The document describes the PULP protocol, a hybrid push-pull protocol for disseminating messages from multiple sources across a network. It uses an initial exponential growth phase using push to quickly inform nodes, followed by a quadratic shrinking pull phase to limit redundant messages. Nodes maintain message histories and trading windows to drive useful pulls. Evaluation shows the protocol achieves high coverage with low latency and bandwidth costs, and adapts well to changes in message frequency and network churn.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns interests in 19 shopping centers located primarily in Germany, with a total lettable space of approximately 899,000 square meters. Deutsche EuroShop aims for long-term growth and stability through a buy and hold strategy focused on high quality shopping centers with long-term leases. Some highlights include revenues of €138 million for the first 9 months of 2011, a net initial yield of 5.89% on its portfolio, and occupancy rates above 99% across its centers.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 19 shopping centers across Germany, Poland, Austria and Hungary totaling around 899,000 square meters of rentable space. The company focuses on long-term growth through prime locations, high occupancy rates, and professional management. Key figures show increasing revenue, earnings, and dividends paid over the past decade, demonstrating stable growth.
This document provides an overview of Deutsche EuroShop, a German company that invests solely in shopping centers. It owns 19 shopping centers across Germany, Poland, Austria and Hungary, with a total lettable space of around 899,000 square meters. The company aims for long-term growth and stable increases in portfolio value. Key figures include annual revenue over €120 million in recent years, funds from operations per share growing 10% annually, and a net asset value per share of over €26.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 19 shopping centers in Germany, Poland, Austria and Hungary. The company focuses on long-term growth and stable increases in portfolio value. Key figures for the first 9 months of 2011 show a 29% increase in both revenue and earnings before interest and taxes compared to the same period in 2010.
Population Dynamics in Conway’s Game of Life and its VariantsMartin Pelikan
The presentation for the project of high school students Yonatan Biel and David Hua made in the Students and Teachers As Research Scientists (STARS) program at the Missouri Estimation of Distribution Algorithms Laboratory (MEDAL). To see animations, please download the powerpoint presentation.
This chart shows the percentage of students who achieved different score ranges on an exam. The majority of students, between 50-80%, scored in the middle ranges, while fewer students scored at the highest and lowest levels, with no students scoring below 10%.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 18 shopping centers in Germany, Poland, Austria and Hungary, with a total lettable space of around 848,000 square meters. Deutsche EuroShop aims for long-term growth and stable dividends through a buy and hold strategy focused on portfolio expansion and increasing rents. The company's shopping centers benefit from prime locations, high occupancy rates, and tenants like Metro, Douglas, H&M, REWE and other well-known retail brands.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 18 shopping centers in Germany, Poland, Austria and Hungary, with over 848,000 square meters of lettable space. Deutsche EuroShop aims for long-term growth and stable increases in portfolio value through a "buy and hold" strategy and professional property management. Key targets include long-term net asset value enhancement, stable and attractive dividends currently at a 4.2% yield, and investment-focused growth.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns interests in 19 shopping centers located primarily in Germany, with a total lettable space of approximately 899,000 square meters. Deutsche EuroShop aims for long-term growth and stability through a buy and hold strategy focused on high quality shopping centers with long-term leases. Some highlights include revenues of €138 million for the first 9 months of 2011, a net initial yield of 5.89% on its portfolio, and occupancy rates above 99% across its centers.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 19 shopping centers across Germany, Poland, Austria and Hungary totaling around 899,000 square meters of rentable space. The company focuses on long-term growth through prime locations, high occupancy rates, and professional management. Key figures show increasing revenue, earnings, and dividends paid over the past decade, demonstrating stable growth.
This document provides an overview of Deutsche EuroShop, a German company that invests solely in shopping centers. It owns 19 shopping centers across Germany, Poland, Austria and Hungary, with a total lettable space of around 899,000 square meters. The company aims for long-term growth and stable increases in portfolio value. Key figures include annual revenue over €120 million in recent years, funds from operations per share growing 10% annually, and a net asset value per share of over €26.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 19 shopping centers in Germany, Poland, Austria and Hungary. The company focuses on long-term growth and stable increases in portfolio value. Key figures for the first 9 months of 2011 show a 29% increase in both revenue and earnings before interest and taxes compared to the same period in 2010.
Population Dynamics in Conway’s Game of Life and its VariantsMartin Pelikan
The presentation for the project of high school students Yonatan Biel and David Hua made in the Students and Teachers As Research Scientists (STARS) program at the Missouri Estimation of Distribution Algorithms Laboratory (MEDAL). To see animations, please download the powerpoint presentation.
This chart shows the percentage of students who achieved different score ranges on an exam. The majority of students, between 50-80%, scored in the middle ranges, while fewer students scored at the highest and lowest levels, with no students scoring below 10%.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 18 shopping centers in Germany, Poland, Austria and Hungary, with a total lettable space of around 848,000 square meters. Deutsche EuroShop aims for long-term growth and stable dividends through a buy and hold strategy focused on portfolio expansion and increasing rents. The company's shopping centers benefit from prime locations, high occupancy rates, and tenants like Metro, Douglas, H&M, REWE and other well-known retail brands.
Deutsche EuroShop is Germany's only public company that invests solely in shopping centers. It owns 18 shopping centers in Germany, Poland, Austria and Hungary, with over 848,000 square meters of lettable space. Deutsche EuroShop aims for long-term growth and stable increases in portfolio value through a "buy and hold" strategy and professional property management. Key targets include long-term net asset value enhancement, stable and attractive dividends currently at a 4.2% yield, and investment-focused growth.
