The Other Hand: High Bandwidth Development Policy
نویسندگان
چکیده
منابع مشابه
High Bandwidth Development Policy
Much of development policy has been based on the search for a short to do list that would get countries moving while growth theory has been based on the aggregate production function, where products disappear from the analysis. In this paper I depart from this framework and conceive of development as a process characterized by the co-evolution of capabilities and products that are dependent on ...
متن کاملDecoupling congestion control and bandwidth allocation policy with application to high bandwidth-delay product networks
In this dissertation, we propose a new architecture for Internet congestion control that decouples the control of congestion from the bandwidth allocation policy. We show that the new protocol, called XCP, enables very large per-flow throughput (e.g., more than 1 Gb/s), which is unachievable using current congestion control. Additionally, we show via extensive simulations that XCP significantly...
متن کاملDevelopment of high frequency and wide bandwidth Johnson noise thermometry
The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.
متن کاملOn the Other Hand - Drawing the Line
conferences, as we all know, is the opportunity they afford to consolidate old friendships and make new contacts. Clusters of conversation provide a more valuable way to spend ones time than attending sessions. At the last national meeting we escaped from the celebrations of the recent victory of Deep Blue over the dreaded Kasparov, to find just such a group, already engaged in an animated disc...
متن کاملHigh-Bandwidth Encryption with Low-Bandwidth Smartcards
This paper describes a simple protocol, the Remotely Keyed Encryption Protocol (RKEP), that enables a secure, but bandwidth-limited, cryptographic smartcard to function as a high-bandwidth secret-key encryption and decryption engine for an insecure, but fast, host processor. The host processor assumes most of the computational and bandwidth burden of each cryptographic operation without ever le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2008
ISSN: 1556-5068
DOI: 10.2139/ssrn.1314799