9,160 research outputs found

    Control theory for principled heap sizing

    Get PDF
    We propose a new, principled approach to adaptive heap sizing based on control theory. We review current state-of-the-art heap sizing mechanisms, as deployed in Jikes RVM and HotSpot. We then formulate heap sizing as a control problem, apply and tune a standard controller algorithm, and evaluate its performance on a set of well-known benchmarks. We find our controller adapts the heap size more responsively than existing mechanisms. This responsiveness allows tighter virtual machine memory footprints while preserving target application throughput, which is ideal for both embedded and utility computing domains. In short, we argue that formal, systematic approaches to memory management should be replacing ad-hoc heuristics as the discipline matures. Control-theoretic heap sizing is one such systematic approach

    Promising Approaches to Address the Needs of Poor Female Farmers: Resources, Constraints, and Interventions

    Get PDF
    This paper critically reviews attempts to increase poor female farmers' access to, and control of, productive resources in Sub-Saharan Africa and South Asia. It surveys the literature from 1998 to 2008 that describes interventions and policy changes across several key agricultural resources, including land, soil, and water; labor-saving technologies; improved varieties; extension services; and credit. Main questions: (1) Are women more constrained in access to, and control of, productive resources? (2) What are the key intervention strategies to address constraints to accessing such resources? (3) What are some of the promising approaches that have been used in the field? and (4) Have those approaches been rigorously evaluated, and what are the implications for scaling up

    Promising approaches to address the needs of poor female farmers: Resources, constraints, and interventions

    Get PDF
    "Recognizing that “gender matters,” many development interventions have aimed to close the gender gap in access to resources, both human and physical, and to address the specific needs of female farmers. This paper critically reviews attempts to increase poor female farmers' access to, and control of, productive resources in Sub-Saharan Africa and South Asia. It surveys the literature from 1998 to 2008 that describes interventions and policy changes across several key agricultural resources, including land, soil, and water; labor-saving technologies; improved varieties; extension services; and credit. Compared with interventions designed to increase investment in human capital, only a minority of interventions or policy changes designed to increase female farmers' access to productive resources have been rigorously evaluated. Future interventions need to consider interactions among inputs rather than treat each input in isolation, adapt interventions to clients' needs, and pay attention to the design of alternative delivery mechanisms, the trade-offs between practical and strategic gender needs, and the culture and context specificity of gender roles." from authors' abstractGender, Agriculture, Interventions, Agricultural growth, Agricultural technology,

    The Graaskamp Legacy

    Get PDF
    James A. Graaskamp\u27s perspective on classroom education and his alternative research paradigm pioneered or greatly enhanced several real estate principles that are more relevant today than during his life. These principles are summarized and presented in 5 sections: A Different Brand of Research, The Development Feasibility, How Appraisers Value, Who\u27s Watching the Chicken Coop, and Teaching an Ethical Vision

    Economic Factors of Vulnerability Trade and Exploitation

    Full text link
    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition and deployment. Yet, this understanding is critical to characterize the production of (traded) exploits, the economy that drives it, and its effects on the overall attack scenario. In this paper we provide an empirical investigation of the economics of vulnerability exploitation, and the effects of market factors on likelihood of exploit. Our data is collected first-handedly from a prominent Russian cybercrime market where the trading of the most active attack tools reported by the security industry happens. Our findings reveal that exploits in the underground are priced similarly or above vulnerabilities in legitimate bug-hunting programs, and that the refresh cycle of exploits is slower than currently often assumed. On the other hand, cybercriminals are becoming faster at introducing selected vulnerabilities, and the market is in clear expansion both in terms of players, traded exploits, and exploit pricing. We then evaluate the effects of these market variables on likelihood of attack realization, and find strong evidence of the correlation between market activity and exploit deployment. We discuss implications on vulnerability metrics, economics, and exploit measurement.Comment: 17 pages, 11 figures, 14 table

    Faith, Community and Civic Action: Reflections on the Organized Religion Initiative

