This has been a disappointing year for El Paso in terms of job growth. Through October, the city added only 1,200 new wage and salary jobs, according to seasonally adjusted data, an annualized growth rate of less than 1 percent. The seasonally adjusted unemployment rate remained at a historically low level of 5.4 percent in October, but progress in lowering the rate further stalled at midyear. ; El Paso's job growth over the past decade has had a strong positive correlation with the U.S. business cycle. El Paso's industrial roots and continued economic ties to the Mexican maquiladora industry keep the city closely linked to the U.S. factory system. A broad slowdown in U.S. growth—jobs grew at a 1.1 percent rate through October—has been under way for over a year and provides the backdrop to sluggish local growth. ; However, some elements of El Paso's economic performance are specific to the city. For example, the major factor behind lower U.S. growth is the housing bust, an event whose effects vary widely in markets across the country, and El Paso has its own story to tell. Further, economic neighbor Mexico has broken out of the mold of mechanically following the U.S. business cycle, with surprisingly good growth continuing in that country. And the maquiladora industry has at least held its own across the border in Ciudad Juárez, with job growth flat in recent months. Finally, El Paso has high expectations built up by the Fort Bliss expansion. It is an economic boom that is still waiting to happen; the stimulus is unfolding more slowly than initially forecast.
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to
freely access the web. The obvious difficulty with this approach is that once the address of a proxy or an anonymizer is announced
for use to the public, the authorities can easily filter all traffic to that address. This poses a challenge as to how proxy
addresses can be announced to users without leaking too much information to the censorship authorities. In this paper, we
formulate this question as an interesting algorithmic problem. We study this problem in a static and a dynamic model, and
give almost tight bounds on the number of proxy servers required to give access to n people k of whom are adversaries. We will also discuss how trust networks can be used in this context.
In December 2007, the U.S. economy entered a mild recession, a downturn that would ultimately trigger the worst financial crisis since the Great Depression and a fall into one of the longest and deepest recessions of the past 60 years. Growth returned to the U.S. in mid-2009 but remains too slow to make inroads into stubbornly high unemployment. Virtually no geographic area of the country was left untouched by the U.S. downturn, including El Paso, although the local economy performed much better than other border cities, such as McAllen, Brownsville and Laredo. Government-related spending, especially the huge expenditures at Fort Bliss, provided an important brake on the local economic decline.> ; This article looks at recent economic trends in El Paso, as well as the prospects for the major economic drivers that combine to determine El Paso’s performance. The U.S. economy is growing, especially manufacturing; the maquiladora is hiring again; and the peso has strengthened following the financial crisis. The data clearly point to a recent bottom and to the likelihood that growth resumed early this year. Conditions are now in place for expansion to continue through the rest of this year and beyond.
A lot of research has been carried out in the field of Mobile Agents over the last years, leading to the implementation of a vast number of prototypes and technologies, such as agent-supporting web servers and JINI-based frameworks. These technologies can be seen as a new means for the development of distributed information systems, extending and complementing traditional design principles like client-server/RPC . This paper gives an overview of currently available Mobile Agent implementation techniques and examines how they can be used to build distributed applications.
this paper, therefore, is to propose a framework to empirically evaluate the types of tasks that might benefit from a multimodal interface. Before exploring this issue, an overview of speech recognition technology is given. This is followed by theoretical work in task integration. Related work in multimodal speech interfaces is covered. Finally, a framework for evaluating the types of input tasks that could benefit from multimodal environments is presented
This paper attempts to raise some issues that are important for graduate students to be successful and to get as much out of the process as possible, and for advisors who wish to help their students be successful. The intent is not to provide prescriptive ...
In an interdisciplinary effort to model protein dependency networks, biologists measure signals from certain proteins within cells over a given interval of time. Using this time series data, the goal is to deduce protein dependency relationships. The ...
This project visualizes a scientific dataset containing two-dimensional flow data from a simulated supernova collapse provided by astrophysics researchers. We started our project by designing visualizations using multiple hand drawings representing the ...
In this study, we developed an algorithmic method to analyze late contrast-enhanced (CE) magnetic resonance (MR) images, revealing the so-called hibernating myocardium. The algorithm is based on an efficient and robust image registration algorithm. Using ...
This paper presents the core knowledge required to properly develop 2D games in Java. We describe the common pitfalls that can easily degrade graphics performance and show how we achieved impressive frames-per-second display updates when implementing Minueto, a game development framework.
