7 research outputs found

    Data assurance in opaque computations

    Get PDF
    The chess endgame is increasingly being seen through the lens of, and therefore effectively defined by, a data ‘model’ of itself. It is vital that such models are clearly faithful to the reality they purport to represent. This paper examines that issue and systems engineering responses to it, using the chess endgame as the exemplar scenario. A structured survey has been carried out of the intrinsic challenges and complexity of creating endgame data by reviewing the past pattern of errors during work in progress, surfacing in publications and occurring after the data was generated. Specific measures are proposed to counter observed classes of error-risk, including a preliminary survey of techniques for using state-of-the-art verification tools to generate EGTs that are correct by construction. The approach may be applied generically beyond the game domain

    Long-range Angular Correlations On The Near And Away Side In P-pb Collisions At √snn=5.02 Tev

    Get PDF
    7191/Mar294

    An Introduction to Cyberbullying

    No full text
    Despite cyberbullying being regarded as a new form of bullying, it is also contextualized within the broader bullying literature. This chapter will provide a review of the literature concerning cyberbullying, to offer insight into its conceptualization. The chapter will discuss the development of digital technologies and opportunities to communicate online. Then, considering this new form of bullying, the chapter discusses and explores the definitional aspect of cyberbullying, particularly addressing definitional issues when applying traditional bullying criteria. The chapter will then review unique features of cyberbullying, and how they fit in within the overall definition of bullying. Finally, the chapter will explore the different types of cyberbullying, the prevalence of cyberbullying in England and discuss the impact such involvement can have on those involved

    Retrieving monitoring and accounting information from constrained devices in internet-of-things applications

    Full text link
    Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device's operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today's IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monitoring and accounting data from constrained devices. On the infrastructure side, the developed prototype relies on using standard building blocks offered by the AMAAIS project in order to collect, pre-process, distribute, and persistently store monitoring and accounting information. Necessary on-device and infrastructure components are prototypically implemented and empirically evaluated in a realistic simulation environment. Experiment results indicate that CoAP is suited for efficiently transferring monitoring and accounting data, both due to a small energy footprint and a memory-wise compact implementation

    A Review of Low Frequency Electromagnetic Wave Phenomena Related to Tropospheric-Ionospheric Coupling Mechanisms

    No full text
    corecore