47,900 research outputs found
Funding the Extraordinary: An Evaluation of The Kresge Foundation Arts and Culture Program's Institutional Capitalization Grantmaking
In undertaking an assessment of Kresge's Capitalization Program, NFF applied its own high-level framework to help answer Kresge's primary research questions and assess the progress of each grantee in meeting its stated capital targets. NFF has found that effective capitalization in the nonprofit sector requires attention to three key financial priorities: liquidity, adaptability and durability:1. Liquidity: Does the organization have adequate cash to meet its operating needs?2. Adaptability: Does the organization have flexible funds that allow it to make adjustments as circumstances change?3. Durability: Does the organization have sufficient resources to address the range of needs that it may face in future years?NFF's review of Kresge's grantees sought to assess capitalization by looking for evidence of organizational progress in building liquid funds for immediate operating needs, as well as longer-term balance sheet savings for adaptability and durability. NFF's evaluation of grantees involved a combination of data analysis and interviews
Making the Distribution Subsystem Secure
This report presents how the Distribution Subsystem is made secure. A set of different security threats to a shared data programming system are identifed. The report presents the extensions nessesary to the DSS in order to cope with the identified security threats by maintaining reference security. A reference to a shared data structure cannot be forged or guessed; only by proper delegation can a thread acquire access to data originating at remote processes. Referential security is a requirement for secure distributed applications. By programmatically restricting access to distributed data to trusted nodes, a distributed application can be made secure. However, for this to be true, referential security must be supported on the level of the implementation
Towards a Formal Framework for Mobile, Service-Oriented Sensor-Actuator Networks
Service-oriented sensor-actuator networks (SOSANETs) are deployed in
health-critical applications like patient monitoring and have to fulfill strong
safety requirements. However, a framework for the rigorous formal modeling and
analysis of SOSANETs does not exist. In particular, there is currently no
support for the verification of correct network behavior after node failure or
loss/addition of communication links. To overcome this problem, we propose a
formal framework for SOSANETs. The main idea is to base our framework on the
\pi-calculus, a formally defined, compositional and well-established formalism.
We choose KLAIM, an existing formal language based on the \pi-calculus as the
foundation for our framework. With that, we are able to formally model SOSANETs
with possible topology changes and network failures. This provides the basis
for our future work on prediction, analysis and verification of the network
behavior of these systems. Furthermore, we illustrate the real-life
applicability of this approach by modeling and extending a use case scenario
from the medical domain.Comment: In Proceedings FESCA 2013, arXiv:1302.478
Milwaukee County-Funded Parks and Cultural Institutions
The Public Policy Forum's role in the Audit of Greater Milwaukee's Regional Cultural Assets was to examine the fiscal condition of those cultural assets owned and/or funded by Milwaukee County: the Milwaukee Public Museum, Marcus Center for the Performing Arts, Milwaukee County War Memorial Center, Milwaukee County Historical Society, Charles Allis Museum, Villa Terrace Decorative Art Museum, Milwaukee County Cultural Artistic and Musical Programming Advisory Council, Milwaukee County Zoo and Milwaukee County Parks
Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services
Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing
efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings
Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems
In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network. Then, without any prior knowledge of hostile intercept receiver, a novel fuzzy chance-constrained programming (FCCP) based security information optimization scheme is presented to achieve enhanced LPID performance in radar network systems, which focuses on minimizing the achievable mutual information (MI) at interceptor, while the attainable MI outage probability at radar network is enforced to be greater than a specified confidence level. Regarding to the complexity and uncertainty of electromagnetic environment in the modern battlefield, the trapezoidal fuzzy number is used to describe the threshold of achievable MI at radar network based on the credibility theory. Finally, the FCCP model is transformed to a crisp equivalent form with the property of trapezoidal fuzzy number. Numerical simulation results demonstrating the performance of the proposed strategy are provided
- …