- Holidays and Film Premieres: A Symbolic Punctuation of Time - Mikhalkov’s "Predstoyaniye": The Film and the Word - Attendance and Reception of "Predstoyaniye" (17/22 April 2010) - "Tsitadel" (5 May 2011; originally planned for 4... more
- Holidays and Film Premieres: A Symbolic Punctuation of Time
- Mikhalkov’s "Predstoyaniye": The Film and the Word
- Attendance and Reception of "Predstoyaniye" (17/22 April 2010)
- "Tsitadel" (5 May 2011; originally planned for 4 November 2010)
- Khotinenko’s "Pop" (5 April 2010—Easter Sunday)
ABSTRACTIcons are frequently used in contexts where comprehension needs to be consistent across cultural and linguistic barriers. This paper reports on a study comparing the comprehension of 54 universal medical icons in rural Tanzania... more
ABSTRACTIcons are frequently used in contexts where comprehension needs to be consistent across cultural and linguistic barriers. This paper reports on a study comparing the comprehension of 54 universal medical icons in rural Tanzania and the United States of America. It finds that most of the icons were not understood cross-culturally. The premise of the study was that this misunderstanding might have two causes: cultural distinctions and lack of knowledge. To test the premise we studied icon comprehension by those in two different cultures with two levels of medical knowledge: 'standard' and 'advanced'. The results show that most (33 of 47) poorly comprehended icons failed due to lack of medical knowledge or unfamiliarity with technology, while few (5 of 47) poorly comprehended icons failed due to cultural differences. Analysis of icons that failed due to cultural differences suggests that the primary drivers of cultural misunderstanding were the use of culturally...
Sculptures of Shiva Nataraja, dancing in his ring of flame, may be the best-known objects of Indic art. Their fame and their academic interpretation derive in large part, however, from an essay by Ananda K. Coomaraswamy that... more
Sculptures of Shiva Nataraja, dancing in his ring of flame, may be the best-known objects of Indic art. Their fame and their academic interpretation derive in large part, however, from an essay by Ananda K. Coomaraswamy that oversimplifies the visual icon's links to written documents and that represents texts composed in the thirteenth century as contemporary with this image type, although sculptures of Nataraja survive from the early tenth century. Evidence from the tenth century suggests his significance rather as the wild lord of the cremation ground and as an emblem of the Chola dynasty.
Mythological representations have always symbolically embodied human beings' ancestral fears and wishes. Yet today the reading of the languages of new myths can convey the key to an understanding of the historical period we are living in.... more
Mythological representations have always symbolically embodied human beings' ancestral fears and wishes. Yet today the reading of the languages of new myths can convey the key to an understanding of the historical period we are living in. Nowadays one of the most popular cultural icons is Michelle Obama. First Afro-American FLOTUS, Michelle is still serving as a highly influential role-model, whose recently published autobiography, Becoming, is a record best-selling book. By drawing on the theoretical approach of Appraisal Framework (Martin and White 2007), I intend to investigate how her 'becoming Michelle' was accomplished. The AF explores the way language is used to evaluate and/or adopt stances and to construe textual personas, and how affective involvement can be conveyed through a set of indicators. Accordingly, qualitative examples are analysed to show how, in Michelle's autobiography, the lexico-grammar options are significant in the process of the shaping of her status of a modern cultural icon.
Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the... more
Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the network becomes more heavily congested, there is an increased probability that these critical packets are lost, resulting in obsolete control information being used to make important decisions. This would further compound the problem of network congestion and lead to a very rapid loss of connectivity and throughput. Given this, we argue the solutions to these problems should not rely on putting extra bandwidth on a radio interface. Instead, we should exploit the use of multiple radios to ensure the route can be firmly established. In this paper, we propose a multiradio solution which reserves one radio channel exclusively for routing. Our simulation results have demonstrated that using a separate radio for routing protocol would dramatically improve reliability in heavily loaded ad hoc wireless networks, thereby effectively alleviating the impact of network congestion.
