Search results for " Sharing"

showing 10 items of 290 documents

Market Opportunity of China Telecom 3G Toward 4G - A Social-Technical Analysis for its Future Development

2013

In the Information and communication Technology (ICT) field, the success a new player will face is the challenge for the opportunity of new market development. China's mobile subscribers grew by 9.93 millions to 1.132 billions in February 2013.The convenience of communication prompted China’s growth, but there is little information available in literature about how it happened and what the next development steps will be for the China Telecom Industry.The purpose of this paper is an attempt to picture the future growth path of China Telecom market opportunities from 3G toward 4G and beyond, including viewing this from the angles of telecom/internet e-commerce regulation development; globaliz…

EngineeringBeijingbusiness.industryInformation and Communications TechnologyMarket analysisTelecom infrastructure sharingEnhanced Telecom Operations MapThe InternetChinaTelecommunicationsbusinessSocial responsibilitySSRN Electronic Journal
researchProduct

Complex Authority Network Interactions in the Common Information Sharing Environment

2019

European authorities collaborate as a community toward a coherent approach of situational understanding and open trust base information sharing. Innovation in multi-stakeholder collaboration networks involve complex collaboration between user community members, providing cross-sector, cross-border and cross-authority interaction and information sharing for collaborative situation awareness, and cooperation to increase safety and security. This study analyses data consisting of elements of use cases, collected from EU funded innovation projects. These were placed in a table based on similarity, difference and relevance to produce a classification. The results of this study indicate that use …

verkostotKnowledge managementHigher educationSituation awarenessbusiness.industryInformation sharingviranomaisyhteistyökansainvälinen yhteistyötietojenvaihtoComplex networktilannekuvakompleksisuusinnovaatiotoimintamulti-stakeholder collaborationTable (database)Use caseRelevance (information retrieval)Situational ethicsbusinesscomplexityinformation sharing situational picture.tiedonkulku
researchProduct

Development of 2D & 3D cadmium–zinc–telluride spectroscopic imagers for X-ray and gamma ray applications

2021

spectroscopic X-ray imagingcharge sharingcharge lossespectroscopic X-ray and gamma-ray imaging.X-ray and gamma ray detectorCdZnTe pixel detector3D CdZnTe detectorSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)charge-sharing correctiondrift strip detector
researchProduct

Economia della condivisione e antropologia dello scambio

2017

The article analyses the distinctive economic models based on sharing that proliferated with the rise of web 2.0 (or social web). In particular, it analyzes what sharing means in different contexts (material and immaterial goods, and services) and it questions whether sharing can be seen as a discrete category, different from both market exchange and gift. Finally, the article questions the role of law with respect of these new economic activities.

InternetSharing Sharing economy Market exchange GiftSettore IUS/05 - Diritto Dell'EconomiaSettore IUS/01 - Diritto PrivatoSettore IUS/02 - Diritto Privato ComparatoSharing Sharing economy Market exchange Gift; Internet
researchProduct

MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks

2009

In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…

Computer sciencebusiness.industryDistributed computingDistributed data storeOverhead (computing)Fault toleranceAdversarybusinessResilience (network)Wireless sensor networkSecret sharingComputer networkTerm (time)2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
researchProduct

The Serial Property and Restricted Balanced Contributions in discrete cost sharing problems

2006

We show that the Serial Poperty and Restricted Balanced Contributions characterize the subsidy-free serial cost sharing method (Moulin (1995)) in discrete cost allocation problems.

Statistics and ProbabilityCost allocationMathematical optimizationInformation Systems and ManagementProperty (philosophy)Computer scienceModeling and SimulationMoulinDiscrete Mathematics and CombinatoricsCost sharingManagement Science and Operations ResearchShapley valueTOP
researchProduct

Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation

2017

To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…

021110 strategic defence & security studiesEmergency managementSituation awarenessbusiness.industryComputer scienceProperty (programming)Information sharing0211 other engineering and technologies030208 emergency & critical care medicine02 engineering and technologyComplex networkComputer securitycomputer.software_genreVisualizationTask (project management)03 medical and health sciences0302 clinical medicinebusinesscomputerSearch and rescue2017 IEEE 7th International Advance Computing Conference (IACC)
researchProduct

Streaming for vehicular users via elastic proxy buffer management

2004

In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…

Mobile radioService (systems architecture)Computer Networks and CommunicationsComputer scienceDelayed real time servicesMultimedia information retrievalCommunication channels (information theory)Resource sharing algorithmBuffer storageWirelessInformation retrievalWireless telecommunication systemsElectrical and Electronic EngineeringReal time streaming servicesProxy (statistics)Railroad car equipmentVehicular area networksBackbone networkInternetMobile computingVehicular ad hoc networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSatellite communication systemsElastic proxy buffer managementLocal area networksReal time systemsAlgorithms; Buffer storage; Communication channels (information theory); Information retrieval; Internet; Local area networks; Multimedia systems; Railroad car equipment; Real time systems; Satellite communication systems; Satellite links; Wireless telecommunication systems; Delayed real time services; Elastic proxy buffer management; Fast internet for fast train hosts (FIFTH); Real time streaming services; Resource sharing algorithm; Vehicular area networks; Mobile computingComputer Science ApplicationsTerminal (electronics)Fast internet for fast train hosts (FIFTH)businessSatellite linksAlgorithmsMultimedia systemsComputer network
researchProduct

The forager's dilemma: food sharing and food defense as risk-sensitive foraging options.

2003

Although many variants of the hawk-dove game predict the frequency at which group foraging animals should compete aggressively, none of them can explain why a large number of group foraging animals share food clumps without any overt aggression. One reason for this shortcoming is that hawk-dove games typically consider only a single contest, while most group foraging situations involve opponents that interact repeatedly over discovered food clumps. The present iterated hawk-dove game predicts that in situations that are analogous to a prisoner's dilemma, animals should share the resources without aggression, provided that the number of simultaneously available food clumps is sufficiently la…

Food defensePopulation DensityFood sharingCompetitive BehaviorEcologyAggressionForagingPopulation DynamicsPrisoner's dilemmaFeeding BehaviorRisk sensitiveEnvironmentCONTESTModels BiologicalDilemmaMicroeconomicsGame TheorymedicineAnimalsmedicine.symptomPsychologyEcology Evolution Behavior and SystematicsThe American naturalist
researchProduct

The differences between distributed shared memory caching and proxy caching

2000

The authors discuss the similarities in caching between the extensively studied distributed shared memory systems and the emerging proxy systems. They believe that several of the techniques used in distributed shared memory systems can be adapted and applied to proxy systems.

Distributed shared memoryHardware_MEMORYSTRUCTURESShared memoryComputer scienceShared disk architectureDistributed computingGeneral EngineeringInterleaved memoryFalse sharingUniform memory accessDistributed memoryData diffusion machineIEEE Concurrency
researchProduct