15,060 research outputs found

    Funder Collaboration: A Compelling and Cautionary Tale

    Get PDF
    This a compelling story of collaboration. It is an inspiring example of funders having the courage to not accept the usual fragmented approach. They believed the lives of vulnerable children deserved better. After enormous effort they reached a stage of performing effectively as a funder collaborative.But this is also a cautionary tale. Collaborating with other funders is much harder than going it alone. This example illustrates the phenomenal costs, compromises and commitment involved in making a joint venture collaborative work. It cautions against pooled funding with diverse donors, implementing an innovative and complex programme in such a demanding context.This begs the big question - was it all worth it? After all, "it was a pretty expensive experiment" as one member said. In terms of the work on the ground in Tangababwe, the honest answer is probably not. Steering committee members admit that the collaborative has not got near to achieving most of its initial aims (but this may be more a consequence of the unique challenges the project faced in-country, rather than funder collaboration itself).What is clear is that despite the costs and difficulties involved, the members have subsequently scaled up their collaborative ventures with other funders. They say that the learning they gained from this demanding, first-hand experience made it worthwhile. They may be more wary of the intensity of pooled funding, but are more convinced than ever of the value of funder collaboration itself. They are now much more aware of the huge risks involved, but are choosing to collaborate with other funders all the more

    On Energy Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Full text link
    In this paper, a hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.Comment: To appear in the EURASIP Journal on Wireless Communications and Networking, Special Issue on Wireless Mobile Ad Hoc Network

    A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    Full text link
    In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower network capacity. In this paper we propose IAMAC, a CSMA/CA sleep/wake MAC protocol that minimizes inter-node interference, while also reduces per-hop delay through cross-layer interactions with the network layer. Furthermore, we show that IAMAC can be integrated into the SP architecture to perform its inter-layer interactions. Through simulation, we have extensively evaluated the performance of IAMAC in terms of different performance metrics. Simulation results confirm that IAMAC reduces energy consumption per node and leads to higher network lifetime compared to S-MAC and Adaptive S-MAC, while it also provides lower latency than S-MAC. Throughout our evaluations we have considered IAMAC in conjunction with two error recovery methods, i.e., ARQ and Seda. It is shown that using Seda as the error recovery mechanism of IAMAC results in higher throughput and lifetime compared to ARQ.Comment: 17 pages, 16 figure

    Cognition-Based Networks: A New Perspective on Network Optimization Using Learning and Distributed Intelligence

    Get PDF
    IEEE Access Volume 3, 2015, Article number 7217798, Pages 1512-1530 Open Access Cognition-based networks: A new perspective on network optimization using learning and distributed intelligence (Article) Zorzi, M.a , Zanella, A.a, Testolin, A.b, De Filippo De Grazia, M.b, Zorzi, M.bc a Department of Information Engineering, University of Padua, Padua, Italy b Department of General Psychology, University of Padua, Padua, Italy c IRCCS San Camillo Foundation, Venice-Lido, Italy View additional affiliations View references (107) Abstract In response to the new challenges in the design and operation of communication networks, and taking inspiration from how living beings deal with complexity and scalability, in this paper we introduce an innovative system concept called COgnition-BAsed NETworkS (COBANETS). The proposed approach develops around the systematic application of advanced machine learning techniques and, in particular, unsupervised deep learning and probabilistic generative models for system-wide learning, modeling, optimization, and data representation. Moreover, in COBANETS, we propose to combine this learning architecture with the emerging network virtualization paradigms, which make it possible to actuate automatic optimization and reconfiguration strategies at the system level, thus fully unleashing the potential of the learning approach. Compared with the past and current research efforts in this area, the technical approach outlined in this paper is deeply interdisciplinary and more comprehensive, calling for the synergic combination of expertise of computer scientists, communications and networking engineers, and cognitive scientists, with the ultimate aim of breaking new ground through a profound rethinking of how the modern understanding of cognition can be used in the management and optimization of telecommunication network

    Book Reviews

    Get PDF
    Teaching/Communication/Extension/Profession,

    Norden, reframed

    Get PDF
    This paper calls for Norden to be understood as a metaframe. Related formulations like “Nordic art” or “Nordic welfare” function as mesoframes. These trigger multiple framing devices. A cache of related framing devices constitutes a framing archive. Framing devices work best when operating unobtrusively such that inclusions, exclusions and inconsistencies are condoned or naturalised. Their artifice, however, becomes apparent whenever a frame is questioned. Questioning or criticising a frame gives rise to a framing dispute. The theoretical justification for these typologies is provided at the outset. This schema is then applied to a select range of empirical examples drawn largely from the disciplinary frames (Ernst 1996) of art history and museum studies. Despite this specificity it is envisaged that the general principles set out below can and will be used to address a variety of devices, disputes and archives in Norden and beyond
    • 

    corecore