9,444 research outputs found

    Preaching to Every Pew: Cross-cultural Strategies

    Get PDF
    Author: Nieman, James R. Title: Preaching to every pew. Publisher: Minneapolis: Fortress Pr, 2001

    Unipotent Representations of Exceptional Richardson Orbits

    Full text link
    We study special unipotent representations attached to exceptional Richardson orbits, and provide some evidences on a conjecture of Vogan for such orbits.Comment: 18 pages, 5 table

    Energy dissipation prediction of particle dampers

    Get PDF
    This paper presents initial work on developing models for predicting particle dampers (PDs) behaviour using the Discrete Element Method (DEM). In the DEM approach, individual particles are typically represented as elements with mass and rotational inertia. Contacts between particles and with walls are represented using springs, dampers and sliding friction interfaces. In order to use DEM to predict damper behaviour adequately, it is important to identify representative models of the contact conditions. It is particularly important to get the appropriate trade-off between accuracy and computational efficiency as PDs have so many individual elements. In order to understand appropriate models, experimental work was carried out to understand interactions between the typically small (1.5–3 mm diameter) particles used. Measurements were made of coefficient of restitution and interface friction. These were used to give an indication of the level of uncertainty that the simplest (linear) models might assume. These data were used to predict energy dissipation in a PD via a DEM simulation. The results were compared with that of an experiment

    Address resolution protocol optimization

    Get PDF
    This paper proposes an improved Address Resolution Protocol (ARP) for Ethernet-based networks. In the proposed alternative method, the ARP request packets are not broadcasted but instead unicasted to an ARP server which will have all the mappings of all the hosts connected to the network. This significantly reduces ARP signaling and processing overhead. The ARP server obtains the mappings through a novel passive method that does not introduce additional overhead in the network. Furthermore, the use of the ARP server makes it much easier to secure the network against certain attacks like ARP poisoning

    Speculative Attacks: A Laboratory Study in Continuous Time

    Get PDF
    We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals increase the likelihood of successful speculative attacks and hasten their onset, and (b) contrary to some theory, success is enhanced by public access to information about either the net speculative position or the fundamentals. The presence of a larger speculator further enhances success, and experience with large speculators increases small speculators’ response to the public information. However, giving the large speculator increased size or better information does not significantly strengthen his impact.currency crisis, speculative attack, laboratory experiment, coordination game, pre-emption, large player
    • 

    corecore