Search results for " Network"

showing 10 items of 6428 documents

'Good to Repeat': Making Random Access Near-Optimal with Repeated Contentions

2020

Recent advances on WLAN technology have been focused mostly on boosting network capacity by means of a more efficient and flexible physical layer. A new concept is required at MAC level to exploit fully the new capabilities of the PHY layer. In this article, we propose a contention mechanism based on Repeated Contentions (ReCo) in frequency domain. It provides a simple-to-configure, robust and short-term fair algorithm for the random contention component of the MAC protocol. The throughput efficiency of ReCo is not sensitive to the number of contending stations, so that ReCo does not require adaptive tuning of the access parameters for performance optimization. Efficiency and robustness is …

imperfect sensingbusiness.industryOrthogonal frequency-division multiplexingComputer scienceSettore ING-INF/03 - TelecomunicazioniApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunicationsThroughput02 engineering and technologyIEEE 802.11ax; random access contention; frequency-domain signalling; imperfect sensingComputer Science ApplicationsPHYfrequency-domain signalling0202 electrical engineering electronic engineering information engineeringfrequency-domain signalingWirelessrandom access contentionSettore ICAR/19 - RestauroElectrical and Electronic EngineeringbusinessRandom accessIEEE 802.11axComputer network
researchProduct

Inadempimento di contratto e sanzioni private nei social network

2012

inadempimentocontrattoSettore IUS/01 - Diritto Privatosocial networksanzioni privatefacebook
researchProduct

Efectos de las consultas boca a boca en redes sociales en la compra de cosméticos en Ecuador.

2022

Las redes sociales han reestructurado el paradigma de la comunicación en el marketing. Investigaciones recientes demuestran que la conducta de consultar reseñas está adquiriendo un rol fundamental en la decisión de compra de los consumidores. En este contexto, el presente estudio desarrolló un marco de investigación para determinar la cadena de relación entre influencia social, credibilidad percibida del boca a boca, adopción del boca a boca e intención de compra aplicada a la industria cosmética del Ecuador. A través de una muestra de 406 consumidores y la aplicación del método de análisis de ecuaciones estructurales, los resultados evidencian el vínculo existente entre las variables plant…

influencia socialadopción del eWOMStrategy and ManagementConsumidoresPublicidad boca a boca//vocabularies.unesco.org/thesaurus/concept1545 [http]IntentionCosmeticsMercadeo en Internet//id.loc.gov/authorities/subjects/sh85067189 [http]Social mediaSocial influencePreferencias de los consumidoresWord-of-mouth advertising//id.loc.gov/authorities/subjects/sh91001924 [http]AdvertisingManagement of Technology and InnovationConsumidor//vocabularies.unesco.org/thesaurus/concept5657 [http]Influencia socialMarketingCosmeticosintención de compraM31 MarketingConsumer behaviourCredibilidad percibida del eWOMComercio electrónico//id.loc.gov/authorities/subjects/sh85033139 [http]eWOM en redes socialesAdopción del eWOMIntenciónIntención de compraPersuasion (Psychology)//id.loc.gov/authorities/subjects/sh96008434 [http]Internet marketingRelaciones socialesInternet personalitiesEconomics and EconometricsPersuasión (Psicología)Medios socialesElectronic commerceComportamiento del consumidorOnline social networks in businessPublicidad//vocabularies.unesco.org/thesaurus/concept6377 [http]//vocabularies.unesco.org/thesaurus/concept1532 [http]ShoppingRedes de informaciónMercadeo//id.loc.gov/authorities/subjects/sh87006429 [http]Information networksComercializaciónBusiness and International ManagementCompraCompras//id.loc.gov/authorities/subjects/sh85100175 [http]Redes sociales en línea en los negociosCosméticos//id.loc.gov/authorities/subjects/sh85121778 [http]//id.loc.gov/authorities/subjects/sh2015001935 [http]//vocabularies.unesco.org/thesaurus/concept12431 [http]UNESCO::CIENCIAS ECONÓMICAS//id.loc.gov/authorities/subjects/sh95005028 [http]//vocabularies.unesco.org/thesaurus/concept17089 [http]Consumer behavior//id.loc.gov/authorities/subjects/sh2015001634 [http]Purchasingcredibilidad percibida del eWOMConsumers' preferences//id.loc.gov/authorities/subjects/sh85031496 [http]Social relationshipsConsumersInfluenciadoresFinance//id.loc.gov/authorities/subjects/sh94006574 [http]
researchProduct

