29,184 research outputs found
Mesmerizer: A Effective Tool for a Complete Peer-to-Peer Software Development Life-cycle
In this paper we present what are, in our experience, the best
practices in Peer-To-Peer(P2P) application development and
how we combined them in a middleware platform called Mesmerizer. We explain how simulation is an integral part of
the development process and not just an assessment tool.
We then present our component-based event-driven framework for P2P application development, which can be used
to execute multiple instances of the same application in a
strictly controlled manner over an emulated network layer
for simulation/testing, or a single application in a concurrent
environment for deployment purpose. We highlight modeling aspects that are of critical importance for designing and
testing P2P applications, e.g. the emulation of Network Address Translation and bandwidth dynamics. We show how
our simulator scales when emulating low-level bandwidth
characteristics of thousands of concurrent peers while preserving a good degree of accuracy compared to a packet-level
simulator
Advanced software techniques for space shuttle data management systems Final report
Airborne/spaceborn computer design and techniques for space shuttle data management system
Shareholder Protection and the Cost of Capital Empirical Evidence from German and Italian Firms
We investigate implications for the cost of capital in a model with agency conflicts between inside and outside shareholders, where the severity of agency costs depends on a parameter representing investor protection. Using firm-level data for Italy and Germany we find significant differences in shareholder protection and its implications for the firm’s ownership structure and the cost of capital. Results indicate that concentrated inside ownership increases the cost of capital for Italian firms while having no significant impact on the cost of capital for German firms. Evidence also suggests bank influence in Germany may serve to reduce investor risk for outside shareholders. In contrast, the magnitude of capital stock distortions is found to be quite important in Italy. Overall, slow growth in continental Europe may be more closely linked to institutional differences in shareholder protection between countries rather than inside ownership of firms.Shareholder protection, ownership structure, cost of capital, agency costs, underinvestment
Visual Performance Management: Does it work in Public Service Organisations?
Visual Performance Management (VPM) has been prominent within Lean manufacturing environments for a number of decades, but its use has only recently started to emerge in service organisations. We consider the transition of VPM approaches to service environments and, utilising a case study method with two public service organisations, we explore four aspects of visual performance implementation. We start by exploring the strategic drivers for VPM adoption, the transparency of VPM, the performance management approach used, and changes in organisational effectiveness resulting from the introduction of VPM. Findings indicate that VPM approaches do work within public service environments, and have a tangible impact on management, but strategic alignment and data integrity are common concerns, and should be considered essential prerequisites
Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences
In this survey, we first briefly review the current state of cyber attacks,
highlighting significant recent changes in how and why such attacks are
performed. We then investigate the mechanics of malware command and control
(C2) establishment: we provide a comprehensive review of the techniques used by
attackers to set up such a channel and to hide its presence from the attacked
parties and the security tools they use. We then switch to the defensive side
of the problem, and review approaches that have been proposed for the detection
and disruption of C2 channels. We also map such techniques to widely-adopted
security controls, emphasizing gaps or limitations (and success stories) in
current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages.
Listing abstract compressed from version appearing in repor
Community Enforcement of Informal Contracts: Jewish Diamond Merchants in New York
The diamond industry is home to many unusual features: the predominance of an ethnically homogeneous community of merchants, the norm of intergenerational family businesses, and a rejection of public courts in favor of private contract enforcement. This paper explains that the diamond industry\u27s unique attributes arise specifically to meet the particularly rigorous hazards of transacting in diamonds. Since diamonds are portable, easily concealable, and extremely valuable, the risk associated with a credit sale can be especially costly. However, the industry enjoys valuable organizational efficiencies if transactions occur on credit between independent, fully incentivized agents. Thus, an efficient system of exchange will find ways to induce merchants who purchase on credit to fulfill their payment obligations. The very features that give the diamond industry an unusual profile are responsible for providing institutions to support credit sales. A system of private arbitration spreads information regarding merchants\u27 past dealings, so a reputation mechanism to monitor merchants can take hold. Intergenerational legacies, though restricting entry only to those who can inherit good reputations from family members, resolve an end-game problem and induce merchants to deal honestly through their very last transaction. And the participation of Ultra-Orthodox Jews, for whom inclusion and participation in their communities is equally paramount to their material wealth, serve important value-added services as diamond cutters and brokers without posing the threat of theft and flight
- …