Search results for "token"
showing 10 items of 24 documents
An analytical model of a new packet marking algorithm for TCP flows
2005
In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…
Tesserae frumentariae, nummariae et ‘Spintriae’ Hispaniae. Hallazgos y nuevas perspectivas
2019
This paper aims at presenting a series of unpublished imperial tesserae, originating from various Spanish institutions and sites, although most of the pieces have been found in present-day Andalusia. These tesserae are not only of the erotic type, commonly known as ‘ (sρintriαe)’, but also bear imperial busts and ludic scenes. All these tokens can be related to the incipient municipalization of Baetica and, therefore, its direct connection to Italy. But we also know that throughout the 1st and 2nd centuries AD there were ludi in Hispania. Except for Pollentia (Majorca), the tesserae seem to originate mainly from the city of Rome ; their import to the Iberian Peninsula was carried out by leg…
Il ruolo del white paper sulle offerte al pubblico di cripto-attività alla luce della proposta MiCA
2022
La proposta MiCA, nel regolare il white paper sulle offerte di crypto-assets, sembra tenere in considerazione i benefici e i limiti dei sistemi di voluntary e di mandatory disclosure, non optando integralmente né per il primo, né per il secondo. In quest’ottica, se può condividersi l’approccio regolamentare diretto a graduare, a seconda della tipologia di token offerto, sia il contenuto che l’assoggettamento del documento a mera notifica o ad approvazione ex ante da parte dell’Autorità competente, dubbi sorgono in ordine all’indistinta allocazione dell’onere della prova in capo all’oblato, nei casi di violazione della disciplina del relativo white paper.
The development of “junk”. Irregularization strategies of have and say in the Germanic languages
2001
Although it is a wellknown fact that the most frequent verbs are the most irregular ones (if not suppletive), it is rarely asked how they became irregular. This article deals with the irregularization process of two originally regular (weak) verbs, HAVE and SAY in the Germanic languages, e.g. have, but has/’s and had/’d (instead of regular *haves/*haved) or say [sei], but says [sez] and said [sed] in English. Other verbs, such as DO, GO, STAND, BE, COME, and so on, also tend to irregularizations again and again without any apparent reason. In contrast to HAVE and SAY these verbs have always been rather irregular, at least dating from their first written records.
Sociālo mediju ziņojumu ietekme uz digitālo aktīvu cenu veidošanos: ekonometriskā analīze.
2022
Darba mērķis ir novērtēt Reddit platformas sentimentu, pirmkārt, noskaidrot vai tas statistiski nozīmīgi ietekmē digitālo aktīvu Decentraland, Tezos vai Chiliz vērtību. Otrkārt, noteikt vai sociālo mediju ietekme atšķiras šiem neaizvietojamajiem tokeniem un kriptovalūtai Ethereum. Pētījums veikts par 2021. gada Reddit platformā publicētajiem ziņojumiem. Tāpat analīzei tika lejuplādēti digitālo aktīvu Decentraland, Tezos, Chiliz un Ethereum monētu tirgus dienas dati no Yahoo! Finance tīmekļa vietnes, tādējādi iegūstot 361 gadījumu par katru no aktīviem. Ziņojumu polaritātes noteikšanai tika izmantots VADER klasifikators. Ar lineāras regresijas palīdzību tika novērtēts, vai pastāv attiecības …
Comprehension of complex animation : cueing, segmentation and 2D / 3D presentations
2011
The goal of our studies was to test the effect of segmentation, cueing, and 2D/3D presentations to foster complex animation rocessing. The material was an upright mechanical piano system. We used an eye tracking system which provides information about learners’ attention direction during the animation processing. We analyzed the effect of the format presentations and the eye movements during learning. Based on animation and multimedia research background, four experiments were conducted. In the first experiment the effect of the presentation of simplified external representations on learning from complex animation was investigated. Experiment two and three aimed at studying the cognitive pr…
Initial Coin Offering (ICO) as a Fundraising Strategy : A Multiple Case Study on Success Factors
2019
Cryptocurrencies and Initial Coin Offerings (ICO) are some of the more prominent examples of currently used blockchain technology applications. Especially software startups have leveraged ICOs to gain funding early on in their lifecycles, going on to develop and create new blockchain based applications. Recently, larger companies such as Facebook have also begun to show interest in cryptocurrency, although thus far not for funding purposes in the form of ICOs. In this paper, we investigate factors that positively affect the abilities of companies to meet their fundraising goals via ICOs. We first identify a set of factors from extant literature and then seek to further confirm the effect of…
Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding
2009
Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…
On Language Adequacy
2015
Abstract The paper concentrates on the problem of adequate reflection of fragments of reality via expressions of language and inter-subjective knowledge about these fragments, called here, in brief, language adequacy. This problem is formulated in several aspects, the most general one being: the compatibility of the language syntax with its bi-level semantics: intensional and extensional. In this paper, various aspects of language adequacy find their logical explication on the ground of the formal-logical theory of syntax T of any categorial language L generated by the so-called classical categorial grammar, and also on the ground of its extension to the bi-level, intensional and ex- tensio…