} (ASes), each owned by an economic entity
(Microsoft, AT\&T, The Hebrew University, etc.). The task of
ensuring interconnectivity between ASes, known as \emph{interdomain
routing}, is currently handled by the \emph{Border Gateway Protocol}
(BGP).
ASes are self-interested and might be willing to manipulate BGP for
their benefit. In this paper we present the strategic justification
for using BGP for interdomain routing in today's Internet: We show
that, in the realistic Gao-Rexford setting, BGP is immune to almost
all forms of rational manipulation by ASes, and can easily be made
immune to all such manipulations. The Gao-Rexford setting is said to
accurately depict the current commercial relations between ASes in
the Internet. Formally, we prove that a slight modification of BGP
is incentive-compatible in \emph{ex-post Nash equilibrium}.
Moreover, we show that, if a certain reasonable condition holds,
then this slightly modified BGP is also \emph{collusion-proof} in
ex-post Nash -- i.e., immune to rational manipulations even by
\emph{coalitions} of \emph{any} size.
Unlike previous works on achieving incentive-compatibility in
interdomain routing, our results \emph{do not require any monetary
transfer between ASes} (as is the case in practice). We also
strengthen the Gao-Rexford constraints by proving that one of the
three constraints can actually be enforced by the rationality of
ASes if the two other constraints hold
On the Semantics of Communicating Hardware Processes and their Translation into LOTOS for the Verification of Asynchronous Circuits with CADP
International audienceHardware process calculi, such as CHP (Communicating Hardware Processes), Balsa, or Haste (formerly Tangram), are a natural approach for the description of asynchronous hardware architectures. These calculi are extensions of standard process calculi with particular synchronisation features implemented using handshake protocols. In this article, we first give a structural operational semantics for value-passing CHP. Compared to the existing semantics of CHP defined by translation into Petri nets, our semantics is general enough to handle value-passing CHP with communication channels open to the environment, and is also independent of any particular (2- or 4-phase) handshake protocol used for circuit implementation. We then describe the translation of CHP into the process calculus LOTOS (ISO standard 8807), in order to allow asynchronous hardware architectures expressed in CHP to be verified using the CADP verification toolbox for LOTOS. A translator from CHP to LOTOS has been implemented and successfully used for the compositional verification of two industrial case studies, namely an asynchronous implementation of the DES (Data Encryption Standard) and an asynchronous interconnect of a NoC (Network on Chip)
Development of a bioelectric nerve conduit using solenoid technology, and nano fabrication
Peripheral nerve repair outcomes have lagged behind comparable surgical techniques for many decades. A number of advanced approaches have been adopted over the last ten years. In particular the application of electrical stimulation during a repair is of great interest. It is clear that electrical stimulation of regenerating nerve tissue has a great many effects and can improve functional outcomes for patients. This work has focused on developing systems capable of applying accurate electric fields on the microscale within a biodegradable conduit, powered wirelessly. Experiments were conducted in vitro with a view to making progress towards an in vivo implementation.
Electrical stimulation was applied to regenerating sensory neurons in vitro, from a rat dorsal root ganglion. Mechanical guidance cues aligned neurons towards different microelectrode configurations in order to record the effect of applied electrical stimulation. This was performed using custom stimulation modules. SU-8 microgrooves and Ti/Au electrodes acted as mechanical and electrical cues respectively. This method was employed to great effect, identifying the effect of a number of electrical stimulation parameters. This led to a stimulation protocol featuring a 1:4 duty cycle, 20 mV amplitude, 100 Hz sinusoidal signal. This produced a number of interesting effects, including neuronal turning and a barrier formation. These results, demonstrated at the cellular level using a custom device and an autonomous stimulation system illustrates progress towards an optimised electrical stimulation waveform for neuronal growth control.
