7,820 research outputs found

    Scottish appeals and the proposed Supreme Court

    Get PDF

    Degeneration of ALF D_n Metrics

    Get PDF
    Beginning with the Legendre transform construction of hyperk\"ahler metrics, we analyze the ALF version of the D_n metrics. We determine the constraint equation obtained from extremizing the ww coordinate of the generating function F(z,\bar{z},u,\bar{u},w) and study its behavior as we send two of the mass parameters of the DnD_n metric to zero. We find that the constraint equation enforces the limit that the metric becomes that of multi-Taub-NUT.Comment: 14 pages, 7 figures, LaTeX, minor corrections, to appear in JHE

    Using evidence to inform health policy: case study

    Get PDF
    No abstract available

    On-board processing satellite network architecture and control study

    Get PDF
    For satellites to remain a vital part of future national and international communications, system concepts that use their inherent advantages to the fullest must be created. Network architectures that take maximum advantage of satellites equipped with onboard processing are explored. Satellite generations must accommodate various services for which satellites constitute the preferred vehicle of delivery. Such services tend to be those that are widely dispersed and present thin to medium loads to the system. Typical systems considered are thin and medium route telephony, maritime, land and aeronautical radio, VSAT data, low bit rate video teleconferencing, and high bit rate broadcast of high definition video. Delivery of services by TDMA and FDMA multiplexing techniques and combinations of the two for individual and mixed service types are studied. The possibilities offered by onboard circuit switched and packet switched architectures are examined and the results strongly support a preference for the latter. A detailed design architecture encompassing the onboard packet switch and its control, the related demand assigned TDMA burst structures, and destination packet protocols for routing traffic are presented. Fundamental onboard hardware requirements comprising speed, memory size, chip count, and power are estimated. The study concludes with identification of key enabling technologies and identifies a plan to develop a POC model

    Delivering real-world ubiquitous location systems

    Get PDF
    Location-enhanced applications are poised to become the first real-world example of ubiquitous computing. In this paper, we emphasize the practical aspects of getting location-enhanced applications deployed on existing devices, such as laptops, tablets, PDAs, and cell phones, without the need to purchase additional sensors or install special infrastructure. Our goal is to provide readers with an overview of the practical considerations that are currently being faced, and the research challenges that lie ahead. We ground the article with a summary of initial work on two deployments of location- enhanced computing: multi-player location-based games and a guide for the Edinburgh Festival

    GBM radiosensitizers: dead in the water
or just the beginning?

    Get PDF
    The finding that most GBMs recur either near or within the primary site after radiotherapy has fueled great interest in the development of radiosensitizers to enhance local control. Unfortunately, decades of clinical trials testing a wide range of novel therapeutic approaches have failed to yield any clinically viable radiosensitizers. However, many of  the previous radiosensitizing strategies were not based on clear pre-clinical evidence, and in many cases blood-barrier penetration was not considered. Furthermore, DNA repair inhibitors have only recenly arrived in the clinic, and likely represent potent agents for glioma radiosensitization. Here, we present recent progress in the use of small molecule DNA damage response inhibitors as GBM radiosensitizers. In addition, we discuss the latest progress in targeting hypoxia and oxidative stress for GBM radiosensitization

    Three applications for mobile epidemic algorithms

    Get PDF
    This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment

    On-board processing satellite network architecture and control study

    Get PDF
    The market for telecommunications services needs to be segmented into user classes having similar transmission requirements and hence similar network architectures. Use of the following transmission architecture was considered: satellite switched TDMA; TDMA up, TDM down; scanning (hopping) beam TDMA; FDMA up, TDM down; satellite switched MF/TDMA; and switching Hub earth stations with double hop transmission. A candidate network architecture will be selected that: comprises multiple access subnetworks optimized for each user; interconnects the subnetworks by means of a baseband processor; and optimizes the marriage of interconnection and access techniques. An overall network control architecture will be provided that will serve the needs of the baseband and satellite switched RF interconnected subnetworks. The results of the studies shall be used to identify elements of network architecture and control that require the greatest degree of technology development to realize an operational system. This will be specified in terms of: requirements of the enabling technology; difference from the current available technology; and estimate of the development requirements needed to achieve an operational system. The results obtained for each of these tasks are presented

    Measurement of aberrations of photographic lenses

    Get PDF
    n/

    Supporting ethnographic studies of ubiquitous computing in the wild

    Get PDF
    Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their design in a wide variety of settings. The emergence of ubiquitous computing raises new challenges for ethnography however, distributing interaction across a burgeoning array of small, mobile devices and online environments which exploit invisible sensing systems. Understanding interaction requires ethnographers to reconcile interactions that are, for example, distributed across devices on the street with online interactions in order to assemble coherent understandings of the social character and purchase of ubiquitous computing systems. We draw upon four recent studies to show how ethnographers are replaying system recordings of interaction alongside existing resources such as video recordings to do this and identify key challenges that need to be met to support ethnographic study of ubiquitous computing in the wild
    • 

    corecore