612 research outputs found
Rhythm and Randomness in Human Contact
There is substantial interest in the effect of human mobility patterns on
opportunistic communications. Inspired by recent work revisiting some of the
early evidence for a L\'evy flight foraging strategy in animals, we analyse
datasets on human contact from real world traces. By analysing the distribution
of inter-contact times on different time scales and using different graphical
forms, we find not only the highly skewed distributions of waiting times
highlighted in previous studies but also clear circadian rhythm. The relative
visibility of these two components depends strongly on which graphical form is
adopted and the range of time scales. We use a simple model to reconstruct the
observed behaviour and discuss the implications of this for forwarding
efficiency
Selfishness, altruism and message spreading in mobile social networks
Many kinds of communication networks, in particular social and opportunistic networks, rely at least partly on on humans to help move data across the network. Human altruistic behavior is an important factor determining the feasibility of such a system. In this paper, we study the impact of different distributions of altruism on the throughput and delay of mobile social communication system. We evaluate the system performance using four experimental human mobility traces with uniform and community-biased traffic patterns. We found that mobile social networks are very robust to the distributions of altruism due to the nature of multiple paths. We further confirm the results by simulations on two popular social network models. To the best of our knowledge, this is the first complete study of the impact of altruism on mobile social networks, including the impact of topologies and traffic patterns.published_or_final_versio
FLICK: developing and running application-specific network services
Data centre networks are increasingly programmable, with application-specific network services proliferating, from custom load-balancers to middleboxes providing caching and aggregation. Developers must currently implement these services using traditional low-level APIs, which neither support natural operations on application data nor provide efficient performance isolation. We describe FLICK, a framework for the programming and execution of application-specific network services on multi-core CPUs. Developers write network services in the FLICK language, which offers high-level processing constructs and application-relevant data types. FLICK programs are translated automatically to efficient, parallel task graphs, implemented in C++ on top of a user-space TCP stack. Task graphs have bounded resource usage at runtime, which means that the graphs of multiple services can execute concurrently without interference using cooperative scheduling. We evaluate FLICK with several services (an HTTP load-balancer, a Memcached router and a Hadoop data aggregator), showing that it achieves good performance while reducing development effort
FLICK: Developing and Running Application-Specific Network Services
Data centre networks are increasingly programmable, with application-specific network services proliferating, from custom load-balancers to middleboxes providing caching and aggregation. Developers must currently implement these services using traditional low-level APIs, which neither support natural operations on application data nor provide efficient performance isolation. We describe FLICK, a framework for the programming and execution of application-specific network services on multi-core CPUs. Developers write network services in the FLICK language, which offers high-level processing constructs and application-relevant data types. FLICK programs are translated automatically to efficient, parallel task graphs, implemented in C++ on top of a user-space TCP stack. Task graphs have bounded resource usage at runtime, which means that the graphs of multiple services can execute concurrently without interference using cooperative scheduling. We evaluate FLICK with several services (an HTTP load-balancer, a Memcached router and a Hadoop data aggregator), showing that it achieves good performance while reducing development effort
Connecting the Edges: A Universal, Mobile-Centric, and Opportunistic Communications Architecture
The Internet has crossed new frontiers with access to it getting faster and cheaper. Considering that the architectural foundations of today's Internet were laid more than three decades ago, the Internet has done remarkably well until today coping with the growing demand. However, the future Internet architecture is expected to support not only the ever growing number of users and devices, but also a diverse set of new applications and services. Departing from the traditional host-centric access paradigm, where access to a desired content is mapped to its location, an information-centric model enables the association of access to a desired content with the content itself, irrespective of the location where it is being held. UMOBILE tailors the information-centric communication model to meet the requirements of opportunistic communications, integrating those connectivity approaches into a single architecture. By pushing services near the edge of the network, such an architecture can pervasively operate in any networking environment and allows for the development of innovative applications, providing access to data independent of the level of end-to-end connectivity availability
Observation of Two Narrow States Decaying into and
We report the first observation of two narrow charmed strange baryons
decaying to and , respectively, using data from
the CLEO II detector at CESR. We interpret the observed signals as the
and , the symmetric partners
of the well-established antisymmetric and .
The mass differences and
are measured to be and
, respectively.Comment: 11 pages, postscript file also available through
http://w4.lns.cornell.edu/public/CLN
Galaxy Zoo: Passive Red Spirals
We study the spectroscopic properties and environments of red spiral galaxies
found by the Galaxy Zoo project. By carefully selecting face-on, disk dominated
spirals we construct a sample of truly passive disks (not dust reddened, nor
dominated by old stellar populations in a bulge). As such, our red spirals
represent an interesting set of possible transition objects between normal blue
spirals and red early types. We use SDSS data to investigate the physical
processes which could have turned these objects red without disturbing their
morphology. Red spirals prefer intermediate density regimes, however there are
no obvious correlations between red spiral properties and environment -
environment alone is not sufficient to determine if a spiral will become red.
Red spirals are a small fraction of spirals at low masses, but are a
significant fraction at large stellar masses - massive galaxies are red
independent of morphology. We confirm that red spirals have older stellar popns
and less recent star formation than the main spiral population. While the
presence of spiral arms suggests that major star formation cannot have ceased
long ago, we show that these are not recent post-starbursts, so star formation
must have ceased gradually. Intriguingly, red spirals are ~4 times more likely
than normal spirals to host optically identified Seyfert or LINER, with most of
the difference coming from LINERs. We find a curiously large bar fraction in
the red spirals suggesting that the cessation of star formation and bar
instabilities are strongly correlated. We conclude by discussing the possible
origins. We suggest they may represent the very oldest spiral galaxies which
have already used up their reserves of gas - probably aided by strangulation,
and perhaps bar instabilities moving material around in the disk.Comment: MNRAS in press, 20 pages, 15 figures (v3
Measurement of the Inclusive Semi-electronic Branching Fraction
Using the angular correlation between the emitted in a decay and the emitted in the subsequent decay, we have measured the branching fraction for the
inclusive semi-electronic decay of the meson to be: {\cal B}(D^0
\rightarrow X e^+ \nu) = [6.64 \pm 0.18 (stat.) \pm 0.29 (syst.)] \%. The
result is based on 1.7 fb of collisions recorded by the CLEO II
detector located at the Cornell Electron Storage Ring (CESR). Combining the
analysis presented in this paper with previous CLEO results we find,
\frac{{\cal B} (D^0 \rightarrow X e^+ \nu)}
{{\cal B} (D^0 \rightarrow K^- \pi^+)}
= 1.684 \pm 0.056 (stat.) \pm 0.093(syst.) and
\frac{{\cal B}(D\rightarrow K^-e^+\nu)}
{{\cal B}(D\rightarrow Xe^+\nu)}
= 0.581 \pm 0.023 (stat.) \pm 0.028(syst.).
The difference between the inclusive rate and the sum of the measured
exclusive branching fractions (measured at CLEO and other experiments) is of the inclusive rate.Comment: Latex file, 33pages, 4 figures Submitted to PR
Observation of the Isospin-Violating Decay
Using data collected with the CLEO~II detector, we have observed the
isospin-violating decay . The decay rate for this mode,
relative to the dominant radiative decay, is found to be .Comment: 8 page uuencoded postscript file, also available through
http://w4.lns.cornell.edu/public/CLN
- …
