The efficient market hypothesis states that an efficient market immediately incorporates all available information into the price of the traded entity. It is well established that the stock market is not an efficient ...
详细信息
The efficient market hypothesis states that an efficient market immediately incorporates all available information into the price of the traded entity. It is well established that the stock market is not an efficient market as it consists of numerous traders with differing strategies and interpretations of information. However there is substantial evidence to suggest that the stock market does incorporate new information into prices. Unfortunately little research has focussed on the high frequency effect of real time news, across a broad base of assets. This paper investigates how the US, UK, and Australian markets incorporate all real time news, not just Press Announcements, Annual Reports, etc. We find that there is strong evidence to suggest that the markets do incorporate news quickly.
Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and delay. The de facto standard, the Random Early Detection (RE...
详细信息
ISBN:
(纸本)1424402212
Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and delay. The de facto standard, the Random Early Detection (RED) AQM scheme, and most of its variants use average queue length as a congestion indicator to trigger packet dropping. This paper proposes a novel AQM algorithm, called Self-tuning Proportional and Integral RED (SPI-RED), as an extension of RED. SPI-RED is based on a Self-tuning Proportional and Integral controller, which not only considers the average queue length at the current time point, but also takes into consideration the past average queue lengths during a round-trip time. Furthermore, we give theoretical analysis of the system stability and give guidelines for the selection of feedback gains for the TCP/RED system to stabilize the average queue length at a desirable level. Extensive simulations have been conducted with ns2. The simulation results have demonstrated that the proposed SPI-RED algorithm outperforms the existing AQM schemes in terms of drop probability and stability.
The paradigm of animated pedagogical agent has been developed in recent years. These lifelike autonomous characters inhabit leaning environments and make rich, face-to-face learning interactions possible. Children see...
详细信息
The paradigm of animated pedagogical agent has been developed in recent years. These lifelike autonomous characters inhabit leaning environments and make rich, face-to-face learning interactions possible. Children seem to develop an immediate and deep affinity to such characters: the agents abilities open up new possibilities, e.g. agents can demonstrate complex tasks, employ locomotion and gestures, focus children's attention on the most important aspects of a task at hand, and convey emotional responses to the game. This create a comfortable environment with the ability to both engage and motivate children. The pedagogical agent uses emotion, intensity of emotion, and game states in order to create rules for adapting the system according to child behavior. Results showed that an affective gesture recognition model was able to recognize a child's emotion with a considerably high rate of over 82.5%, and the social agent (estimate intensity of emotion) had a strong relationship with observers' feedback, except in low intensity levels.
Although privacy is considered to be the ultimate right for every user to enjoy intercommunications with security and anonymity, the provision for such a service could easily be adapted as a hiding cover by malicious ...
详细信息
Although privacy is considered to be the ultimate right for every user to enjoy intercommunications with security and anonymity, the provision for such a service could easily be adapted as a hiding cover by malicious users. Privacy enhancing technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered and revealed when necessary. This paper proposes a network forensics protocol called RPINA (respect private information, not abuser) which may operate over PETs, without violating the privacy of innocent users, but only the privacy of abusers. This approach introduces a new dimension in the relation between these two opposite-goal technologies, which enhances their viability in the global network environment
This paper is based on work in progress for integrating simulations of agent-based models with geographic information systems using a DEVS-based approach. Work on multi-agent systems (agents-centric view) and geograph...
详细信息
This paper is based on work in progress for integrating simulations of agent-based models with geographic information systems using a DEVS-based approach. Work on multi-agent systems (agents-centric view) and geographic information systems (resource-centric view) reveals that actual platforms do not provide truly integrative modelling and simulation of both views. We argue that actual DEVS-based simulators facilitates that integration, providing a process of composing behaviours depending of time passage, however other mechanisms are needed to enable decentralised dynamic interactions of agents in spatio-temporal contexts.
The detection of failures is a fundamental issue for fault tolerance in distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, simi...
详细信息
The detection of failures is a fundamental issue for fault tolerance in distributed systems. Recently, many people have come to realize that failure detection ought to be provided as some form of generic service, similar to IP address lookup. However, this has not been successful so far; one of the reasons being the fact that classical failure detectors were not designed to satisfy several application requirements simultaneously. More specifically, traditional implementations of failure detectors are often tuned for running over local networks and fail to address some important problems found in wide-area distributed systems with a large number of monitored components. In this paper, we study the quality of service (QoS) of failure detectors. We first present a novel failure detector scheme combined with control theory that can help in solving or optimizing some problems. Furthermore, this paper discusses the design and analysis of implementing a scalable failure detection service for such large wide-area distributed systems considering dynamically adjusting the heartbeat streams, so that it satisfies the bottleneck router requirements. We further show how the online failure detector control algorithm can be used to design a controller, analyze the theoretical aspects of the proposed algorithm and verify its agreement. Simulation results show the efficiency of our scheme in terms of high utilization of the bottleneck link, fast response and good stability of the bottleneck router buffer occupancy as well as of the controlled sending rates. In conclusion, the new failure detector algorithm provides a better QoS.
The PC based virtual instrumentation is a dynamic and attractive alternative to the classic instrumentation. Its main advantages are: flexibility and adaptability, low cost, wide development of extension PC boards wit...
详细信息
The PC based virtual instrumentation is a dynamic and attractive alternative to the classic instrumentation. Its main advantages are: flexibility and adaptability, low cost, wide development of extension PC boards with measurements features, attractive representation of measurement results, in different forms, on the PC's monitor. The paper presents a system identification application with PC based (virtual) instrumentation. The virtual system is made of an external board, connected to the PC via the USB interface and a software tool, Agilent VEE (Visual engineering Environment). The presented virtual system can work as a voltmeter, ammeter, signal generator, digital oscilloscope and power supply. The main contribution of the paper is the extension of the application domain of the virtual instrumentation system to system identification. The identification method consists of applying to the system input a binary pseudorandom signal (BPRS) and determining the impulse response of the system as being well approximated by the cross-correlation function between the input signal and the answer of the system. The application is intended for educational purposes but can be used in other areas too
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper, the access control requirements in such environments were identified, and an access control model for P2P file-sharing systems based on trust and recommendation was proposed. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
The paper describes a study of how Japanese and Sinhala naive viewers use modifiers to describe differences in color tones. Three sequences of color tone stimuli were created for three hues, red, green and blue by var...
详细信息
The paper describes a study of how Japanese and Sinhala naive viewers use modifiers to describe differences in color tones. Three sequences of color tone stimuli were created for three hues, red, green and blue by varying just two parameters, saturation and value. Two methods were employed to study how naive viewers use modifiers to describe differences in their perceptions and modifiers of color tones. A preliminary elicitation employed the methods of selection description, in which Japanese and Sinhala modifiers meaning - pale, bright, vivid, strong, dull, dark - constituted a high proportion of responses. These modifiers were employed in a triadic comparison. Dissimilarities of all pair wise comparisons of stimuli were submitted to MDS analysis in order to derive a multidimensional perceptual structure for the stimuli. A semantic differential structure was derived applying PCA for modifier responses provided for the same set of stimuli. The results revealed that Japanese and Sinhala native speakers perceptually discriminate the six color tone stimulus into six categories. Furthermore, the semantic structures for each hue were different from one a another. And it was observed that the semantic structures related differently to the dimensions of the perceptual structures.
暂无评论