In this paper, we overview the implementation of an algorithm to coordinate the congestion control algorithms of the TCP transport protocol and the ATM celloriented switching architecture. The novel idea uses ATM rate-based flow control... more
In this paper, we overview the implementation of an algorithm to coordinate the congestion control algorithms of the TCP transport protocol and the ATM celloriented switching architecture. The novel idea uses ATM rate-based flow control to adjust the credit-based window size of TCP via the implementation of an agent. The effects of running TCP over ABR are studied with the help of two different environments (LAN and WAN). Firstly, we show that TCP window (CWND) and ABR Actual Cell Rate (ACR) are weakly correlated. Secondly, we derive an agentbased algorithm to ensure that even when the ATM switch queues are indicating no congestion, it is the switch (and not the source) which should control the increment in the TCP source rates. The introduction of the agent at the edge of the network coordinates the TCP and ATM sending transmission and clearly demonstrates a strong correlation coefficient between CWND and ACR. The simulation results show that coordination at the edge of the network makes better use of available bandwidth and improves TCP's performance over ATM for a range of performance metrics such as the Cell Loss Ratio, the Packet Retransmission Ratio and the Throughput.
The Character Sequence Modeling (CSM), typically called the Language Modeling, has not received sufficient attention in the current transliteration research. We discuss the impact of various CSM factors like word granularity, smoothing... more
The Character Sequence Modeling (CSM), typically called the Language Modeling, has not received sufficient attention in the current transliteration research. We discuss the impact of various CSM factors like word granularity, smoothing technique, corpus variation, and word origin on the transliteration accuracy. We demonstrate the importance of CSM by showing that for transliterating into English, for two very different languages, Hindi and Persian, systems employing only monolingual resources and simple non-probabilistic character mappings achieve accuracy close to that of the baseline statistical systems employing parallel transliteration pairs. It shows that a reasonable transliteration system can be built for resource scarce languages that lack large parallel corpora.
Marking and Mark-based Detection to the field of IP Traceback. In Dynamic Marking it is possible to find the attack agents in a large scale DDoS network. Moreover, in the case of a DRDoS it enables the victim to trace the attack one step... more
Marking and Mark-based Detection to the field of IP Traceback. In Dynamic Marking it is possible to find the attack agents in a large scale DDoS network. Moreover, in the case of a DRDoS it enables the victim to trace the attack one step further back to the source, to find a master machine or the real attacker with only a few numbers of packets. The proposed marking procedure increases the possibility of DRDoS attack detection at the victim through Mark-based Detection. In Mark-based method, the detection engine takes into account the marks of the packets to identify varying sources of a single site involved in a DDoS attack. This significantly increases the probability of detection. In order to satisfy the end-to-end arguments approach, fate-sharing and also respect to the need for scalable and applicable schemes, only edge routers implement our simple marking procedure. The delay and bandwidth overhead added to the edge routers is fairly negligible.
It is generally accepted that self-similar (or fractal) processes may provide better models of teletraffic in modern computer networks than Poisson processes. Thus, an important requirement for conducting simulation studies of... more
It is generally accepted that self-similar (or fractal) processes may provide better models of teletraffic in modern computer networks than Poisson processes. Thus, an important requirement for conducting simulation studies of telecommunication networks is the ability to generate long synthetic stochastic self-similar sequences. A new generator of pseudo-random self-similar sequences, based on the fractional Gaussian noise (FGN) and a wavelet transform, is proposed and analysed in this paper. Specifically, this generator uses Daubechies wavelets. The motivation behind this selection of wavelets is that Daubechies wavelets lead to more accurate results by better matching the selfsimilar structure of long range dependent processes, than other types of wavelets. The statistical accuracy and time required to produce sequences of a given (long) length are experimentally studied. This generator shows a high level of accuracy of the output data (in the sense of the Hurst parameter) and is fast. Its theoretical algorithmic complexity is O(n).
Close Document Image Close Document Printer Image Print This Document! Conservation Information Network (BCIN). Author: Romey, Kristin Title Article/Chapter: "Bourgeois dreams: Georgia's forgotten Art Nouveau legacy ...
p-Cycle is a type of shared link protection for survivable wavelength-division multiplexing (WDM) mesh networks. p-Cycle not only retains ring-like restoration speeds, but also achieves capacity efficiency in mesh networks. However,... more
p-Cycle is a type of shared link protection for survivable wavelength-division multiplexing (WDM) mesh networks. p-Cycle not only retains ring-like restoration speeds, but also achieves capacity efficiency in mesh networks. However, finding the optimal set of p-cycles to protect all traffic demands within a reasonable response time is difficult. This is particularity true with dense meshes or large networks, because the number of candidates is huge.