Deutsche EuroShop is Germany's only publicly traded company focused solely on shopping centers. It owns interests in 18 centers located primarily in Germany, with a total lettable space of around 848,000 square meters. Deutsche EuroShop aims for long-term growth and stability through a buy and hold strategy, focusing on quality properties with long-term leases and a diverse tenant base. Key goals include annual portfolio growth of 10% and a stable dividend yield of around 4.5%.
- The median home price in the Portland area declined 13.9% over the last year to $246,200 as of Q2 2009, continuing a weakening trend.
- Local job losses over the last year were sharp at -56,800 (-5.5%), contributing to weak housing demand.
- Mortgage rates remain low while affordability is improving, with the monthly mortgage payment-to-income ratio at a historically strong 15.4% in Q2 2009.
- Foreclosure rates on prime loans are low at 0.4% while rates on subprime and Alt-A loans show large local increases compared to a year ago but remain below national averages.
As Facebook announced its upcoming IPO, lots of interrogations are still pending about the relevance of such an important valorization, whereas the website’s revenues are still border line.
This longed-for IPO is the occasion to come back on the short history of this social network and to understand better the bases on which he is developed.
It’s also the occasion to anticipate the issues which it would facing with, to forecast the areas of growth that would enable it to concretize his current success, and see how this company might be a potential source of benefits.
Stormwater Financing Mechanisms- Charlotte KatzenmoyerCleanH2O
The document discusses the implementation of a stormwater user fee program in the City of Lancaster. It outlines criteria for evaluating policy issues, including equity, clarity, transparency, efficiency, efficacy, legal considerations, and consistency with other city goals. It presents data on impervious surface areas by property type and preliminary annual cost estimates for different levels of stormwater management service. Case studies are provided comparing stormwater fees to property taxes and sewer fees for different property types.
Deutsche EuroShop is Germany's only publicly traded company focused solely on shopping centers. It owns interests in 18 centers across Germany, Poland, Austria and Hungary, with a total lettable space of around 848,000 square meters. Deutsche EuroShop aims for long-term growth and stability through a buy-and-hold strategy of prime shopping centers with long-term leases and a diverse tenant base. The company's goals include annual portfolio growth of 10% and a stable dividend yield of around 4%.
The document discusses how hotels need to adapt to changing market conditions and increasing use of technology. It summarizes that:
1) Hotels cannot assume they will follow the same recovery path as before and must seize new opportunities from shifting to online/direct distribution.
2) By 2010, 50% of leisure bookings worldwide are expected to be made online, so hotels need their websites and mobile access to be optimized to attract customers.
3) Hotels should focus on having an effective internet strategy, driving traffic to their websites, optimizing conversion rates, and ensuring their sites and booking capabilities are up-to-date.
This document summarizes online video trends in Europe. It finds that while growth of unique viewers and video views slowed in 2010, consumption has since shifted to higher quality, longer videos. There is demand for a quality viewing experience, wide range of engaging content, convenient accessibility, and pricing worth paying. As supply meets this demand, online video is being driven by improved broadband, more content from broadcasters and local specialists, and user generated content supplemented by partners. Syndication and social media make video more accessible, while advanced advertising allows optimized campaigns and understanding of impact. Overall online video is becoming more integrated with television.
Solvin has implemented a cost-to-serve (C2S) analysis to better understand its costs and margins at the customer level. Key aspects of its C2S practice include:
1) Collecting detailed cost and sales data for each customer, including transportation, raw materials, fixed costs, to calculate true margins.
2) Analyzing cost drivers like transportation costs and production costs to identify optimization opportunities.
3) Using the C2S analysis to inform commercial strategies and production planning tailored to each customer's profitability.
Brazilian honey production is strong, with year-round crops across the country supported by floral diversity and resistant hybrid bee species. Brazil has over 350,000 beekeepers organized in cooperatives and producing honey without antibiotic residues. Exports of Brazilian honey have grown significantly over the past decade, reaching over $100 million USD annually, with key export markets in Spain, the UK, Germany, and NAFTA countries. The outlook for continued growth in Brazilian honey exports is positive.
American Pharmaceutical Review Barnes Et Albarnes72
This document summarizes research on using Raman spectroscopy and turbidity measurements to monitor polymorphic form conversion during crystallization of an active pharmaceutical ingredient (API). In-situ Raman spectroscopy was used to develop a phase diagram showing the stable form over a range of conditions and monitor kinetics of conversions between forms. Turbidity measurements effectively detected form changes during scale-up and provided comparable induction times to laboratory data. The combined use of these process analytical technologies enabled control of crystal form during development and scale-up of the crystallization process.
Pascal Hartmann is a German sociologist and an experienced strategy executive and theory designer. He is also the Director of the R & D Department at Logon Architecture. With an eye to the future, his work embraces the architectural heritage of the city in a sustainable fashion.
Session1 cdm eligibility of prosol (amel bida, rcreee)RCREEE
The document summarizes a regional workshop on solar thermal applications held in Cairo, Egypt in March 2009. It discusses Egypt's eligibility for Clean Development Mechanism (CDM) projects under the Kyoto Protocol and highlights two potential CDM projects involving Egypt's PROSOL program: (1) a 450,000 square meter residential solar water heating project called PROSOL II, and (2) a 90,000 square meter commercial solar water heating project called PROSOL Collectif. The document provides details on each project's approval status, anticipated greenhouse gas reductions, and socioeconomic benefits.
Broadband penetration and GDP per capita are positively correlated across OECD countries. Countries with higher GDP per capita tend to have higher broadband penetration, with a simple correlation of 0.64. The graph shows broadband subscribers per 100 inhabitants on the y-axis and GDP per capita in USD PPP on the x-axis, demonstrating that as GDP increases, so too does broadband access.
