39,232 research outputs found
IP Law Book Review: \u3cem\u3eConfiguring the Networked Self: Law, Code, and the Play of Every Day Practice\u3c/em\u3e
Julie Cohen\u27s Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship
Sparse Packetized Predictive Control for Networked Control over Erasure Channels
We study feedback control over erasure channels with packet-dropouts. To
achieve robustness with respect to packet-dropouts, the controller transmits
data packets containing plant input predictions, which minimize a finite
horizon cost function. To reduce the data size of packets, we propose to adopt
sparsity-promoting optimizations, namely, ell-1-ell-2 and ell-2-constrained
ell-0 optimizations, for which efficient algorithms exist. We derive sufficient
conditions on design parameters, which guarantee (practical) stability of the
resulting feedback control systems when the number of consecutive
packet-dropouts is bounded.Comment: IEEE Transactions on Automatic Control, Volume 59 (2014), Issue 7
(July) (to appear
Combating False Reports for Secure Networked Control in Smart Grid via Trustiness Evaluation
Smart grid, equipped with modern communication infrastructures, is subject to
possible cyber attacks. Particularly, false report attacks which replace the
sensor reports with fraud ones may cause the instability of the whole power
grid or even result in a large area blackout. In this paper, a trustiness
system is introduced to the controller, who computes the trustiness of
different sensors by comparing its prediction, obtained from Kalman filtering,
on the system state with the reports from sensor. The trustiness mechanism is
discussed and analyzed for the Linear Quadratic Regulation (LQR) controller.
Numerical simulations show that the trustiness system can effectively combat
the cyber attacks to smart grid.Comment: It has been submitted to IEEE International Conference on
Communications (ICC
Recommended from our members
Both Sides of the Story: Communication Ethics in Mediatized Worlds
Current transformations in the media landscape are challenging contemporary communication and media ethics in at least 2 ways. First, digitization of the media creates new ethical problems that stimulate calls for a redefinition of the norms and values of public communication. Second, new instruments of web-based media observation introduce new possibilities for media (self-)regulation and accountability, thus complementing the initiatives of traditional institutions like press councils. The article retraces those conflicting developments by reference to 2 comparative studies, representing the diverging traditions of conventional communication ethics and media accountability research. In bridging over the conceptual gap between the 2 forms of research, the article develops new perspectives for ethical reflection in the mediatized worlds of the digital ag
Networked buffering: a basic mechanism for distributed robustness in complex adaptive systems
A generic mechanism - networked buffering - is proposed for the generation of robust traits in complex systems. It requires two basic conditions to be satisfied: 1) agents are versatile enough to perform more than one single functional role within a system and 2) agents are degenerate, i.e. there exists partial overlap in the functional capabilities of agents. Given these prerequisites, degenerate systems can readily produce a distributed systemic response to local perturbations. Reciprocally, excess resources related to a single function can indirectly support multiple unrelated functions within a degenerate system. In models of genome:proteome mappings for which localized decision-making and modularity of genetic functions are assumed, we verify that such distributed compensatory effects cause enhanced robustness of system traits. The conditions needed for networked buffering to occur are neither demanding nor rare, supporting the conjecture that degeneracy may fundamentally underpin distributed robustness within several biotic and abiotic systems. For instance, networked buffering offers new insights into systems engineering and planning activities that occur under high uncertainty. It may also help explain recent developments in understanding the origins of resilience within complex ecosystems. \ud
\u
Recommended from our members
Challenges to the Integration of Renewable Resources at High System Penetration
Successfully integrating renewable resources into the electric grid at penetration levels to meet a 33 percent Renewables Portfolio Standard for California presents diverse technical and organizational challenges. This report characterizes these challenges by coordinating problems in time and space, balancing electric power on a range of scales from microseconds to decades and from individual homes to hundreds of miles. Crucial research needs were identified related to grid operation, standards and procedures, system design and analysis, and incentives, and public engagement in each scale of analysis. Performing this coordination on more refined scales of time and space independent of any particular technology, is defined as a “smart grid.” “Smart” coordination of the grid should mitigate technical difficulties associated with intermittent and distributed generation, support grid stability and reliability, and maximize benefits to California ratepayers by using the most economic technologies, design and operating approaches
- …