Search results for "ARCHITECTURE"
showing 10 items of 3706 documents
The Footprints of a “Mastodon”: How a Decentralized Architecture Influences Online Social Relationships
2019
Decentralized online social networks (DOSNs) have recently emerged as a viable solution to preserve the users' privacy and ensure higher users' control over the contents they publish. However, little is known about the backlashes that the decentralized organization and management of these platforms may have on the overlaid social network. This paper fills the gap. Specifically, we investigate how a decentralized architecture based on distributed servers impacts the structure of the users' neighborhood and their ego-networks. Our analysis relies on social data gathered from the decentralized micro-blogging platform Mastodon, the newest and fastest-growing decentralized alternative to Twitter…
You’ve Got Photos! The design and evaluation of a location-based media-sharing application
2008
PhotoJournal is a novel location-based media sharing appli- cation that enables users to build interactive journals that associate multimedia files with locations on maps and share this information with other users. Its underlying informa- tion discovery and sharing mechanism is 7DS that runs in either pure peer-to-peer or centralized server-to-client mode, depending on the availability of a server and/or an infras- tructure. 7DS-enabled devices act as miniature caches, shar- ing information with each other. When access to an informa- tion server (e.g., web server) is not available, the local 7DS instance running on the device enables the device to search and access information from other p…
The Adaptation of a Web Information System: A Perspective of Organizations
2011
We provide a different view on the problem of Web Information System (WIS) adaptation, looking from perspective of organizations that are interested in an adapted Web Information System for their needs if a unified system to support similar business processes is used. We propose an adaptation architecture for WIS. Two levels of adaptation are introduced—coarse grained adaptation for the organization level and fine grained adaptation for the user level. The architecture supports also the situation, when users can work with many instances of the system adapted for different organizations, which are integrated into one instance for a particular user.
Female Architecture
2015
The objective of this study is that one, starting from the initial considerations, to give back to the history of architecture, through drawing as a critical means of inquiry, the thought and work of some women-architect who, between 1926 and 1962, have designed and/or built buildings of fine architectural quality. The critical re-drawing, which in this case is mimetic to the construction of the project, wants to make manifest the thought of some figures of the Modern Movement often relegated to an unknown fate; in particular it analyses a part of the activity of Lilly Reich, Helena Niemirowska Syrkus and Charlotte Perriand. The study aims to build a graphic inedited and exhaustive repertor…
Wavelet data analysis of EXAFS spectra
2009
Abstract The application of wavelet transform to the analysis of the extended X-ray absorption fine structure (EXAFS) from perovskite-type compounds is presented on the example of the Re L 3 -edge in ReO 3 and Co K-edge in LaCoO 3 . We propose a modified wavelet transform procedure, which allows better discrimination of the overlapped contributions into the EXAFS signal.
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
PALERMO NELLO SGUARDO DEI VIAGGIATORI (XVI-XVII SECOLO) : la città e l’architettura
2020
The leading thread of the present volume is the theme of the voyage to Sicily, Palermo, but the text is not only concerned about voyagers and their journals. The core is the city and the architecture through the written account of external personalities, who between the XVIth and XVIIth centuries, arrive in the Capital and the way( not neutral at all nor objective) by which they got information and transmitted impressions, observations. Testimonies are limited, due to the selection, which has been made in a preceding period of time (compared to the phenomenon, which is going to explode in XVIIIth and XIXth centuries). To modern travelers, who before the so-called season of Grand tour, visit…
"Table 1" of "Determination of $alpha_{s}$ in second order {QCD} from hadronic $Z$ decays"
1992
Experimental differential Thrust distributions.
Multipath extensions to the DYMO routing protocol
2007
Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.
PTNet: An efficient and green data center network
2017
International audience; In recent years, data centers have witnessed an exponential growth for hosting hundreds of thousands of servers as well as to accommodating a very large demand for resources. To fulfill the required level of demand, some approaches tackled network aspects so to host a huge number of servers while others focused on delivering rapid services to the clients by minimizing the path length between any two servers. In general, network devices are often designed to achieve 1:1 oversubscription. Alternatively, in a realistic data center environment, the average utilization of a network could vary between 5% and 25%, and thus the energy consumed by idle devices is wasted. This…