Broadband penetration and GDP per capita are positively correlated across OECD countries. Countries with higher GDP per capita in 2006 tended to have higher broadband penetration rates in December 2007, with a simple correlation of 0.64. Broadband penetration rates ranged from less than 5 subscribers per 100 inhabitants to over 35, while GDP per capita ranged from under $10,000 to over $90,000.
This document summarizes the promises and pitfalls of tier pricing for scientific research journals. It discusses how online publishing requires a different pricing model than print due to varying usage levels across institutions. Tier pricing aims to reduce costs for smaller institutions but poses challenges, such as disproportionately increasing prices for top institutions or requiring complex administration. Transparency is important to ensure tier pricing is not used simply to increase overall revenue. Overall, tier pricing systems must balance fairness across institution sizes with maintaining affordability.
Activities and trends in testing graphical user interfaces automaticallyIzzat Alsmadi
This graph shows the effectiveness of 5 algorithms (Al1-Al4) at different numbers of test cases generated, from 10 to 40,000. Algorithm 1 was the most effective, reaching 80% effectiveness with only 400 test cases, while the other algorithms required more test cases to achieve similar effectiveness levels.
The document discusses concepts related to stationary and non-stationary time series data. It provides examples of time series data that are non-stationary, exhibiting changing means and non-zero correlation over time, as well as examples of stationary time series with constant means and zero correlation as time increases. The document also discusses techniques for identifying non-stationary processes, such as examining correlograms, and formal unit root tests to establish the stationarity of time series data.
The document discusses improving I/O scalability in the Xen virtualization platform. It explores optimizations to the virtual network interface (VNIF) and reducing virtual-to-physical device assignment (VT-d) overhead. It also examines using single-root I/O virtualization (SR-IOV) and processing interrupts on a per-CPU vector to improve I/O performance and scalability. Charts are presented showing the benefits of these techniques for network throughput and CPU utilization.
The document discusses the energy-water nexus and its implications for Texas. It notes that fresh water is a limited resource, with only 2.5% being fresh water and the majority locked up in ice or snow. Meeting future fresh water and electricity demands will be challenging given population growth and climate change impacts. Texas withdraws more fresh water than any other state, with the majority used for irrigation and thermoelectric power generation, both of which are energy intensive. This interdependence of energy and water systems will impact Texas' future water security and sustainability.
The document discusses the growth of online video between 2006-2010. It notes that the number of people streaming videos in the US increased from around 120 million in 2006 to over 160 million in 2010. Additionally, the number of videos streamed grew from 63 billion to over 441 billion during this period. The amount spent on online video advertising also increased dramatically, from $324 million in 2006 to $1.44 billion in 2010.
This document provides information on rainwater harvesting, including how to collect and store rainwater. It discusses the components of a rainwater harvesting system, including the catchment surface, conveyance to storage, initial filtration, storage tanks, conveyance to end use, and purification. It also addresses water quality, estimating water needs and collection potential, costs, maintenance, regulations, and ways to conserve water. The document aims to educate about setting up a rainwater harvesting system and using collected rainwater, especially for irrigation purposes during times of drought.
Deutsche EuroShop is Germany's only publicly traded company focused solely on shopping centers. It owns interests in 18 centers located primarily in Germany, with a total lettable space of around 848,000 square meters. Deutsche EuroShop aims for long-term growth and stability through a buy and hold strategy, focusing on quality properties with long-term leases and a diverse tenant base. Key goals include annual portfolio growth of 10% and a stable dividend yield of around 4.5%.
- The median home price in the Portland area declined 13.9% over the last year to $246,200 as of Q2 2009, continuing a weakening trend.
- Local job losses over the last year were sharp at -56,800 (-5.5%), contributing to weak housing demand.
- Mortgage rates remain low while affordability is improving, with the monthly mortgage payment-to-income ratio at a historically strong 15.4% in Q2 2009.
- Foreclosure rates on prime loans are low at 0.4% while rates on subprime and Alt-A loans show large local increases compared to a year ago but remain below national averages.
As Facebook announced its upcoming IPO, lots of interrogations are still pending about the relevance of such an important valorization, whereas the website’s revenues are still border line.
This longed-for IPO is the occasion to come back on the short history of this social network and to understand better the bases on which he is developed.
It’s also the occasion to anticipate the issues which it would facing with, to forecast the areas of growth that would enable it to concretize his current success, and see how this company might be a potential source of benefits.
Stormwater Financing Mechanisms- Charlotte KatzenmoyerCleanH2O
The document discusses the implementation of a stormwater user fee program in the City of Lancaster. It outlines criteria for evaluating policy issues, including equity, clarity, transparency, efficiency, efficacy, legal considerations, and consistency with other city goals. It presents data on impervious surface areas by property type and preliminary annual cost estimates for different levels of stormwater management service. Case studies are provided comparing stormwater fees to property taxes and sewer fees for different property types.
Deutsche EuroShop is Germany's only publicly traded company focused solely on shopping centers. It owns interests in 18 centers across Germany, Poland, Austria and Hungary, with a total lettable space of around 848,000 square meters. Deutsche EuroShop aims for long-term growth and stability through a buy-and-hold strategy of prime shopping centers with long-term leases and a diverse tenant base. The company's goals include annual portfolio growth of 10% and a stable dividend yield of around 4%.
The document discusses how hotels need to adapt to changing market conditions and increasing use of technology. It summarizes that:
1) Hotels cannot assume they will follow the same recovery path as before and must seize new opportunities from shifting to online/direct distribution.
2) By 2010, 50% of leisure bookings worldwide are expected to be made online, so hotels need their websites and mobile access to be optimized to attract customers.
3) Hotels should focus on having an effective internet strategy, driving traffic to their websites, optimizing conversion rates, and ensuring their sites and booking capabilities are up-to-date.
