12,958 research outputs found
Translucent windows: How uncertainty in competitive interactions impacts detection of community pattern
Trait variation and similarity among coexisting species can provide a window
into the mechanisms that maintain their coexistence. Recent theoretical
explorations suggest that competitive interactions will lead to groups, or
clusters, of species with similar traits. However, theoretical predictions
typically assume complete knowledge of the map between competition and measured
traits. These assumptions limit the plausible application of these patterns for
inferring competitive interactions in nature. Here we relax these restrictions
and find that the clustering pattern is robust to contributions of unknown or
unobserved niche axes. However, it may not be visible unless measured traits
are close proxies for niche strategies. We conclude that patterns along single
niche axes may reveal properties of interspecific competition in nature, but
detecting these patterns requires natural history expertise firmly tying traits
to niches.Comment: Main text: 18 pages, 6 figures. Appendices: A-G, 6 supplementary
figures. This is the peer reviewed version of the article of the same title
which has been accepted for publication at Ecology Letters. This article may
be used for non-commercial purposes in accordance with Wiley Terms and
Conditions for Self-Archivin
Scheduling policies and system software architectures for mixed-criticality computing
Mixed-criticality model of computation is being increasingly
adopted in timing-sensitive systems. The model not only
ensures that the most critical tasks in a system never fails,
but also aims for better systems resource utilization in normal condition. In this report, we describe the widely used
mixed-criticality task model and fixed-priority scheduling
algorithms for the model in uniprocessors. Because of the
necessity by the mixed-criticality task model and scheduling
policies, isolation, both temporal and spatial, among tasks is
one of the main requirements from the system design point
of view. Different virtualization techniques have been used
to design system software architecture with the goal of isolation. We discuss such a few system software architectures
which are being and can be used for mixed-criticality model
of computation
- …