3 resultados para pacs: computer networks and intercomputer communications in office automation

em WestminsterResearch - UK


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The task of this work is to apply thoughts from Georg Lukács’ final book, the Ontology of Social Being, for the theoretical analysis of cultural and digital labour. It discusses Lukács’ concepts of work and communication and relates them to the analysis of cultural and digital work. It also analyses his conception of the relation of labour and ideology and points out how we can make use of it for critically understanding social media ideologies. Lukács opposes the dualist separation of the realms of work and ideas. He introduces in this context the notion of teleological positing that allows us to better understand cultural and digital labour as well as associated ideologies, such as the engaging/connecting/sharing-ideology, today. The analysis shows that Lukács’ Ontology is in the age of Facebook, YouTube, and Twitter still a very relevant book, although it has thus far not received the attention that it deserves. This article also introduces the Ontology’s main ideas on work and culture, which is important because large parts of the book have not been translated from the German original into English. Lukács’ notion of teleological positing is crucial for understanding the common features of the economy and culture.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly.