5,564 research outputs found

    Towards an SDN network control application for differentiated traffic routing

    Get PDF
    In the last years, Software Defined Networking has emerged as a promising paradigm to foster network innovation and address the issues coming from the ossification of the TCP/IP architecture. The clean separation between control and data plane, the definition of northbound and southbound interfaces are key features of the Software Defined Networking paradigm. Moreover, a centralised control plane allows network operators to deploy advanced control and management strategies. Effective traffic engineering and resources management policies allow to achieve a better utilisation of network resources and improve endto- end service performance. This paper deals with the architectural design and experimental validation of a control application that enables differentiated routing for traffic flows belonging to different service classes. The new control application makes routing decisions leveraging on OpenFlow network statistics, i.e., taking advantage of real-time network status information. Moreover, a Deep Packet Inspection module has been developed and integrated in the control application to detect VoIP traffic with Session Initiation Protocol signalling, enforcing this way policies for a differentiated treatment of VoIP traffic. Finally, a functional validation is performed in emulated environment.This work was supported by the EPSRC INTERNET Project EP/H040536/1.This is the author accepted manuscript. The final version is available from IEEE via http://dx.doi.org/10.1109/ICC.2015.724925

    Kant, Morality, and Hell

    Get PDF
    In this paper I argue that, although Kant argues that morality is independent of God (and hence, agrees with the Euthyphro), and rejects Divine Command Theory (or Theological Voluntarism), he believes that all moral duties are also the commands of God, who is a moral being, and who is morally required to punish those who transgress the moral law: "God’s justice is the precise allocation of punishments and rewards in accordance with men’s good or bad behavior." However, since we lack a strict proof of God's existence, we can still fulfill our duties from the motive of duty. if we did know that God exists, then this would undermine our pure moral motivation to do our duty, since we would have an even stronger interest in pleasing God through our good conduct. The effect of undermining our pure moral motivation would be to make us less eligible for divine reward, since God rewards us for doing our duty from the motive of duty

    FLICK: developing and running application-specific network services

    Get PDF
    Data centre networks are increasingly programmable, with application-specific network services proliferating, from custom load-balancers to middleboxes providing caching and aggregation. Developers must currently implement these services using traditional low-level APIs, which neither support natural operations on application data nor provide efficient performance isolation. We describe FLICK, a framework for the programming and execution of application-specific network services on multi-core CPUs. Developers write network services in the FLICK language, which offers high-level processing constructs and application-relevant data types. FLICK programs are translated automatically to efficient, parallel task graphs, implemented in C++ on top of a user-space TCP stack. Task graphs have bounded resource usage at runtime, which means that the graphs of multiple services can execute concurrently without interference using cooperative scheduling. We evaluate FLICK with several services (an HTTP load-balancer, a Memcached router and a Hadoop data aggregator), showing that it achieves good performance while reducing development effort

    Proximity to Sports Facilities and Sports Participation for Adolescents in Germany

    Get PDF
    Objectives - To assess the relationship between proximity to specific sports facilities and participation in the corresponding sports activities for adolescents in Germany. Methods - A sample of 1,768 adolescents aged 11–17 years old and living in 161 German communities was examined. Distances to the nearest sports facilities were calculated as an indicator of proximity to sports facilities using Geographic Information Systems (GIS). Participation in specific leisure-time sports activities in sports clubs was assessed using a self-report questionnaire and individual-level socio-demographic variables were derived from a parent questionnaire. Community-level socio-demographics as covariates were selected from the INKAR database, in particular from indicators and maps on land development. Logistic regression analyses were conducted to examine associations between proximity to the nearest sports facilities and participation in the corresponding sports activities. Results - The logisitic regression analyses showed that girls residing longer distances from the nearest gym were less likely to engage in indoor sports activities; a significant interaction between distances to gyms and level of urbanization was identified. Decomposition of the interaction term showed that for adolescent girls living in rural areas participation in indoor sports activities was positively associated with gym proximity. Proximity to tennis courts and indoor pools was not associated with participation in tennis or water sports, respectively. Conclusions - Improved proximity to gyms is likely to be more important for female adolescents living in rural areas

    10- m imaging of the bipolar protoplanetary nebula Mz-3

    Get PDF
    A 10-µm image is presented of the bipolar protoplanetary nebula Mz-3 made at the 3.9-m Anglo-Australian Telescope using the NIMPOL mid-infrared imaging polarimeter. The image shows extended emission from warm (110–130 K) dust both to the north and to the south of the central star, which correlates well with the visible bipolar lobes. The observed surface brightness of this emission is consistent with radiative heating of the dust by both direct stellar illumination and trapped Lyman α photons. Emission in excess of the point-source profile indicates that there is also an extended shell of dust surrounding the central star

    Avoiding catastrophic failure in correlated networks of networks

    Get PDF
    Networks in nature do not act in isolation but instead exchange information, and depend on each other to function properly. An incipient theory of Networks of Networks have shown that connected random networks may very easily result in abrupt failures. This theoretical finding bares an intrinsic paradox: If natural systems organize in interconnected networks, how can they be so stable? Here we provide a solution to this conundrum, showing that the stability of a system of networks relies on the relation between the internal structure of a network and its pattern of connections to other networks. Specifically, we demonstrate that if network inter-connections are provided by hubs of the network and if there is a moderate degree of convergence of inter-network connection the systems of network are stable and robust to failure. We test this theoretical prediction in two independent experiments of functional brain networks (in task- and resting states) which show that brain networks are connected with a topology that maximizes stability according to the theory.Comment: 40 pages, 7 figure

