650 research outputs found

    Self-Stabilizing Wavelets and r-Hops Coordination

    Full text link
    We introduce a simple tool called the wavelet (or, r-wavelet) scheme. Wavelets deals with coordination among processes which are at most r hops away of each other. We present a selfstabilizing solution for this scheme. Our solution requires no underlying structure and works in arbritrary anonymous networks, i.e., no process identifier is required. Moreover, our solution works under any (even unfair) daemon. Next, we use the wavelet scheme to design self-stabilizing layer clocks. We show that they provide an efficient device in the design of local coordination problems at distance r, i.e., r-barrier synchronization and r-local resource allocation (LRA) such as r-local mutual exclusion (LME), r-group mutual exclusion (GME), and r-Reader/Writers. Some solutions to the r-LRA problem (e.g., r-LME) also provide transformers to transform algorithms written assuming any r-central daemon into algorithms working with any distributed daemon

    A Multifaceted Performance Model for the Multiple Percussion Performance Practice: Performance Analysis of Select Works toward Developing a Graduate Curriculum

    Get PDF
    The purpose of this document is to articulate the various dimensions of the solo multiple percussion performance practice, the primary objective being to construct appropriate graduate curricula. It was found that the necessary skills and concepts could be categorized into four dimensions that make up the multi-faceted model: (1) equipment and setup, (2) notational style, (3) technical demands, and (4) conceptual performance. Requisite skills were posited from performance analyses of over fifty solo works that range from intermediate to advanced difficulty. Representative works are described that might effectively introduce and challenge these requisite skills and concepts, as are exemplary pieces that require their mastery. One piece that I performed for recital within my doctoral program was selected for each dimension to provide experiential details: The Anvil Chorus is used to describe equipment and setup, Psappha for notational style and devices, Thirteen Drums for technical facility, and Tunnels for the performance concept. I conclude the document with sample program curricula suggested for master’s and doctoral level, as well as curricula specific to each dimension of the performance model. It is my hope that the percussion instructor will use this model to analyze their own inventory and to include future additions to the literature for creating an effective and comprehensive graduate multiple percussion curriculum

    Phylogenetic systematics, biogeography, and evolutionary ecology of the true crocodiles (Eusuchia: Crocodylidae: Crocodylus)

    Get PDF
    Modern crocodylian systematics has been dominated by investigations of higher-level relationships aimed at resolving the disparity between morphological and molecular data, especially regarding the true gharial (Gavialis). Consequently, no studies to date have provided adequate resolution of the interspecific relationships within the most broadly distributed, ecologically diverse, and species-rich crocodylian genus, Crocodylus. In this study, Bayesian and ML partitioned phylogenetic analyses were performed on a DNA sequence dataset of 7,282 base pairs representing four mitochondrial regions, nine nuclear loci, and all 23 crocodylian species. The analyses were performed on a suite of partitioning strategies to investigate the modeling effects of partition choice in phylogenetic analyses. Bayesian lognormal relaxed-clock dating analyses also were performed on the dataset, calibrated from the rich crocodylian fossil record. A robust interspecific phylogeny of Crocodylus is reconstructed, and subsequently used in ML and Bayesian ancestral character-state reconstructions to test hypotheses about the biogeographic history and evolutionary ecology of the genus. The results demonstrate that the genus originated from an ancestor in the tropics of the Late Miocene Indo-Pacific, and rapidly radiated and dispersed around the globe during a period marked by mass extinctions of fellow crocodylians. The results also prove paraphyly of Crocodylus, and reveal more diversity within the genus than recognized by current taxonomy. This study also establishes a baseline for assessing the utility of various model selection criteria for objectively selecting the optimal partitioning strategy within ML and Bayesian frameworks. The results indicate that gene identity is a poor method of partition choice. Furthermore, the results of the ancestral character-state reconstructions suggest ML and Bayesian methods produce more realistic and reliable results than parsimony

    Change and Transformation: The Harp as a Symbol of Liminality in Tchaikovsky’s The Nutcracker (1892)

