230 research outputs found

    The Strategic Justification for BGP

    Get PDF
    The Internet consists of many administrative domains, or \emph{Autonomous Systems} (ASes), each owned by an economic entity (Microsoft, AT\&T, The Hebrew University, etc.). The task of ensuring interconnectivity between ASes, known as \emph{interdomain routing}, is currently handled by the \emph{Border Gateway Protocol} (BGP). ASes are self-interested and might be willing to manipulate BGP for their benefit. In this paper we present the strategic justification for using BGP for interdomain routing in today's Internet: We show that, in the realistic Gao-Rexford setting, BGP is immune to almost all forms of rational manipulation by ASes, and can easily be made immune to all such manipulations. The Gao-Rexford setting is said to accurately depict the current commercial relations between ASes in the Internet. Formally, we prove that a slight modification of BGP is incentive-compatible in \emph{ex-post Nash equilibrium}. Moreover, we show that, if a certain reasonable condition holds, then this slightly modified BGP is also \emph{collusion-proof} in ex-post Nash -- i.e., immune to rational manipulations even by \emph{coalitions} of \emph{any} size. Unlike previous works on achieving incentive-compatibility in interdomain routing, our results \emph{do not require any monetary transfer between ASes} (as is the case in practice). We also strengthen the Gao-Rexford constraints by proving that one of the three constraints can actually be enforced by the rationality of ASes if the two other constraints hold

    The Uttilization of Jogja Smart Service Application: an E-Readiness Approach

    Get PDF
    This study will analyze the readiness of the Yogyakarta City Government in Jogja Smart Service services. This study will use the E-Readiness approach to measure government preparedness. The four indicators of the E-Readiness model are Policy, infrastructure, financial resources, and human resources. This research uses a qualitative approach. The findings show the Yogyakarta City Information and Bath Communication Office is ready in the implementation process in developing the concept of the smart city through the Jogja Smart service application. Policy readiness can be seen from the availability of the legal basis stated in Yogyakarta Mayor Regulation No. 15 of 2015 concerning e-Government and the decision of the mayor of Yogyakarta number 373 regarding the application of Jogja smart services related to the position, duties, and functions of technical managers. From the aspect of the development of Jogja Smart Service application infrastructure, it is ready to implement the application of Jogja smart service. It is intended that the infrastructure has been available from previous years. Overall readiness of musty budget resources can be seen from a very significant budget allocation from year to year where the application of these funds comes from the budget, and there is no allocation of funds from the private sector. If viewed from the aspect of internal human resources, there is still a lack of human resources in the field of programmers so that the government cooperates with programmers in developing Jogja Smart Service applications

    The Strategic Justification for BGP

    Get PDF
    The Internet consists of many administrative domains, or \emph{Autonomous Systems} (ASes), each owned by an economic entity (Microsoft, AT\&T, The Hebrew University, etc.). The task of ensuring interconnectivity between ASes, known as \emph{interdomain routing}, is currently handled by the \emph{Border Gateway Protocol} (BGP). ASes are self-interested and might be willing to manipulate BGP for their benefit. In this paper we present the strategic justification for using BGP for interdomain routing in today's Internet: We show that, in the realistic Gao-Rexford setting, BGP is immune to almost all forms of rational manipulation by ASes, and can easily be made immune to all such manipulations. The Gao-Rexford setting is said to accurately depict the current commercial relations between ASes in the Internet. Formally, we prove that a slight modification of BGP is incentive-compatible in \emph{ex-post Nash equilibrium}. Moreover, we show that, if a certain reasonable condition holds, then this slightly modified BGP is also \emph{collusion-proof} in ex-post Nash -- i.e., immune to rational manipulations even by \emph{coalitions} of \emph{any} size. Unlike previous works on achieving incentive-compatibility in interdomain routing, our results \emph{do not require any monetary transfer between ASes} (as is the case in practice). We also strengthen the Gao-Rexford constraints by proving that one of the three constraints can actually be enforced by the rationality of ASes if the two other constraints hold

    On the Semantics of Communicating Hardware Processes and their Translation into LOTOS for the Verification of Asynchronous Circuits with CADP

    Get PDF
    International audienceHardware process calculi, such as CHP (Communicating Hardware Processes), Balsa, or Haste (formerly Tangram), are a natural approach for the description of asynchronous hardware architectures. These calculi are extensions of standard process calculi with particular synchronisation features implemented using handshake protocols. In this article, we first give a structural operational semantics for value-passing CHP. Compared to the existing semantics of CHP defined by translation into Petri nets, our semantics is general enough to handle value-passing CHP with communication channels open to the environment, and is also independent of any particular (2- or 4-phase) handshake protocol used for circuit implementation. We then describe the translation of CHP into the process calculus LOTOS (ISO standard 8807), in order to allow asynchronous hardware architectures expressed in CHP to be verified using the CADP verification toolbox for LOTOS. A translator from CHP to LOTOS has been implemented and successfully used for the compositional verification of two industrial case studies, namely an asynchronous implementation of the DES (Data Encryption Standard) and an asynchronous interconnect of a NoC (Network on Chip)

    Development of a bioelectric nerve conduit using solenoid technology, and nano fabrication

