A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
ASH: Tackling Node Mobility in Large-Scale Networks
2010
2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems
A preliminary evaluation by means of simulation shows that ASH succeeds in tackling node mobility, while consuming only minimal resources. ...
The main contribution of this paper is the introduction of a novel mechanism (called ASH) for the creation of a quasi-static overlay on top of a mobile topology. ...
In this paper we propose a novel mechanism (called ASH) for handling mobility in large-scale networks; in essence we "slow down" the network by creating a quasi-static overlay on top of the highly mobile ...
doi:10.1109/saso.2010.33
dblp:conf/saso/PruteanuDL10
fatcat:p6xr4ouhavg6tmh6bd2r3q2x3e
ASH: tackling node mobility in large-scale networks
2012
Computing
A preliminary evaluation by means of simulation shows that ASH succeeds in tackling node mobility, while consuming only minimal resources. ...
It is powered by simple, local interactions between nodes and exhibits self-healing and self-organization capabilities with respect to failures and node mobility. ...
Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s) ...
doi:10.1007/s00607-012-0202-3
fatcat:vq77vi2panbr5cjx7hbgsbzukm
Epilogue: The Machinery of Urban Resilience
2014
Social Sciences
They are large, open and dispersed. They gather life but also distribute it. They are full of variety, latency and multiplicity. They are territories but also nodes in multiple networks. ...
In the course of time, cities have endured all manner of difficulty, hedging against risk and bouncing back from adversity, small and large [1] . ...
Recognizing the plurality of the modern metropolis, and drawing on the example of cities investing in large-scale data capture, this narrative locates resilience-anticipatory and regenerative-in the capacity ...
doi:10.3390/socsci3030308
fatcat:dotdvetvgnhy3pj4xzighvahmu
Volcanic ash impacts on critical infrastructure
2012
Physics and Chemistry of the Earth
Electricity networks are very vulnerable to disruption from volcanic ash falls. ...
Ash cleanup from road and airports is commonly necessary, but the large volumes make it logistically challenging. ...
Acknowledgements We would like to thank the large number of local partners, collaborators and participants, too numerous to list here, who have given generously of their time and expertise to assist international ...
doi:10.1016/j.pce.2011.06.006
fatcat:bozm55uqa5hvpdtzx3mq3p4ke4
Regulating economic globalization
2004
Transactions of the Institute of British Geographers
provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in ...
The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-profit purposes ...
In part, the variety is the product of the sheer 'excess' of regulation at work in different networks, and in part, it is the product of the interface between the scalar, largely state-led, regimes of ...
doi:10.1111/j.0020-2754.2004.00126.x
fatcat:hvukjakjzvb4xdrap4akdv5nwu
Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Properties of High Strength Concrete
2013
IOSR Journal of Mechanical and Civil Engineering
In this experimental study the changes on some mechanical properties of concrete specimens produced by Metakaolin, fly Ash and steel fibers were investigated. ...
Three types of steel fibers were used in the experiments and volume fractions of steel fiber were 0.5% to 4.0 %. ...
Journal of Chemical Engineering costs and problems with regeneration of the spent activated carbon discourage its large-scale application. ...
doi:10.9790/1684-0710104
fatcat:hcaupjeofvejrgklz6soete4em
Potential impacts of the loss ofFraxinus excelsior(Oleaceae) due to ash dieback on woodland vegetation in Great Britain
2016
New Journal of Botany
Ash is dominant in eight NVC communities: W8a, W8b, W8c, W8d, W8e, W8g, W9a and W12a. (Confidence: High). ...
Regional differences in how the tree and ground flora woodland community may respond following the loss of ash were assessed. ...
In south and east England, holes in mature farmland trees are frequently used as nest sites; where this coincides with ash being the dominant farmland tree, any large-scale felling of mature ash is likely ...
doi:10.1080/20423489.2016.1171454
fatcat:eex3mkfx2zgp7oubmwchezj4ga
Top Downloads in IEEE Xplore [Reader's Choice]
2017
IEEE Signal Processing Magazine
September 2014
Locating the Nodes: Cooperative
Localization in Wireless Sensor
Networks
Patwari, N.; Ash, J.N.; Kyperountas,
S.; Hero, O.; Moses, R.L.; Correal, N.S. ...
