Academia.eduAcademia.edu

Network computing

1,489 papers
106 followers
AI Powered
Network computing is a field of computer science that focuses on the design, implementation, and management of distributed systems that enable multiple computers to communicate and share resources over a network. It encompasses protocols, architectures, and technologies that facilitate data exchange and collaborative processing among interconnected devices.
We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of... more
Satellite-based information on significant waves is increasingly being made available to ocean scientists and engineers at low costs. While such measurements have a number of useful applications the manner with which the satellites sense... more
Geant4 is a very large, highly accurate toolkit for Monte Carlo simulation of particle-matter interaction. It has been applied to high-energy physics, cosmic ray modeling, radiation shields, radiation therapy, mine detection, and other... more
Abstract: Nowadays, user authentication is one of the important topics in information security. Text based strong password schemes could provide with certain degree of security. However, the fact that strong passwords being difficult to... more
Knowledge of the up-to-date network topology (i.e. Layer 2 & Layer 3) is crucial for efficient network management. Issues like congestion avoidance, resource management, resource discovery, root-cause analysis and event correlation... more
This article offers expert opinion on two Internet of Things (IoT) perspectives. The first is a research agenda for the IoT to ensure the development of a trusted, secure, reliable, and interoperable net-centric computing environment. The... more
Children are considered particularly important in debates about the possibilities and dangers of information and communication technologies (ICT). Discourses on ICT contain paradoxical representations of childhood. On the one hand, unlike... more
Purpose – This paper sets out the arguments for the use of social media as a tool for learning in the workplace. Design/methodology/approach – Not applicable – viewpoint paper Findings – Social media can play a valuable role in both... more
Peer-to-peer systems (P2P) have become a popular technique to architect decentralized systems. However, despite its popularity most P2P systems consist in simple applications such as file sharing or chat systems. The main reason is that... more
... Al-Sharqiyah Al-Dakhiliah Al Wusta UAE KSA Al Dhahirah Manah Alkamil JBB Ali Sur OMIFCO Mudhirib Mudaybi Adam Nizwa Bahla Nahada PDO Ibri Alhayl Dank Mhadah (Alwasit) Bureimi Wadi Al Jizzi Liwa Shinas Sohar SIS SPS SIA-1 SRC Saham... more
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imper- ative that these... more
We developed Smart Furniture, which extemporaneously converts the legacy non-smart space into a Smart Hot-spot which consists of computational services. Since the Smart Furniture is equipped with networked computers, sensors and various... more
This study examined the pattern of use of different forms of contact between grandparents and grandchildren, and especially the use of new technologies (SMS, e-mail) and factors affecting this. Questionnaire data are reported from 408... more
Some authors proposed that exact mental calculation is based on linguistic representations and relies on the perisylvian language cortices, while the understanding of proximity relations between numerical quantities implicates the... more
Background: Progressive remodelling of the left ventricle (LV) following myocardial infarction (MI) is an outcome of spatial-temporal cellular interactions among different cell types that leads to heart failure for a significant number of... more
This paper discusses how a group leader computer tutor may aid students in learning collaborative skills in a co-operative learning environment. However, students need to learn collaborative skills and practice using them. The group... more
This article proposes an adaptive connectionist model that implements an attributional account of cognitive dissonance. The model represents an attitude as the connection between the attitude object and behavioral-affective outcomes.... more
The principles of robotics and control are widely taught in engineering subjects, however a common problem concerns the limited availability of expensive equipment with which students can work with, in order to acquire valuable practical... more
▪   We explore the extent to which neocortical circuits generalize, i.e., to what extent can neocortical neurons and the circuits they form be considered as canonical? We find that, as has long been suspected by cortical neuroanatomists,... more
Some authors proposed that exact mental calculation is based on linguistic representations and relies on the perisylvian language cortices, while the understanding of proximity relations between numerical quantities implicates the... more
by raja r
Inexpensive fixed wing UAVs are increasingly useful in remote sensing operations. They are a cheaper alternative to manned vehicles, and are ideally suited for dangerous or monotonous missions that would be inadvisable for a human pilot.... more
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficult problem, even without the additional risks posed by... more
S ophisticated consumer devices that support multimedia-personal digital assistants, network computers, and mobile communication devices-pose challenges for embedded-systems designers. The low-cost, consumer-oriented, fast time-to-market... more
This paper presents a project devoted to developing an open system architecture for functionally based (implicit or more generally F-rep) shape modeling and its applications. The software tools are built around the shape models written in... more
Absrract --The switched-capacitor transconductance is used to simulate a new FDNR element which is relatively insensitive to parasitic capacitances and requires few components. The element is used in the switched-capacitor simulation of a... more
We present a taxonomy of the agents involved in network computing, introduce models capable to describe different levels of reliability and Quality of Service required by a service contract and discuss architectural requirements for each... more
Network security issues and game exploits can undermine the gameplay experience of networked games. With this in mind, this work tries to draw attention of the academic community to the issue and, through a vast bibliography, present: why... more
Networks of neurons in the cerebral cortex generate complex outputs that are not simply predicted by their inputs. These emergent responses underlie the function of the cortex. Understanding how cortical networks carry out such... more
We propose a method to compute a probably approximately correct (PAC) normalized histogram of observations with a refresh rate of Âð1Þ time units per histogram sample on a random geometric graph with noise-free links. The delay in... more
A family of message propagation protocols for highly mobile ad-hoc networks is defined, and is studied analytically and by simulation. The coverage of a message (the fraction of nodes that receive it), can be made arbitrarily close to 1,... more
The Jackson Laboratory Colony Management System (JCMS) is a software application for managing data and information related to research mouse colonies, associated biospecimens, and experimental protocols. JCMS runs directly on computers... more
A common problem faced by institutions concerns the limited availability of expensive robotics and control equipment, with which students in the educational program can work, in order to acquire valuable 'hands on' experience. The... more
The paper would discuss the possibilities of using cloud computing as a solution to expand work efficiency at Taiz university (TU) Computer Center and Information Technology (CCIT) labs, these Labs equipped with hardware and software... more
The proliferation of information sources as a result of networked computers and other interconnected devices has prompted significant changes in the amount, availability, and nature of geographic information. Among the more significant... more
The routing scalability and IP address exhaustion are two significant issues the current Internet faces. The "locator/identifier (Loc/ID) split" has become a well recognized design principle for future Internet architectures that make... more
This paper describes a novel approach to implement multimedia access platforms: reconfigurable oriented codesign. Nowadays we observe a rapid and mutant evolution of multimedia standards and its de facto adoption into many consumer... more
An adaptive distributed strategy is developed based on incremental techniques. The proposed scheme addresses the problem of linear estimation in a cooperative fashion, in which nodes equipped with local computing abilities derive local... more
In systems where customer service demands are only known probabilistically, there is very little to distinguish between jobs. Therefore, no universal optimum scheduling strategy or algorithm exists. If the distribution of job times is... more
The Network Time Protocol, an over 2-decade old and always improving algorithm for synchronizing networked computer clocks, still finds problems for its efficient operation. Many applications need a trustable time system to function... more
Computer mediated communication (CMC) refers to communication between individuals and among groups via networked computers. Such forms of communication can be asynchronous or synchronous and serve a wide variety of useful functions... more