This document summarizes online video trends in Europe. It finds that while growth of unique viewers and video views slowed in 2010, consumption has since shifted to higher quality, longer videos. There is demand for a quality viewing experience, wide range of engaging content, convenient accessibility, and pricing worth paying. As supply meets this demand, online video is being driven by improved broadband, more content from broadcasters and local specialists, and user generated content supplemented by partners. Syndication and social media make video more accessible, while advanced advertising allows optimized campaigns and understanding of impact. Overall online video is becoming more integrated with television.
Solvin has implemented a cost-to-serve (C2S) analysis to better understand its costs and margins at the customer level. Key aspects of its C2S practice include:
1) Collecting detailed cost and sales data for each customer, including transportation, raw materials, fixed costs, to calculate true margins.
2) Analyzing cost drivers like transportation costs and production costs to identify optimization opportunities.
3) Using the C2S analysis to inform commercial strategies and production planning tailored to each customer's profitability.
Brazilian honey production is strong, with year-round crops across the country supported by floral diversity and resistant hybrid bee species. Brazil has over 350,000 beekeepers organized in cooperatives and producing honey without antibiotic residues. Exports of Brazilian honey have grown significantly over the past decade, reaching over $100 million USD annually, with key export markets in Spain, the UK, Germany, and NAFTA countries. The outlook for continued growth in Brazilian honey exports is positive.
American Pharmaceutical Review Barnes Et Albarnes72
This document summarizes research on using Raman spectroscopy and turbidity measurements to monitor polymorphic form conversion during crystallization of an active pharmaceutical ingredient (API). In-situ Raman spectroscopy was used to develop a phase diagram showing the stable form over a range of conditions and monitor kinetics of conversions between forms. Turbidity measurements effectively detected form changes during scale-up and provided comparable induction times to laboratory data. The combined use of these process analytical technologies enabled control of crystal form during development and scale-up of the crystallization process.
Pascal Hartmann is a German sociologist and an experienced strategy executive and theory designer. He is also the Director of the R & D Department at Logon Architecture. With an eye to the future, his work embraces the architectural heritage of the city in a sustainable fashion.
Session1 cdm eligibility of prosol (amel bida, rcreee)RCREEE
The document summarizes a regional workshop on solar thermal applications held in Cairo, Egypt in March 2009. It discusses Egypt's eligibility for Clean Development Mechanism (CDM) projects under the Kyoto Protocol and highlights two potential CDM projects involving Egypt's PROSOL program: (1) a 450,000 square meter residential solar water heating project called PROSOL II, and (2) a 90,000 square meter commercial solar water heating project called PROSOL Collectif. The document provides details on each project's approval status, anticipated greenhouse gas reductions, and socioeconomic benefits.
Broadband penetration and GDP per capita are positively correlated across OECD countries. Countries with higher GDP per capita tend to have higher broadband penetration, with a simple correlation of 0.64. The graph shows broadband subscribers per 100 inhabitants on the y-axis and GDP per capita in USD PPP on the x-axis, demonstrating that as GDP increases, so too does broadband access.
Broadband penetration and GDP per capita are positively correlated across OECD countries. Countries with higher GDP per capita in 2006 tended to have higher broadband penetration rates in December 2007, with a simple correlation of 0.64. Broadband penetration rates ranged from less than 5 subscribers per 100 inhabitants to over 35, while GDP per capita ranged from under $10,000 to over $90,000.
This document summarizes the promises and pitfalls of tier pricing for scientific research journals. It discusses how online publishing requires a different pricing model than print due to varying usage levels across institutions. Tier pricing aims to reduce costs for smaller institutions but poses challenges, such as disproportionately increasing prices for top institutions or requiring complex administration. Transparency is important to ensure tier pricing is not used simply to increase overall revenue. Overall, tier pricing systems must balance fairness across institution sizes with maintaining affordability.
Activities and trends in testing graphical user interfaces automaticallyIzzat Alsmadi
This graph shows the effectiveness of 5 algorithms (Al1-Al4) at different numbers of test cases generated, from 10 to 40,000. Algorithm 1 was the most effective, reaching 80% effectiveness with only 400 test cases, while the other algorithms required more test cases to achieve similar effectiveness levels.
The document discusses concepts related to stationary and non-stationary time series data. It provides examples of time series data that are non-stationary, exhibiting changing means and non-zero correlation over time, as well as examples of stationary time series with constant means and zero correlation as time increases. The document also discusses techniques for identifying non-stationary processes, such as examining correlograms, and formal unit root tests to establish the stationarity of time series data.
The document discusses improving I/O scalability in the Xen virtualization platform. It explores optimizations to the virtual network interface (VNIF) and reducing virtual-to-physical device assignment (VT-d) overhead. It also examines using single-root I/O virtualization (SR-IOV) and processing interrupts on a per-CPU vector to improve I/O performance and scalability. Charts are presented showing the benefits of these techniques for network throughput and CPU utilization.
The document discusses the energy-water nexus and its implications for Texas. It notes that fresh water is a limited resource, with only 2.5% being fresh water and the majority locked up in ice or snow. Meeting future fresh water and electricity demands will be challenging given population growth and climate change impacts. Texas withdraws more fresh water than any other state, with the majority used for irrigation and thermoelectric power generation, both of which are energy intensive. This interdependence of energy and water systems will impact Texas' future water security and sustainability.
The document discusses the growth of online video between 2006-2010. It notes that the number of people streaming videos in the US increased from around 120 million in 2006 to over 160 million in 2010. Additionally, the number of videos streamed grew from 63 billion to over 441 billion during this period. The amount spent on online video advertising also increased dramatically, from $324 million in 2006 to $1.44 billion in 2010.
