4,438 research outputs found

    Network protocol scalability via a topological Kadanoff transformation

    Full text link
    A natural hierarchical framework for network topology abstraction is presented based on an analogy with the Kadanoff transformation and renormalisation group in theoretical physics. Some properties of the renormalisation group bear similarities to the scalability properties of network routing protocols (interactions). Central to our abstraction are two intimately connected and complementary path diversity units: simple cycles, and cycle adjacencies. A recursive network abstraction procedure is presented, together with an associated generic recursive routing protocol family that offers many desirable features.Comment: 4 pages, 5 figures, PhysComNet 2008 workshop submissio

    The Fruits of the Unseen: A Jamesian Challenge to Explanatory Reductionism in Accounts of Religious Experience

    Get PDF
    In Religious Experience, Wayne Proudfoot argued that a tout court rejection of reductionism in accounts of religious experience was not viable. According to Proudfoot, it’s possible to distinguish between an illegitimate practice of descriptive reductionism and the legitimate practice of explanatory reductionism. The failure to distinguish between these two forms of reductionism resulted in a protective strategy, or an attempt to protect religious experience from the reach of scientific explanation. Among the theorists whom he accused of deploying this illegitimate strategy Proudfoot included William James and his work in The Varieties of Religious Experience. In this article, I argue that while James does occasionally deploy a protective strategy in Varieties, this is not the only nor most important method of treating religious experience James developed. Implicit in his rejection of medical materialism, James not only deploys the protective strategy Proudfoot criticizes, but the pragmatic method with which he treats all claims. I argue that James’s pragmatic method leads to what James called noetic pluralism, or the view that there is no privileged knowledge practice, but a plurality of knowledge practices, and that this method puts pressure on the explanatory reductionist, who is implicitly committed to noetic monism

    The Internet's unexploited path diversity

    Get PDF
    The connectivity of the Internet at the Autonomous System level is influenced by the network operator policies implemented. These in turn impose a direction to the announcement of address advertisements and, consequently, to the paths that can be used to reach back such destinations. We propose to use directed graphs to properly represent how destinations propagate through the Internet and the number of arc-disjoint paths to quantify this network's path diversity. Moreover, in order to understand the effects that policies have on the connectivity of the Internet, numerical analyses of the resulting directed graphs were conducted. Results demonstrate that, even after policies have been applied, there is still path diversity which the Border Gateway Protocol cannot currently exploit.Comment: Submitted to IEEE Communications Letter
    corecore