Results 1 to 10 of about 7,609,923 (393)

Practice of Connectivism As Learning Theory: Enhancing Learning Process Through Social Networking Site (Facebook)

open access: yesGaziantep Üniversitesi Sosyal Bilimler Dergisi, 2013
The impact of the digital age within learning and social interaction has been growing rapidly. The realm of digital age and computer mediated communication requires reconsidering instruction based on collaborative interactive learning process and socio ...
Fahriye Altınay Aksal   +2 more
doaj  

Framing labor contracts: Contract versus network theories [PDF]

open access: yesRecht der Werkelijkheid, 2016
‘Framing Labour Contracts: Contract versus Network Theories’ Since the 18th century the ‘contractual model’ has become both a paradigm of social theories (f.i. ‘rational choice’) and a dominant model of structuring labour relations. Its presupposition of the subjectivity of individual actors as a given is criticized with reference to network ...
openaire   +3 more sources

Low energy indoor network : deployment optimisation [PDF]

open access: yes, 2012
This article considers what the minimum energy indoor access point deployment is in order to achieve a certain downlink quality-of-service. The article investigates two conventional multiple-access technologies, namely: LTE-femtocells and 802.11n Wi-Fi ...
Guo, Weisi, O'Farrell, Tim, Wang, Siyi
core   +2 more sources

Networking theoretical frames: the ReMath enterprise [PDF]

open access: yesEducational Studies in Mathematics, 2013
In this article of the special issue devoted to the European project ReMath, we present and discuss the affordances of this project in terms of networking between theoretical frameworks. After clarifying the vision of theories and networking adopted in this project, we introduce the methodological constructs that have been developed and used in ReMath ...
Artigue, Michèle   +1 more
openaire   +4 more sources

Random Access Game and Medium Access Control Design [PDF]

open access: yes, 2010
Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (
Chen, Lijun   +2 more
core   +3 more sources

A novel multipath-transmission supported software defined wireless network architecture [PDF]

open access: yes, 2017
The inflexible management and operation of today\u27s wireless access networks cannot meet the increasingly growing specific requirements, such as high mobility and throughput, service differentiation, and high-level programmability.
Jin, Wenqiang   +5 more
core   +1 more source

On the Performance of Stream-based, Class-based Time-aware Shaping and Frame Preemption in TSN

open access: yesInternational Conference on Industrial Technology, 2020
Time-sensitive Networking (TSN) is an evolving group of IEEE standards for deterministic real-time communication making standard Ethernet technology applicable to safety-critical application domains such as manufacturing or automotive systems.
David Hellmanns   +5 more
semanticscholar   +1 more source

Enhanced FRER Mechanism in Time-Sensitive Networking for Reliable Edge Computing

open access: yesSensors
Time-Sensitive Networking (TSN) and edge computing are promising networking technologies for the future of the Industrial Internet. TSN provides a reliable and deterministic low-latency communication service for edge computing.
Shaoliu Hu   +3 more
doaj   +1 more source

Effective Caching for the Secure Content Distribution in Information-Centric Networking

open access: yes, 2018
The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective ...
Bilal, Muhammad   +2 more
core   +1 more source

Selection of EAP-authentication methods in WLANs [PDF]

open access: yes, 2007
IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks.
Ali, KM, Owens, TJ
core  

Home - About - Disclaimer - Privacy