    Get PDF
    Evaluates how well six California faith-based institutions used community organizing to pull immigrant and low-income communities into more active involvement with political and civic leadership and participation activities, between 1996-2005

    The legal framework for private sector development in a transitional economy : the case of Poland

    Get PDF
    The economies of Central and Eastern Europe are in the midst of a historic transition from central planning and state ownership to development of a market-driven private sector. This transition requires comprehensive changes in"rules of the game"- including the legal framework for economic activity. A market economy presupposes a set of property rights and a system of laws or customs that allow the exchange of those rights. The legal framework in a market economy has at least three basic functions: defining the universe of property rights; setting the rules for entry into and exit from productive activities; and setting the rules of market exchange. These legal tasks are accomplished by areas of law such as: company, foreign investment, bankruptcy, contract and competition law. Poland has a rich legal tradition dating from pre-socialist times, which was suppressed but not eliminated during its forty years of socialism. This tradition is being revised as the country moves toward a private market economy. The current legal framework in Poland closely follows other continental jurisdictions and has a clear and reasonable internal logic. Many of the laws are old, but most are flexible enough to permit a wide range of modern, market-oriented activity. Property law, however, remains a"jungle". The wide discretion and general lack of precedent create tremendous legal uncertainty that is sure to hamper private sector development.Environmental Economics&Policies,Banks&Banking Reform,Municipal Housing and Land,Legal Products,Land and Real Estate Development

    London Creative and Digital Fusion

    Get PDF
    date-added: 2015-03-24 04:16:59 +0000 date-modified: 2015-03-24 04:16:59 +0000date-added: 2015-03-24 04:16:59 +0000 date-modified: 2015-03-24 04:16:59 +0000The London Creative and Digital Fusion programme of interactive, tailored and in-depth support was designed to support the UK capital’s creative and digital companies to collaborate, innovate and grow. London is a globally recognised hub for technology, design and creative genius. While many cities around the world can claim to be hubs for technology entrepreneurship, London’s distinctive potential lies in the successful fusion of world-leading technology with world-leading design and creativity. As innovation thrives at the edge, where better to innovate than across the boundaries of these two clusters and cultures? This booklet tells the story of Fusion’s innovation journey, its partners and its unique business support. Most importantly of all it tells stories of companies that, having worked with London Fusion, have innovated and grown. We hope that it will inspire others to follow and build on our beginnings.European Regional Development Fund 2007-13

    Self-Reliance for the Internet of Things: Blockchains and Deep Learning on Low-Power IoT Devices

    Get PDF
    The rise of the Internet of Things (IoT) has transformed common embedded devices from isolated objects to interconnected devices, allowing multiple applications for smart cities, smart logistics, and digital health, to name but a few. These Internet-enabled embedded devices have sensors and actuators interacting in the real world. The IoT interactions produce an enormous amount of data typically stored on cloud services due to the resource limitations of IoT devices. These limitations have made IoT applications highly dependent on cloud services. However, cloud services face several challenges, especially in terms of communication, energy, scalability, and transparency regarding their information storage. In this thesis, we study how to enable the next generation of IoT systems with transaction automation and machine learning capabilities with a reduced reliance on cloud communication. To achieve this, we look into architectures and algorithms for data provenance, automation, and machine learning that are conventionally running on powerful high-end devices. We redesign and tailor these architectures and algorithms to low-power IoT, balancing the computational, energy, and memory requirements.The thesis is divided into three parts:Part I presents an overview of the thesis and states four research questions addressed in later chapters.Part II investigates and demonstrates the feasibility of data provenance and transaction automation with blockchains and smart contracts on IoT devices.Part III investigates and demonstrates the feasibility of deep learning on low-power IoT devices.We provide experimental results for all high-level proposed architectures and methods. Our results show that algorithms of high-end cloud nodes can be tailored to IoT devices, and we quantify the main trade-offs in terms of memory, computation, and energy consumption
    corecore