• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 103
Next 10 →

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
does not allow connections outside its own set of values. Networks may communicate, if they are compatible in their goals. But for this they need actors who possess compatible access codes to operate the switches. They are the switchers or power-holders in our society (as in the connections between

Forecast: Geospatial technology blurs the boundary between cyberspace and urban space to form geocomputable cities

by Pm Paul Torrens
"... The boundary between computing infrastructure and urban infrastructure were blurred to a fuzzy line some time ago and much has been written (and speculated) about on the ramifications of their consociation across a spectrum of topics, from sociology and public policy, to cyborgs and robotic manageme ..."
Abstract - Add to MetaCart
The boundary between computing infrastructure and urban infrastructure were blurred to a fuzzy line some time ago and much has been written (and speculated) about on the ramifications of their consociation across a spectrum of topics, from sociology and public policy, to cyborgs and robotic

Enhancing application robustness in cloud data centers

by Madalin Mihailescu, Andres Rodriguez, Cristiana Amza, Dmitrijs Palcikovs, Gabriel Iszlai, Andrew Trossman, Joanna Ng - in: 2011 Conference of the Center for Advanced Studies on Collaborative Research, CASCON’11 , 2011
"... We propose OX, a runtime system that uses application-level availability constraints and application topologies discovered on the fly to enhance resilience to infrastructure anomalies for cloud applications. OX allows application owners to specify groups of highly available virtual machines, followi ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
, following component roles and replication semantics. To discover application topologies, OX monitors network traffic among virtual machines, transparently. Based on this information, OX builds on-line topology graphs for applications and incrementally partitions these graphs across the infrastructure

Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services

by Dominique Guinard, Student Member, Student Member, Stamatis Karnouskos, Senior Member, Patrik Spiess, Domnic Savio
"... Abstract—The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, m ..."
Abstract - Cited by 65 (7 self) - Add to MetaCart
Abstract—The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic

SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING

by Bird Tracking, William P. Bennett, William P., Development, Deployment Of, Mobile Wireless Sensor, William P. Bennett, William P. Bennett, Adviser Mehmet, C. Vuran , 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract - Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable

Wireless Sensor Networking in Challenging Environments

by Mo Sha, Raj Jain, Jonathan Turner, Guoliang Xing, Mo Sha , 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract - Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact

Rutgers University

by Wei Zhang, Timothy Wood, K. K. Ramakrishnan, Jinho Hwang
"... A revolution is beginning in communication networks with the adoption of network function virtualization, which allows network services to be run on common off-the-shelf hardware—even in virtual machines—to in-crease flexibility and lower cost. An exciting prospect for cloud users is that these soft ..."
Abstract - Add to MetaCart
could automatically cache data blocks near worker nodes, or perform some computation directly on the data stream. This approach enables a new breed of application designs that blur the line between the cloud’s network and its servers. 1

Routing and Broadcasting in Ad-Hoc Networks

by Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Prof Dr, T. Braun, Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Von Frutigen, Prof Dr, T. Braun
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract - Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present

permission. Structured Codes in Information Theory: MIMO and Network Applications

by Jiening Zhan, Jiening Zhan, Jiening Zhan, Jiening Zhan
"... All rights reserved. ..."
Abstract - Add to MetaCart
All rights reserved.

2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC) On the Selection of Testbeds for the Evaluation of Sensor Network Protocols and Applications

by Pablo E. Guerrero, Iliya Gurov, Silvia Santini, Ro Buchmann, Technische Universität Darmstadt Darmstadt
"... Abstract—Wireless sensor network protocols and applications typically need to be evaluated and tested not only using simulators but also on testbeds. While simulations allow studying the performance of protocols and applications in a controlled environment, they usually do not provide a sufficient l ..."
Abstract - Add to MetaCart
Abstract—Wireless sensor network protocols and applications typically need to be evaluated and tested not only using simulators but also on testbeds. While simulations allow studying the performance of protocols and applications in a controlled environment, they usually do not provide a sufficient
Next 10 →
Results 1 - 10 of 103
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University