12,934 research outputs found

    `The counterfeit silly curr`: money, politics and the forging of royalist newspapers in the English civil war

    Get PDF

    Spartan Daily, May 14, 1962

    Get PDF
    Volume 49, Issue 118https://scholarworks.sjsu.edu/spartandaily/4305/thumbnail.jp

    Efficiency, Equity, and Timing in Voting Mechanisms

    Get PDF
    We compare the behavior of voters, depending on whether they operate under sequential and simultaneous voting rules, when voting is costly and information is incomplete. In many real political institutions, ranging from small committees to mass elections, voting is sequential, which allows some voters to know the choices of earlier voters. For a styl- ized model, we characterize the equilibria for this rule, and compare it to simultaneous voting, and show how these equilibria vary for di¤erent voting costs. This generates a variety of predictions about the relative e¢ ciency and equity of these two systems, which we test using controlled laboratory experiments. Most of the qualitative predictions are supported by the data, but there are signi?cant departures from the predicted equilib- rium strategies, in both the sequential and sumultanous voting games. We ?nd a tradeo¤ between information aggregation, e¢ ciency, and equity in sequential voting: a sequential voting rule aggregates information better, and produces more e¢ cient outcomes on aver- age, compared to simultaneous voting, but sequential voting leads to signi?cant inequities, with later voters ben?tting at the expense of early voters.

    Botnet Detection using Social Graph Analysis

    Get PDF
    Signature-based botnet detection methods identify botnets by recognizing Command and Control (C\&C) traffic and can be ineffective for botnets that use new and sophisticate mechanisms for such communications. To address these limitations, we propose a novel botnet detection method that analyzes the social relationships among nodes. The method consists of two stages: (i) anomaly detection in an "interaction" graph among nodes using large deviations results on the degree distribution, and (ii) community detection in a social "correlation" graph whose edges connect nodes with highly correlated communications. The latter stage uses a refined modularity measure and formulates the problem as a non-convex optimization problem for which appropriate relaxation strategies are developed. We apply our method to real-world botnet traffic and compare its performance with other community detection methods. The results show that our approach works effectively and the refined modularity measure improves the detection accuracy.Comment: 7 pages. Allerton Conferenc

    Spartan Daily, March 26, 1958

    Get PDF
    Volume 45, Issue 98https://scholarworks.sjsu.edu/spartandaily/12590/thumbnail.jp

    I-O Psychology in Aotearoa, New Zealand: A world away?

    Get PDF
    Industrial-organizational psychology has had a fairly long history in this country, dating back to around the 1920s (Jamieson & Paterson, 1993). To a large extent the field developed initially within universities, although the focus of I-O psychologists’ activities in this country has always been very applied. Inclusion of I-O psychology in university curricula originally started at the University of Canterbury (in the south island) and then Massey University (in the north island); now two other universities (University of Auckland and University of Waikato, both in the north island) also provide training programs in the field. There are about a dozen academics in psychology departments who would consider themselves to be I-O psychologists, and a small handful in management or HRM departments. Clearly the number of academics specializing in this field is very small. Although this poses challenges for the development of I-O psychology in Aotearoa New Zealand, at the same time it helps communication among us

    ACRL New England Chapter News (June 2014)

    Get PDF
    corecore