Filters








44 Hits in 4.0 sec

A methodology for studying persistency aspects of internet flows

Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
2005 Computer communication review  
The research of the authors is supported in part by EPSRC grant GR/S86266/01.  ...  ACKNOWLEDGEMENTS The authors are grateful to Bob Briscoe, Jon Crowcroft, Christophe Diot, Richard Gibbens, Damon Wischik and two anonymous referees for their comments on an earlier draft of this paper.  ...  In terms of Internet access, for simplicity, I'll only consider three alternatives to cell phones: wired desktops, wired or wireless laptops, and wireless Personal Digital Assistants (PDAs), where the  ... 
doi:10.1145/1064413.1064417 fatcat:b5leqpkvmnd5paw2vws4mqhlme

Carbon-Responsive Computing: Changing the Nexus between Energy and Computing

Dawn Nafus, Eve M. Schooler, Karly Ann Burch
2021 Energies  
response techniques needs to be developed that span the continuum of data centers, from the back-end cloud to the network edge.  ...  The industry also has not fully leveraged the parallel trend of decentralized renewable energy generation, which creates new areas of opportunity for innovation in combined energy and computing systems  ...  At Otago, David Eyers, Michael Jack, and the participants of the "ICTs and Sustainability" Workshop at the Centre for Sustainability gave helpful early feedback.  ... 
doi:10.3390/en14216917 fatcat:6u5ybid6ezhkfkbftnwnuafmxu

GoCoronaGo: Privacy Respecting Contact Tracing for COVID-19 Management

Yogesh Simmhan, Tarun Rambha, Aakash Khochare, Shriram Ramesh, Animesh Baranawal, John Varghese George, Rahul Atul Bhope, Amrita Namtirtha, Amritha Sundararajan, Sharath Suresh Bhargav, Nihar Thakkar, Raj Kiran
2020 Journal of the Indian Institute of Science  
In this article, we discuss various capabilities of such digital contact tracing, and its implication on community safety and individual privacy, among others.  ...  We offer a detailed overview of the app, backend platform and analytics, and our early experiences with deploying the app to over 1000 users within the Indian Institute of Science campus in Bangalore.  ...  The authors thank the administration of IISc for assistance with the development and deployment of GCG, the members of the Institute who volunteered to test early versions of the app, and Prof. Y.  ... 
doi:10.1007/s41745-020-00201-5 pmid:33199945 pmcid:PMC7656502 fatcat:ni6slbmghfdv5e57so3g3oycuq

Routing in Heterogeneous Wireless Ad Hoc Networks

Sivaram Cheekiralla, Daniel W. Engels
2007 2007 16th International Conference on Computer Communications and Networks  
Wireless ad hoc networks are used in several applications ranging from infrastructure monitoring to providing Internet connectivity to remote locations.  ...  The identification scheme is extended to a multi-addressing scheme for wireless ad hoc networks.  ...  The first routing scheme is for devices that use the wired Internet as a backbone for communication and the second routing scheme is for devices in wireless ad hoc networks.  ... 
doi:10.1109/icccn.2007.4317940 dblp:conf/icccn/CheekirallaE07 fatcat:2td7kbnjrzexrigg5an7thcjry

Mobile hosts in enterprise service integration

Satish Narayana Srirama, Matthias Jarke
2009 International Journal of Web Engineering and Technology  
It mainly concentrated on federated identity, because of the lack of connectivity between identities for internet applications in the current wireless technology especially in mobile networks.  ...  Hence IPv4, the current version of the Internet Protocol, for general use on the Internet is not sufficient, which has limited set of public addresses.  ... 
doi:10.1504/ijwet.2009.028620 fatcat:ho2y475htrhv7hq4cjmd6cgqbi

Localizing the Internet. Ethical Issues in Intercultural Perspective

Thomas Hausmanninger, Felix Weil, Marcus Apel, Peter Bittner, Elizabeth Buchanan, Josep Esquirol, Kenneth Himma, Thomas Hodel-, Alma Schütter, Wolfgang Hofkirchner, Ursula Maier-Rabler
2004 Zentrum für Kunst und Medientechnologie (ZKM, Karlsruhe) International Journal of Information Ethics   unpublished
Proceedings of the symposium "Localizing the Internet.  ...  Thanks to the fall 2004 LIS 503 students at the School of Library and Information Studies, University of Alberta for their inspiration.  ...  of scien ific practice.  ... 
fatcat:jnp3t3o4vncxbmo27erxoxlmny

MAIDS for VoIP : a Mobile Agents-based Intrusion Detection System for Voice over Internet Protocol

Christian Chita
2008
of the Application Under Test when specific, internet telephony attacks do occur, and ultimately to block the capability of the attack perpetrator to induce further damage.  ...  Compared to traditional (PSTN) voice networks, a Voice over Internet Protocol network is a convergence of a signaling network and a data network using Internet Protocol (IP).  ...  agents are prevented from tampering with the mission-spec ific tokens they carry.  ... 
doi:10.14288/1.0051579 fatcat:3z5ccs4qafcgtmqxzp5oovatti

