7,990 research outputs found

    Web and Semantic Web Query Languages

    Get PDF
    A number of techniques have been developed to facilitate powerful data retrieval on the Web and Semantic Web. Three categories of Web query languages can be distinguished, according to the format of the data they can retrieve: XML, RDF and Topic Maps. This article introduces the spectrum of languages falling into these categories and summarises their salient aspects. The languages are introduced using common sample data and query types. Key aspects of the query languages considered are stressed in a conclusion

    From top-hat masking to smooth transitions: P-filter and its application to polarized microwave sky maps

    Full text link
    In CMB science, the simplest idea to remove a contaminated sky region is to multiply the sky map with a mask that is 0 for the contaminated region and 1 elsewhere, which is also called a top-hat masking. Although it is easy to use, such top-hat masking is known to suffer from various leakage problems. Therefore, we want to extend the top-hat masking to a series of semi-analytic functions called the P-filters. Most importantly, the P-filters can seamlessly realize the core idea of masking in CMB science, and, meanwhile, guarantee continuity up to the first derivative everywhere. The P-filters can significantly reduce many leakage problems without additional cost, including the leakages due to low-, high-, and band-pass filtering, and the E-to-E, B-to-B, B-to-E, and E-to-B leakages. The workings of the P-filter are illustrated by using the WMAP and Planck polarization sky maps. By comparison to the corresponding WMAP/Planck masks, we show that the P-filter performs much better than top-hat masking, and meanwhile, has the potential to supersede the principal idea of masking in CMB science. Compared to mask apodization, the P-filter is ``outward'', that tends to make proper use of the region that was marked as 0; whereas apodization is ``inward'', that always kills more signal in the region marked as 1.Comment: 19 pages and 11 figure

    A Robust Multi-Dimensional Poverty Profile for Uganda

    Get PDF
    In this paper we compute a multi-dimensional poverty index (MPI) for Uganda following the approach proposed by Alkire and Forster (2007). Using household survey data we show how the incidence of multi-dimensional poverty has fallen in recent years and we use the decomposability features of the index to explain the drivers of reduction in multi-dimensional poverty. We also compare the results from Uganda with other countries for which the MPI has been computed and we note some caveats in such a comparison. The robustness of our estimates is tested in a stochastic dominance framework and using statistical inference. Notably, we extend the one-dimensional analysis of stochastic dominance to take into account household size in a second dimension, which is particularly important as some of the MPI indicators are sensitive to the number of household members. By exploiting a unique subsample of the integrated household survey programme in Uganda, which has not previously been analysed, we are also able to match the data-set used for the MPI with data used to compute the conventional estimates of monetary poverty. This enables a more robust assessment of the complementarities of the two types of poverty measures than has been previously possible.multidimensional poverty, counting approach, Uganda, household size, robustness analysis, international comparisons.

    Efficiency loss in a class of two-sided market mechanisms

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 57).This thesis addresses the question of how to efficiently allocate resources among competing players in convex environments. We will analyze the efficiency loss of certain two-sided market mechanisms involving both consumers and suppliers that are natural extensions of Johari's thesis. After gaining intuition about the mechanisms, we show that their worst case efficiency loss approaches 100%. We then introduce some supply-side market mechanisms in a network setting. In the market mechanisms we study, every player submits a bid which specifies a demand or supply function from a parameterized family. Then, the mechanism allocates resources so that supply meets demand.by Sebastian James Neumayer.S.M

    On the Reliability of LTE Random Access: Performance Bounds for Machine-to-Machine Burst Resolution Time

    Full text link
    Random Access Channel (RACH) has been identified as one of the major bottlenecks for accommodating massive number of machine-to-machine (M2M) users in LTE networks, especially for the case of burst arrival of connection requests. As a consequence, the burst resolution problem has sparked a large number of works in the area, analyzing and optimizing the average performance of RACH. However, the understanding of what are the probabilistic performance limits of RACH is still missing. To address this limitation, in the paper, we investigate the reliability of RACH with access class barring (ACB). We model RACH as a queuing system, and apply stochastic network calculus to derive probabilistic performance bounds for burst resolution time, i.e., the worst case time it takes to connect a burst of M2M devices to the base station. We illustrate the accuracy of the proposed methodology and its potential applications in performance assessment and system dimensioning.Comment: Presented at IEEE International Conference on Communications (ICC), 201
    corecore