9,444 research outputs found
Preaching to Every Pew: Cross-cultural Strategies
Author: Nieman, James R. Title: Preaching to every pew. Publisher: Minneapolis: Fortress Pr, 2001
Unipotent Representations of Exceptional Richardson Orbits
We study special unipotent representations attached to exceptional Richardson
orbits, and provide some evidences on a conjecture of Vogan for such orbits.Comment: 18 pages, 5 table
Energy dissipation prediction of particle dampers
This paper presents initial work on developing models for predicting particle dampers (PDs) behaviour using the Discrete Element Method (DEM). In the DEM approach, individual particles are typically represented as elements with mass and rotational inertia. Contacts between particles and with walls are represented using springs, dampers and sliding friction interfaces. In order to use DEM to predict damper behaviour adequately, it is important to identify representative models of the contact conditions. It is particularly important to get the appropriate trade-off between accuracy and computational efficiency as PDs have so many individual elements. In order to understand appropriate models, experimental work was carried out to understand interactions between the typically small (1.5â3 mm diameter) particles used. Measurements were made of coefficient of restitution and interface friction. These were used to give an indication of the level of uncertainty that the simplest (linear) models might assume. These data were used to predict energy dissipation in a PD via a DEM simulation. The results were compared with that of an experiment
Address resolution protocol optimization
This paper proposes an improved Address Resolution Protocol (ARP) for Ethernet-based networks. In the proposed alternative method, the ARP request packets are not broadcasted but instead unicasted to an ARP server which will have all the mappings of all the hosts connected to the network. This significantly reduces ARP signaling and processing overhead. The ARP server obtains the mappings through a novel passive method that does not introduce additional overhead in the network. Furthermore, the use of the ARP server makes it much easier to secure the network against certain attacks like ARP poisoning
Speculative Attacks: A Laboratory Study in Continuous Time
We examine speculative attacks in a controlled laboratory environment featuring continuous time, size asymmetries, and varying amounts of public information. Attacks succeeded in 233 of 344 possible cases. When speculators have symmetric size and access to information: (a) weaker fundamentals increase the likelihood of successful speculative attacks and hasten their onset, and (b) contrary to some theory, success is enhanced by public access to information about either the net speculative position or the fundamentals. The presence of a larger speculator further enhances success, and experience with large speculators increases small speculatorsâ response to the public information. However, giving the large speculator increased size or better information does not significantly strengthen his impact.currency crisis, speculative attack, laboratory experiment, coordination game, pre-emption, large player
- âŠ