2,067 research outputs found

    ACTion Bibliography

    Get PDF
    This bibliography of recent literature on communications technology is a result of the ongoing activities of the ACE ACTion committee

    A cross impact methodology for the assessment of US telecommunications system with application to fiber optics development, volume 1

    Get PDF
    A cross impact model of the U.S. telecommunications system was developed. It was necessary to prepare forecasts of the major segments of the telecommunications system, such as satellites, telephone, TV, CATV, radio broadcasting, etc. In addition, forecasts were prepared of the traffic generated by a variety of new or expanded services, such as electronic check clearing and point of sale electronic funds transfer. Finally, the interactions among the forecasts were estimated (the cross impact). Both the forecasts and the cross impacts were used as inputs to the cross impact model, which could then be used to stimulate the future growth of the entire U.S. telecommunications system. By varying the inputs, technology changes or policy decisions with regard to any segment of the system could be evaluated in the context of the remainder of the system. To illustrate the operation of the model, a specific study was made of the deployment of fiber optics throughout the telecommunications system

    Cooperative Interval Caching in Clustered Multimedia Servers

    Get PDF
    In this project, we design a cooperative interval caching (CIC) algorithm for clustered video servers, and evaluate its performance through simulation. The CIC algorithm describes how distributed caches in the cluster cooperate to serve a given request. With CIC, a clustered server can accommodate twice (95%) more number of cached streams than the clustered server without cache cooperation. There are two major processes of CIC to find available cache space for a given request in the cluster: to find the server containing the information about the preceding request of the given request; and to find another server which may have available cache space if the current server turns out not to have enough cache space. The performance study shows that it is better to direct the requests of the same movie to the same server so that a request can always find the information of its preceding request from the same server. The CIC algorithm uses scoreboard mechanism to achieve this goal. The performance results also show that when the current server fails to find cache space for a given request, randomly selecting a server works well to find the next server which may have available cache space. The combination of scoreboard and random selection to find the preceding request information and the next available server outperforms other combinations of different approaches by 86%. With CIC, the cooperative distributed caches can support as many cached streams as one integrated cache does. In some cases, the cooperative distributed caches accommodate more number of cached streams than one integrated cache would do. The CIC algorithm makes every server in the cluster perform identical tasks to eliminate any single point of failure, there by increasing availability of the server cluster. The CIC algorithm also specifies how to smoothly add or remove a server to or from the cluster to provide the server with scalability

    Knowledge of and Response to Copyright Law, School Copyright Policy, and Copyright-related Issues: Survey of Secondary School Principals and Librarians

    Get PDF
    The problem of this study was that, with the impact of new media and delivery systems, principals and librarians must respond to copyright issues in order to remain informed about the copyright law and the legal use of media. The purpose of this study was to gather and evaluate educator response to issues related to copyright. The study was conducted with a sample of regionally accredited secondary schools in the following states: Alabama, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, South Carolina, Tennessee, Texas, and Virginia. A total of 1008 questionnaires were mailed to the principal and the librarian of the 504 schools of the sample. The data of the study were provided by 546 (54%) questionnaires. The first twenty items of the questionnaire provided the variables used to organize, test, and report the data. The second part of the questionnaire was a multiple choice copyright test used to determine the copyright knowledge of the respondent. The t test was used to test the mean copyright test scores of educator groups for significant differences. Groups were defined by professional position, years of experience, involvement or no involvement in job related litigation, and law class or workshop participation since the enactment of the 1976 Copyright Law. Chi-square was used to test the frequencies of reported exposure to the 1976 Copyright Law between professional groups, experience groups, and law class or workshop participation groups. Seven null hypotheses were tested at the.05 level. The mean copyright test score of the librarian group was significantly higher than the mean score of the principal group. The mean test score of the law class participation group was significantly higher than the mean test score of the non-participation group. Responses of exposure to the 1976 Copyright Law provided a five category hierarchy. There was no significant difference in the exposure reported by the principal and librarian groups. The difference of exposure reported by the law class participation group and the non-participation group was significant. Fourteen research questions, which comprised the periphery of the study, were reported. The findings of the study provided the basis for the conclusions and recommendations

    Journal of the National Collegiate Honors Council -- Volume 3, no. 2 -- Complete Issue

    Get PDF
    CONTENTS Call for Papers Submission Guidelines Dedication (Ada Long) Editor’s Introduction (Dail Mullins) TECHNOLOGY IN HONORS Technology and the NCHC, Bob Spurrier Technology, Distance Education, and Honors, Jon A. Schlenker The Pickup Truck, Being a Scholarly Paper on the Efficiencies Effected by Modern Technology, Don Tucker Collaborative Teaching of English and Information Literacy in the Community College Honors Program, Nancy Tenhet, Juanita Flanders, Jeanne Wells Cook, and Margaret Jane Stauble Introducing the Video Web-board as a Technologic Enhancement to Your Honors Course, A. Midori Albert and Katherine M. Bruce SHORT PIECES The Computer Based Honors Program at the University of Alabama, Cathy Randall Clemson University, Pam Mack University of Connecticut, Trevor Tebbs Florida International University, Meri-Jane Rochelson Glenville State College Presidential Scholars Program, Alison Witte and Philip Taylor Long Island University, C. W. Post Campus, Joan Digby Longwood University, Claire Black McCoy North Carolina State University, John Wall Penn State Schreyer Honors College, Cheryl Achterberg Red Rocks Community College, Amy Braziller and Chris Howell Western Washington University, George Mariz Wright State University, Susan Carrafiello About the Authors NCHC Publication Order Form

    Forty Years of Distance Education: Challenges and implications at the Open University of Sri Lanka

    Get PDF
    Commencing its activities in 1980, the Open University of Sri Lanka (OUSL) has expanded over the years embracing emerging technologies periodically, undergoing a series of technological adoptions gradually through Generations of Distance Education (GDE). The aim of this study is to assess the current status of OUSL, based on Taylor’s conceptual framework of GDE, identify the challenges faced during these technological transformations, and how those challenges were mitigated during its forty years of existence as a single-mode national open and distance learning university in Sri Lanka. This study employs a qualitative research design based on reflective practices of the researchers, narrative accounts of past decision makers, reflections of academics and administrators, and cross-referenced with documentary evidences. The findings show how the OUSL has advanced towards the fifth GDE, amidst challenges and finally propose mitigation strategies that would be useful for future technological interventions

    1982-1984 Course Catalog

    Get PDF
    1982-1984 Course Catalo

    A Review of Copyright and the Internet

    Get PDF

    1981-1983 Course Catalog

    Get PDF
    1981-1983 Course Catalo
    • …
    corecore