This document provides information on rainwater harvesting, including how to collect and store rainwater. It discusses the components of a rainwater harvesting system, including the catchment surface, conveyance to storage, initial filtration, storage tanks, conveyance to end use, and purification. It also addresses water quality, estimating water needs and collection potential, costs, maintenance, regulations, and ways to conserve water. The document aims to educate about setting up a rainwater harvesting system and using collected rainwater, especially for irrigation purposes during times of drought.
ARGOMARINE Final Conference - CMRE-NATO - Stefano Fioravanti, Alessandra TeseiARGOMARINE
The document discusses area access surveillance technologies developed by CMRE, a NATO scientific research facility. CMRE designed and implemented advanced environmental monitoring systems using passive acoustic monitoring with autonomous underwater sensors. The system uses sparse hydrophone arrays and signal processing techniques to detect, localize and classify underwater sound sources in real-time. Initial deployments in La Spezia harbor and Elba Island demonstrated the system's ability to monitor areas and localize sources.
The document discusses the Bass diffusion model for modeling the adoption of new products or innovations over time. It shows how the innovation and imitation rates can affect the shape of adoption curves. Sample categories are given with their average innovation and imitation rates. Graphs show the number of new customers and cumulative customers over time for different combinations of rates.
We are alive! Now what? by Kārlis CērbulisRoberts Zīle
Brilliant and professional look at the current economical situation of Latvia. Kārlis Cērbulis is one of the bright economical minds in Latvia and collegue of mine in the economist association "EA2010" Enjoy!
The document provides information about the National Health Authority of Thailand. It includes:
1. Contact information for the director including email and social media accounts.
2. An organizational chart showing the different departments within the National Health Authority including the Health Service Provider Office, Health Information System and Network Office, and Health Foreign Policy Office.
3. Tables and graphs showing health statistics over time such as disease rates, life expectancy, healthcare utilization and costs, and trends in health risk factors.
A recent direction in Business Process Management studied methodologies to control the execution of Business Processes under several sources of uncertainty in order to always get to the end by satisfying all constraints. Current approaches encode business processes into temporal constraint networks or timed game automata in order to exploit their related strategy synthesis algorithms. However, the proposed encodings can only synthesize single-strategies and fail to handle loops. To overcome these limits I will discuss a recent approach based on supervisory control. The approach considers structured business processes with resources, parallel and mutually exclusive branches, loops, and uncertainty. I will discuss an encoding into finite state automata and prove that their concurrent behavior models exactly all possible executions of the process. After that, I will introduce tentative commitment constraints as a new class of constraints restricting the executions of a process. Finally, I will discuss a tree decomposition of the process that plays a central role in modular supervisory control.
In his ignite talk „The Digital Transformation of Education: A Hyper-Disruptive Era through Blockchain and Generative AI,“ Dr. Alexander Pfeiffer delves into the intricate challenges and potential benefits associated with integrating blockchain technologies and generative AI into the educational landscape. He scrutinizes consensus algorithms and explores sustainable methods of operating blockchain systems, while also examining how smart contracts and transactions can be tailored to meet the specific needs of the educational sector. Alexander underscores the importance of establishing secure digital identities and ensuring robust data protection, while simultaneously casting a critical eye on potential risks and vulnerabilities. The topic of digital identities, facilitated through tokenization, forms a bridge between storing data using blockchain-based databases and the increasingly urgent need for content verification of AI-generated material.
Alexander explores the profound alterations occurring in teaching methodologies, assignment creation, and evaluation processes, shedding light on the hyper-disruptive impact these changes are having on both research and practical applications in education. The production of textual content by educators and students is analyzed with a focus on ensuring clear traceability of content sources and editors, and its proper citation, a critical aspect in the responsible use of AI. In addition to generative text and graphics, AI plays a crucial role in future learning and assignment practices, particularly through adaptive game-based learning and assessment. Alexander will provide a brief glimpse into his game „Gallery-Defender,“ a prototype demonstrating how AI and blockchain can be effectively implemented in serious gaming scenarios.
Furthermore, he emphasizes the imperative for ongoing education and professional development for educational personnel, advocating for a proactive stance in addressing the (legal) challenges associated with AI-generated images and text. This ignite talk aims to provide a balanced and critically reflective perspective on hyper-disruptive technologies, setting the stage for further discourse and exploration in the subsequent discussion.
The simulation of melee combat is central to many contemporary and traditional strategic games and simulations. In order to elevate this element of play from mere exercises of stats-comparison and dice rolling to a meaningful experience of play, strategy games rely on a rich plethora of cultural motives as deciding factors of their mechanic design. On the example of Samurai-themed skirmishing games, my talk elaborates on the impact that (popular) culture and other inspirations have on gaming experiences. It provides concrete examples from Japanese history, its traditional cinema, and postmodern Western reflections of Japanese cultural practices. Based on these insights, it compares four tabletop strategy games, muses on which phenomena they have adapted in their mechanics, and asks why or why not they may succeed in capturing a cultural essence via their rules.
Ultimately, this comparative approach shall serve to decipher the interplay of dice mechanics and aesthetic properties as the longing for a dramatic ideal in tabletop gaming and encourage participants to reflect on the idea in a subsequent, shared gaming experience.
How does a development team expand on an already existing game?
We will look at the two community driven and committee led expansions to the abandoned Tabletop game 'GuildBall' and explore the stages of development that the game went through. The art and lore driven approach employed will show us how rough sketches and concept ideas become a fully fledged ruleset and ultimately miniatures that can be put on the table. We will also explore pitfalls in rules design like over complicating abilities, the lack of streamlining across the game or simply creating expansions who break the game instead of the mold.
