62,168 research outputs found

    The New White Flight

    Get PDF
    White charter school enclaves—defined as charter schools located in school districts that are thirty percent or less white, but that enroll a student body that is fifty percent or greater white— are emerging across the country. The emergence of white charter school enclaves is the result of a sobering and ugly truth: when given a choice, white parents as a collective tend to choose racially segregated, predominately white schools. Empirical research supports this claim. Empirical research also demonstrates that white parents as a collective will make that choice even when presented with the option of a more racially diverse school that is of good academic quality. Despite the connection between collective white parental choice and school segregation, greater choice continues to be injected into the school assignment process. School choice assignment policies, particularly charter schools, are proliferating at a substantial rate. As a result, parental choice rather than systemic design is creating new patterns of racial segregation and inequality in public schools. Yet the Supreme Court’s school desegregation jurisprudence insulates racial segregation in schools ostensibly caused by parental choice rather than systemic design from regulation. Consequently, the new patterns of racial segregation in public schools caused by collective white parental choice largely escapes regulation by courts. This article argues that the time has come to reconsider the legal and normative viability of regulating racial segregation in public schools caused by collective white parental choice. The article makes two important contributions to the legal literature on school desegregation. First, using white charter school enclaves as an example, it documents the ways in which school choice policies are being used to allow whites as a collective to satisfy their preference for segregated predominately white schools. Second, the article sets forth both constitutional and normative arguments for regulating the private choices that result in stark racial segregation patterns in public schools

    Improving Message Delivery Performance in Opportunistic Networks using a Forced-stop diffusion scheme

