Results 61 to 70 of about 53,786 (213)
Deploying SIP-based Mobile Exam Application onto Next Generation Network testbed
Over the past few years, mobile operators are faced with enormous challenges. Of such challenges, evolved user demands on personalized applications. Telecommunications industry as well as research community have paid enormous attention to Next Generation
Akkari, Nadine +3 more
core +1 more source
Peri‐operative fasting in adults: an international, multidisciplinary consensus statement
Summary Introduction Evidence suggests that existing pre‐operative fasting guidelines are associated with prolonged fasting times. Prolonged fasting, particularly from clear liquids, has the potential to harm patients through reduced peri‐operative wellbeing; impaired glucose metabolism and peri‐operative inflammatory response; delayed return of bowel ...
Anne Rüggeberg +67 more
wiley +1 more source
Preventing DDoS using Bloom Filter: A Survey
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar +2 more
core +1 more source
(Un)threading Rhythms: On Affect and Vibe in a Rave
ABSTRACT In Toronto, raves arise across large nightclubs, DIY venues and outdoors, despite changing regulations that have further arranged and narrowed their possibility in the past 4 years. Following a rave in Toronto, this work explores ways that potentialities and affects emerge in a single night, through my entry of taking part in dancing and ...
Tatiana Yunadi
wiley +1 more source
Detecting and Mitigating Denial-of-Service Attacks on Voice over IP Networks [PDF]
Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter.
Anwar, Zahid +5 more
core
ABSTRACT The recent rise of Generative Artificial Intelligence (GenAI) is fundamentally changing the way businesses operate, with many now investing heavily in this technology. However, businesses are still exploring ways to extract value from GenAI and develop organisational capabilities.
Ashish Jagdish Sharma +4 more
wiley +1 more source
A personal distributed environment for future mobile systems [PDF]
A Personal Distributed Environment (PDE) embraces a user-centric view of communications that take place against a backdrop of multiple user devices, each with its distinct capabilities, in physically separate locations. This paper provides an overview of
Atkinson, R.C. +3 more
core +1 more source
Re‐Purposing Business Schools: Potential, Progress, and Precarity
Abstract With recent management studies of organizational purpose concentrating on the reactions of corporate elites to external change stimuli, little attention has been given to the emergent phenomenon of internally‐driven business school re‐purposing.
Martin Kitchener
wiley +1 more source
Beyond safety net value(s): Tourist hotel rooms for people experiencing homelessness
Abstract This article examines the shape of care and value through an ethnographic study of an intensive, temporary housing intervention for people experiencing homelessness in San Francisco, California, during the COVID‐19 pandemic. Building on a new anthropological theory of value, the results highlight the slipperiness between surveillance and care,
Naomi C. Schoenfeld
wiley +1 more source
Autofiction as relational mediation: A Ghost in the Throat and To Write as if Already Dead
Abstract Because of its exploration of the self and the resemblance to online styles of publishing, autofiction has been accused by certain scholars of reflecting neoliberal tendencies. Hans Demeyer and Sven Vitse have developed a more nuanced view on the relation between autofiction and neoliberalism.
Stijn De Cauwer
wiley +1 more source

