Results 121 to 130 of about 133,285 (280)
Caching and Replication in Mobile Data Management. [PDF]
Mobile data management has been an active area of research for the past fifteen years. Besides dealing with mobility itself, issues central in data management for mobile computing include low bandwidth, intermittent network connectivity and scarcity of resources with emphasis on power management. In this article, we focus on how caching and replication
Evaggelia Pitoura, Panos K. Chrysanthis
openaire +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
NuMagSANS, a GPU‐accelerated software package for the computation of nuclear and magnetic small‐angle neutron scattering cross sections and correlation functions of complex systems, is presented.We present NuMagSANS, a GPU‐accelerated software package for calculating nuclear and magnetic small‐angle neutron scattering (SANS) cross sections and ...
Michael P. Adams, Andreas Michels
wiley +1 more source
Apex predators exploit advantageous snow conditions across hunting modes
Advantageous snow conditions—in terms of snow depth and density—are among the most important features of the winter landscape for two apex predators, regardless of hunting strategy. In a warming climate, the knock‐on effects of a diminishing snowpack may reduce the hunting success of multiple large carnivore species.
Benjamin K. Sullender +7 more
wiley +1 more source
Abstract In this article, the key dilemmas that will confront the new Labour administration in Britain during its initial period in power are examined. The Starmer government is seeking to use the state pragmatically to improve British economic performance, stem the crisis in public services and strengthen the strategic capacity of Whitehall.
Patrick Diamond +2 more
wiley +1 more source
Anthropologists, in common with social theorists more generally, have often understood social life as an emergent phenomenon grounded in practices of creativity and improvisation. Where stasis and continuity feature, these are often presented as illusory manifestations of underlying processes of ‘invention’, or as external impositions upon otherwise ...
Paolo Heywood, Thomas Yarrow
wiley +1 more source
FEMINISTS VERSUS MONUMENTS? From Protests to Anti‐monuments in Mexico City
Abstract This article examines the role of heritage spaces and monuments in the Historic Centre of Mexico City during ongoing feminist mobilizations. Feminists have claimed that the Mexican government is more concerned about protecting monuments and urban heritage than acting to prevent gender‐based violence and femicide.
Fernando Gutiérrez
wiley +1 more source
ABSTRACT How are capital and the family interconnected in contemporary capitalism? In this article, we argue that they come together in owning relations. By owning capital across generations, families bridge the temporal gap between the durability of capital and the finite lifespan of private property holders and thus resolve the problem of bona ...
Jens Beckert, Isabell Stamm
wiley +1 more source
Taking Stock: Elite Studies and Social Change
ABSTRACT This article provides a systematic synthesis of contemporary elite sociology through the analytical lens of change and stability. We distinguish between two types of change: change within elites, referring to transformations in elite composition, circulation, or internal characteristics; and change by elites, designating processes whereby ...
Lena Ajdacic +13 more
wiley +1 more source
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley +1 more source