    Get PDF
    The harp is a musical instrument with a uniquely resonating timbre, and a highly specialized expressive niche within the orchestral repertoire. A deeper study of the harp’s metaphorical use is conducted in this report by evaluating the historical context in which the harp emerged, analyzing the timbre of the modern double-action pedal harp, and reviewing the historically significant ensemble works to reveal why composers elected to feature the harp in the orchestra, in lieu of and in conjunction with other instruments. Each of these elements points squarely towards the use of the harp to represent liminal themes and the universal sentiments associated with experiencing change and transformation. To this end, the harp parts from the score of Pyotr Ilyich Tchaikovsky’s The Nutcracker (1892) are analyzed, alongside the theatrical cues of the first edition ballet score, and E.T.A. Hoffman’s original fairytale narrative that the ballet libretto was based on. The orchestration of two harp parts in the original score, featured at the points of the many transformational thresholds in the narrative make The Nutcracker ballet a particularly compelling piece to study, with striking examples of how the harp’s timbre is used to effectively express liminality

    The Kuramoto model: A simple paradigm for synchronization phenomena

    Get PDF
    Synchronization phenomena in large populations of interacting elements are the subject of intense research efforts in physical, biological, chemical, and social systems. A successful approach to the problem of synchronization consists of modeling each member of the population as a phase oscillator. In this review, synchronization is analyzed in one of the most representative models of coupled phase oscillators, the Kuramoto model. A rigorous mathematical treatment, specific numerical methods, and many variations and extensions of the original model that have appeared in the last few years are presented. Relevant applications of the model in different contexts are also included

    Unified architecture of mobile ad hoc network security (MANS) system

    Get PDF
    In this dissertation, a unified architecture of Mobile Ad-hoc Network Security (MANS) system is proposed, under which IDS agent, authentication, recovery policy and other policies can be defined formally and explicitly, and are enforced by a uniform architecture. A new authentication model for high-value transactions in cluster-based MANET is also designed in MANS system. This model is motivated by previous works but try to use their beauties and avoid their shortcomings, by using threshold sharing of the certificate signing key within each cluster to distribute the certificate services, and using certificate chain and certificate repository to achieve better scalability, less overhead and better security performance. An Intrusion Detection System is installed in every node, which is responsible for colleting local data from its host node and neighbor nodes within its communication range, pro-processing raw data and periodically broadcasting to its neighborhood, classifying normal or abnormal based on pro-processed data from its host node and neighbor nodes. Security recovery policy in ad hoc networks is the procedure of making a global decision according to messages received from distributed IDS and restore to operational health the whole system if any user or host that conducts the inappropriate, incorrect, or anomalous activities that threaten the connectivity or reliability of the networks and the authenticity of the data traffic in the networks. Finally, quantitative risk assessment model is proposed to numerically evaluate MANS security

    Games and Time

    Get PDF
    Video games are a medium uniquely immersed in time. While the topic of time and games has been broached by many in the field of game studies, its centrality to both how games function and the experience of playing games remains underexamined. Reading games as literary texts, this holistic study uses queer and social theories to survey the myriad of ways games play with time. I argue games are time machines, each idiosyncratically allows players to experience time differently from traditional linear time. Beyond games with literal time machines, this dissertation examines games which structure themselves around labyrinthine and existential loops. It also considers real-time, or games competitively organized around time and those which change over time, in a sense, aging. Regardless of the subject, this dissertation seeks to illuminate the complexities of games and time, and argues that, despite their many conflicting messages about the topic, they all have something meaningful to say about the human experience of time

    Efficient Passive Clustering and Gateways selection MANETs

    Get PDF
    Passive clustering does not employ control packets to collect topological information in ad hoc networks. In our proposal, we avoid making frequent changes in cluster architecture due to repeated election and re-election of cluster heads and gateways. Our primary objective has been to make Passive Clustering more practical by employing optimal number of gateways and reduce the number of rebroadcast packets

    The Tiger Vol. 74 Issue 26 1981-04-16

    Get PDF
    https://tigerprints.clemson.edu/tiger_newspaper/3377/thumbnail.jp
    corecore