Results 1 - 10
of
165
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
in this paper: they rely on data and sources presented in the updated version of my trilogy (Castells 2000a). For the sake of clarity, I will rst present the conceptual framework I use in my analysis of social structure. I will then proceed to enumerate the main transformations taking place in social structures
Magnet: Robust and Efficient Collection through Control and Data Plane Integration
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract
- Add to MetaCart
. Magnet’s link estimator addresses the inaccuracies in link estimation by using feedback from both the data and control planes, using information from multiple layers through narrow, platform-independent interfaces. Second, Magnet addresses link dynamics by using the Trickle algorithm for control traffic
A Learning-Based Approach to the Detection of SQL Attacks
- In DIMVA (2005
, 2005
"... Abstract. Web-based systems are often a composition of infrastructure components, such as web servers and databases, and of applicationspecific code, such as HTML-embedded scripts and server-side applications. While the infrastructure components are usually developed by experienced programmers with ..."
Abstract
-
Cited by 66 (1 self)
- Add to MetaCart
with solid security skills, the application-specific code is often developed under strict time constraints by programmers with little security training. As a result, vulnerable web-applications are deployed and made available to the Internet at large, creating easilyexploitable entry points
Exploiting Temporal & Spatial Constraints on Distributed Shared Objects
- IN PROC. 17TH IEEE ICDCS. IEEE
, 1997
"... Gigabit network technologies have made it possible to combine workstations into a distributed, massivelyparallel computer system. Middleware, such as distributed shared objects (DSO), attempts to improve programmability of such systems, by providing globally accessible 'object' abstraction ..."
Abstract
-
Cited by 6 (6 self)
- Add to MetaCart
) high-frequency symmetric accesses to shared objects, (2) unpredictable and limited locality of accesses, (3) dynamically changing sharing behavior, and (4) potential data races. We show that a DSO system exploiting application-level temporal and spatial constraints on shared objects can outperform
Investigating the perceptions of credit constraints in the European Union
"... Abstract: The promotion and support of small and medium-sized enterprises (SMEs) forms an essential ingredient in policies to help improve Europe’s economic performance. A key issue in this context is whether SMEs face undue difficulty when trying to access credit. Using survey data from 2005 and 20 ..."
Abstract
- Add to MetaCart
banking helps to perceive an increased availability to credit. On the other hand, the ownership structure of a firm is not systematically related to perceived credit constraints, whereas turnover relaxes firms ’ perceptions in the “new ” EU 10 countries, but not in the “old ” Member States. There exist
Automatic inference of memory fences
- In FMCAD (2010
"... We addresses the problem of automatic verification and fence inference in concurrent programs running under relaxed memory models. Modern architectures implement relaxed memory models in which memory operations may be reordered and executed non-atomically. Instructions called memory fences are provi ..."
Abstract
-
Cited by 35 (9 self)
- Add to MetaCart
are provided to the programmer, allowing control of this behavior. To ensure correctness of many algorithms, the programmer is often required to explicitly insert memory fences into her program. However, she must use as few fences as possible, or the benefits of the relaxed architecture may be lost. It is our
hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks
, 2013
"... Digitising statistics handling through ..."
CITRUS FARMERS PRODUCTION CONSTRAINTS AND ATTITUDE TO TRAINING ON IMPROVED TECHNIQUES OF CITRUS PRODUCTION OYEDELE,
"... Emerging trends and advances in the citrus industry globally necessitates updating farmers knowledge and skill base to cope profitably in the industry. Therefore, this study was designed to assess the disposition of farmers to training on improved techniques of citrus production and also examine pro ..."
Abstract
- Add to MetaCart
production constraints confronting them. Randomly selected 321 citrus farmers from Oyo, Ondo, Osun and Ekiti states were assessed through the use of pretested interview schedule. Data generated were analysed through frequency counts, percentages,and means. Results showed that 74.7 % and 60.5 % of farmers
Globally Consistent Depth Labeling of 4D Lightfields
- In Proc. CVPR, 41
, 2012
"... We present a novel paradigm to deal with depth recon-struction from 4D light fields in a variational framework. Taking into account the special structure of light field data, we reformulate the problem of stereo matching to a con-strained labeling problem on epipolar plane images, which can be thoug ..."
Abstract
-
Cited by 34 (5 self)
- Add to MetaCart
-sulting optimization problems are solved with state-of-the-art convex relaxation techniques. We test our algorithm on a number of synthetic and real-world examples captured with a light field gantry and a plenoptic camera, and compare to ground truth where available. All data sets as well as source code are provided
The Impact of Banking Deregulations on Inbound Foreign Direct Investment: Transaction-level Evidence from the United States �
, 2013
"... Starting in the late 1970s, many states adopted intrastate branching and interstate banking deregulations that lifted restrictions on bank expansions, and facilitated access to finance. We evaluate the effects of the two banking deregulations and the accompanying reduction in credit constraints on f ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Starting in the late 1970s, many states adopted intrastate branching and interstate banking deregulations that lifted restrictions on bank expansions, and facilitated access to finance. We evaluate the effects of the two banking deregulations and the accompanying reduction in credit constraints
Results 1 - 10
of
165