Search results for "networking"
showing 10 items of 1776 documents
The social significance of the Facebook Like button
2015
In this paper we study social aspects of using the Like button for purposes of impression management, identity construction, and maintenance of social ties online. On the theoretical level our investigation combines Goffman’s notion of face-work with concepts of social network analysis, shedding light on what we dub ‘nano-level’ interaction and sociality on social networking sites. Our data come from a 2013 classroom survey in which 26 Finnish university students were asked about their motives for and ways of using the Like button. Our results show that though the Like button was designed to allow users to express their positive evaluations of the contents of Facebook posts, comments, and p…
Lietotāja digitālā vizuālā identitāte un tās vērtējums sociālajā tīklošanās vietnē “Instagram” (vecuma grupā no 18-35 gadiem)
2022
Bakalaura darba tēma “Lietotāja digitālā vizuālā identitāte un tās vērtējums sociālajā tīklošanās vietnē “Instagram” (vecuma grupā no 18-35 gadiem)”. Darba teorētiskā daļa balstās uz digitālās vizuālās identitātes veidojošajiem faktoriem, kā arī dažādiem vizuālās kultūras aspektiem un tās nozīmi mūsdienās. Ar vizuālās kontentanalīzes palīdzību tika analizēti sociālo tīklošanās vietņu patērētāju, “Instagram” lietošanas un vizuālo materiālu publicēšanas paradumi. Un ar interneta aptauju tika ievākti vispārīgi dati par digitālās vizuālās identitātes nozīmi patērētāju vidū. Bakalaura darba autore nonāca līdz secinājumam, ka digitālā vizuālā identitāte daļai “Instagram” patērētāju ir nozīmīga, t…
Software architectures for mobile computing
1999
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…
On the Influence of Walking People on the Doppler Spectral Characteristics of Indoor Channels
2017
Author´s accepted manuscript © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. When modelling mobile radio channels with moving scatterers, it is generally assumed that the angles of departure (AODs), angles of arrival (AOAs), and the speed of the scatterers are time-invariant. However, this assumption is violated as the AODs and AOAs vary with the positions of t…
Two-phase routing in three-dimensional blocked optical tori
2014
The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…
Semi-automatic literature mapping of participatory design studies 2006--2016
2018
The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.
Context-aware data caching for 5G heterogeneous small cells networks
2016
In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…
Data mining framework for random access failure detection in LTE networks
2014
Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…
Towards enabling privacy preserving smart city apps
2016
Smart city applications are increasingly relying on personally identifiable data. A disclosure of such a data to a platform provider and possible 3rd parties represents a risk to the privacy of the application users. To mitigate the privacy risk, two-layer privacy-preserving platform architecture is introduced, wherein the personally identifiable information is dealt with at the inner layer (executed in a trusted environment), whereas only generic and personally unidentifiable information is made available to the apps at the outer layer of the architecture — e.g., in a form of app-specific events. The essential requirements for the platform are described, and the architectural implications …