15,060 research outputs found
Funder Collaboration: A Compelling and Cautionary Tale
This a compelling story of collaboration. It is an inspiring example of funders having the courage to not accept the usual fragmented approach. They believed the lives of vulnerable children deserved better. After enormous effort they reached a stage of performing effectively as a funder collaborative.But this is also a cautionary tale. Collaborating with other funders is much harder than going it alone. This example illustrates the phenomenal costs, compromises and commitment involved in making a joint venture collaborative work. It cautions against pooled funding with diverse donors, implementing an innovative and complex programme in such a demanding context.This begs the big question - was it all worth it? After all, "it was a pretty expensive experiment" as one member said. In terms of the work on the ground in Tangababwe, the honest answer is probably not. Steering committee members admit that the collaborative has not got near to achieving most of its initial aims (but this may be more a consequence of the unique challenges the project faced in-country, rather than funder collaboration itself).What is clear is that despite the costs and difficulties involved, the members have subsequently scaled up their collaborative ventures with other funders. They say that the learning they gained from this demanding, first-hand experience made it worthwhile. They may be more wary of the intensity of pooled funding, but are more convinced than ever of the value of funder collaboration itself. They are now much more aware of the huge risks involved, but are choosing to collaborate with other funders all the more
On Energy Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks
In this paper, a hierarchical cross-layer design approach is proposed to
increase energy efficiency in ad hoc networks through joint adaptation of
nodes' transmitting powers and route selection. The design maintains the
advantages of the classic OSI model, while accounting for the cross-coupling
between layers, through information sharing. The proposed joint power control
and routing algorithm is shown to increase significantly the overall energy
efficiency of the network, at the expense of a moderate increase in complexity.
Performance enhancement of the joint design using multiuser detection is also
investigated, and it is shown that the use of multiuser detection can increase
the capacity of the ad hoc network significantly for a given level of energy
consumption.Comment: To appear in the EURASIP Journal on Wireless Communications and
Networking, Special Issue on Wireless Mobile Ad Hoc Network
A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks
In low power wireless sensor networks, MAC protocols usually employ periodic
sleep/wake schedule to reduce idle listening time. Even though this mechanism
is simple and efficient, it results in high end-to-end latency and low
throughput. On the other hand, the previously proposed CSMA/CA-based MAC
protocols have tried to reduce inter-node interference at the cost of increased
latency and lower network capacity. In this paper we propose IAMAC, a CSMA/CA
sleep/wake MAC protocol that minimizes inter-node interference, while also
reduces per-hop delay through cross-layer interactions with the network layer.
Furthermore, we show that IAMAC can be integrated into the SP architecture to
perform its inter-layer interactions. Through simulation, we have extensively
evaluated the performance of IAMAC in terms of different performance metrics.
Simulation results confirm that IAMAC reduces energy consumption per node and
leads to higher network lifetime compared to S-MAC and Adaptive S-MAC, while it
also provides lower latency than S-MAC. Throughout our evaluations we have
considered IAMAC in conjunction with two error recovery methods, i.e., ARQ and
Seda. It is shown that using Seda as the error recovery mechanism of IAMAC
results in higher throughput and lifetime compared to ARQ.Comment: 17 pages, 16 figure
Cognition-Based Networks: A New Perspective on Network Optimization Using Learning and Distributed Intelligence
IEEE Access
Volume 3, 2015, Article number 7217798, Pages 1512-1530
Open Access
Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence (Article)
Zorzi, M.a , Zanella, A.a, Testolin, A.b, De Filippo De Grazia, M.b, Zorzi, M.bc
a Department of Information Engineering, University of Padua, Padua, Italy
b Department of General Psychology, University of Padua, Padua, Italy
c IRCCS San Camillo Foundation, Venice-Lido, Italy
View additional affiliations
View references (107)
Abstract
In response to the new challenges in the design and operation of communication networks, and taking inspiration from how living beings deal with complexity and scalability, in this paper we introduce an innovative system concept called COgnition-BAsed NETworkS (COBANETS). The proposed approach develops around the systematic application of advanced machine learning techniques and, in particular, unsupervised deep learning and probabilistic generative models for system-wide learning, modeling, optimization, and data representation. Moreover, in COBANETS, we propose to combine this learning architecture with the emerging network virtualization paradigms, which make it possible to actuate automatic optimization and reconfiguration strategies at the system level, thus fully unleashing the potential of the learning approach. Compared with the past and current research efforts in this area, the technical approach outlined in this paper is deeply interdisciplinary and more comprehensive, calling for the synergic combination of expertise of computer scientists, communications and networking engineers, and cognitive scientists, with the ultimate aim of breaking new ground through a profound rethinking of how the modern understanding of cognition can be used in the management and optimization of telecommunication network
Norden, reframed
This paper calls for Norden to be understood as a metaframe. Related formulations like âNordic artâ or âNordic welfareâ function as mesoframes. These trigger multiple framing devices. A cache of related framing devices constitutes a framing archive. Framing devices work best when operating unobtrusively such that inclusions, exclusions and inconsistencies are condoned or naturalised. Their artifice, however, becomes apparent whenever a frame is questioned. Questioning or criticising a frame gives rise to a framing dispute. The theoretical justification for these typologies is provided at the outset. This schema is then applied to a select range of empirical examples drawn largely from the disciplinary frames (Ernst 1996) of art history and museum studies. Despite this specificity it is envisaged that the general principles set out below can and will be used to address a variety of devices, disputes and archives in Norden and beyond
- âŠ