September 2014 Communicating While Computing: Distributed Mobile Cloud Computing over 5G Heterogeneous Networks Barbarossa, S.; Sardellitti, S.; Lorenzo, P.D. ...
doi:10.1109/msp.2016.2639138
fatcat:c22jyxu4hzanjirvdw22o5c6we
Stanford Us-Russia Forum Research Journal
2017
Zenodo
We are grateful to Middlebury School in Russia for their assistance in distributing the survey and providing expert advice. ...
Tatiana Tropina for her guidance in the development of this paper. ...
Next, for every other English-language co-occurrence network, we add edges between nodes if those nodes are linked by an edge in any other English network. ...
doi:10.5281/zenodo.1181947
fatcat:cuatqnwazrby3gdggnv7z6ue7a
Stanford Us-Russia Forum Research Journal
2017
Zenodo
We are grateful to Middlebury School in Russia for their assistance in distributing the survey and providing expert advice. ...
Tatiana Tropina for her guidance in the development of this paper. ...
Next, for every other English-language co-occurrence network, we add edges between nodes if those nodes are linked by an edge in any other English network. ...
doi:10.5281/zenodo.1181946
fatcat:4pnc5nzim5chnpivdwgqwde2ae
When networks network: Once studied solo, systems display surprising behavior when they interact
2012
Science News
Important large-scale interactions would have remained hidden. Exposing unknown interactions is not the only issue. ...
In 2009, D'Souza and a colleague showed that connecting a large portion of nodes in a network of networks takes fewer links than would be required for a similar single network. ...
doi:10.1002/scin.5591820619
fatcat:3hedr7oxhrhnbfch5uvg5lirty
Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm
2018
Wireless Communications and Mobile Computing
One major obstacle in the application of the PHY-layer authentication is its detection rate. ...
In addition, a two-dimensional test statistic features authentication model is presented for further improvement of detection rate. ...
of wireless mobile networks are continuously covered in rural areas. ...
doi:10.1155/2018/6039878
fatcat:k5gbel5jgbcbnoodnjiukv4yra
The Ninja architecture for robust Internet-scale systems and services
2001
Computer Networks
Support is provided as well by Intel Corporation, Ericsson, Philips, Sun Microsystems, IBM, Nortel Networks, and Compaq. ...
Acknowledgements This work is supported, in part, by the Defense Advanced Research Project Agency (grant DABT 63-98-C-0038) and the National Science Foundation (grant RI EIA-9802069). ...
We believe that there will be a very large number of units attached to the network, reaching scales of hundreds of millions, and eventually, billions of devices. ...
doi:10.1016/s1389-1286(00)00179-1
fatcat:vaghnmok75a5bfqpiapmnz6g6e
Trustworthy Edge Computing through Blockchains
[article]
2020
arXiv
pre-print
, computing, and network capacity. ...
Nonetheless, one open challenge of this emerging paradigm lies in the potential security issues on edge nodes and end devices, e.g., sensors and controllers. ...
., adjacency) in large scales of nodes, (ii) It makes the validation process independent of the Build-Network phase because the leaders can continue validating the blocks while the other nodes are building ...
arXiv:2005.07741v1
fatcat:ivxef3bgmbdrdahyqgb2u7qhxm
Distributed computing column 44 2011 in review
2011
ACM SIGACT News
And in this column, we have touched in 2011 upon computing over dynamic networks (in March), combining game theory and fault tolerance in distributed computing (in June), and using social networks to overcome ...
The ABD construction lies at the heart of many distributed storage systems built in the last decade, including scalable replicated storage used in today's large data centers and clouds. ...
Mobile and radio networks was one of this year's hot topics. ...
doi:10.1145/2078162.2078178
fatcat:wqzckoz7jngxbpp4ezv6uce65u
« Previous
Showing results 1 — 15 out of 1,376 results