The document discusses Ben Calvert-Lee's work developing miniatures for tabletop games. It begins with an introduction to Ben's background and current role as a freelance lead sculptor. It then outlines the typical development pipeline for miniatures, from initial concepts and artwork to production. The document also discusses different miniature production methods. A case study details Ben's process for developing the Tengu faction for a game, including exploring species archetypes and incorporating unexpected developments into the designs.
In recent years, we have experienced an exponential growth in the amount of data generated by IoT devices. Data have to be processed strict low latency constraints, that cannot be addressed by conventional computing paradigm and architectures. On top of this, if we consider that we recently hit the limit codified by the Moore’s law, satisfying low-latency requirements of modern applications will become even more challenging in the future. In this talk, we discuss challenges and possibilities of heterogeneous distributed systems in the Post-Moore era.
In the modern world, we are permanently using, leveraging, interacting with, and relying upon systems of ever higher sophistication, ranging from our cars, recommender systems in eCommerce, and networks when we go online, to integrated circuits when using our PCs and smartphones, security-critical software when accessing our bank accounts, and spreadsheets for financial planning and decision making. The complexity of these systems coupled with our high dependency on them implies both a non-negligible likelihood of system failures, and a high potential that such failures have significant negative effects on our everyday life. For that reason, it is a vital requirement to keep the harm of emerging failures to a minimum, which means minimizing the system downtime as well as the cost of system repair. This is where model-based diagnosis comes into play.
Model-based diagnosis is a principled, domain-independent approach that can be generally applied to troubleshoot systems of a wide variety of types, including all the ones mentioned above. It exploits and orchestrates techniques for knowledge representation, automated reasoning, heuristic problem solving, intelligent search, learning, stochastics, statistics, decision making under uncertainty, as well as combinatorics and set theory to detect, localize, and fix faults in abnormally behaving systems.
In this talk, we will give an introduction to the topic of model-based diagnosis, point out the major challenges in the field, and discuss a selection of approaches from our research addressing these challenges. For instance, we will present methods for the optimization of the time and memory performance of diagnosis systems, show efficient techniques for a semi-automatic debugging by interacting with a user or expert, and demonstrate how our algorithms can be effectively leveraged in important application domains such as scheduling or the Semantic Web.
Function-as-a-Service (FaaS) is the latest paradigm of cloud computing in which developers deploy their codes as serverless functions, while the entire underlying platform and infrastructure is completely managed by cloud providers. Each cloud provider offers a huge set of cloud services and many libraries to simplify development and deployment, but only inside their clouds, often in a single cloud region. With such „help“ of cloud providers, users are locked to use resources and services of the selected cloud provider, which are often limited. Moreover, such heterogeneous and distributed environment of multiple cloud regions and providers challenge scientists to engineer cloud applications, often in a form of serverless workflows. In this talk, I will present our design principle „code once, run everywhere, with everything“. In particular, I will present challenges and our approaches and techniques how to program, model, orchestrate, and run distributed serverless workflow applications in federated FaaS.
This document summarizes a presentation on machine learning and fluid network planes. It begins with an agenda and introduction to fluid network planes and instances. It then discusses the role of machine learning in fluid network planes, including applications such as optimization, virtual network embedding problems, run-time operations, and intent-based closed-loop automation. Recent research is presented on machine learning-based YouTube QoE estimation using real 4G/5G network traces to predict video quality and inform control actions. Results are shown comparing 4G and 5G networks in terms of radio parameters, stalling events, handovers, and video resolutions under different mobility conditions.
The dynamics of networks enables the function of a variety of systems we rely on every day, from gene regulation and metabolism in the cell to the distribution of electric power and communication of information. Understanding, steering and predicting the function of interacting nonlinear dynamical systems, in particular if they are externally driven out of equilibrium, relies on obtaining and evaluating suitable models, posing at least two major challenges. First, how can we extract key structural system features of networks if only time series data provide information about the dynamics of (some) units? Second, how can we characterize nonlinear responses of nonlinear multi-dimensional systems externally driven by fluctuations, and consequently, predict tipping points at which normal operational states may be lost? Here we report recent progress on nonlinear response theory extended to predict tipping points and on model-free inference of network structural features from observed dynamics.
When it comes to integrating digital technologies into the classroom in higher education, many teachers face similar challenges. Nevertheless, it is difficult for teachers to share experiences because it is usually not possible to transfer successful teaching scenarios directly from one area to another, as subject-specific characteristics make it difficult to reuse them. To address this problem, instructional scenarios can be described as patterns that have been used previously in educational contexts. Patterns can capture proven teaching strategies and describe instructional scenarios in a consistent structure that can be reused. Because priorities for content, methods, and tools are different in each domain, a consensus-tested taxonomy was first developed with the goal of modeling a domain-independent database to collect digital instructional practices. In addition, this presentation will present preliminary insights into a data-driven approach to identifying effective instructional practices from interdisciplinary data as patterns. A web-based application will be developed for this that can both collect teaching/learning scenarios and individually extract scenarios from patterns for a learning platform.
The document discusses performance characterization across a computing continuum from the edge to the cloud. It evaluates the performance of video encoding and machine learning tasks on different devices. For video encoding, older single-board computers had significantly higher encoding times than other resources but provided lower data transfer times. For machine learning, training a convolutional neural network took much longer than a simpler model. Cloud and fog resources generally outperformed edge devices for more complex tasks. The document recommends offloading large or complex tasks to more powerful resources when possible.
East-west oriented photovoltaic power system is a new trend in orienting photovoltaic system. This lecture presents an evaluation of east–west oriented photovoltaic power system. A comparison between east–west oriented photovoltaic system and south oriented photovoltaic system in terms of cost of energy and technical requirement is conducted is presented in this lecture. In addition to that, the benefits of using east–west oriented photovoltaic system are discussed in this paper.
