Filters








44,566 Hits in 3.9 sec

Converged social media: Identity management and engagement on Facebook Mobile and blogs

Patient Rambe
2013 Australasian Journal of Educational Technology  
, and particularly, the academic and social implications of converged media on students' lives.  ...  Identity construction and convergence as theoretical constructs were drawn upon to examine student narratives of their Facebook interactions and navigation of their identities.  ...  Social convergence: A myth or reality?  ... 
doi:10.14742/ajet.117 fatcat:d7aj5gtrgvdwzpw6wysrbzjzve

The Lisbon Process, Re-Visited - A Reality Check of the European Social Model

Arno Tausch
2006 Social Science Research Network  
A reality check of the European social model. Abstract This article portrays a bleak picture of European realities.  ...  We also show that Europe's crisis is not caused by what the neo-liberals term a "lack of world economic openness" but rather, on the contrary, by the enormous amount of passive globalization that Europe  ...  The political background for such a "reality check" is clear.  ... 
doi:10.2139/ssrn.975238 fatcat:lsm5omnumjcaxhlphp4qo7erfe

A reality check on technical trading rule profits in the U.S. futures markets

Cheol-Ho Park, Scott H. Irwin
2009 Journal of futures markets  
This is so far the largest universe of trading rules in studies of technical analysis on the futures market.  ...  Hansen shows that his new test, termed the Superior Predictive Ability (SPA) test, can improve the power of the test by adopting a studentized test statistic and a data dependent null distribution.  ...  a Reality Check p-value of 0.32.  ... 
doi:10.1002/fut.20435 fatcat:44su742is5awbclmq5vdnf5hye

"Network Neutrality"

kc claffy
2011 Computer communication review  
In June 2011 I participated on a panel on network neutrality hosted at the June cybersecurity meeting of the DHS/SRI Infosec Technology Transition Council (ITTC) [1], where "experts and leaders from the  ...  I recently wrote up some of my thoughts on that panel, including what network neutrality has to do with cybersecurity.  ...  Although they have recently recognized the need for a reality check on both of these beliefs, they have not yet outwardly admitted that they are simply not true.  ... 
doi:10.1145/2043165.2043172 fatcat:izh2nhqz6jarxhutzrtksihknu

Predicting Network Futures with Plankton

Santhosh Prabhu, Ali Kheradmand, Brighten Godfrey, Matthew Caesar
2017 Proceedings of the First Asia-Pacific Workshop on Networking - APNet'17  
By combining symbolic modeling of data plane and control plane with explicit state exploration, Plankton performs a goal-directed search on a finite-state transition system that captures the behavior of  ...  We propose Plankton, a verification platform for identifying undesirable evolutions of networks.  ...  We also checked for convergence of BGP in networks such as the one illustrated in Figure 3 , where violations were correctly identified by Plankton.  ... 
doi:10.1145/3106989.3106991 dblp:conf/apnet/PrabhuKGC17 fatcat:3it43fgzgfd3rgdw3gju3cajbe

Small-buffer networks

Mark Shifrin, Isaac Keslassy
2009 Computer Networks  
Recent models of large-buffer networks have suggested that these large buffers could be replaced with much smaller ones.  ...  In this paper, we introduce a new model that provides a complete statistical description of small-buffer Internet networks.  ...  However, in order to study how far from reality the independence assumption is, we first checked how correlated the congestion windows are over time.  ... 
doi:10.1016/j.comnet.2009.05.005 fatcat:2qugrn6vtzgttnr4pel5xyxvl4

A New Convergent Identity System Based on EAP-TLS Smart Cards

Pascal Urien, Estel Marie, Christophe Kiennert
2011 2011 Conference on Network and Information Systems Security  
We present the identity lifecycle in which a secure device is manufactured and then linked to one or several user's identities.  ...  SSL-Identity is convergent because it works in fixed and mobile environment. It claims a strong mutual authentication between user and authentication server.  ...  The architecture detailed in this section is a convergent identity management system, consisting of an identity management server based on EAP-TLS smart card authentication.  ... 
doi:10.1109/sar-ssi.2011.5931373 fatcat:hmhezvawfbd4hmh6yulpelpwu4