This paper introduces a novel approach to transport messages between a backbone network and a device network (SAN) in a seamless way, even when these networks use incompatible protocols or technologies. The paper shows how to leverage a... more
This paper introduces a novel approach to transport messages between a backbone network and a device network (SAN) in a seamless way, even when these networks use incompatible protocols or technologies. The paper shows how to leverage a general purpose distributed object oriented middleware to encapsulate and send messages as object invocations.
Previous papers have described and evaluated the performance of packet discard techniques for maintaining packet integrity during overload in ATM switches but without taking into account di erent classes of service.
In this paper, we overview the implementation of an algorithm to coordinate the congestion control algorithms of the TCP transport protocol and the ATM celloriented switching architecture. The novel idea uses ATM rate-based flow control... more
In this paper, we overview the implementation of an algorithm to coordinate the congestion control algorithms of the TCP transport protocol and the ATM celloriented switching architecture. The novel idea uses ATM rate-based flow control to adjust the credit-based window size of TCP via the implementation of an agent. The effects of running TCP over ABR are studied with the help of two different environments . Firstly, we show that TCP window (CWND) and ABR Actual Cell Rate (ACR) are weakly correlated. Secondly, we derive an agentbased algorithm to ensure that even when the ATM switch queues are indicating no congestion, it is the switch (and not the source) which should control the increment in the TCP source rates. The introduction of the agent at the edge of the network coordinates the TCP and ATM sending transmission and clearly demonstrates a strong correlation coefficient between CWND and ACR. The simulation results show that coordination at the edge of the network makes better use of available bandwidth and improves TCP's performance over ATM for a range of performance metrics such as the Cell Loss Ratio, the Packet Retransmission Ratio and the Throughput.
Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the... more
Ad hoc networks typically require a significant amount of routing and control information to be distributed in a timely and reliable manner throughout the network, particularly in dynamic environments. As traffic levels increase and the network becomes more heavily congested, there is an increased probability that these critical packets are lost, resulting in obsolete control information being used to make
We introduce a new paradigm for the retrieval and presentation of management data. XNAMI is a Javabased network and application management toolkit which uses XML and the Document Object Model to specify a Management Information Base (MIB)... more
We introduce a new paradigm for the retrieval and presentation of management data. XNAMI is a Javabased network and application management toolkit which uses XML and the Document Object Model to specify a Management Information Base (MIB) at runtime. This approach allows the MIB to be serialized and shipped over the network between managers and agents. It also facilitates runtime agent extension and allows the MIB to be e asily browsed a n d s e amlessly integrated with online documentation. XML further allows for the interchange of data between management applications using di erent information models. (a) Get X Agent No X in MIB Manager Definition and code for X Agent X now in MIB Manager (b)
Abstrmct-In this paper we present an adaptive multiple antenna selection (AdMAS) employing a maximum of 4 transmit (4 Tx) and I receive (1 Rx) antenna in conjunction with coded spacetime-frequency (STF) orthogonal frequency division... more
Abstrmct-In this paper we present an adaptive multiple antenna selection (AdMAS) employing a maximum of 4 transmit (4 Tx) and I receive (1 Rx) antenna in conjunction with coded spacetime-frequency (STF) orthogonal frequency division multiplexing (OFDM) over Broadband Wireless Access IEEE 802.16 Stanford Interim University (SUI) channels. Our coded STF-OFDM is a product of phase-shift-keying (PSK) modulated STF block code which has been concatenated with convolutional codes of rate 1/3, constant length of 8, and code generator of 1225 331 3671. In transmitting data we adaptively select channel(s) with least fade and turn off the most faded channel(s) at the transmitter side. We determine levels of fading of the channel from each transmitter based on the calculated second moment of the channel impulse response (CIR). We also compare results when level of fading is based on the mean of the CIR. We tested our scheme in the most severe case of Sil channel, i.e SUI6. Results show that the employment of AdMAS does not give significant gain at low-level constellations. However significant gain is observed at higher constellations which makes our proposed scheme a potential scheme to be employed for the high data rate system.