The document discusses using randomized recurrent neural networks and signature-based methods for machine learning in finance. It proposes splitting the input-output map of a dynamical system into a "reservoir" part and a linear "readout" part. The signature of the input signal provides a natural candidate for the reservoir, as it is point-separating and linear functions on the signature can approximate continuous functionals via the universal approximation theorem. The goal of the talk is to prove how dynamical systems can be approximated using randomized recurrent networks, with precise convergence rates, and to view randomized deep networks through this lens.
We live in a “digital” world, the separation between physical and virtual makes (almost) no sense anymore. Here, the Corona pandemic has also acted as an accelerator/magnifier demonstrating that the future of our digital society is here with all its possibilities, but also shortcomings.
In his talk, Hannes Werthner will briefly reflect on the history of computer science, and then discuss the need for an interdisciplinary response to these shortcomings. Such an answer is the Digital Humanism, which looks at this interplay of technology and humankind, it analyzes, and, most importantly, tries to influence the complex interplay of technology and humankind, for a better society and life. In the second part he will discuss this approach, and show what was achieved since its first workshop in 2019, and what lies ahead.
In the latest years, we have witnessed a growing number of media transmitted and stored on computers and mobile devices. For this reason, there is an actual need to employ smart compression algorithms to reduce the size of our media files. However, such techniques are often responsible for severe reduction of user perceived quality. In this talk we present several approaches we have developed to restore degraded images and videos to match their original quality, making use of Generative Adversarial Networks. The aim of the talk is to highlight the main features of our research work, including the advantages of our solution, the current challenges and the possible directions for future improvements.
Recommendation systems today are widely used across many applications such as in multimedia content platforms, social networks, and ecommerce, to provide suggestions to users that are most likely to fulfill their needs, thereby improving the user experience. Academic research, to date, largely focuses on the performance of recommendation models in terms of ranking quality or accuracy measures, which often don’t directly translate into improvements in the real-world. In this talk, we present some of the most interesting challenges that we face in the personalization efforts at Netflix. The goal of this talk is to sunshine challenging research problems in industrial recommendation systems and start a conversation about exciting areas of future research.
The document discusses the evolution to 5G networks and their benefits. It covers 5G principles like enhanced mobile broadband, massive machine-type communication, and ultra-reliable low-latency communications. Statistics are provided on 5G subscriptions, deployments, and expected growth in mobile data traffic. Use cases like smart cities, VR/AR, and autonomous vehicles are described. The presentation outlines Ericsson's 5G experience and global footprint.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
An Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams
1. PULP
An Adaptive Gossip-Based
Dissemination Protocol for
Multi-Source Message Streams
Pascal Felber
A.-M. Kermarrec, L. Leonini, E. Rivière, S. Voulgaris
Pascal.Felber@unine.ch
http://iiun.unine.ch/
2. Introduction
l Epidemic protocols are widely used for
information dissemination
l Algorithmic simplicity
l Robustness (failures of nodes and links)
l Adapted to large-scale dynamic networks
l Yet, there have a number of drawbacks
l Bandwidth overutilization (redundant messages)
l High message dissemination latency
l Objectives of the PULP protocol
l Hybrid protocol bandwidth- & latency-efficient
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 2
3. Epidemic Protocols: Push vs. Pull
l Push
l At 1st reception, every node forwards message to
f other nodes, at most TTL times
l Low latency, high redundancy
l Pull
l Periodically, every node contacts another node
and asks for missing messages
l High latency, low redundancy
l Both approaches rely on a sampling service
to obtain random nodes
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 3
6. Context and Objectives
l Dissemination of streams of small messages
l Sources may be any node
l Dissemination from all to all
l Variable publication frequency
l High frequency phases (e.g., react to event)
l Idle phases with no new message
l Objectives
l Low network cost, proportional to actual activity
l Low latency
l Robustness to failures and churn
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 6
7. The PULP Protocol
l Two-phase hybrid approach
1. Exponential growth phase (push)
l Inform sufficiently many nodes w/out redundancy
2. Quadratic shrinking phase (pull)
l Pull frequency driven by message activity
l Exploit sequences of messages
l Push messages carry information for pull phase
l Limits useless pulls
l Supports complete disseminations with low
cost and low latency
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 7
8. PULP: 1st Phase
l Objective: inform sufficiently many nodes
with negligible redundancy
l 4-5% of the network (based on observations)
l Size of network N estimated by sampling service
TTL
l Choose TTL and f: c=N ∑ i=1
f i ≈ 4.5%
l Subsets of nodes reached by different messages
are not correlated (random neighbor selection)
l Forwarded messages embed information about
previously received messages (drive 2nd phase)
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 8
9. PULP: 2nd Phase
l Objective: limit useless pulls
l The protocol uses information about missing
messages (received during 1st phase)
l Pull frequency adapts according to:
l Missing messages
l Ratio of useful to useless pulls in last period
l Pull frequency increases when more messages are
being disseminated
l When there is little activity, pull frequency
depends on how useful previous pulls have been
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 9
10. PULP: Data Structures
l Every node maintains a sorted list of
received messages
l Hp: Recent history (last messages)
l Tp ⊆ Hp: Trading window (available for others)
l Tp is embedded in messages sent by p to q
l If ∃ m ∈ Tp Hq then q can request m from p
t
Hp: recent history Tp: trading window
old messages B3 A7 C3 B1 C6 B2 C5 A5 A6 C7 C8 B5 A9 C4
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 10
11. 3.4 Pulp: The Protocol random peers
// Messages will be pulled at the next pulling period
We now present a detailed description of the Pulp al- missing missing [ {m 2 TQ : m 2 HP } {msg}
/
PULP: Algorithm
gorithm, which combines the push and pull components
for disseminating a sequence of messages in a collabo-
rative and decentralized fashion.
