Results 1 - 10
of
103
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
does not allow connections outside its own set of values. Networks may communicate, if they are compatible in their goals. But for this they need actors who possess compatible access codes to operate the switches. They are the switchers or power-holders in our society (as in the connections between
Forecast: Geospatial technology blurs the boundary between cyberspace and urban space to form geocomputable cities
"... The boundary between computing infrastructure and urban infrastructure were blurred to a fuzzy line some time ago and much has been written (and speculated) about on the ramifications of their consociation across a spectrum of topics, from sociology and public policy, to cyborgs and robotic manageme ..."
Abstract
- Add to MetaCart
The boundary between computing infrastructure and urban infrastructure were blurred to a fuzzy line some time ago and much has been written (and speculated) about on the ramifications of their consociation across a spectrum of topics, from sociology and public policy, to cyborgs and robotic
Enhancing application robustness in cloud data centers
- in: 2011 Conference of the Center for Advanced Studies on Collaborative Research, CASCON’11
, 2011
"... We propose OX, a runtime system that uses application-level availability constraints and application topologies discovered on the fly to enhance resilience to infrastructure anomalies for cloud applications. OX allows application owners to specify groups of highly available virtual machines, followi ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
, following component roles and replication semantics. To discover application topologies, OX monitors network traffic among virtual machines, transparently. Based on this information, OX builds on-line topology graphs for applications and incrementally partitions these graphs across the infrastructure
Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services
"... Abstract—The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, m ..."
Abstract
-
Cited by 65 (7 self)
- Add to MetaCart
Abstract—The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic
SIMULATION, DEVELOPMENT AND DEPLOYMENT OF MOBILE WIRELESS SENSOR NETWORKS FOR MIGRATORY BIRD TRACKING
, 2012
"... This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable reli ..."
Abstract
- Add to MetaCart
This thesis presents CraneTracker, a multi-modal sensing and communication system for monitoring migratory species at the continental level. By exploiting the robust and extensive cellular infrastructure across the continent, traditional mobile wireless sensor networks can be extended to enable
Wireless Sensor Networking in Challenging Environments
, 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract
- Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact
Rutgers University
"... A revolution is beginning in communication networks with the adoption of network function virtualization, which allows network services to be run on common off-the-shelf hardware—even in virtual machines—to in-crease flexibility and lower cost. An exciting prospect for cloud users is that these soft ..."
Abstract
- Add to MetaCart
could automatically cache data blocks near worker nodes, or perform some computation directly on the data stream. This approach enables a new breed of application designs that blur the line between the cloud’s network and its servers. 1
Routing and Broadcasting in Ad-Hoc Networks
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract
- Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present
permission. Structured Codes in Information Theory: MIMO and Network Applications
"... All rights reserved. ..."
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC) On the Selection of Testbeds for the Evaluation of Sensor Network Protocols and Applications
"... Abstract—Wireless sensor network protocols and applications typically need to be evaluated and tested not only using simulators but also on testbeds. While simulations allow studying the performance of protocols and applications in a controlled environment, they usually do not provide a sufficient l ..."
Abstract
- Add to MetaCart
Abstract—Wireless sensor network protocols and applications typically need to be evaluated and tested not only using simulators but also on testbeds. While simulations allow studying the performance of protocols and applications in a controlled environment, they usually do not provide a sufficient
Results 1 - 10
of
103