BLOCKCHAIN-BASED NETWORK FUNCTIONS VIRTUALIZATION FOR 5G NETWORK SLICING

Taras MAKSYMYUK, Department of Telecommunications, Institute of Telecommunications, Radio Electronics and Electronic Engineering, Lviv Polytechnic National University, Bandery 12, 79013 Lviv, Ukraine, Volodymyr ANDRUSHCHAK, Stepan DUMYCH, Bohdan SHUBYN, Gabriel BUGÁR, Juraj GAZDA, Department of Telecommunications, Institute of Telecommunications, Radio Electronics and Electronic Engineering, Lviv Polytechnic National University, Bandery 12, 79013 Lviv, Ukraine, Department of Telecommunications, Institute of Telecommunications, Radio Electronics and Electronic Engineering, Lviv Polytechnic National University, Bandery 12, 79013 Lviv, Ukraine, Department of Telecommunications, Institute of Telecommunications, Radio Electronics and Electronic Engineering, Lviv Polytechnic National University, Bandery 12, 79013 Lviv, Ukraine, Department of Computers and Informatics, Technical University of Kosice, Letna 9, 042 00 Kosice, Slovakia, Department of Computers and Informatics, Technical University of Kosice, Letna 9, 042 00 Kosice, Slovakia
2021 Acta Electrotechnica et Informatica  
By using a combination of AI and blockchain technologies, proposed system provides flexible network deployment, interoperability between different mobile network operators and effective management of radio  ...  The paper proposes a new blockchain-based network architecture for 5G network functions virtualization.  ...  A hash is a unique cryptographic identity that ensures integrity and correctness of the information in the block.  ... 
doi:10.15546/aeei-2020-0026 fatcat:gfpv2vefnbhzhoxgzfxpvwvdha

Optimized Multipath Network Coding in Lossy Wireless Networks

Xinyu Zhang, Baochun Li
2008 2008 The 28th International Conference on Distributed Computing Systems  
Recent work on network coding includes a substantial number of optimization based protocols, but mostly for wireline multicast networks.  ...  Network coding has been a prominent approach to a series of problems that used to be considered intractable with traditional transmission paradigms.  ...  MORE relies on a heuristic algorithm to manage the coding and forwarding operations of intermediate nodes.  ... 
doi:10.1109/icdcs.2008.45 dblp:conf/icdcs/ZhangL08 fatcat:3a3z7nls4zakrmgikuigdcjabm

Optimized multipath network coding in lossy wireless networks

Xinyu Zhang, Baochun Li
2009 IEEE Journal on Selected Areas in Communications  
Recent work on network coding includes a substantial number of optimization based protocols, but mostly for wireline multicast networks.  ...  Network coding has been a prominent approach to a series of problems that used to be considered intractable with traditional transmission paradigms.  ...  MORE relies on a heuristic algorithm to manage the coding and forwarding operations of intermediate nodes.  ... 
doi:10.1109/jsac.2009.090605 fatcat:k5gkiqj2lrbxvegdblmbvwi3ca

New Infrastructure of NGN and IMS Networks

Saeed Mahdavi, Maryam Sabet Sarvestani, Mohammad Doosti
2016 International Journal of Future Computer and Communication  
network and how network communications convergance fixed and mobile network.  ...   Abstract-This paper is about the introduction of new generation networks and include network standard used this type of structure is providing services(vas).The infrastructure requirements in the fixed  ...  Convergence is nowadays a reality, with different types of content and communication services delivered through the same pipes and consumed over a variety of platforms and user devices.  ... 
doi:10.18178/ijfcc.2016.5.3.460 fatcat:yoriopsinncopjlaewedb4hzq4

Mobility helps security in ad hoc networks

Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
2003 Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '03  
We also propose an extension of this basic mechanism, in which a security association can be established with the help of a "friend".  ...  We show that this technique is generic, by explaining its application to fully self-organized ad hoc networks and to ad hoc networks placed under an (off-line) authority.  ...  In [27] , Zhou and Haas propose a distributed public-key management service for ad hoc networks.  ... 
doi:10.1145/778415.778422 dblp:conf/mobihoc/CapkunHB03 fatcat:wviaxamtivh4didf7ba4cwtk5y

Mobility helps security in ad hoc networks

Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
2003 Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing - MobiHoc '03  
We also propose an extension of this basic mechanism, in which a security association can be established with the help of a "friend".  ...  We show that this technique is generic, by explaining its application to fully self-organized ad hoc networks and to ad hoc networks placed under an (off-line) authority.  ...  In [27] , Zhou and Haas propose a distributed public-key management service for ad hoc networks.  ... 
doi:10.1145/778421.778422 fatcat:fmvvasduefd4vaxxuwf26d3mcy

Wireless Network Security Issues
ENGLISH

Ashwani Kumar Ashwani Kumar, Ram Kumar Ram Kumar
2005 DESIDOC Bulletin of Information Technology  
In this paper a study has been carried out for the threats on wireless networks and security goals to be achieved.  ...  In the time span of just a few years, wireless networking has emerged from a novelty to revolution.  ...  Mobile internet and mobile network are reality now.  ... 
doi:10.14429/dbit.25.1.3645 fatcat:rnafqcu2mja75poeap4s7dlzk4

Structuring for Globalization: The Minimal Network

João Vieira Cunha, Stewart R. Clegg, Miguel Pina E. Cunha
2008 Social Science Research Network  
Nonetheless, managers seem to be able to handle the paradox posed by these two contradicting tensions by enacting, via action, a synthesis that allows for the co-presence of a high level of global integration  ...  Global advantage requires a dialectical capability that organizations rarely achieve, and the importance of which orthodox management theory rarely recognizes.  ...  It is important, though, that those perceptions, although not being identical (global), are compatible (glocal) in the sense that they illuminate a certain reality from different but complementary (i.e  ... 
doi:10.2139/ssrn.1357324 fatcat:ohgmmo2qa5bvzhzqu7tnwe75li
« Previous Showing results 1 — 15 out of 44,566 results