    Get PDF
    Peripheral nerve repair outcomes have lagged behind comparable surgical techniques for many decades. A number of advanced approaches have been adopted over the last ten years. In particular the application of electrical stimulation during a repair is of great interest. It is clear that electrical stimulation of regenerating nerve tissue has a great many effects and can improve functional outcomes for patients. This work has focused on developing systems capable of applying accurate electric fields on the microscale within a biodegradable conduit, powered wirelessly. Experiments were conducted in vitro with a view to making progress towards an in vivo implementation. Electrical stimulation was applied to regenerating sensory neurons in vitro, from a rat dorsal root ganglion. Mechanical guidance cues aligned neurons towards different microelectrode configurations in order to record the effect of applied electrical stimulation. This was performed using custom stimulation modules. SU-8 microgrooves and Ti/Au electrodes acted as mechanical and electrical cues respectively. This method was employed to great effect, identifying the effect of a number of electrical stimulation parameters. This led to a stimulation protocol featuring a 1:4 duty cycle, 20 mV amplitude, 100 Hz sinusoidal signal. This produced a number of interesting effects, including neuronal turning and a barrier formation. These results, demonstrated at the cellular level using a custom device and an autonomous stimulation system illustrates progress towards an optimised electrical stimulation waveform for neuronal growth control. A novel transfer printing process was developed to produce patterned gold films on the biodegradable polymer, polycaprolactone. Patterned Au, 400 nm thick, was transferred to a sheet of the polymer, producing a 15 turn, spiral inductor. The inductor was then electroplated to a thickness of 30 ÎŒm and wire-bonded. Power and data were transferred wirelessly to the receiver circuit. Receiver circuits, connected to stimulation test modules in planar form, delivered electrical stimulation waveforms to regenerating sensory neurons on polycaprolactone. This stimulation resulted in confinement of the cells between two pairs of electrodes, demonstrating the efficacy of the novel receiver circuits. This was achieved with four electrodes in a twin-barrier configuration. These results illustrate progress towards implantation in vivo, using remotely powered electronics to guide regenerating neurons to their targets with microelectrodes. Sensing cell growth through changes in electrical impedance is a well-documented technique. A receiver inductor has been connected to caco-2 cells in culture. Power was transmitted to the receiver inductor through an inductive link. Changes in the cell-monolayer have been detected at the transmitter output circuit, showing that the impedance changes are of sufficient magnitude to be reflected to the transmitter. Trypsin or EDTA were added to confluent layers of caco-2 cells, detaching them from the surface of the microchannel electrode array. This detachment was seen at the transmitter in the form of transient voltage changes. Data was acquired in using Labview programming and PXI hardware systems. This work illustrates progress towards biodegradable, passive cell sensing inspired by radio frequency identification technology, and electric cell impedance sensing

    Planning Flood Control Measures by Digital Computer

    Get PDF
    The purpose of this study was to develop adequate guidelines whereby those interested in flood control planning would be able to apply a pair of digital computer programs known as the University of Kentucky Flood Control Planning Programs to ease the computational burden of evaluating specific flood control situations. Program II determines the economically optimum combination of channel improvement, land use restriction, and flood proofing for flood damage abatement. Program III also incorporates reservoir storage into the planning process. The Programs are not intended to provide a finished design but rather to select the optimum combination of flood control measures and residual flooding with regard to both time and space. Application of Computer Programs to flood control planning is guided by presenting first a general description of the application process then a detailed description of the input required and the output produced by the Planning Programs. Input was developed and results interpreted to determine the optimum flood control plan for the upper reaches of the North Fork of the Kentucky River near Hazard, Kentucky

    Tracing the Compositional Process. Sound art that rewrites its own past: formation, praxis and a computer framework

    Get PDF
    The domain of this thesis is electroacoustic computer-based music and sound art. It investigates a facet of composition which is often neglected or ill-defined: the process of composing itself and its embedding in time. Previous research mostly focused on instrumental composition or, when electronic music was included, the computer was treated as a tool which would eventually be subtracted from the equation. The aim was either to explain a resultant piece of music by reconstructing the intention of the composer, or to explain human creativity by building a model of the mind. Our aim instead is to understand composition as an irreducible unfolding of material traces which takes place in its own temporality. This understanding is formalised as a software framework that traces creation time as a version graph of transactions. The instantiation and manipulation of any musical structure implemented within this framework is thereby automatically stored in a database. Not only can it be queried ex post by an external researcher—providing a new quality for the empirical analysis of the activity of composing—but it is an integral part of the composition environment. Therefore it can recursively become a source for the ongoing composition and introduce new ways of aesthetic expression. The framework aims to unify creation and performance time, fixed and generative composition, human and algorithmic “writing”, a writing that includes indeterminate elements which condense as concurrent vertices in the version graph. The second major contribution is a critical epistemological discourse on the question of ob- servability and the function of observation. Our goal is to explore a new direction of artistic research which is characterised by a mixed methodology of theoretical writing, technological development and artistic practice. The form of the thesis is an exercise in becoming process-like itself, wherein the epistemic thing is generated by translating the gaps between these three levels. This is my idea of the new aesthetics: That through the operation of a re-entry one may establish a sort of process “form”, yielding works which go beyond a categorical either “sound-in-itself” or “conceptualism”. Exemplary processes are revealed by deconstructing a series of existing pieces, as well as through the successful application of the new framework in the creation of new pieces
    • 

    corecore