    WAP four-disulfide core domain protein 2 gene(WFDC2) is a target of estrogen in ovarian cancer cells

    Get PDF
    BACKGROUND: WAP four-disulfide core domain protein 2 (WFDC2) shows a tumor-restricted upregulated pattern of expression in ovarian cancer. METHODS: We investigated the role of estradiol (E2) on cell growth in estrogen-sensitive or estrogen-insensitive ovarian cancer cell lines. Real-time (RT)-PCR and western blotting were used to examine the expression of WFDC2 at RNA and protein levels. Growth traits of cells transfected with WFDC2-shRNA or blank control were assessed using MMT arrays. Cell apoptosis was analyzed using annexin V-FITC/PI and flow cytometry. Estrogen receptor expression was evaluated using RT-PCR and flow cytometry. Apoptosis-related proteins induced by E2 directly and indirectly were determined using an antibody array comparing cells transfected with WFDC2- shRNA or a blank control. RESULTS: High-dose (625 ng/ml) E2 increased the expression of WFDC2 in HO8910 cells at both the mRNA and protein levels. However, E2 had no effect on WFDC2 expression in estrogen-insensitive SKOV3 cells. Of interest, knockdown of WFDC2 enabled a considerable estrogen response in SKOV3 cells in terms of proliferation, similar to estrogen-responsive HO8910 cells. This transformation of SKOV3 cells into an estrogen-responsive phenotype was accompanied by upregulation of estrogen receptor beta (ERß) and an effect on cell apoptosis under E2 treatment by regulating genes related to cell proliferation and apoptosis. CONCLUSIONS: We postulate that increased WFDC2 expression plays an important role in altering the estrogen pathway in ovarian cancer, and the identification of WFDC2 as a new player in endocrine-related cancer encourages further studies on the significance of this gene in cancer development and therapy. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi:10.1186/s13048-015-0210-y) contains supplementary material, which is available to authorized users

    A single residue substitution in the receptor-binding domain of H5N1 hemagglutinin is critical for packaging into pseudotyped lentiviral particles

    Get PDF
    © 2012 Tang et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.Background: Serological studies for influenza infection and vaccine response often involve microneutralization and hemagglutination inhibition assays to evaluate neutralizing antibodies against human and avian influenza viruses, including H5N1. We have previously characterized lentiviral particles pseudotyped with H5-HA (H5pp) and validated an H5pp-based assay as a safe alternative for high-throughput serological studies in BSL-2 facilities. Here we show that H5-HAs from different clades do not always give rise to efficient production of H5pp and the underlying mechanisms are addressed. Methodology/Findings: We have carried out mutational analysis to delineate the molecular determinants responsible for efficient packaging of HA from A/Cambodia/40808/2005 (H5Cam) and A/Anhui/1/2005 (H5Anh) into H5pp. Our results demonstrate that a single A134V mutation in the 130-loop of the receptor binding domain is sufficient to render H5Anh the ability to generate H5Anh-pp efficiently, whereas the reverse V134A mutation greatly hampers production of H5Cam-pp. Although protein expression in total cell lysates is similar for H5Anh and H5Cam, cell surface expression of H5Cam is detected at a significantly higher level than that of H5Anh. We further demonstrate by several independent lines of evidence that the behaviour of H5Anh can be explained by a stronger binding to sialic acid receptors implicating residue 134. Conclusions: We have identified a single A134V mutation as the molecular determinant in H5-HA for efficient incorporation into H5pp envelope and delineated the underlying mechanism. The reduced binding to sialic acid receptors as a result of the A134V mutation not only exerts a critical influence in pseudotyping efficiency of H5-HA, but has also an impact at the whole virus level. Because A134V substitution has been reported as a naturally occurring mutation in human host, our results may have implications for the understanding of human host adaptation of avian influenza H5N1 virusesThis work was supported by grants from the Research Fund for the Control of Infectious Diseases of Hong Kong (RFCID#08070972), the Area of Excellence Scheme of the University Grants Committee (grant AoE/M-12/-06 of the Hong Kong Special Administrative Region, China), the French Ministry of Health, and the RESPARI project of the Institut Pasteur International Network

    Boundary Conditions and Unitarity: the Maxwell-Chern-Simons System in AdS_3/CFT_2

    Get PDF
    We consider the holography of the Abelian Maxwell-Chern-Simons (MCS) system in Lorentzian three-dimensional asymptotically-AdS spacetimes, and discuss a broad class of boundary conditions consistent with conservation of the symplectic structure. As is well-known, the MCS theory contains a massive sector dual to a vector operator in the boundary theory, and a topological sector consisting of flat connections dual to U(1) chiral currents; the boundary conditions we examine include double-trace deformations in these two sectors, as well as a class of boundary conditions that mix the vector operators with the chiral currents. We carefully study the symplectic product of bulk modes and show that almost all such boundary conditions induce instabilities and/or ghost excitations, consistent with violations of unitarity bounds in the dual theory.Comment: 50+1 pages, 6 figures, PDFLaTeX; v2: added references, corrected typo
    corecore