'She has like 4000 followers!': the celebrification of self within school social networks

Sarah MacIsaac, J. Kelly, S. Gray
2017 Journal of Youth Studies  
The paper explores the resulting implications for teaching, learning and pupil wellbeing within contemporary educational environments.  ...  : the celebrification of self within school social networks.  ...  We would like to thank pupils and staff at the participating school. All participants' names have been changed in order to maintain anonymity.  ... 
doi:10.1080/13676261.2017.1420764 fatcat:6toxmpnouzfytbphavq67mzh24

Multiple Input Multiple Output [chapter]

2015 Wireless Communications Systems Design  
To my family Massimo, Luana and Alberto, their call for tenacity echoes in my ears.  ...  Acknowledgements This work is the result of the research conducted in two years at the University of Florence and during a visiting period of one year at Center for TeleInFrastruktur (CTIF) at the University  ...  Her encouragement and support enabled me to develop an understanding of the subject and overcome all the difficulties that I encountered.  ... 
doi:10.1002/9781118759479.ch8 fatcat:zerctkcbnjhxdnv6vsemyyki74

Bio-inspired cost-aware optimization for data-intensive service provision

Lijuan Wang, Jun Shen, Junzhou Luo
2015 Concurrency and Computation  
For all combinations of parameters (k, t), ACS with the global pheromone mod- ification approach and the local pheromone modification approach were tested.  ...  For example, in order to understand the regional scale impacts of fires, or the long-range transportation of pollutants on air quality, or even the implications of climate change, scientists need to combine  ... 
doi:10.1002/cpe.3589 fatcat:ac3v652klncdndi6bkglyxe5v4

Towards Accurate Monitoring of Extra-Functional Properties in Real-Time Embedded Systems

Mehrdad Saadatmand, Mikael Sjodin
2012 2012 19th Asia-Pacific Software Engineering Conference  
of the NFRs.  ...  Starting from requirements, which form the constraints of EFPs, we propose an approach for modeling Non-Functional Requirements (NFRs) and evaluating different design alternatives with respect to the satisfaction  ...  Acknowledgements This research is supported by the RALF3 (Swedish Foundation for Strategic Research (SSF), http://www.mrtc.mdh.se/projects/ralf3/) project and the Swedish Knowledge Foundation (KKS) through  ... 
doi:10.1109/apsec.2012.42 dblp:conf/apsec/SaadatmandS12 fatcat:lpyh3ui6nbghxlywqq4n55l7sy

An International Relations Perspective on the Convergence of Corporate Governance: German Shareholder Capitalism and the European Union, 1990-2000

Jeffrey N. Gordon
2003 Social Science Research Network  
This move has two implications.  ...  In particular, such conte stabilit y may be necessary for state-level acq uies cence t o cro ss-bor der merger act ivity, which creates economic organizations that are special conduits for the transnational  ...  This move has two implications.  ... 
doi:10.2139/ssrn.374620 fatcat:smucyhh32fh5lmfni4jmkuj7x4

On the Dominant Factors of Civilian-Use Drones: A Thorough Study and Analysis of Cross-Group Opinions Using a Triple Helix Model (THM) with the Analytic Hierarchy Process (AHP)

Chen-Hua Fu, Ming-Wen Tsao, Li-Pin Chi, Zheng-Yun Zhuang
2021 Drones  
future negotiations to propose the drafts for regulating the design, manufacturing, and uses of civilian drones.  ...  A thorough literature study is first undertaken to have the set of influencing factors that should be suitable for the investigation from the perspective of designing and selecting civilian drones.  ...  of wireless control signal.  ... 
doi:10.3390/drones5020046 fatcat:ibe2b6x6hzbsbcdnghrmptl3ky

National missile defense?

J. D. Crouch
1993 Comparative Strategy  
This medium is approved for the official dissemination of material designed to keep individuals within the Army knowledgeable of current and emerging developments within their areas of expertise for the  ...  Articles reflect views of the authors and should not be interpreted as official opinion of the Department of the Army or any branch, command, or agency of the Army.  ...  of the GBR-P and associated radar technologies; and a BM/C3 Division (which is part of a BM/C3 Project Office located in Washington, DC) responsible for the development of the IFICS, the automated engagement  ... 
doi:10.1080/01495939308402902 fatcat:ithwvos25bhw3p7bwpmt3zc3e4

National Missile Defense

Daniel Rosenfield
2009 Defense and Security Analysis  
This medium is approved for the official dissemination of material designed to keep individuals within the Army knowledgeable of current and emerging developments within their areas of expertise for the  ...  Articles reflect views of the authors and should not be interpreted as official opinion of the Department of the Army or any branch, command, or agency of the Army.  ...  of the GBR-P and associated radar technologies; and a BM/C3 Division (which is part of a BM/C3 Project Office located in Washington, DC) responsible for the development of the IFICS, the automated engagement  ... 
doi:10.1080/14751790902985256 fatcat:x25wxxkslrg2xmgrhgfznbzxom
« Previous Showing results 1 — 15 out of 44 results