9 research outputs found

    Bipartite electronic SLA as a business framework to support cross-organization load management of real-time online applications

    No full text
    Online applications such as games and e-learning applications fall within the broader category of real-time online interactive applications (ROIA), a new class of ‘killer’ application for the Grid that is being investigated in the edutain@grid project. The two case studies in edutain@grid are an online game and an e-learning training application. We present a novel Grid-based business framework that makes use of bipartite service level agreements (SLAs) and dynamic invoice models to model complex business relationships in a massively scalable and flexible way. We support cross-organization load management at the business level, through zone migration. For evaluation we look at existing and extended value chains, the quality of service (QoS) metrics measured and the dynamic invoice models that support this work. We examine the causal links from customer quality of experience (QoE) and service provider quality of business (QoBiz) through to measured quality of service. Finally we discuss a shared reward business ecosystem and suggest how extended service level agreements and invoice models can support this

    Solvable Systems of Linear Differential Equations

    Full text link
    The asymptotic iteration method (AIM) is an iterative technique used to find exact and approximate solutions to second-order linear differential equations. In this work, we employed AIM to solve systems of two first-order linear differential equations. The termination criteria of AIM will be re-examined and the whole theory is re-worked in order to fit this new application. As a result of our investigation, an interesting connection between the solution of linear systems and the solution of Riccati equations is established. Further, new classes of exactly solvable systems of linear differential equations with variable coefficients are obtained. The method discussed allow to construct many solvable classes through a simple procedure.Comment: 13 page

    Anomalous dimensions and phase transitions in superconductors

    Full text link
    The anomalous scaling in the Ginzburg-Landau model for the superconducting phase transition is studied. It is argued that the negative sign of the η\eta exponent is a consequence of a special singular behavior in momentum space. The negative sign of η\eta comes from the divergence of the critical correlation function at finite distances. This behavior implies the existence of a Lifshitz point in the phase diagram. The anomalous scaling of the vector potential is also discussed. It is shown that the anomalous dimension of the vector potential ηA=4−d\eta_A=4-d has important consequences for the critical dynamics in superconductors. The frequency-dependent conductivity is shown to obey the scaling σ(ω)∼ξz−2\sigma(\omega)\sim\xi^{z-2}. The prediction z≈3.7z\approx 3.7 is obtained from existing Monte Carlo data.Comment: RevTex, 20 pages, no figures; small changes; version accepted in PR

    Critical behavior at m-axial Lifshitz points: field-theory analysis and ϵ\epsilon-expansion results

    Full text link
    The critical behavior of d-dimensional systems with an n-component order parameter is reconsidered at (m,d,n)-Lifshitz points, where a wave-vector instability occurs in an m-dimensional subspace of Rd{\mathbb R}^d. Our aim is to sort out which ones of the previously published partly contradictory ϵ\epsilon-expansion results to second order in ϵ=4+m2−d\epsilon=4+\frac{m}{2}-d are correct. To this end, a field-theory calculation is performed directly in the position space of d=4+m2−ϵd=4+\frac{m}{2}-\epsilon dimensions, using dimensional regularization and minimal subtraction of ultraviolet poles. The residua of the dimensionally regularized integrals that are required to determine the series expansions of the correlation exponents ηl2\eta_{l2} and ηl4\eta_{l4} and of the wave-vector exponent βq\beta_q to order ϵ2\epsilon^2 are reduced to single integrals, which for general m=1,...,d-1 can be computed numerically, and for special values of m, analytically. Our results are at variance with the original predictions for general m. For m=2 and m=6, we confirm the results of Sak and Grest [Phys. Rev. B {\bf 17}, 3602 (1978)] and Mergulh{\~a}o and Carneiro's recent field-theory analysis [Phys. Rev. B {\bf 59},13954 (1999)].Comment: Latex file with one figure (eps-file). Latex file uses texdraw to generate figures that are included in the tex

    Next generation community management: A proactive risk-based approach

    No full text
    Effective management of online communities is a significant challenge as they can exceed millions of users producing hundreds of millions of discussion threads that link together billions of posts. Current management solutions are based on basic statistical tools that aggregate data for the community owner/moderator to interpret themselves and take appropriate actions. This paper presents a proactive and extensible risk-based management framework supporting advanced analytical services for managing online communities. This allows community owners to focus on their community objectives and proactively manage favourable/unfavourable events at the user and community level

    Supporting coordinated maintenance of system trustworthiness and user trust at runtime

    No full text
    In addition to design-time considerations, user trust and the trustworthiness of software-intensive socio-technical systems (STS) need to be maintained during runtime. Especially trust can only be monitored based on the actual usage of the system in operation. Service providers should be able to make informed decisions about runtime adaptation based on trust and trustworthiness, as well as respective essential relations. In this paper we present a unified approach to support the coordination of trust and trustworthiness maintenance. Trustworthiness maintenance is based on measuring objective system qualities, while trust maintenance considers two complementary measures of trust, i.e., the user behavior, and an estimation of the perceived system trustworthiness. A prototype tool demonstrates the feasibility of our approach. Furthermore, we illustrate specific functionalities of the tool by means of an application example

    Impacts of water and soil conservation strategies on households’ food security in North West of Benin.

    No full text
    <p>*Bolded p-values are likelihood ratio test p-values and non-bolded p-values are Wald test p-values.</p>†<p>Likelihood ratio test p-values significant at the 5% level.</p
    corecore