// Periodic pulling of missing elements
thread PeriodicPull()
do every pull seconds
// Shu✏ing reduces the probability of receiving
duplicates by pull
Algorithm 1 shows the pseudo-code of the Pulp pro- shu✏e missing
7
tocol. Each peer P maintains a history of the messages invoke Pull(missing, P, TP ) on a random node Q
it has recently received, denoted as HP . It additionally
maintains a trading window, denoted nodePP containing
Algorithm 1: Pulp algorithm on as T , // Invoked when a node Q requests a message from node P
function Pull(requested, Q, TQ )
Variables 1st element in requested order 2 TP , or ? if none
the list ofPmessages that are available to other nodes on
H : History of (recently) received message IDs
m
invoke PullReply(m, P, TP ) on Q
request. pull : Period of pull operations (initially 30s)
missing: Set of message IDs known, but not yet received // Receive a reply to a pull request from node P
When a message is Size of missing at the end of last node
prevMissingSize: pushed to (or generated at) function PullReply(msg, Q, TQ )
P for theadjust period P registers it in HP and, if the
first time, if msg = ? _ m 2 HP then
prevuseful : Number of useful pull replies during current prevuseless prevuseless + 1
TTL has adjust period reached yet, forwards it to Fanout
not been else
random other period We stress that replies during current
prevuseless : Number of useless pullobtaining the IP ad-
peers. add msg to HP
adjust missing missing [ {m 2 TQ : m 2 HP } {msg}
/
dress of randomly selectedare fixedis a trivial task thanks
( adjust , TTL and Fanout peers protocol parameters) prevuseful prevuseful + 1
to Cyclon, as described inis pushed to node P by node Q
// Invoked when a message Section 3.2.
function Push(msg, hops, Q, TQ ) // Periodic adjustment of pulling period for node P
// Forward further if needed thread AdaptFreq()
if msg received for the first time then t do every adjust seconds
add msg top: recent history
H H
P
Tp: trading window
if |missing| > prevMissingSize then
if hops > 0 then adjust
invoke 3 B1 C6 B hops-1, A P ) C8 B5 A9
old messages B3 A7 CPush(msg, 2 C5 A5 P,6TC7 on Fanout C4 pull |missing| prevMissingSize+prevuseful
random peers else
if |missing| > 0 ^ prevuseless prevuseful then
// Messages will be pulled at the next pulling period pull pull ⇥ 0.9
missing missing [ {m 2 TQ : m 2 HP } {msg}
/ else
Fig. 3 Data structures of the Pulp algorithm. Note that mes- pull pull ⇥ 1.1
sages// Periodic pulling of sources (here A, B, and C) and each
come from multiple missing elements
thread PeriodicPull() the order it received them (which is
node sorts them based on pull max( pull , pull min )
do every pull seconds pull min( pull , pull max )
generally di↵erent for each node).the probability of receiving
// Shu✏ing reduces prevuseless 0
duplicates by pull prevuseful 0
shu✏e missing prevMissingSize |missing|
invoke Pull(missing, P, TP ) on a random node Q
In forwarding a message to another peer Q, node P
// Invoked when a node Q requests a message from node P
also function Pull(requested, Q, TQ ) Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber
forwards the IDs of messages in its trading window 11
12. Evaluation
l Conducted with SPLAY
l 1000 nodes in a cluster
l Reproducing real churn (OverNet trace)
l 300 nodes from PlanetLab
l Heavily loaded machines
l Messages sent from random nodes
l Communication over UDP (i.e., unreliable)
l Metrics: number of receptions (coverage),
latency, evolution of pull frequency
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 12
19. Only−push (Fanout=5, TTL=4): Hit and Duplicate ratios
100
Comparison with Pull-/Push-only
80 PULP (Fanout=3, TTL=3): Reception Delays Distribution
Ratio
60
60 th th
40 Max 75th perc. 25th perc.
50
20 90th perc. 50 perc. 5 perc.
Seconds
Hit Ratio 40 Dup Ratio
0 30
0 100 200 300 20 400 500 600
10
Message sending rate
0
0 100 200 300 400 500 600
1msg
/2s
Only−pull: Reception Delays Distribution
80
70
60
Seconds
1msg 50
/20s 40
0 100 200 300 30 400 500 600
20
10
0
0 100 200 300 400 500 600
PULP (Fanout=3, TTL=3): Reception Delays Distribution Only−push (Fanout=5, TTL=4): Reception Delays Distribution
60 200
50 th
Max 75th perc.
th
25th perc.
th 175
90 perc. 50 perc. 5 perc. 150
Seconds
Seconds
40 125
30 100
20 75
10 50
25
0 0
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Only−pull: Reception Delays Distribution Only−push (Fanout=5, TTL=4): Hit and Duplicate ratios
80
70 100
60 80
Seconds
50
Ratio
40 60
30 40
20
10 20
Hit Ratio Dup Ratio
0 0
0 100 200 300 400 500 600 0 100 200 300 400 500 600
Only−push (Fanout=5, TTL=4): Reception Delays Distribution Message sending rate
200 Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 19
175 1msg
150 /2s
20. Conclusion
l PULP is a lightweight protocol that combines
push and pull dissemination
l Handles streams of message from multiple
sources
l Negligible amounts of redundant messages
l Low dissemination latency thanks to adaptive
pull frequency
l Adapted to the conditions of real networks
l Efficient, robust, churn-tolerant
Pulp: An Adaptive Gossip-Based Dissemination Protocol — P. Felber 20