Experimental constraints on fluid-rock reactions during incipient serpentinization of harzburgite
Klein, Frieder
2014-10-20
Search results
1,869 records were found.
In this paper we show that the typical architecture of current KM systems re.ects an objectivistic epistemology and a traditional managerial control paradigm. We argue that such an objectivistic epistemology is inconsistent with many theories on the nature of knowledge, in which subjectivity and sociality are taken as essential features of knowledge creation and sharing. We show that adopting such a new epistemological view has dramatic consequences at an architectural, managerial and technological level.
Current trends in international banking supervision following the 1996 Amendment to the Basel Accord emphasise market risk control based upon internal Value-at-risk (VaR) models. This paper discusses the merits and drawbacks of VaR models in the light of their impact on market liquidity. After a preliminary review of basic concepts and measures regarding market risk, market friction and liquidity risk, the arguments supporting the internal models approach to supervision on market risk are discussed, in the light of the debate on the limitations and possible enhancements of VaR models. In particular, adverse systemic effects of widespread risk management practices are considered. Risk measurement models dealing with liquidity risk are then examined in detail, in order to verify their potential for application in the field. We conclude t...
The Server Allocation with Bounded Simultaneous Requests problem arises in infostations, where mobile users going through the coverage area require immediate high-bit rate communications such as web surfing, file transferring, voice messaging, email and fax. Given a set of service requests, each characterized by a temporal interval and a category, an integer $k$, and an integer $h_c$ for each category $c$, the problem consists in assigning a server to each request in such a way that at most $k$ mutually simultaneous requests are assigned to the same server at the same time, out of which at most $h_c$ are of category $c$, and the minimum number of servers is used. Since this problem is computationally intractable, a $2$-approximation on-line algorithm is exhibited which asymptotically gives a $\left(2-\frac{h}{k}\right)$-approximation, ...
The availability of decision procedures for combinations of boolean and linear mathematical propositions opens the ability to solve problems arising from real-world domains such as verification of timed systems and planning with resources. In this paper we present a general and efficient approach to the problem, based on two main ingredients. The first is a DPLL-based SAT procedure, for dealing efficiently with the propositional component of the problem. The second is a tight integration, within the DPLL architecture, of a set of mathematical deciders for theories of increasing expressive power. A preliminary experimental evaluation shows the potential of the approach.
Knowledge e Management: sono compatibili?
We propose a way to abstract from various specifications of authentication and to obtain idealized protocols "secure by construction". This feature enables us to prove that a cryptographic protocol is the correct implementation of the corresponding abstract protocol. Our proposal relies on the combination of two authentication primitives, proposed by the authors in to a simplified version of the spi calculus.
No abstract available
According to the IST/ FET proactive initiative on GLOBAL COMPUTING, the goal is to obtain techniques (models, frameworks, methods, algorithms) for constructing systems that are flexible, dependable, secure, robust and efficient.
The dominant concerns are not those of representing and manipulating data efficiently but rather those of handling the co-ordination and interaction, security, reliability, robustness, failure modes, and control of risk of the entities in the system and the overall design, description and performance of the system itself.
Completely different paradigms of computer science may have to be developed to tackle these issues effectively. The research should concentrate on systems having the following characteristics: • The systems are composed of autonomous computational entities where activity is not centrally con...