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-40509-4_11The performance of mobile opportunistic networks strongly depends on contact duration. If the contact lasts less than the required transmission times, some messages will not get delivered, and the whole diffusion scheme will be seriously affected. In this paper we propose a new diffusion method, called Forced-Stop, that is based on controlling node mobility to guarantee a complete message transfer. Using the ONE simulator and realistic mobility traces, we compared our proposal with the classical Epidemic diffusion. We show that Forced-Stop improves the message delivery performance, increasing the delivery ratio up to 30\%, and reducing the latency of message delivery up to 40\%, with a limited impact on buffer utilisation and message relaying. These results can be a relevant indication to the designers of opportunistic network applications that could integrate in their products strategies to inform the user about the need to temporarily stop in order to favor the overall data delivery.This work was partially supported by the Ministerio de Economía y Competitividad, Programa Estatal de Investigación, Desarrollo e Innovación Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, the Generalitat Valenciana, Spain, under Grant AICO/2015/108, the Secretaría Nacional de Educación Superior, Ciencia, Tecnología e Innovación del Ecuador(SENESCYT), and the Universidad Laica Eloy Alfaro de Manabi, Ecuador.Herrera Tapia, J.; Hernández Orallo, E.; Tomás Domínguez, AE.; Manzoni, P.; Tavares De Araujo Cesariny Calafate, CM.; Cano Escribá, JC. (2016). Improving Message Delivery Performance in Opportunistic Networks using a Forced-stop diffusion scheme. En Ad-hoc, Mobile, and Wireless Networks. Springer. 156-168. https://doi.org/10.1007/978-3-319-40509-4_11S156168Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 44(11), 134–141 (2006)Ferretti, S.: Shaping opportunistic networks. Comput. Commun. 36, 481–503 (2013)Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the Second International ICST Conference on Simulation Tools and Techniques, Rome (2009)Tsai, T.-C., Chan, H.-H.: NCCU Trace: social-network-aware mobility trace. IEEE Commun. Mag. 53, 144–149 (2015)AnAverage WhatsApp User Sends Messages per Month, 15 September 2015. http://www.statista.com/chart/1938/monthly-whatsapp-usage-per-userNiu, J., Guo, J., Cai, Q., Sadeh, N., Guo, S.: predict and spread: an efficient routing algorithm for opportunistic networking. In: Wireless Communications and Networking Conference (WCNC), 2011 IEEE, pp. 498–503, Cancún (2011)Thakur, G.S., Kumar, U., Helmy, A., Hsu, W.-J.: On the efficacy of mobility modeling for DTN evaluation: analysis of encounter statistics andspatio-temporal preferences. In: 7th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 510–515, Istanbul (2011)Warthman, F.: Delay-and Disruption-Tolerant Networks (DTNs) a tutorial, version 2.0. In: The InterPlaNetary (IPN) Internet Project. InterPlanetary Networking Special Interest Group (IPNSIG) (2012)Battestini, A., Setlur, V., Sohn, T.: A large scale study of text messaging use. In: 12th International Conference on Human Computer Interaction with Mobile Devices and Services MobileHCI, pp. 1–10, Lisbon (2010)Förster, A., Garg, K., Nguyen, H.A., Giordano, S. On context awareness and social distance in human mobility traces. In: Third ACM International Workshop on Mobile Opportunistic Networks, pp. 5–12, Zürich (2012)Boldrini, C., Conti, M., Passarella, A.: Modelling data dissemination in opportunistic networks. In: Proceedings of the Third ACM Workshop on Challenged Networks - CHANTS 2008, pp. 89–96, San Francisco (2008)Natalizio, E., Loscrí, V.: Controlled mobility in mobile sensor networks: advantages, issues and challenges. Telecommun. Syst. 52(4), 2411–2418 (2013)Neena, V.V., Rajam, V.M.A.: Performance analysis of epidemic routing protocol for opportunistic networks in different mobility patterns. In: 2013 International Conference on Computer Communication and Informatics, pp. 1–5, Coimbatore (2013)Mehta, N., Shah, M.: Performance evaluation of efficient routing protocols in delay tolerant network under different human mobility models. Int. J. Grid Distrib. Comput. 8(1), 169–178 (2015)Su, J., Chin, A., Popivanova, A., Goel, A., Lara, E.D.: User mobility for opportunistic ad-hoc networking. In: Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2004), Low Wood (2004)Feng, Z., Chin, K.-W.: A unified study of epidemic routing protocols and their enhancements. In: IEEE 26th International Parallel and Distributed Processing Symposium Workshops PhD Forum (IPDPSW), pp. 1484–1493, Shanghai (2012)Vardalis, D., Tsaoussidis, V.: Exploiting the potential of DTN for energy-efficient internetworking. J. Syst. Softw. 90, 91–103 (2014)Rango, F.D., Amelio, S., Fazio, P.: Epidemic strategies in delay tolerant networks from an energetic point of view: main issues and performance evaluation. J. Networks 10(01), 4–14 (2015)Herrera-Tapia, J., Manzoni, P., Hernández-Orallo, E., Calafate, C.T., Cano, J.-C.: Power consumption evaluation in vehicular opportunistic networks. In: IEEE 12th CCNC 2015 Workshops - VENITS, pp. 925–930, Las Vegas (2015)Erramilli, V., Crovella, M.: Forwarding in opportunistic networks with resource constraints. In: Proceedings of the third ACM workshop on Challenged networks - CHANTS 2008, pp. 41–47, San Francisco (2008)Fathima, G., Wahidabanu, R.: Buffer management for preferential delivery in opportunistic delay tolerant networks. Int. J. Wirel. Mob. Netw. (IJWMN) 3, 15–28 (2011)Pan, D., Ruan, Z., Zhou, N., Liu, X., Song, Z.: A comprehensive-integrated buffer management strategy for opportunistic networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 1–10 (2013)Hernández-Orallo, E., Herrera-Tapia, J., Cano, J.-C., Calafate, C.T., Manzoni, P.: Evaluating the impact of data transfer time in contact-based messaging applications. IEEE Commun. Lett. 19, 1814–1817 (2015)de Abreu, C.S., Salles, R.M.: Modeling message diffusion in epidemical DTN. Ad Hoc Netw. 16, 197–209 (2014

    Robotic Wireless Sensor Networks

    Full text link
    In this chapter, we present a literature survey of an emerging, cutting-edge, and multi-disciplinary field of research at the intersection of Robotics and Wireless Sensor Networks (WSN) which we refer to as Robotic Wireless Sensor Networks (RWSN). We define a RWSN as an autonomous networked multi-robot system that aims to achieve certain sensing goals while meeting and maintaining certain communication performance requirements, through cooperative control, learning and adaptation. While both of the component areas, i.e., Robotics and WSN, are very well-known and well-explored, there exist a whole set of new opportunities and research directions at the intersection of these two fields which are relatively or even completely unexplored. One such example would be the use of a set of robotic routers to set up a temporary communication path between a sender and a receiver that uses the controlled mobility to the advantage of packet routing. We find that there exist only a limited number of articles to be directly categorized as RWSN related works whereas there exist a range of articles in the robotics and the WSN literature that are also relevant to this new field of research. To connect the dots, we first identify the core problems and research trends related to RWSN such as connectivity, localization, routing, and robust flow of information. Next, we classify the existing research on RWSN as well as the relevant state-of-the-arts from robotics and WSN community according to the problems and trends identified in the first step. Lastly, we analyze what is missing in the existing literature, and identify topics that require more research attention in the future
    • …
    corecore