75 research outputs found

    Ensemble evaluation of hydrological model hypotheses

    Get PDF
    It is demonstrated for the first time how model parameter, structural and data uncertainties can be accounted for explicitly and simultaneously within the Generalized Likelihood Uncertainty Estimation (GLUE) methodology. As an example application, 72 variants of a single soil moisture accounting store are tested as simplified hypotheses of runoff generation at six experimental grassland field-scale lysimeters through model rejection and a novel diagnostic scheme. The fields, designed as replicates, exhibit different hydrological behaviors which yield different model performances. For fields with low initial discharge levels at the beginning of events, the conceptual stores considered reach their limit of applicability. Conversely, one of the fields yielding more discharge than the others, but having larger data gaps, allows for greater flexibility in the choice of model structures. As a model learning exercise, the study points to a “leaking” of the fields not evident from previous field experiments. It is discussed how understanding observational uncertainties and incorporating these into model diagnostics can help appreciate the scale of model structural error

    Writing in Britain and Ireland, c. 400 to c. 800

    Get PDF
    No abstract available

    Copyright C

    No full text
    While there has been considerable effort in creating a single sign-on solution for interoperability among authentication methods, such interoperability across authorization methods has received little attention. This paper presents a flexible distributed authorization protocol that provides the full generality of restricted proxies while supporting the functionality of and interoperability with existing authorization models including OSF DCE and SESAME V2. Our authorization protocol includes a delegation method that is well suited for certain electronic commerce applications. 1 Introduction Authentication and authorization are essential functions for the security of distributed systems. Authentication protocols have been studied at great length; this paper concentrates on distributed authorization and describes a protocol that can be applied to address a variety of distributed authorization problems. Such protocols must be flexible in order to satisfy the needs of a diverse set of ap..
    corecore