3,266 research outputs found
The Functions and Practices of a Television Network
An Iterative Learning Control disturbance rejection approach is considered and it is shown that iteration variant learning filters can asymptotically give the controlled variable zero error and zero variance. Convergence is achieved with the assumption that the relative model error is less than one. The transient response of the suggested ILC algorithm is also discussed using a simulation example
Diversity and Discontent: The Relationship Between School Desegregation and Perceptions of Racial Justice
A number of recent studies have explored the consequences of interracial peer effects on the academic and social performance of minority students. This article contributes to that discussion, focusing, however, on perceptions rather than behaviors. The analysis suggests that exposure to white peers is associated with declining perceptions of racial justice among black and Latino high school students. While cautioning against causal interpretations of this finding, the article suggests that the integrationist aims of Brown v. Board of Education will not be satisfied without more thoughtful and vigorous desegregation efforts
Liability and Organizational Choice
Scholars have long maintained that increases in liability encourage firms to contract out risky activities in order to take advantage of so-called judgment-proof strategies. These strategies allow entities to limit their liability through contractual arrangements with nearly insolvent firms. However, the use of judgment-proof firms triggers countervailing effects: it provides opportunities to externalize liability through judgment-proof firms, but the insolvency of these firms introduces distortion in care levels that can generate more liability costs. These costs may outweigh the benefits of externalizing liability, making contracting out suboptimal. A simple model of organizational decision making with judgment-proof firms is developed and applied to the oil industry, where contracting out decreased in response to heightened liability following the Exxon Valdez oil spill
Provenance Threat Modeling
Provenance systems are used to capture history metadata, applications include
ownership attribution and determining the quality of a particular data set.
Provenance systems are also used for debugging, process improvement,
understanding data proof of ownership, certification of validity, etc. The
provenance of data includes information about the processes and source data
that leads to the current representation. In this paper we study the security
risks provenance systems might be exposed to and recommend security solutions
to better protect the provenance information.Comment: 4 pages, 1 figure, conferenc
Occurrence of \u3ci\u3eQuadrigyrus torquatus\u3c/i\u3e Van Cleave, 1920 \u3ci\u3e(Acanthocephala)\u3c/i\u3e in North-central Colombia, South America
During June and July of 1975 and 1976, fish of the Magdalena River basin in Colombia, South America, were examined for acanthocephalans, A total of 16 species of fish were collected from the departments of Caldas and Bolivar. Worms were fixed in AFA and stained in Mayer\u27s carmalum
Supermodular Architecture of Inclusion
Achieving and managing workplace diversity can be contentious work for employers. As Susan Sturm\u27s recent article asserts, [e]mployers face legal and political challenges both for failing to diversify their workplaces and for diversity efforts to overcome that failure. \u27 Both employers and employees find themselves in an ambiguous and highly reactive landscape that offers little structure within which to plan diversity initiatives. Sturm\u27s thoughtful article, The Architecture of Inclusion, offers some much needed structure to institutional participants engaged in the practice of making inclusive environments. In this brief comment, we build on Sturm\u27s work, offering a simple suggestion relating to the practical structure of diversity
Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks
This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) of their multicast regions. We find that power consumption issues provide a natural trade-off that determines optimal values for these parameters. Analysis of one application shows an increase in system security with 70-80% less power overhead than existing security approaches
- …