Search results for "networking"

showing 10 items of 1776 documents

The social significance of the Facebook Like button

2015

In this paper we study social aspects of using the Like button for purposes of impression management, identity construction, and maintenance of social ties online. On the theoretical level our investigation combines Goffman’s notion of face-work with concepts of social network analysis, shedding light on what we dub ‘nano-level’ interaction and sociality on social networking sites. Our data come from a 2013 classroom survey in which 26 Finnish university students were asked about their motives for and ways of using the Like button. Our results show that though the Like button was designed to allow users to express their positive evaluations of the contents of Facebook posts, comments, and p…

social networksFacebookComputer Networks and CommunicationsCyberpsychologyErving Goffmanmedia_common.quotation_subjectsocial mediaface-workonline social behaviorsosiaalinen mediaIdentity (social science)050801 communication & media studiesonline interaction0508 media and communications0502 economics and businessSocial mediaConversationlike buttonsocial networking sitesSocial network analysismedia_common05 social sciencesAdvertisingHuman-Computer InteractionInterpersonal tiesImpression management5141 SociologyLike buttonta5141050211 marketingPsychologypersonal networksFirst Monday
researchProduct

Lietotāja digitālā vizuālā identitāte un tās vērtējums sociālajā tīklošanās vietnē “Instagram” (vecuma grupā no 18-35 gadiem)

2022

Bakalaura darba tēma “Lietotāja digitālā vizuālā identitāte un tās vērtējums sociālajā tīklošanās vietnē “Instagram” (vecuma grupā no 18-35 gadiem)”. Darba teorētiskā daļa balstās uz digitālās vizuālās identitātes veidojošajiem faktoriem, kā arī dažādiem vizuālās kultūras aspektiem un tās nozīmi mūsdienās. Ar vizuālās kontentanalīzes palīdzību tika analizēti sociālo tīklošanās vietņu patērētāju, “Instagram” lietošanas un vizuālo materiālu publicēšanas paradumi. Un ar interneta aptauju tika ievākti vispārīgi dati par digitālās vizuālās identitātes nozīmi patērētāju vidū. Bakalaura darba autore nonāca līdz secinājumam, ka digitālā vizuālā identitāte daļai “Instagram” patērētāju ir nozīmīga, t…

sociālā tīklošanās vietne “Instagram”digitālā vizuālā identitātesociālo mediju lietotājidigital visual identityKomunikācijas zinātnesocial networking site “Instagram”
researchProduct

Software architectures for mobile computing

1999

software architecturenetworking infrastructurehybrid communicatorglobal connectivitymobile computingubiquitous computingminiaturisationbluetoothWAP architecture
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

On the Influence of Walking People on the Doppler Spectral Characteristics of Indoor Channels

2017

Author´s accepted manuscript © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. When modelling mobile radio channels with moving scatterers, it is generally assumed that the angles of departure (AODs), angles of arrival (AOAs), and the speed of the scatterers are time-invariant. However, this assumption is violated as the AODs and AOAs vary with the positions of t…

symbols.namesakeComputer scienceAcousticsGaussian0103 physical sciences0202 electrical engineering electronic engineering information engineeringsymbols020206 networking & telecommunications02 engineering and technology010301 acoustics01 natural sciencesDoppler effectCommunication channel
researchProduct

Two-phase routing in three-dimensional blocked optical tori

2014

The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…

ta113Dynamic Source Routingta213Computer sciencebusiness.industryNetwork packetNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink-state routing protocolDestination-Sequenced Distance Vector routingRouting (electronic design automation)businessBlock sizeComputer networkBlock (data storage)Proceedings of the 15th International Conference on Computer Systems and Technologies
researchProduct

Semi-automatic literature mapping of participatory design studies 2006--2016

2018

The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.

ta113Structure (mathematical logic)Point (typography)Computer scienceProcess (engineering)tekstinlouhinta020206 networking & telecommunications02 engineering and technologyData scienceParticipatory design0202 electrical engineering electronic engineering information engineeringklusterianalyysi020201 artificial intelligence & image processingparticipatory designSemi automaticSet (psychology)Cluster analysisosallistava suunnittelusystematic literature mappingsystemaattiset kirjallisuuskatsauksetclusteringProceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2
researchProduct

Context-aware data caching for 5G heterogeneous small cells networks

2016

In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…

ta113context awareta213Computer sciencebusiness.industryQuality of servicematching05 social sciences050801 communication & media studies020206 networking & telecommunicationssmall cell networks02 engineering and technologycontent cachingSmart CacheBase station0508 media and communicationsServer0202 electrical engineering electronic engineering information engineeringLeverage (statistics)CacheSmall cellbusinessComputer network
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct

Towards enabling privacy preserving smart city apps

2016

Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …

ta113smart city application platformInformation privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareMultitier architectureInternet privacy020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreprivacylayered architecture020204 information systemsSmart city0202 electrical engineering electronic engineering information engineeringLayer (object-oriented design)ArchitecturebusinessPersonally identifiable informationcomputerpersonally identifiable information
researchProduct