113,643 research outputs found

    A Protocol for the Atomic Capture of Multiple Molecules at Large Scale

    Get PDF
    With the rise of service-oriented computing, applications are more and more based on coordination of autonomous services. Envisioned over largely distributed and highly dynamic platforms, expressing this coordination calls for alternative programming models. The chemical programming paradigm, which models applications as chemical solutions where molecules representing digital entities involved in the computation, react together to produce a result, has been recently shown to provide the needed abstractions for autonomic coordination of services. However, the execution of such programs over large scale platforms raises several problems hindering this paradigm to be actually leveraged. Among them, the atomic capture of molecules participating in concur- rent reactions is one of the most significant. In this paper, we propose a protocol for the atomic capture of these molecules distributed and evolving over a large scale platform. As the density of possible reactions is crucial for the liveness and efficiency of such a capture, the protocol proposed is made up of two sub-protocols, each of them aimed at addressing different levels of densities of potential reactions in the solution. While the decision to choose one or the other is local to each node participating in a program's execution, a global coherent behaviour is obtained. Proof of liveness, as well as intensive simulation results showing the efficiency and limited overhead of the protocol are given.Comment: 13th International Conference on Distributed Computing and Networking (2012

    Individual Consequences of Monitoring Under Gainsharing: Expanding Agency Theory Predictions

    Get PDF
    Agency theory suggests that gainsharing produces changes in monitoring within teams, however, the implications of monitoring on individual behavior have not yet been examined. This research expands agency theory by exploring the behavioral implications of peer monitoring under gainsharing. Performance data from both individual workers and managers show that peer monitoring has either zero or positive effects on five categories of individual behavior. However, focus group, interview, and company generated survey data indicate the existence of concealment and perhaps retaliatory behaviors in response to gainsharing

    Personal Volunteer Computing

    Full text link
    We propose personal volunteer computing, a novel paradigm to encourage technical solutions that leverage personal devices, such as smartphones and laptops, for personal applications that require significant computations, such as animation rendering and image processing. The paradigm requires no investment in additional hardware, relying instead on devices that are already owned by users and their community, and favours simple tools that can be implemented part-time by a single developer. We show that samples of personal devices of today are competitive with a top-of-the-line laptop from two years ago. We also propose new directions to extend the paradigm

    Advancing impact assessments of non-native species: strategies for strengthening the evidence-base

    Get PDF
    The numbers and impacts of non-native species (NNS) continue to grow. Multiple ranking protocols have been developed to identify and manage the most damaging species. However, existing protocols differ considerably in the type of impact they consider, the way evidence of impacts is included and scored, and in the way the precautionary principle is applied. These differences may lead to inconsistent impact assessments. Since these protocols are considered a main policy tool to promote mitigation efforts, such inconsistencies are undesirable, as they can affect our ability to reliably identify the most damaging NNS, and can erode public support for NNS management. Here we propose a broadly applicable framework for building a transparent NNS impact evidence base. First, we advise to separate the collection of evidence of impacts from the act of scoring the severity of these impacts. Second, we propose to map the collected evidence along a set of distinguishing criteria: where it is published, which methodological approach was used to obtain it, the relevance of the geographical area from which it originates, and the direction of the impact. This procedure produces a transparent and reproducible evidence base which can subsequently be used for different scoring protocols, and which should be made public. Finally, we argue that the precautionary principle should only be used at the risk management stage. Conditional upon the evidence presented in an impact assessment, decision-makers may use the precautionary principle for NNS management under scientific uncertainty regarding the likelihood and magnitude of NNS impacts. Our framework paves the way for an improved application of impact assessments protocols, reducing inconsistencies and ultimately enabling more effective NNS management

    Understanding information needs of Australian business organisations

    Get PDF
    Over the past decade, universities have used repositories as channels to create access to research outputs. Increasingly government and universities are seeking to optimise the impact of their research, particularly to improve public policy. This study looks at the impact of access to research from the perspective of business associations and researchers. It finds that business organisations value trusted timely, relevant research. Accessibility and peer-reviewed research outputs are highly valued but little used. Barriers to use of the research include availability (material not openly accessible), discoverability (ranking on search engines) and knowledge by trusted mediators and connectivity (presentation as part of a cohort of scholarly knowledge). Barriers for researchers include lack of rewards and recognition for research outputs focused on these organisations. The theories used in the study include triple helix, Kautto-Koivula and Huhtaniemi’s model for knowledge and competence management and actor network theory. The study concludes that significant work is required to improve the accessibility and discoverability of research. In particular, the search paradigm is insufficient to provide optimal awareness of and impact of research.Australian Library and Information Associatio
    • 

    corecore