108 research outputs found

    Real-time communication in packet-switched networks

    Full text link

    Application of learning algorithms to traffic management in integrated services networks.

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre-DSC:DXN027131 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    Real-Time Communication in Packet-Switched Networks

    Get PDF
    Abstract The dramatically increased bandwidths and processing capabilities of future high-speed networks make possible many distributed real-time applications, such as sensor-based applications and multimedia services. Since these applications will have tra c characteristics and performance requirements that di er dramatically from those of current data-oriented applications, new communication network architectures and protocols will be required. In this paper we discuss the performance requirements and tra c characteristics of various real-time applications, survey recent developments in the areas of network architecture and protocols for supporting real-time services, and develop frameworks in which these, and future, research e orts can be considered

    Machine Learning

    Get PDF
    Machine Learning can be defined in various ways related to a scientific domain concerned with the design and development of theoretical and implementation tools that allow building systems with some Human Like intelligent behavior. Machine learning addresses more specifically the ability to improve automatically through experience

    Internet Daemons: Digital Communications Possessed

    Get PDF
    We’re used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net’s infrastructure—as well as the devices we use to access it—daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives—including their role in hot-button issues like network neutrality. Going back to Victorian times and the popular thought experiment Maxwell’s Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast’s efforts to control peer-to-peer networking, and Pirate Bay’s attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users. Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight. Table of Contents Abbreviations and Technical Terms Introduction 1. The Devil We Know: Maxwell’s Demon, Cyborg Sciences, and Flow Control 2. Possessing Infrastructure: Nonsynchronous Communication, IMPs, and Optimization 3. IMPs, OLIVERs, and Gateways: Internetworking before the Internet 4. Pandaemonium: The Internet as Daemons 5. Suffering from Buffering? Affects of Flow Control 6. The Disoptimized: The Ambiguous Tactics of the Pirate Bay 7. A Crescendo of Online Interactive Debugging? Gamers, Publics and Daemons Conclusion Acknowledgments Appendix: Internet Measurement and Mediators Notes Bibliography Index Reviews Beneath social media, beneath search, Internet Daemons reveals another layer of algorithms: deeper, burrowed into information networks. Fenwick McKelvey is the best kind of intellectual spelunker, taking us deep into the infrastructure and shining his light on these obscure but vital mechanisms. What he has delivered is a precise and provocative rethinking of how to conceive of power in and among networks. —Tarleton Gillespie, author of Custodians of the Internet Internet Daemons is an original and important contribution to the field of digital media studies. Fenwick McKelvey extensively maps and analyzes how daemons influence data exchanges across Internet infrastructures. This study insightfully demonstrates how daemons are transformative entities that enable particular ways of transferring information and connecting up communication, with significant social and political consequences. —Jennifer Gabrys, author of Program Eart

    Frontiers in psychodynamic neuroscience

    Full text link
    he term psychodynamics was introduced in 1874 by Ernst von Brücke, the renowned German physiologist and Freud’s research supervisor at the University of Vienna. Together with Helmholtz and others, Brücke proposed that all living organisms are energy systems, regulated by the same thermodynamic laws. Since Freud was a student of Brücke and a deep admirer of Helmholtz, he adopted this view, thus laying the foundations for his metapsychology. The discovery of the Default Network and the birth of Neuropsychoanalysis, twenty years ago, facilitated a deep return to this classical conception of the brain as an energy system, and therefore a return to Freud's early ambition to establish psychology as natural science. Our current investigations of neural networks and applications of the Free Energy Principle are equally ‘psychodynamic’ in Brücke’s original sense of the term. Some branches of contemporary neuroscience still eschew subjective data and therefore exclude the brain’s most remarkable property – its selfhood – from the field, and many neuroscientists remain skeptical about psychoanalytic methods, theories, and concepts. Likewise, some psychoanalysts continue to reject any consideration of the structure and functions of the brain from their conceptualization of the mind in health and disease. Both cases seem to perpetuate a Cartesian attitude in which the mind is linked to the brain in some equivocal relationship and an attitude that detaches the brain from the body -- rather than considering it an integral part of the complex and dynamic living organism as a whole. Evidence from psychodynamic neuroscience suggests that Freudian constructs can now be realized neurobiologically. For example, Freud’s notion of primary and secondary processes is consistent with the hierarchical organization of self-organized cortical and subcortical systems, and his description of the ego is consistent with the functions of the Default Network and its reciprocal exchanges with subordinate brain systems. Moreover, thanks to new methods of measuring brain entropy, we can now operationalize the primary and secondary processes and therefore test predictions arising from these Freudian constructs. All of this makes it possible to deepen the dialogue between neuroscience and psychoanalysis, in ways and to a degree that was unimaginable in Freud's time, and even compared to twenty years ago. Many psychoanalytical hypotheses are now well integrated with contemporary neuroscience. Other Freudian and post-Freudian hypotheses about the structure and function of the mind seem ripe for the detailed and sophisticated development that modern psychodynamic neuroscience can offer. This Research Topic aims to provide comprehensive coverage of the latest advances in psychodynamic neuroscience and neuropsychoanalysis. Potential authors are invited to submit papers (original research, case reports, review articles, commentaries) that deploy, review, compare or develop the methods and theories of psychodynamic neuroscience and neuropsychoanalysis. Potential authors include researchers, psychoanalysts, and neuroscientists

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Play Among Books

    Get PDF
    How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books
    • 

    corecore