37,810 research outputs found

    Guest Editorial: Nonlinear Optimization of Communication Systems

    Get PDF
    Linear programming and other classical optimization techniques have found important applications in communication systems for many decades. Recently, there has been a surge in research activities that utilize the latest developments in nonlinear optimization to tackle a much wider scope of work in the analysis and design of communication systems. These activities involve every “layer” of the protocol stack and the principles of layered network architecture itself, and have made intellectual and practical impacts significantly beyond the established frameworks of optimization of communication systems in the early 1990s. These recent results are driven by new demands in the areas of communications and networking, as well as new tools emerging from optimization theory. Such tools include the powerful theories and highly efficient computational algorithms for nonlinear convex optimization, together with global solution methods and relaxation techniques for nonconvex optimization

    Guest Editorial: Ethics and Privacy in Learning Analytics

    Get PDF
    The European Learning Analytics Community Exchange (LACE) project is responsible for an ongoing series of workshops on ethics and privacy in learning analytics (EP4LA), which have been responsible for driving and transforming activity in these areas. Some of this activity has been brought together with other work in the papers that make up this special issue. These papers cover the creation and development of ethical frameworks, as well as tools and approaches that can be used to address issues of ethics and privacy. This editorial suggests that it is worth taking time to consider the often intertangled issues of ethics, data protection and privacy separately. The challenges mentioned within the special issue are summarised in a table of 22 challenges that are used to identify the values that underpin work in this area. Nine ethical goals are suggested as the editors’ interpretation of the unstated values that lie behind the challenges raised in this paper

    Special Libraries, May-June 1948

    Get PDF
    Volume 39, Issue 5https://scholarworks.sjsu.edu/sla_sl_1948/1004/thumbnail.jp

    Evolving routines and strategic change. Learning in practice through knowledge and knowing in evolving routines

    Get PDF
    A travers l'évolution d'une routine à fort contenu de connaissance : l'évaluation par les pairs d'articles scientifiques, on analyse l'impact des pratiques concrètes pour faire évoluer les processus stratégiques de l'organisation.routine;ingénierie des connaissances;micro-pratiques;caractérisation

    Special Libraries, March 1970

    Get PDF
    Volume 61, Issue 3https://scholarworks.sjsu.edu/sla_sl_1970/1002/thumbnail.jp

    Theatre and Drama of Socialist Realism in the Context of Cryptotexts (Based on MKiS and WUKPPiW Material)

    Get PDF
    The main goal of the article is to offer a description of cryptotexts of theatre staging handbooks and dramatic works created in Poland during the socialist realism period. A cryptotext is a secret text which is the result of a purposeful act of subterfuge. In the article, I present selected cryptotexts – reviews produced in the Ministry of Culture and Art (MKiS) and censorship reviews of the dramatic works submitted for evaluation to the Voivodship Control Bureau for Press, Main Office of Control of Press, Publications and Shows (WUKPPiW). The archives contain evaluation of works which have been published in subsequent years as well as those which remained only in their draft form. Analysis of the evaluations of ministry officials reveal the mechanisms for allowing and withholding submitted dramatic works and a theatre staging handbook which shows the practices of publishing theatrical works. An analysis of different evaluations of the same text allows for a hypothesis that the main aim of cryptotexts was the evaluation of ideological correctness of submitted works. Despite this main function it is possible to point out specific passages in the statements by the WUKPPiW officials which are similar to statements of Ministry officials. In both cases the evaluation pertains to the content and the planned fulfilment of the work and plays mainly a didactic function

    Performance evaluation of two-fuzzy based cluster head selection systems for wireless sensor networks

    Get PDF
    Sensor networks supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities are emerging as a critically important computer class that enable novel and low cost applications. There are many fundamental problems that sensor networks research will have to address in order to ensure a reasonable degree of cost and system quality. Cluster formation and cluster head selection are important problems in sensor network applications and can drastically affect the network’s communication energy dissipation. However, selecting of the cluster head is not easy in different environments which may have different characteristics. In this paper, in order to deal with this problem, we propose two fuzzy-based systems for cluster head selection in sensor networks. We call these systems: FCHS System1 and FCHS System2. We evaluate the proposed systems by simulations and have shown that FCHS System2 make a good selection of the cluster head compared with FCHS System1 and another previous system.Peer ReviewedPostprint (published version
    • …
    corecore