• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 167
Next 10 →

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
, following an old tradition in human ecology. I would like to use for conceptualizing technology as a layer of the social structure, the Tourainian concept of 'mode of development' (also consistent with Bell's analytical framework), that I will de ne, in my own terms, as: &apos

Indicators for Social and Economic Coping Capacity - Moving Toward a Working Definition of Adaptive Capacity”, Wesleyan-CMU Working Paper.

by Gary Yohe , Richard S J Tol , Gary Yohe , 2001
"... Abstract This paper offers a practically motivated method for evaluating systems' abilities to handle external stress. The method is designed to assess the potential contributions of various adaptation options to improving systems' coping capacities by focusing attention directly on the u ..."
Abstract - Cited by 109 (14 self) - Add to MetaCart
could actually turn on personal stature and not necessarily social usefulness. Determinant #3 speaks to institutional requirements for each adaptation option and the decisionmaking frameworks with which they will be evaluated. Both need to be considered, and both can be evaluated independently

Digital library adoption and the technology acceptance model: A cross-country analysis

by Jade Miller, Otto Khera - The Electronic Journal on Information Systems in Developing Countries , 2010
"... In this article, we examine, through the framework of the Technology Acceptance Model (TAM), some of the features that inform user acceptance of a digital library system implementation at agricultural universities in two developing countries: Kenya and Peru. This is a study not only examining factor ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
In this article, we examine, through the framework of the Technology Acceptance Model (TAM), some of the features that inform user acceptance of a digital library system implementation at agricultural universities in two developing countries: Kenya and Peru. This is a study not only examining

Digital Trust: An Analysis of Trust in the Adoption of Digital Support Services

by Emilie Glazer , Anna Mieczakowski , James King , Ben Fehnert
"... Adoption of digital support services is mediated by varying experiences of trust. This paper deconstructs the notion of trust in technology through a design-led research project on the long-term adoption of a telehealth service -a context at once complex and fragile. The investigated daily experien ..."
Abstract - Add to MetaCart
trust means in developing digital support services more generally, and how appreciating the fragility of trust can bring both risk and hope in uncertain and evolving worlds. DECONSTRUCTING TRUST Digital technology is ubiquitous. Daily rituals of the most mundane kind are enacted through smartphones

Rethinking the Digital Divide: Towards a Path of Digital Effectiveness

by Corlane Barclay
"... The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching for sustainable solutions to reduce the digital gap in order to leverage their investments in information and communication ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
and communication technologies (ICT) toward the attainment of greater economic and social benefits and increased global competitiveness. Research has shown that the earlier focus on this phenomenon targeted physical access and diffusion of ICT as an indicator of digital readiness to reap ICT benefits. However

Active Mask Framework for Segmentation of Fluorescence Microscope Images

by Gowri Srinivasa, Advisor Prof, Prof Matthew, C. Fickus, Prof Adam, D. Linstedt, Prof Robert, F. Murphy
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract - Add to MetaCart
of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly

Nanyang Technological

by Yinan Li, Bingsheng He, Ming Wu, Qiong Luo, Jianliang Xu
"... We design and implement FD-Buffer, a buffer manager for database systems running on flash-based disks. Unlike magnetic disks, flash media has an inherent read-write asymmetry: writes involve expen-sive erase operations and as a result are usually much slower than reads. Therefore, we address this as ..."
Abstract - Add to MetaCart
We design and implement FD-Buffer, a buffer manager for database systems running on flash-based disks. Unlike magnetic disks, flash media has an inherent read-write asymmetry: writes involve expen-sive erase operations and as a result are usually much slower than reads. Therefore, we address this asymmetry in FD-Buffer. Specifically, we use the average I/O cost per page access as op-posed to the traditional miss rate as the performance metric for a buffer. We develop a new replacement policy in which we sepa-rate clean and dirty pages into two pools. The size ratio of the two pools is automatically adapted according to the read-write asymme-try and the runtime workload. We evaluate FD-Buffer with trace-driven simulations as well as experiments on real flash disks. Our evaluation results show that our algorithm achieves up to 40 % less I/O cost in simulation and up to 33 % improvement on the over-all performance on commodity flash disks, in comparison with the state-of-the-art flash-aware replacement policy. 1.

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case

THE IMPACT OF SOCIAL ISSUES ON INTERNET POLICY MAKING

by Anastasia Papazafeiropoulou, Athanasia Pouloudi, Anastasia Papazafeiropoulou, Athanasia Pouloudi
"... The advantages that Internet as a new technology offers to business and individuals can’t be fully exploited without taking under consideration a number of social issues that related with its use. Its global nature makes Internet policy making a challenging task, creating new responsibilities for po ..."
Abstract - Add to MetaCart
for policy makers world-wide. Apart from the technical (e.g. security, network availability, speed) and regulatory (e.g. legal frameworks and standardization) challenges that need to be tackled there are a number of social concerns that require special concern. It is important for policy makers to see

pp. 69–88 L2 IDENTITY, DISCOURSE, AND SOCIAL NETWORKING IN RUSSIAN

by Liudmila Klimanova
"... As the integration of Internet-based social networking tools becomes increasingly popular in foreign language classrooms, the use of modern communication technologies is particularly critical in the context of less commonly taught languages (LCTLs), where student exposure to the target language and ..."
Abstract - Add to MetaCart
As the integration of Internet-based social networking tools becomes increasingly popular in foreign language classrooms, the use of modern communication technologies is particularly critical in the context of less commonly taught languages (LCTLs), where student exposure to the target language
Next 10 →
Results 1 - 10 of 167
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University