584 research outputs found

    Context-Aware Publish Subscribe in Mobile ad Hoc Networks

    Get PDF
    The publish-subscribe communication paradigm is enjoying increasing popularity thanks to its ability to simplify the development of complex distributed applications. However, existing solutions in the publish-subscribe domain address only part of the challenges associated with the development of applications in dynamic scenarios such as mobile ad hoc networks. Mobile applications must be able to assist users in a variety of situations, responding not only to their inputs but also to the characteristics of the environment in which they operate. In this paper, we address these challenges by extending the publish-subscribe paradigm with the ability to manage and exploit context information when matching events against subscriptions. We present our extension in terms of a formal model of context-aware publish-subscribe. We propose a solution for its implementation in MANETs; and finally we validate our approach by means of extensive simulations

    The Search for the Holy Grail in Ireland: Social Care in Perspective

    Get PDF
    This article suggests that social care in Ireland is at a crossroads and that the Irish Association of Care Workers is now at a crucial stage of its twenty-six year existence. It acknowledges that a number of practitioners and academics have spent an enormous amount of time and energy attempting to convince their peers and the general public that social care deserves independent professional recognition, but with little real willingness to problematise the discipline of social care. I argue that social care practitioners and advocates will be forced to fully embrace change and become both more dynamic and proactive than heretofore in a number of areas if social care is to achieve professional recognition rather than maintain a vocational status. The national organisation representing care workers started life in 1972 as the Association of Workers in Care (AWCC) with only 73 members. By 1992 it had changed name and orientation and had 200 members, but 0\u27 Connor (1992, p. 250) rightly observed that the title, status, qualifications and pay accorded to people working with children remained unclear. As of February 1998, the organisation had approximately 500 members, but increased numbers does not necessarily equate with increased political mobility. The proverbial path to enlightenment has not been smooth with 0\u27 Connor (1992, p. 256) further noting, at the beginning of this decade, that despite a membership of approximately 200, the body had failed to gain recognition as the voice of care workers and that any attempt to professionalise child care would face considerable difficulties in the Irish context . The current organisation has the potential to act as an effective lobby and interest group on behalf of both its membership and clients, but to achieve this, the organisation must (re)structure itself - from within. The paper concludes by commenting on the irony in seeking the Holy Grail in social care - professional status

    Building And Managing Political Consensus Through The Internet: A Projectual Model

    Get PDF
    This paper focuses on the digital applications in political communication and for building consensus, assuming that we need to overcome the idea of the Internet as a simple means of mass communication, and instead analyse it as a social medium for acquiring, activating, and involving people in a specific political idea or movement. The social developments under way in Internet networks are leading to an integration between reality and virtual reality, thus making the Internet an increasingly faithful representation of the real world and of different subjects’ social networks. This makes Internet a great opportunity for building consensus. On the base of these considerations, we are going to elaborate a model for political communication on the Internet, which is integrated in the political marketing flow and articulated in three phases: acquisition, activation and defense. This model is based on the significant case study of Barack Obama and on the innovative approach in using website by Ségolène Royal

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Network Coding Enabled Named Data Networking Architectures

    Get PDF
    The volume of data traffic in the Internet has increased drastically in the last years, mostly due to data intensive applications like video streaming, file sharing, etc.. This motivates the development of new communication methods that can deal with the growing volume of data traffic. To this aim, Named Data Networking (NDN) has been proposed as a future Internet architecture that changes how the Internet works, from the exchange of content between particular nodes of the network, to retrieval of particular content in the network. The NDN architecture enables ubiquitous in-network caching and naturally supports dynamic selection of content sources, characteristics that fit well with the communication needs of data intensive applications. However, the performance of data intensive applications is degraded by the limited throughput seen by applications, which can be caused by (i) limited bandwidth, (ii) network bottlenecks and (iii) packet losses. In this thesis, we argue that introducing network coding into the NDN architecture improves the performance of NDN-based data intensive applications by alleviating the three issues presented above. In particular, network coding (i) enables efficient multipath data retrieval in NDN, which allows nodes to aggregate all the bandwidth available through their multiple interfaces; (ii) allows information from multiple sources to be combined at the intermediate routers, which alleviates the impact of network bottlenecks; and (iii) enables clients to efficiently handle packet losses. This thesis first provides an architecture that enables network coding in NDN for data intensive applications. Then, a study demonstrates and quantifies the benefits that network coding brings to video streaming over NDN, a particular data intensive application. To study the benefits that network coding brings in a more realistic NDN scenario, this thesis finally provides a caching strategy that is used when the in-network caches have limited capacity. Overall, the evaluation results show that the use of network coding permits to exploit more efficiently available network resources, which leads to reduced data traffic load on the sources, increased cache-hit rate at the in-network caches and faster content retrieval at the clients. In particular, for video streaming applications, network coding enables clients to watch higher quality videos compared to using traditional NDN, while it also reduces the video servers' load. Moreover, the proposed caching strategy for network coding enabled NDN maintains the benefits that network coding brings to NDN even when the caches have limited storage space

    Modeling, Design And Evaluation Of Networking Systems And Protocols Through Simulation

    Get PDF
    Computer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework that can be used to create new networking simulators on top of an HLA-based federation for distributed simulation. The goals are to model and simulate networking architectures and protocols by developing a common underlying simulation infrastructure and to reduce the time a developer has to learn the semantics of message passing and time management to free more time for experimentation and data collection and reporting. This is accomplished by evolving the simulation engine through three different applications that model three different types of network protocols. Computer networking is a good candidate for simulation because of the Internet\u27s rapid growth that has spawned off the need for new protocols and algorithms and the desire for a common infrastructure to model these protocols and algorithms. One simulation, the 3DInterconnect simulator, simulates data transmitting through a hardware k-array n-cube network interconnect. Performance results show that k-array n-cube topologies can sustain higher traffic load than the currently used interconnects. The second simulator, Cluster Leader Logic Algorithm Simulator, simulates an ad-hoc wireless routing protocol that uses a data distribution methodology based on the GPS-QHRA routing protocol. CLL algorithm can realize a maximum of 45% power savings and maximum 25% reduced queuing delay compared to GPS-QHRA. The third simulator simulates a grid resource discovery protocol for helping Virtual Organizations to find resource on a grid network to compute or store data on. Results show that worst-case 99.43% of the discovery messages are able to find a resource provider to use for computation. The simulation engine was then built to perform basic HLA operations. Results show successful HLA functions including creating, joining, and resigning from a federation, time management, and event publication and subscription

    Culture and Content in French

    Get PDF
    Instructors in today’s language classrooms face the challenge of preparing globally competent and socially responsible students with transcultural aptitude. As classroom content shifts toward communication, collaboration, and problem solving across cultural, racial, and linguistic boundaries, the teaching of culture is an integral part of foreign language education. This volume offers nontraditional approaches to teaching culture in a complex time when the internet and social networks have blurred geographical, social, and political borders.The authors offer practical advice about teaching culture with kinesthetics, music, improvisation, and communication technologies for different competency levels.The chapters also explore multi-literacies, project-based learning, and discussions on teaching culture through literature, media, and film.The appendices share examples of course syllabi, specific course activities, and extracurricular projects that explore culinary practices, performing arts, pop culture, geolocation, digital literacy, journalism, and civic literacy

    Investment companies industry developments, 2009; Audit risk alerts

    Get PDF
    https://egrove.olemiss.edu/aicpa_indev/2100/thumbnail.jp
    • …
    corecore