512 research outputs found
Replica Placement on Bounded Treewidth Graphs
We consider the replica placement problem: given a graph with clients and
nodes, place replicas on a minimum set of nodes to serve all the clients; each
client is associated with a request and maximum distance that it can travel to
get served and there is a maximum limit (capacity) on the amount of request a
replica can serve. The problem falls under the general framework of capacitated
set covering. It admits an O(\log n)-approximation and it is NP-hard to
approximate within a factor of . We study the problem in terms of
the treewidth of the graph and present an O(t)-approximation algorithm.Comment: An abridged version of this paper is to appear in the proceedings of
WADS'1
Existence Results for Quasilinear Degenerated Equations vias Strong Convergence of Truncations
Abstract In this paper, we study the existence of entropy solution for quasilinear elliptic equations of the form, is a non-linear term which has a growth condition with respect to ξ and no growth with respect to s, but it satisfies a sign condition on s. key words: Quasilinear elliptic equation, Sobolev spaces with variable exponent, entropy stronglyregular solution, truncations. References [1] Y
The New Generation of Computer Literacy
A tremendous mismatch is developing between two of the most critical components of any computer literacy course: the textbooks and the students. We are encountering a new generation of students (literally as well as figuratively!) who are much better acquainted with computer usage than their earlier counterparts. Yet many textbooks with increasing emphasis in those same computer tools continue to appear. There are signs of a coming change in that a few authors and publishers apparently are becoming aware of the need for innovations in texts for non-scientists. These textbooks open the door for a new orientation to principles in the teaching of computer literacy
E-Voting in an ubicomp world: trust, privacy, and social implications
The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and also socially. Ubicomp evokes a near future in which humans will be surrounded by “always-on,” unobtrusive, interconnected intelligent objects where information is exchanged seamlessly. This seamless exchange of information has vast social implications, in particular the protection and management of personal information. This research project investigates the concepts of trust and privacy issues specifically related to the exchange of e-voting information when using a ubicomp type system
Effects of quantum well growth temperature on the recombination efficiency of InGaN/GaN multiple quantum wells that emit in the green and blue spectral regions
InGaN-based light emitting diodes and multiple quantum wells designed to emit in the green spectral region exhibit, in general, lower internal quantum efficiencies than their blue-emitting counter parts, a phenomenon referred to as the “green gap.” One of the main differences between green-emitting and blue-emitting samples is that the quantum well growth temperature is lower for structures designed to emit at longer wavelengths, in order to reduce the effects of In desorption. In this paper, we report on the impact of the quantum well growth temperature on the optical properties of InGaN/GaN multiple quantum wells designed to emit at 460 nm and 530 nm. It was found that for both sets of samples increasing the temperature at which the InGaN quantum well was grown, while maintaining the same indium composition, led to an increase in the internal quantum efficiency measured at 300 K. These increases in internal quantum efficiency are shown to be due reductions in the non-radiative recombination rate which we attribute to reductions in point defect incorporation.This work was carried out with the financial support of the United Kingdom Engineering and Physical Sciences Research Council under Grant Numbers EP/I012591/1 and EP/H011676/1.This is the final version of the article. It first appeared from AIP via http://dx.doi.org/10.1063/1.4932200 All data created during this research are openly available from the University of Manchester eScholar archive at http://dx.doi.org/10.15127/1.26974
Towards an Economy of Higher Education
This paper draws a distinction between ways thinking and acting, and hence of policy and practice in higher education, in terms of different kinds of economy: economies of exchange and economies of excess. Crucial features of economies of exchange are outlined and their presence in prevailing conceptions of teaching and learning is illustrated. These are contrasted with other possible forms of practice, which in turn bring to light the nature of an economy of excess. In more philosophical terms, and to expand on the picture, economies of excess are elaborated with reference, first, to the understanding of alterity in the work of Emmanuel Levinas and, second, to the idea of Dionysian intensity that is to be found in Nietzsche. In the light of critical comment on some current directions in policy and practice, the implications of these ways of thinking for the administrator, the teacher and the student in higher education are explored
Gold as a Tool for Hedging Financial Risks
The article discusses gold as a protective asset, which claims to be a high-efficiency tool for hedging financial risks. In the introductory part the general characteristics of hedging as a method of full or partial risk elimination is given, and the main known types of risk hedging typical for a financial asset portfolio holder are considered. Further, dynamics of the world prices for gold is analyzed in a historical retrospective, whereby the conclusion is drawn on a tendency of this asset to grow during the periods of financial instability, and also if new financial assets appear. In the final part of the article the assessment of gold as a tool for hedging financial risks is given
Using automated medical records for rapid identification of illness syndromes (syndromic surveillance): the example of lower respiratory infection
BACKGROUND: Gaps in disease surveillance capacity, particularly for emerging infections and bioterrorist attack, highlight a need for efficient, real time identification of diseases. METHODS: We studied automated records from 1996 through 1999 of approximately 250,000 health plan members in greater Boston. RESULTS: We identified 152,435 lower respiratory infection illness visits, comprising 106,670 episodes during 1,143,208 person-years. Three diagnoses, cough (ICD9CM 786.2), pneumonia not otherwise specified (ICD9CM 486) and acute bronchitis (ICD9CM 466.0) accounted for 91% of these visits, with expected age and sex distributions. Variation of weekly occurrences corresponded closely to national pneumonia and influenza mortality data. There was substantial variation in geographic location of the cases. CONCLUSION: This information complements existing surveillance programs by assessing the large majority of episodes of illness for which no etiologic agents are identified. Additional advantages include: a) sensitivity, uniformity and efficiency, since detection of events does not depend on clinicians' to actively report diagnoses, b) timeliness, the data are available within a day of the clinical event; and c) ease of integration into automated surveillance systems. These features facilitate early detection of conditions of public health importance, including regularly occurring events like seasonal respiratory illness, as well as unusual occurrences, such as a bioterrorist attack that first manifests as respiratory symptoms. These methods should also be applicable to other infectious and non-infectious conditions. Knowledge of disease patterns in real time may also help clinicians to manage patients, and assist health plan administrators in allocating resources efficiently
- …