Results 51 to 60 of about 29,121 (270)

An Enhancement of Greedy Perimeter Stateless Routing Protocol in VANET

open access: yesProcedia Computer Science, 2019
Abstract The technological development in the world has increased rapidly and touched various areas, especially communication technology, which evolves with the evolution of wireless technology. This technology has invaded several areas, including the transport sector which has benefited from a new technology allowing the communication between ...
Meriem Houmer, Moulay Lahcen Hasnaoui
openaire   +1 more source

Funding, Facilities, and the Face of Homelessness: Heterogeneous Impacts of Federal Grants on Sheltered and Unsheltered Counts

open access: yesSouthern Economic Journal, EarlyView.
ABSTRACT This paper examines the causal impact of federal homeless‐assistance grants on reported homelessness and shelter capacity across 370 Continuums of Care in 2019. We exploit cross‐sectional variation in pre‐1940 housing shares, used in Community Development Block Grant formula allocations, as an instrument for combined CoC and Emergency ...
Luke Maddock, Anita Alves Pena
wiley   +1 more source

Design and Development of a UDP-Based Connection-Oriented Multi-Stream One-to-Many Communication Protocol

open access: yesJournal of Telecommunications and Information Technology, 2012
A communication protocol is a set of rules defined formally that describes the format of digital messages and the rules for exchanging those messages in or between computing systems.
Valentin Stanciu   +3 more
doaj   +1 more source

Greedy Intersection-Mode Routing Strategy Protocol for Vehicular Networks

open access: yesComplexity, 2020
The advantages of vehicular ad hoc networks (VANETs) have been acknowledged, particularly during the last decade. Furthermore, VANET-related issues have been addressed by different researchers.
Marwan Mahmoud   +1 more
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

Perspectives On Machine Learning Inference Serving in Real‐World Settings

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Introduction As machine learning (ML)‐enabled systems become increasingly prevalent across industries, the engineering challenges of deploying and maintaining them in production have emerged as critical. The existing engineering knowledge base often derives from conceptual frameworks or case studies conducted by large technology companies ...
Dennis Muiruri   +3 more
wiley   +1 more source

Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks [PDF]

open access: yes, 2014
This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities.
Iyengar, S S   +4 more
core   +1 more source

Analysis of greedy perimeter stateless routing protocol network simulation using bird flocking algorithm

open access: yesJURNAL INFOTEL, 2022
The purpose of this study is to simulate the GPSR protocol network on NS3 using the bird flocking algorithm and to analyze the comparison of performance measurements obtained from the simulation results. The Greedy Perimeter Stateless Routing network was simulated using NS-3 in this simulation. The simulation area is created in length, width.
Nindy Ayu Marthaliana   +4 more
openaire   +1 more source

“Bad Things Happen in Philadelphia”: Managing Stigma and Threats in the Wake of False Criminal Accusations

open access: yesSymbolic Interaction, EarlyView.
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley   +1 more source

Accomplishing Ethics‐Work as a Generic Social Process

open access: yesSymbolic Interaction, EarlyView.
Existing systems of university research ethics are often criticized by those in the qualitative research tradition. A common thread is that ethics cannot be fully anticipated before the research begins, as is expected by most institutional review boards.
Deana Simonetto, Antony Puddephatt
wiley   +1 more source

Home - About - Disclaimer - Privacy