3,266 research outputs found

    The Functions and Practices of a Television Network

    Get PDF
    An Iterative Learning Control disturbance rejection approach is considered and it is shown that iteration variant learning filters can asymptotically give the controlled variable zero error and zero variance. Convergence is achieved with the assumption that the relative model error is less than one. The transient response of the suggested ILC algorithm is also discussed using a simulation example

    Diversity and Discontent: The Relationship Between School Desegregation and Perceptions of Racial Justice

    Get PDF
    A number of recent studies have explored the consequences of interracial peer effects on the academic and social performance of minority students. This article contributes to that discussion, focusing, however, on perceptions rather than behaviors. The analysis suggests that exposure to white peers is associated with declining perceptions of racial justice among black and Latino high school students. While cautioning against causal interpretations of this finding, the article suggests that the integrationist aims of Brown v. Board of Education will not be satisfied without more thoughtful and vigorous desegregation efforts

    Liability and Organizational Choice

    Get PDF
    Scholars have long maintained that increases in liability encourage firms to contract out risky activities in order to take advantage of so-called judgment-proof strategies. These strategies allow entities to limit their liability through contractual arrangements with nearly insolvent firms. However, the use of judgment-proof firms triggers countervailing effects: it provides opportunities to externalize liability through judgment-proof firms, but the insolvency of these firms introduces distortion in care levels that can generate more liability costs. These costs may outweigh the benefits of externalizing liability, making contracting out suboptimal. A simple model of organizational decision making with judgment-proof firms is developed and applied to the oil industry, where contracting out decreased in response to heightened liability following the Exxon Valdez oil spill

    Provenance Threat Modeling

    Full text link
    Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set. Provenance systems are also used for debugging, process improvement, understanding data proof of ownership, certification of validity, etc. The provenance of data includes information about the processes and source data that leads to the current representation. In this paper we study the security risks provenance systems might be exposed to and recommend security solutions to better protect the provenance information.Comment: 4 pages, 1 figure, conferenc

    Occurrence of \u3ci\u3eQuadrigyrus torquatus\u3c/i\u3e Van Cleave, 1920 \u3ci\u3e(Acanthocephala)\u3c/i\u3e in North-central Colombia, South America

    Get PDF
    During June and July of 1975 and 1976, fish of the Magdalena River basin in Colombia, South America, were examined for acanthocephalans, A total of 16 species of fish were collected from the departments of Caldas and Bolivar. Worms were fixed in AFA and stained in Mayer\u27s carmalum

    Supermodular Architecture of Inclusion

    Get PDF
    Achieving and managing workplace diversity can be contentious work for employers. As Susan Sturm\u27s recent article asserts, [e]mployers face legal and political challenges both for failing to diversify their workplaces and for diversity efforts to overcome that failure. \u27 Both employers and employees find themselves in an ambiguous and highly reactive landscape that offers little structure within which to plan diversity initiatives. Sturm\u27s thoughtful article, The Architecture of Inclusion, offers some much needed structure to institutional participants engaged in the practice of making inclusive environments. In this brief comment, we build on Sturm\u27s work, offering a simple suggestion relating to the practical structure of diversity

    Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks

    Get PDF
    This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) of their multicast regions. We find that power consumption issues provide a natural trade-off that determines optimal values for these parameters. Analysis of one application shows an increase in system security with 70-80% less power overhead than existing security approaches
    • …
    corecore