This collection collates faculty and staff collections alphabetically by surname.

Displaying 1 - 10 of 26
Filtering by

Clear all filters

360-Thumbnail Image.png
DescriptionAddendum to document recording all the responses from the survey in table form. This document records all the additional comments made on the survey responses
Contributorsfarrelly, deg (Author) / Hutchison Surdi, Jane (Author) / Arizona State University. Libraries (Contributor)
Created2016-01-21
362-Thumbnail Image.png
Description

Explains the urgent need for libraries to engage in preservation of irreplaceable content on VHS and other obsolete video formats in their collections, and presents a database of titles for which due diligence as required by Section 108 of US Copyright has already been completed.

Contributorsfarrelly, deg (Author) / Arizona State University. Libraries (Contributor)
Created2016-10-21
363-Thumbnail Image.png
Description

In spring 2013, the presenters developed a survey on academic library streaming video and distributed it broadly through various discussion and mailing lists.

This is the first large-scale and most comprehensive effort to date to collect data on streaming video funding, licensing, acquisition, and hosting in academic libraries. Its results will

In spring 2013, the presenters developed a survey on academic library streaming video and distributed it broadly through various discussion and mailing lists.

This is the first large-scale and most comprehensive effort to date to collect data on streaming video funding, licensing, acquisition, and hosting in academic libraries. Its results will provide benchmark data for future explorations of this rapidly expanding approach to video in academic libraries.

Streaming video is becoming a common occurrence on many campuses today. Its fast growth is due in part to the steady growth of online classes and programs. Technology has also played a role in this growth as alternatives for ingesting and accessing content have expanded. Multiple options are now available including in-house approaches, cloud storage, and third party vendors.

This survey collected data on how academic institutions address the day-to-day operations related to streaming video as well as perceived directions for future action.

Survey questions addressed selection and acquisition of video in both hard copy and streaming formats, funding for acquisitions, current and planned hosting interfaces, cataloging and access, and current practice and policy on digitization of hard copy titles for streaming. This session reviews the instrument used, and provides a preliminary look at some of the key data collected.

Contributorsfarrelly, deg (Author) / Hutchison Surdi, Jane (Author) / Arizona State University. Libraries (Contributor)
Created2013-11-03
361-Thumbnail Image.jpg
DescriptionPoster presents information on group project to develop a crowd-sourced database of VHS titles eligible for duplication within Section 108 provisions of US copyright law.
Contributorsfarrelly, deg (Author) / Arizona State University. Libraries (Contributor)
Created2016-05-17
359-Thumbnail Image.png
DescriptionDocument recording all the responses from the survey in table form
Contributorsfarrelly, deg (Author) / Hutchison Surdi, Jane (Author) / Arizona State University. Libraries (Contributor)
Created2016-01-21
358-Thumbnail Image.png
Description

Survey instrument used in Survey of Academic Library Streaming Video Revisited, 2015

Contributorsfarrelly, deg (Author) / Hutchison Surdi, Jane (Author) / Arizona State University. Libraries (Contributor)
Created2015-04-30
364-Thumbnail Image.png
Description

Streaming video has been an option for academic libraries for nearly a decade. What is the state of streaming video in academic libraries today? How are these libraries acquiring streaming videos? Who makes acquisition decisions? How much staff time does supporting streaming video require?

Contributorsfarrelly, deg (Author) / Hutchison Surdi, Jane (Author) / Arizona State University. Libraries (Contributor)
Created2014-09-30
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23