Learn More
We consider routing games where the performance of<lb>each user is dictated by the worst (bottleneck) element it employs.<lb>We are given a network, finitely many (selfish) users, each<lb>associated with a positive flow demand, and a load-dependent<lb>performance function for each network element; the social (i.e.,<lb>system) objective is to optimize the(More)
Current survivability schemes typically offer two degrees of protection, namely full protection (from a single failure) or no protection at all. Full protection translates into rigid design constraints, i.e., the employment of disjoint paths. We introduce the concept of tunable survivability that bridges the gap between full and no protection. First, we(More)
BACKGROUND Native Hawaiian women have the highest breast and cervical cancer mortality rates and lowest screening rates in Hawai'i. This paper summarizes impacts of a breast and cervical cancer screening intervention spearheaded by a Native Hawaiian community. METHODS Six hundred seventy-eight randomly selected Native Hawaiian women completed two(More)
BACKGROUND Community participation was a key component of a cancer control research project in a Native Hawaiian community. This project tested the effectiveness of a culturally appropriate intervention as a means of increasing breast and cervical cancer screening practices among Native Hawaiian women on the Wai'anae Coast of the island of O'ahu. METHODS(More)
Topology control is the task of establishing an efficient underlying graph for ad-hoc networks over which high level routing protocols are implemented. The following design goals are of fundamental importance for wireless topologies: (1) low level of interference; (2) minimum energy consumption; (3) high spatial reuse; (4) connectivity; (5) planarity; (6)(More)
BACKGROUND This article describes a breast and cervical cancer control project in a Native Hawaiian community and presents preliminary findings from its first year. The project is community driven, with Native Hawaiian community investigators and advisors involved in all phases of the research project. Its purpose is to test the effectiveness of a(More)
Unlike traditional routing schemes that route all traffic along a single path, multipath routing strategies split the traffic among several paths in order to ease congestion. It has been widely recognized that multipath routing can be fundamentally more efficient than the traditional approach of routing along single paths. Yet, in contrast to the(More)
We propose a new IT automation technology for configuration management: automatic baseline policy extraction out of the Configuration Management Data Base (CMDB). Whereas authoring a configuration policy rule manually is time consuming and unlikely to realize the actual state of the configurations in the overall organization, this new approach summarizes(More)
In deblurring an image, we seek to recover the original sharp image. However, without knowledge of the blurring process, we cannot expect to recover the image perfectly. We propose a deblurring method of a single-image where the blur kernel is directly estimated from highlight spots or streaks with high intensity value. These highlighted points can be(More)