The idea of telematics was first conceived by Simon Nora and Alain Minc as the “increasing interconnection between computers and telecommunications” which “[blend] pictures, sounds and memories and [transform] the pattern of our culture”. Through these computer-mediated communications, new kinds of human-human and humanmachine interactions have become possible. Telepresence, teleconferencing and telerobotics are all enabled by the mechanisms encompassed by telematics. Of special interest for this article however is the idea of telerobotics. Telerobotic techniques and human supervisory control allow complex tasks to be performed at large distances or in hazardous environments without posing any real risk to the operator. Tele-autonomous systems are the result of merging telerobotics with techniques for autonomous systems. The motivation for this is as follows: by placing intelligent functions at the work site, the operator’s performance can be increased  while reducing his or her exposure to potentially hazardous environments. The tele-autonomous system, by virtue of its name, will typically be located at a remote site from the human operator. This can result in certain undesirable side effects of operating robots over large distances. A tight control loop requires fine control on the part of the operator which can slow down the work process and cause a higher rate of error if the communication is delayed. This may be a result of a work site being at a significant distance from the control station, noisy communication channels or both. As an example, NASA’s Sojourner Mars Micro-rover suffered from very long delays between the time a command was sent from the control station and the time it was received by the rover. Space missions in general suffer from these problems when performing trajectory correction maneuvers; an accurate model of the spacecraft’s motion is required to calculate the corrections because the signals won’t be received for some time . Tele-autonomous systems and supervisory control provide a means for these challenges to be alleviated. By giving the mobile platform enough intelligence to be able to make some decisions without the intervention of the operator, the complexity of command formulation is greatly reduced. This article discusses the concepts of tele-autonomous and multi-robot systems and some of the particular challenges faced by a human who is operating or supervising such a system. The SimCanuck simulated robotic soccer team will serve as an example to illustrate these various challenges. This system was a competitor at RoboCup 2001, the World Cup of robotic soccer in Seattle and was later extended to allow a human coach to provide advice to the team during game play. The simulation environment operates under a client-server model where each agent is represented by a stand alone client providing the AI (artificial intelligence) for its robotic avatar in the simulation. Each SimCanuck client, implemented in C++, is completely independent of the others, and communication is allowed only through the simulation server via UDP (User Datagram Protocol) sockets. The coach component of the SimCanuck teleautonomous multi-robot system consists of a graphical user interface that allows the operator to specify goals and tasks and communicate these to the robotic players. This article will be divided into three main sections. The first introduces Tele-Autonomous Multi-Robot Systems and discusses how human-system interaction is predicated by the social organization of a multi-robot system. The second discusses supervisory control and some of the challenges and obstacles of using this technology with robot collectives. The final section will discuss the graphical user interface used by the human coach to operate the SimCanuck tele-autonomous robotic soccer system.
Research in proteomics has created two significant needs: the need for an accurate public database of empirically derived mass spectrum information and the need for managing the I/O and organization of mass spectrometry data in the form of files and structures. Lack of an empirically derived database limits the ability of proteomic researchers to identify and study proteins. Managing the I/O and organization of mass spectrometry data is often time-consuming due to the many fields that need to be set and retrieved. As a result, incompatibilities and inefficiencies are created by each programmer handling this in his or her own way. Until recently, storage space and computing power has been the limiting factor in developing tools to handle the vast amount of mass spectrometry information. Now the resources are available to store, organize, and analyze mass spectrometry information.The Illinois Bio-Grid Mass Spectrometry Database is a database of empirically derived tandem mass spectra of peptides created to provide researchers with an organized and searchable database of curated spectrum information to allow more accurate protein identification. The Mass Spectrometry I/O Project creates a framework that handles mass spectrometry data I/O and data organization, allowing researchers to concentrate on data analysis rather than I/O. In addition, the Mass Spectrometry I/O Project leverages several cross-platform and portability-enhancing technologies, allowing it to be utilized on a variety of hardware and operating systems.
This paper presents the results of an empirical study aimed at examining the extent to which software engineers follow a software process and the extent to which they improvise during the process. Our subjects tended to classify processes into two groups. ...
We've been experimenting with a new editorial model. Previously, issues of XRDS have been directed by one or two Feature Editors, who have a particular interest in a subject area. For example, James Stanier headed up the "Changing Face of Programming" ...
This design pattern is an extension of the well-known state pattern , which allows an object to change its behavior depending on the internal state of the object. The behavior is defined by events, whose transformation to actions depends on the object state. This pattern introduces a way to manage state actions.
In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead . We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme  is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS  attack in a mobile environment and study the performance results.
Static analysis tools are useful for finding common programming mistakes that often lead to field failures. However, static analysis tools regularly generate a high number of false positive alerts, requiring manual inspection by the developer to determine if an alert is an indication of a fault. The adaptive ranking model presented in this paper utilizes feedback from developers about inspected alerts in order to rank the remaining alerts by the likelihood that an alert is an indication of a fault. Alerts are ranked based on the homogeneity of populations of generated alerts, historical developer feedback in the form of suppressing false positives and fixing true positive alerts, and historical, application-specific data about the alert ranking factors. The ordering of alerts generated by the adaptive ranking model is compared to a baseline of randomly-, optimally-, and static analysis tool-ordered alerts in a small role-based health care application. The adaptive ranking model provides developers with 81% of true positive alerts after investigating only 20% of the alerts whereas an average of 50 random orderings of the same alerts found only 22% of true positive alerts after investigating 20% of the generated alerts.
Research in proteomics has created two significant needs: the need for an accurate public database of empirically derived mass spectrum information and the need for managing the I/O and organization of mass spectrometry data in the form of files and ...
As a student of computer science, there's a significant chance you will end up working in software development after graduation. Despite whether your career path takes you into industry or academia, you're likely to have some kind of interaction with software development companies or organizations, if only in trying to get the most out of a project or collaboration.
Computational semantics has become an interesting and important branch of computational linguistics. Born from the fusion of formal semantics and computer science, it is concerned with the automated processing of meaning associated with natural language ...
This paperattem?? to raise som issues that are im ortant for graduate students to be successful and to get asm uch out of the process as possible, and for advisors who wish to help their students be successful. The intent is not to provide prescriptive advice -- no form ulas for finishing a thesis or twelve-stepprogram for becom8 ] a better advisor are given -- but to raise awareness on both sides of the advisor-student relationship as to what the expectations are and should be for this relationship, what a graduate student should expect toaccom8ACF; comom problem8 and where to go if the advisor is not forthcomCF? 1 In troduction This article originated with a discussion I had with several wom? professors about the problem wom] face in graduate school, and how mAF wom] could be encouraged to go to graduate school incom?M"O science. Eventually, the conversation turned to the question of what these wom] could do in their interactions with wom# students to support and encouragethem I volunteered that over the course ofm y graduate career I had collected a variety of papers and e-mAF discussions about how to be a good advisor, how to get through graduate school, and issues facing wom]? They were eager to get this mthisAF8 and I toldthem I would sort through it when I got a chance.