2 resultados para Cooperation networks
em Digital Commons - Michigan Tech
Resumo:
In the Iron Range Strike of 1916, working-class wives picketed alongside their husbands in a conflict-ridden and dangerous setting. Mine deputies abused immigrant women on the picket lines and in their homes, with several disquieting reports receiving statewide attention in Minnesota. Many middle-class reformers in the Twin Cities grew sympathetic to the plight of northern mining families and became controversially involved the labor struggle. Some middleclass women worked alongside working-class wives and radical organizers from the Industrial Workers of the World (IWW). At the center of this gendered analysis is the cross-class cooperation between an upper-middle class woman, Lenora Austin Hamlin, a radical reformer, Elizabeth Gurley Flynn, and the story of a working-class housewife, Mikla Masonovich. This study will ask how authentic, prevalent, and unproblematic their stories of cross-class cohesive action actually were. In answering this, it will address and identify those factors that impeded women’s potential for unity. “Flash in the Pan” argues that as a result of both real and perceived differences, these networks of women remained isolated, inhibiting each from gaining sufficient power to work cohesively, and marginalizing their influence. Drawing upon a variety of sources, including media representations in newspapers, and archives of social, labor and women’s organizations, this regional study lends state-level insight into the larger gender-labor historiography.
Resumo:
With wireless vehicular communications, Vehicular Ad Hoc Networks (VANETs) enable numerous applications to enhance traffic safety, traffic efficiency, and driving experience. However, VANETs also impose severe security and privacy challenges which need to be thoroughly investigated. In this dissertation, we enhance the security, privacy, and applications of VANETs, by 1) designing application-driven security and privacy solutions for VANETs, and 2) designing appealing VANET applications with proper security and privacy assurance. First, the security and privacy challenges of VANETs with most application significance are identified and thoroughly investigated. With both theoretical novelty and realistic considerations, these security and privacy schemes are especially appealing to VANETs. Specifically, multi-hop communications in VANETs suffer from packet dropping, packet tampering, and communication failures which have not been satisfyingly tackled in literature. Thus, a lightweight reliable and faithful data packet relaying framework (LEAPER) is proposed to ensure reliable and trustworthy multi-hop communications by enhancing the cooperation of neighboring nodes. Message verification, including both content and signature verification, generally is computation-extensive and incurs severe scalability issues to each node. The resource-aware message verification (RAMV) scheme is proposed to ensure resource-aware, secure, and application-friendly message verification in VANETs. On the other hand, to make VANETs acceptable to the privacy-sensitive users, the identity and location privacy of each node should be properly protected. To this end, a joint privacy and reputation assurance (JPRA) scheme is proposed to synergistically support privacy protection and reputation management by reconciling their inherent conflicting requirements. Besides, the privacy implications of short-time certificates are thoroughly investigated in a short-time certificates-based privacy protection (STCP2) scheme, to make privacy protection in VANETs feasible with short-time certificates. Secondly, three novel solutions, namely VANET-based ambient ad dissemination (VAAD), general-purpose automatic survey (GPAS), and VehicleView, are proposed to support the appealing value-added applications based on VANETs. These solutions all follow practical application models, and an incentive-centered architecture is proposed for each solution to balance the conflicting requirements of the involved entities. Besides, the critical security and privacy challenges of these applications are investigated and addressed with novel solutions. Thus, with proper security and privacy assurance, these solutions show great application significance and economic potentials to VANETs. Thus, by enhancing the security, privacy, and applications of VANETs, this dissertation fills the gap between the existing theoretic research and the realistic implementation of VANETs, facilitating the realistic deployment of VANETs.