Search results for "Computer network"
showing 10 items of 1634 documents
Los marcos de acción colectiva en la prensa conservadora
2013
El artículo examina si la prensa de línea editorial conservadora facilita la promoción de los marcos de acción colectiva promovidos por grupos sociales ideológicamente próximos. El objetivo es determinar si el discurso periodístico se contagia, así, de los elementos que integran el mensaje de los movimientos que protagonizan campañas de protesta desde una postura conservadora. Para ello, el trabajo selecciona como fenómeno de estudio la movilización generada en torno a la puesta en marcha de la asignatura Educación para la Ciudadanía en España (2004-2008), analizando el marco que estructuró el mensaje de los colectivos que agitaron el conflicto y el encuadre periodístico que los diarios ABC…
Imágenes ausentes, perdidas, creadas. L’image manquante y los límites de la representación
2020
El film L’image manquante (Rithy Panh, 2013) se organiza en torno a un tópico de las imágenes de atrocidades surgido de los debates en torno al Holocausto, a saber: la ausencia de una imagen fidedigna capaz de encarnar la violencia extrema del exterminio. Las imágenes sobre la masacre perpetrada por los Jemeres Rojos entre 1975 y 1978 en Kampuchea Democrática responden a cuatro estrategias o modalidades distintas: de perpetradores, de liberadores, testimoniales y creativas. A este estado de cosas responde Rithy Panh al emprender su film, de cariz intimista. L’image manquante recurre, así, a una imaginería no realista basada en figuras de arcilla proyectadas sobre un diorama para incrustar e…
Evolución de la comunicación política digital (2011-2019): ocaso de los blogs, declive de Facebook, generalización de Twitter y popularización de Ins…
2022
Este trabajo estudia la utilización electoral de la blogosfera, Facebook, Twitter e Instagram por parte de la clase política española durante la última década. El objetivo es describir la evolución de su presencia en dichos canales, tanto de manera individual como multiplataforma, así como de su actividad y notoriedad en cada uno de ellos. La investigación aplica un análisis cuantitativo longitudinal a un corpus formado por los blogs y las cuentas en redes sociales de los líderes de las candidaturas al Congreso de los Diputados presentadas en todas las circunscripciones por los partidos con mayor expectativa de voto en las Elecciones Generales de noviembre de 2011 (PP y PSOE), diciembre de …
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
A Random Trajectory Approach for the Development of Nonstationary Channel Models Capturing Different Scales of Fading
2017
This paper introduces a new approach to developing stochastic nonstationary channel models, the randomness of which originates from a random trajectory of the mobile station (MS) rather than from the scattering area. The new approach is employed by utilizing a random trajectory model based on the primitives of Brownian fields (BFs), whereas the position of scatterers can be generated from an arbitrarily 2-D distribution function. The employed trajectory model generates random paths along which the MS travels from a given starting point to a fixed predefined destination point. To capture the path loss, the gain of each multipath component is modeled by a negative power law applied to the tra…
Throughput and delay analysis of HARQ with code combining over double Rayleigh fading channels
2018
This paper proposes the use of hybrid automatic repeat request (HARQ) with code combining (HARQ-CC) to offer reliable communications over double Rayleigh channels. The double Rayleigh fading channel is of particular interest to vehicleto-vehicle communication systems as well as amplify-and-forward relaying and keyhole channels. This paper studies the performance of HARQ-CC over double Rayleigh channels from an information theoretic perspective. Analytical approximations are derived for the ϵ-outage capacity, the average number of transmissions, and the throughput of HARQ-CC. Moreover, we evaluate the delay experienced by Poisson-arriving packets for HARQ-CC. We provide analytical expression…
Modeling and Performance Analysis of Channel Assembling in Multichannel Cognitive Radio Networks With Spectrum Adaptation
2012
[EN] To accommodate spectrum access in multichannel cognitive radio networks (CRNs), the channel-assembling technique, which combines several channels together as one channel, has been proposed in many medium access control (MAC) protocols. However, analytical models for CRNs enabled with this technique have not been thoroughly investigated. In this paper, two representative channel-assembling strategies that consider spectrum adaptation and heterogeneous traffic are proposed, and the performance of these strategies is evaluated based on the proposed continuous-time Markov chain (CTMC) models. Moreover, approximations of these models in the quasistationary regime are analyzed, and closed-fo…
Location of navigation menus in websites: an experimental study with Arabic users
2015
Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…
Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint
2019
Mobile Edge Computing (MEC) is an important and effective platform to offload the computational services of modern mobile applications, and has gained tremendous attention from various research communities. For delay and resource constrained mobile devices, the important issues include: 1) minimization of the service latency; 2) optimal revenue maximization; 3) high quality-of-service (QoS) requirement to offload the computational service offloading. To address the above issues, an adaptive service offloading scheme is designed to provide the maximum revenue and service utilization to MEC. Unlike most of the existing works, we consider both the delay-tolerant and delay-constraint services i…
Evaluation of Structural and Temporal Properties of Ego Networks for Data Availability in DOSNs
2017
The large diffusion of Online Social Networks (OSNs) has influenced the way people interact with each other. OSNs present several drawbacks, one of the most important is the problem of privacy disclosures. Distributed Online Social Networks (DOSNs) have been proposed as a valid alternative solution to solve this problem. DOSNs are Online Social Networks implemented on a distributed platform, such as a P2P system or a mobile network. However, the decentralization of the control presents several challenges, one of the main ones is guaranteeing data availability without relying on a central server. To this aim, users’ data allocation strategies have to be defined and this requires the knowledg…