Results 101 to 110 of about 6,185,376 (371)
Broadcasting in geometric radio networks
AbstractWe consider deterministic broadcasting in geometric radio networks (GRN) whose nodes know only a limited part of the network. Nodes of a GRN are situated in the plane and each of them is equipped with a transmitter of some range r. A signal from this node can reach all nodes at distance at most r from it but if a node u is situated within the ...
Anders Dessmark, Andrzej Pelc
openaire +2 more sources
Broadcasting in unreliable radio networks [PDF]
Practitioners agree that unreliable links, which sometimes deliver messages and sometime do not, are an important characteristic of wireless networks. In contrast, most theoretical models of radio networks fix a static set of links and assume that these links are reliable.
Kuhn, Fabian+4 more
openaire +4 more sources
From Tweets to Insights: Social Opinion Mining on Corporate Social Responsibility
ABSTRACT Corporate Social Responsibility (CSR) has become increasingly critical as firms seek to balance financial goals with social and environmental responsibilities. Our study introduces a three‐phase structured method to analyze stakeholders' opinions on CSR through Social Opinion Mining, utilizing stakeholder and legitimacy theories.
Chiara Leggerini, Mariasole Bannò
wiley +1 more source
VPPCS: VANET-Based Privacy-Preserving Communication Scheme
Over the past years, vehicular ad hoc networks (VANETs) have been commonly used in intelligent traffic systems. VANET's design encompasses critical features that include autonomy, distributed networking, and rapidly changing topology. The characteristics
Mahmood A. Al-Shareeda+3 more
doaj +1 more source
Neighbour coverage: a dynamic probabilistic route discovery for mobile ad hoc networks [PDF]
Blind flooding is extensively use in ad hoc routing protocols for on-demand route discovery, where a mobile node blindly rebroadcasts received route request (RREQ) packets until a route to a particular destination is established.
Abdulai, J.+3 more
core
Are Firms Penalized for Their Involvement in Human Rights Violations?
ABSTRACT Increased transparency about harmful corporate human rights practices is often assumed to contribute to the prevention of such violations, as negative publicity may generate reputational damage for corporations. However, whether and when such reputational damage actually occurs, and in what shape, is unknown.
Peter‐Jan Engelen+3 more
wiley +1 more source
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan+7 more
wiley +1 more source
The core–periphery hypothesis (CPH) predicts that genetic diversity is greatest at the centre and lowest at the edges of a species' distribution because genetic diversity is a function of a species' abundance, which is also expected to be greatest at the centre and lowest at the edges of the distribution. Variants of the CPH include the ‘Ramped North' (
Daniel Cárcamo+2 more
wiley +1 more source
Grassroots Innovations and Projectification: Diffusion Processes of the European Ecovillage Movement
ABSTRACT Grassroots innovations are increasingly recognized as crucial actors in sustainability transitions, offering localized, bottom‐up solutions to local and global challenges. These initiatives contribute to sustainability by diffusing sustainable innovations and practices to broader societal sectors.
André Girardi+4 more
wiley +1 more source
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang+4 more
wiley +1 more source