Understanding Interaction Search Behavior in Professional Social Networks

2011

We present an empirical study of social interaction in a professional social network. As the point of departure, we take previous research into distributed work and information foraging theory to explore interaction search behavior of individuals active in professional networks, examining how social factors govern their behavior. For this exploration, we focused on the process through which relevant collaborators are chosen to execute shared work tasks in the area of logistics, and identified six characteristics of the explored processes. We recognized the “survival of the social” as a cornerstone for efficient and long-term professional networks and outlined design implications arising fro…

information foragingsocial interaction foragingsocial networkdistributed work
researchProduct

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

2022

In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…

information security policy complianceComputer Networks and Communicationsohjeidenmukainen käyttäytyminentietoturvapolitiikkatietoturvadeterrent effectpelotteetpeloteteoriadeterrence theoryManagement Information Systemstietojärjestelmät
researchProduct

Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…

2018

This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…

information systems architectureCorrectnessbusiness.industryComputer scienceProcess (engineering)Multi-agent systemIntelligent decision support systeminformation systemscomputer.software_genrerisk managementAutomationExpert systemSystems engineeringComputer Aided DesignDesign processcomputer networks ISAT 2017businesscomputer
researchProduct

Kyberin taskutieto : keskeisin kybermaailmasta jokaiselle

2017

information warfarecyber securityinformation networksinformaatiosodankäyntiinfrastruktuuritdigitalisationtietoturvakyberturvallisuustietoverkotdigitalisaatiodata securitydata systemsinfrastructurestietojärjestelmät
researchProduct

Synthetic approach to the design of wide-band microwave injection-locked amplifiers

2010

In this work, a synthesis-based approach to the realization of wide-band microwave injection-locked amplifiers (ILA) is proposed. To this purpose, a transmission-type topology is combined with a feedback structure in which the "core ILA" is intentionally separated from the output (power) amplifier. A modular, matched, design of individual building blocks of the core ILA is then adopted, which allows their first-approximation exact modeling in the dynamical complex-envelope domain, following the theory earlier developed by Calandra-Sommariva. On this basis, analytic expressions for the main operating characteristics of the ILA (such as the locking bandwidth under small signal operation) are …

injection locked amplifiers microwave amplifiers network topolog transistor circuitsSettore ING-INF/01 - Elettronica
researchProduct

Approach to the Design of Transmission-Type Injection-Locked Microwave Oscillators through Behavioral Block Modeling

2010

In this work, an attempt is made toward the development of a systematic design method for the performance- driven dimensioning of the various elements comprising the structure of modern transistor-based microwave injection- locked oscillators with transmission-type topologies (TILOs). The proposed approach is based on the use of appropriate diakoptics of the various circuit blocks into a matched environment, and their behavioral modeling in the fundamental- frequency dynamical complex envelope domain with the help of standard circuit and E.M. simulation CAD tools. This will permit, in the end, to obtain closed-form expressions for the main TILO performances in terms of the design parameters…

injection locked amplifiers microwave amplifiers network topology transistor circuitsSettore ING-INF/01 - Elettronica
researchProduct

The territorial and social metamorphosis of the Inner Peripheries

2019

The paper debates the theme of the Inner Peripheries that, in their complexity and diversity, represent those territories in which a rethinking of the rural/urban, society/territory, society/economy, territory/production and community/landscape relationship is increasingly urgent for the sustainability, to interrupt the process of abandonment and to strengthen and network the small experiences of innovation that are taking place and that are showing that they can be welcoming and functional places, capable of realizing new local centralities with global attractiveness. With the aim of opening a debate on the role that inner peripheries can take in a multi-scale territorial scenario and on t…

inner peripheries networks local developmentSettore ICAR/21 - Urbanistica
researchProduct