4,773 research outputs found
Pre-processing of Wallops Station AN/FPQ-6 GEOS 2 data
Preprocessing, operation, and calibration procedures for Wallops radar syste
Error sensitivity function catalog
Various systematic errors of orbital solutions involving range and range rate rada
Modular Workflow Engine for Distributed Services using Lightweight Java Clients
In this article we introduce the concept and the first implementation of a
lightweight client-server-framework as middleware for distributed computing. On
the client side an installation without administrative rights or privileged
ports can turn any computer into a worker node. Only a Java runtime environment
and the JAR files comprising the workflow client are needed. To connect all
clients to the engine one open server port is sufficient. The engine submits
data to the clients and orchestrates their work by workflow descriptions from a
central database. Clients request new task descriptions periodically, thus the
system is robust against network failures. In the basic set-up, data up- and
downloads are handled via HTTP communication with the server. The performance
of the modular system could additionally be improved using dedicated file
servers or distributed network file systems.
We demonstrate the design features of the proposed engine in real-world
applications from mechanical engineering. We have used this system on a compute
cluster in design-of-experiment studies, parameter optimisations and robustness
validations of finite element structures.Comment: 14 pages, 8 figure
Open Source Licensing and Scattering Opportunism in Software Standards
Despite their beneficial influence on interoperability and markets, problems of detrimental opportunism occur with technology standards, including standards implemented in software, which this Article calls Software Standards. inspired by new perspectives on the study of semicommons in the history of real property, this Article Contemplates the substitutability of free and open source software ( FOSS ) for traditional standard-setting approaches. Standards are analogous to semicommons, where public and private use interact, raising the possibility of opportunistic influence on the Software Standard to increase private gain at the expense of the public benefit in a more uniform standard. With its source code disclosure requirement, FOSS shifts and dampens this opportunism, although various limits influence the reach of its effect. The political economy around a standard will express itself differently under a FOSS implementation, and clearing intellectual property rights in the standard is no more certain than under the traditional standard-setting approach
Reality and imagination: the authorial decisions of May Welland Archer and Emma Woodhouse
The ideal woman of the eighteenth and nineteenth centuries was the Angel in the House -a woman who was sweet, shy, and modest. She lived to please the men in her life. She was also the child-woman who was sheltered from the knowledge of the world because it would be too painful and heavy for her fragile shoulders to endure. Edith Wharton, in The Age of Innocence, and Jane Austen, in Emma challenge this ideal picture by creating their respective heroines, May and Emma, to be the exact opposite of it. Though May constantly acts like the ideal woman mentioned earlier, she is actually a very shrewd, intuitive, and perceptive woman. She understands the role she is supposed to play so she dons the mask of the Victorian ideal woman and hides her true personality in order to write and innocently manipulate Newland Archer\u27s every move without him ever knowing. Although Wharton\u27s May successfully controls the entire novel, Jane Austen\u27s Emma Woodhouse does not try to hide her knowledge and relies more on her imagination than reality, so when she attempts to manipulate and write other peoples\u27 stories, she fails miserably. However, in the end, Emma experiences the kind of genuine relationship with Mr. Knightley that May\u27s mask never allows May to have with Newland--Document
Slouching Toward Open Innovation: Free and Open Source Software for Electronic Health Information
This Article argues that some software markets are more favorable for open source approaches than others. Using a case study of one particular software market, this Article develops a tentative framework of factors characterizing markets likely to disfavor contemporary approaches in free and open source software
Reality and imagination: the authorial decisions of May Welland Archer and Emma Woodhouse
The ideal woman of the eighteenth and nineteenth centuries was the Angel in the House -a woman who was sweet, shy, and modest. She lived to please the men in her life. She was also the child-woman who was sheltered from the knowledge of the world because it would be too painful and heavy for her fragile shoulders to endure. Edith Wharton, in The Age of Innocence, and Jane Austen, in Emma challenge this ideal picture by creating their respective heroines, May and Emma, to be the exact opposite of it. Though May constantly acts like the ideal woman mentioned earlier, she is actually a very shrewd, intuitive, and perceptive woman. She understands the role she is supposed to play so she dons the mask of the Victorian ideal woman and hides her true personality in order to write and innocently manipulate Newland Archer\u27s every move without him ever knowing. Although Wharton\u27s May successfully controls the entire novel, Jane Austen\u27s Emma Woodhouse does not try to hide her knowledge and relies more on her imagination than reality, so when she attempts to manipulate and write other peoples\u27 stories, she fails miserably. However, in the end, Emma experiences the kind of genuine relationship with Mr. Knightley that May\u27s mask never allows May to have with Newland--Document
Patent Law\u27s Unpredictability Doctrine and the Software Arts
Part II reviews these insights from the Norden model generally. Part III brings these insights to the disclosure doctrines for software patents, with particular emphasis on the unpredictability factor for undue experimentation within enablement. The model corresponds well with enablement and best mode but does not correspond as well with other disclosure-prompting doctrines whose role is related to defining the claim. Thus, the review in Part III of written description, definiteness, and means-plus-function (§ 112 T 6) claim limitations helps establish the contours of applicability for the Norden model. The discussion of Part III also reviews the current state of the law for software patent disclosure: disclosure burdens are light and do not require disclosure of source code for the software. Thus, software patents may represent the high-water technology in patent law for having your cake and eating it too: trade secrecy protection attaches if the licensing and distribution of the software is according to proprietary licensing: distribution of object code, keeping source code secret. Within this review of software patent disclosure law, the Article contrasts the continuum of possible disclosure modes with the Norden model and patent law\u27s current requirements. Part IV then completes the article by arguing for a change to one of the requirements: reducing the categorical approach to unpredictability in the software arts. All of software should not be deemed predictable. Many niches are, but some are not. Unpredictability is one of eight Wands factors that define undue experimentation,14 but it is particularly important among the factors. Technologically, Part IV explains potential sources for unpredictable or unreliable behavior in software systems. Pragmatically, the progression of software technology since the time of the precedent influencing enablement for software patents suggests a failure by the law to recognize the changes in the technology. Moreover, the disclosure doctrines in software patents have not responded to the expansion of patentable subject matter in the area of software patents. The discussion also helps show that patent law does not necessarily specify what it means by unpredictability, whether the unpredictable arts doctrine only attaches to ungovernable or inestimable items in nature or based on natural principles. Software is different as a discipline because it processes encoded information, where the encoding is derived from human thought. For some, this processing would not fit within a definition of what is nature. Regardless, the Norden model suggests that an effort-based perspective on disclosure brings notions of unpredictability into the software arts in a nuanced and niche-specific manner
- …