A novel transfer printing process was developed to produce patterned gold films on the biodegradable polymer, polycaprolactone. Patterned Au, 400 nm thick, was transferred to a sheet of the polymer, producing a 15 turn, spiral inductor. The inductor was then electroplated to a thickness of 30 ÎŒm and wire-bonded. Power and data were transferred wirelessly to the receiver circuit. Receiver circuits, connected to stimulation test modules in planar form, delivered electrical stimulation waveforms to regenerating sensory neurons on polycaprolactone. This stimulation resulted in confinement of the cells between two pairs of electrodes, demonstrating the efficacy of the novel receiver circuits. This was achieved with four electrodes in a twin-barrier configuration. These results illustrate progress towards implantation in vivo, using remotely powered electronics to guide regenerating neurons to their targets with microelectrodes.
Sensing cell growth through changes in electrical impedance is a well-documented technique. A receiver inductor has been connected to caco-2 cells in culture. Power was transmitted to the receiver inductor through an inductive link. Changes in the cell-monolayer have been detected at the transmitter output circuit, showing that the impedance changes are of sufficient magnitude to be reflected to the transmitter. Trypsin or EDTA were added to confluent layers of caco-2 cells, detaching them from the surface of the microchannel electrode array. This detachment was seen at the transmitter in the form of transient voltage changes. Data was acquired in using Labview programming and PXI hardware systems. This work illustrates progress towards biodegradable, passive cell sensing inspired by radio frequency identification technology, and electric cell impedance sensing
Planning Flood Control Measures by Digital Computer
The purpose of this study was to develop adequate guidelines whereby those interested in flood control planning would be able to apply a pair of digital computer programs known as the University of Kentucky Flood Control Planning Programs to ease the computational burden of evaluating specific flood control situations. Program II determines the economically optimum combination of channel improvement, land use restriction, and flood proofing for flood damage abatement. Program III also incorporates reservoir storage into the planning process. The Programs are not intended to provide a finished design but rather to select the optimum combination of flood control measures and residual flooding with regard to both time and space.
Application of Computer Programs to flood control planning is guided by presenting first a general description of the application process then a detailed description of the input required and the output produced by the Planning Programs. Input was developed and results interpreted to determine the optimum flood control plan for the upper reaches of the North Fork of the Kentucky River near Hazard, Kentucky
Tracing the Compositional Process. Sound art that rewrites its own past: formation, praxis and a computer framework
The domain of this thesis is electroacoustic computer-based music and sound art. It investigates
a facet of composition which is often neglected or ill-defined: the process of composing itself
and its embedding in time. Previous research mostly focused on instrumental composition or,
when electronic music was included, the computer was treated as a tool which would eventually
be subtracted from the equation. The aim was either to explain a resultant piece of music by
reconstructing the intention of the composer, or to explain human creativity by building a model
of the mind.
Our aim instead is to understand composition as an irreducible unfolding of material traces which
takes place in its own temporality. This understanding is formalised as a software framework
that traces creation time as a version graph of transactions. The instantiation and manipulation
of any musical structure implemented within this framework is thereby automatically stored
in a database. Not only can it be queried ex post by an external researcherâproviding a new
quality for the empirical analysis of the activity of composingâbut it is an integral part of
the composition environment. Therefore it can recursively become a source for the ongoing
composition and introduce new ways of aesthetic expression. The framework aims to unify
creation and performance time, fixed and generative composition, human and algorithmic
âwritingâ, a writing that includes indeterminate elements which condense as concurrent vertices
in the version graph.
The second major contribution is a critical epistemological discourse on the question of ob-
servability and the function of observation. Our goal is to explore a new direction of artistic
research which is characterised by a mixed methodology of theoretical writing, technological
development and artistic practice. The form of the thesis is an exercise in becoming process-like
itself, wherein the epistemic thing is generated by translating the gaps between these three levels.
This is my idea of the new aesthetics: That through the operation of a re-entry one may establish
a sort of process âformâ, yielding works which go beyond a categorical either âsound-in-itselfâ
or âconceptualismâ.
Exemplary processes are revealed by deconstructing a series of existing pieces, as well as
through the successful application of the new framework in the creation of new pieces
- âŠ