Search results for " Sharing"
showing 10 items of 290 documents
Market Opportunity of China Telecom 3G Toward 4G - A Social-Technical Analysis for its Future Development
2013
In the Information and communication Technology (ICT) field, the success a new player will face is the challenge for the opportunity of new market development. China's mobile subscribers grew by 9.93 millions to 1.132 billions in February 2013.The convenience of communication prompted China’s growth, but there is little information available in literature about how it happened and what the next development steps will be for the China Telecom Industry.The purpose of this paper is an attempt to picture the future growth path of China Telecom market opportunities from 3G toward 4G and beyond, including viewing this from the angles of telecom/internet e-commerce regulation development; globaliz…
Complex Authority Network Interactions in the Common Information Sharing Environment
2019
European authorities collaborate as a community toward a coherent approach of situational understanding and open trust base information sharing. Innovation in multi-stakeholder collaboration networks involve complex collaboration between user community members, providing cross-sector, cross-border and cross-authority interaction and information sharing for collaborative situation awareness, and cooperation to increase safety and security. This study analyses data consisting of elements of use cases, collected from EU funded innovation projects. These were placed in a table based on similarity, difference and relevance to produce a classification. The results of this study indicate that use …
Development of 2D & 3D cadmium–zinc–telluride spectroscopic imagers for X-ray and gamma ray applications
2021
Economia della condivisione e antropologia dello scambio
2017
The article analyses the distinctive economic models based on sharing that proliferated with the rise of web 2.0 (or social web). In particular, it analyzes what sharing means in different contexts (material and immaterial goods, and services) and it questions whether sharing can be seen as a discrete category, different from both market exchange and gift. Finally, the article questions the role of law with respect of these new economic activities.
MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks
2009
In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…
The Serial Property and Restricted Balanced Contributions in discrete cost sharing problems
2006
We show that the Serial Poperty and Restricted Balanced Contributions characterize the subsidy-free serial cost sharing method (Moulin (1995)) in discrete cost allocation problems.
Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation
2017
To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…
Streaming for vehicular users via elastic proxy buffer management
2004
In this article we refer to the market of vehicular networks, where groups of customers located in the same public vehicle (e.g., a train or bus) connect to a terrestrial network through a wireless/satellite backbone link. Elastic buffering is a proxy management technique devised to decouple the multimedia information retrieval rate on the network backbone from the playout streaming rate at the user terminal. It has been shown in the past that the application of elastic buffering mechanisms in terrestrial networks brings significant advantages in terms of network effectiveness. We show that elastic buffering is an extremely effective means to reduce, or even eliminate, streaming service out…
The forager's dilemma: food sharing and food defense as risk-sensitive foraging options.
2003
Although many variants of the hawk-dove game predict the frequency at which group foraging animals should compete aggressively, none of them can explain why a large number of group foraging animals share food clumps without any overt aggression. One reason for this shortcoming is that hawk-dove games typically consider only a single contest, while most group foraging situations involve opponents that interact repeatedly over discovered food clumps. The present iterated hawk-dove game predicts that in situations that are analogous to a prisoner's dilemma, animals should share the resources without aggression, provided that the number of simultaneously available food clumps is sufficiently la…
The differences between distributed shared memory caching and proxy caching
2000
The authors discuss the similarities in caching between the extensively studied distributed shared memory systems and the emerging proxy systems. They believe that several of the techniques used in distributed shared memory systems can be adapted and applied to proxy systems.