Search results for "Location"
showing 10 items of 1480 documents
Optimal Buffer Resource Allocation in Wireless Caching Networks
2019
Wireless caching systems have been exhaustively investigated in recent years. Due to limited buffer capacity, and unbalanced arrival and service rates, the backlogs may exist in the caching node and even cause buffer overflow. In this paper, we first investigate the relationship among backlogs, buffer capacity, data arrival rate and service rate, utilizing the martingale theory which is flexible in handling any arrival and service processes. Then given a target buffer overflow probability, the minimal required buffer portion is determined. If the devoted buffer capacity can fulfill all serving users' minimal buffer requirements, an optimization problem is constructed with the objective to m…
Ethics appraisal procedure in 79,670 Marie Skłodowska-Curie proposals from the entire European HORIZON 2020 research and innovation program (2014–202…
2021
Introduction Horizon 2020 was the most significant EU Research and Innovation programme ever implemented and included the Marie Skłodowska-Curie Actions (MSCA). Proposals submitted to the MSCA actions awere subject to the Ethics Appraisal Procedure. In this work we explored the ethics appraisal procedure in MSCA H2020. Methods Using a retrospective analysis of pooled anonymized data, we explored the ethics appraisal procedure on proposals submitted to Marie Skłodowska-Curie Actions (MSCA) during the entire Horizon 2020 program period (N = 79,670). Results Our results showed that one of the most frequently identified ethics categories was Data protection. We also detected slight differences…
Executives' Commitment to Information Security
2020
Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…
A fast and efficient picking algorithm for earthquake early warning application based on the variance piecewise constant models
2020
An earthquake warning system, or earthquake early warning system, is a system of accelerometers, seismometers, communication, computers, and alarms that is devised for notifying adjoining regions of a substantial earthquake while it is in progress. This is not the same as earthquake prediction, which is currently incapable of producing decisive event warnings. The implementation of efficient and computationally simple picking algorithm is necessary for this purpose, as well as automatic picking of seismic phases for seismic surveillance and routine earthquake location for fast hypocenter determination. In this paper a method for picking based on the detection of signals changes in variance …
Depletion of cytosolic GSH decreases the ATP levels and viability of synaptosomes from aged mice but not from young mice
1995
The effect of glutathione depletion on the viability of freshly isolated synaptosomes from whole brain was investigated in young and aged mice. Aging did not influence the GSH and ATP levels and the viability of these synaptosomes. However depletion of glutathione caused by the cytosolic glutathione inhibitor diethyl maleate (1 mM) resulted in a significant decline, after 60 min of incubation, in ATP levels and viability in the synaptosomes from aged mice but not in those from young mice. When synaptosomes were incubated in the presence of the mitochondrial glutathione inhibitor ethacrynic acid (0.2 mM) there was a similar decline in glutathione, ATP levels and synaptosomal viability, both …
Vertical take-off and landing air transport to provide tourist mobility.
2012
Abstract This paper examines helicopter transfer services to reach attractive and not very accessible tourist areas, taking Sicily and its minor islands, in the South of Italy, as a case study. We investigate the viability of helicopter scheduled services for tourists moving from/to airports or doing one day tours to visit far away places. The mode choice of tourists is simulated using random utility models employing stated preference data. Heli-shuttle service is planned in terms of fleet size, frequency, fare and location pattern of heliports. The paper also analyses how a public subsidy reducing fares might change the set of feasible connections.
Navigating efficiency and effectiveness relationships across local government services: Another step toward strategic resource management
2013
A major part of maintaining a well-managed performance measurement system in local government is providing the infrastructure for performance management. The problem is that local officials often struggle with moving from adopting performance measures to actually using them for improving services and for making resource allocation decisions. This article responds to this struggle by presenting information on the relationships between efficiency and effectiveness measures across six local government service areas, with the goal of providing guidance on using performance measures to support strategic resource management. Our research suggests that stronger correlations exist between efficienc…
Revenue-Aware Resource Allocation in the Future Multi-Service IP Networks
2006
In the future IP networks, a wide range of different service classes must be supported in a network node and different classes of customers will pay different prices for their used node resources based on their Service-Level-Agreements. In this paper, we link the resource allocation issue with pricing strategies and explore the problem of maximizing the revenue of service providers in a network node by optimally allocating a given amount of node resources among multiple service classes. Under the linear pricing strategy, the optimal resource allocation scheme is derived for the case that no firm Quality-of-Service (QoS) guarantees are required for all service classes, which can achieve the …
Improving Usability of Location-Based Services with User-Centric Data Querying
2004
In this paper, we describe a computational model that produces a dataset which we consider to be an appropriate response for “give me a description of my neighborhood” type of queries in location-based services Our attempt is to reflect the abstraction ability of a specific user, and in this way to maximize the usability of the service under restrictions on data volume posed by technical, economical and cognitive factors of mobile environments We also present the results of instantiating the model for a simple LBS.
Joint Radio and Computational Resource Allocation in IoT Fog Computing
2018
The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…