978 resultados para Internet. Network neutrality. Network neutrality mandates.


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Austria and Finland are persistently referred to as the “success stories” of post-1945 European history. Notwithstanding their different points of departure, in the course of the Cold War both countries portrayed themselves as small and neutral border-states in the world dictated by superpower politics. By the 1970s, both countries frequently ranked at the top end in various international classifications regarding economic development and well-being in society. This trend continues today. The study takes under scrutiny the concept of consensus which figures centrally in the two national narratives of post-1945 success. Given that the two domestic contexts as such only share few direct links with one another and are more obviously different than similar in terms of their geographical location, historical experiences and politico-cultural traditions, the analogies and variations in the anatomies of the post-1945 “cultures of consensus” provide an interesting topic for a historical comparative and cross-national examination. The main research question concerns the identification and analysis of the conceptual and procedural convergence points of the concepts of the state and consensus. The thesis is divided into six main chapters. After the introduction, the second chapter presents the theoretical framework in more detail by focusing on the key concepts of the study – the state and consensus. Chapter two also introduces the comparative historical and cross-national research angles. Chapter three grounds the key concepts of the state and consensus in the historical contexts of Austria and Finland by discussing the state, the nation and democracy in a longer term comparative perspective. The fourth and fifth chapter present case studies on the two policy fields, the “pillars”, upon which the post-1945 Austrian and Finnish cultures of consensus are argued to have rested. Chapter four deals with neo-corporatist features in the economic policy making and chapter five discusses the building up of domestic consensus regarding the key concepts of neutrality policies in the 1950s and 1960s. The study concludes that it was not consensus as such but the strikingly intense preoccupation with the theme of domestic consensus that cross-cut, in a curiously analogous manner, the policy-making processes studied. The main challenge for the post-1945 architects of Austrian and Finnish cultures of consensus was to find strategies and concepts for consensus-building which would be compatible with the principles of democracy. Discussed at the level of procedures, the most important finding of the study concerns the triangular mechanism of coordination, consultation and cooperation that set into motion and facilitated a new type of search for consensus in both post-war societies. In this triangle, the agency of the state was central, though in varying ways. The new conceptions concerning a small state’s position in the Cold War world also prompted cross-nationally perceivable willingness to reconsider inherited concepts and procedures of the state and the nation. At the same time, the ways of understanding the role of the state and its relation to society remained profoundly different in Austria and Finland and this basic difference was in many ways reflected in the concepts and procedures deployed in the search for consensus and management of domestic conflicts. For more detailed information, please consult the author.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper, we study duty cycling and power management in a network of energy harvesting sensor (EHS) nodes. We consider a one-hop network, where K EHS nodes send data to a destination over a wireless fading channel. The goal is to find the optimum duty cycling and power scheduling across the nodes that maximizes the average sum data rate, subject to energy neutrality at each node. We adopt a two-stage approach to simplify the problem. In the inner stage, we solve the problem of optimal duty cycling of the nodes, subject to the short-term power constraint set by the outer stage. The outer stage sets the short-term power constraints on the inner stage to maximize the long-term expected sum data rate, subject to long-term energy neutrality at each node. Albeit suboptimal, our solutions turn out to have a surprisingly simple form: the duty cycle allotted to each node by the inner stage is simply the fractional allotted power of that node relative to the total allotted power. The sum power allotted is a clipped version of the sum harvested power across all the nodes. The average sum throughput thus ultimately depends only on the sum harvested power and its statistics. We illustrate the performance improvement offered by the proposed solution compared to other naive schemes via Monte-Carlo simulations.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Internet streaming applications are adversely affected by network conditions such as high packet loss rates and long delays. This paper aims at mitigating such effects by leveraging the availability of client-side caching proxies. We present a novel caching architecture (and associated cache management algorithms) that turn edge caches into accelerators of streaming media delivery. A salient feature of our caching algorithms is that they allow partial caching of streaming media objects and joint delivery of content from caches and origin servers. The caching algorithms we propose are both network-aware and stream-aware; they take into account the popularity of streaming media objects, their bit-rate requirements, and the available bandwidth between clients and servers. Using realistic models of Internet bandwidth (derived from proxy cache logs and measured over real Internet paths), we have conducted extensive simulations to evaluate the performance of various cache management alternatives. Our experiments demonstrate that network-aware caching algorithms can significantly reduce service delay and improve overall stream quality. Also, our experiments show that partial caching is particularly effective when bandwidth variability is not very high.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The myriad of technologies and protocols working at different layers pose significant security challenges in the upcoming Internet of Things (IoT) paradigm. Security features and needs vary from application to application and it is layer specific. In addition, security has to consider the constraints imposed by energy limited sensor nodes and consider the specific target application in order to provide security at different layers. This paper analyses current standardization efforts and protocols. It proposes a generic secured network topology for IoT and describes the relevant security challenges. Some exploitation examples are also provided.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2014

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Literatures have shown that Internet gaming disorder (IGD) subjects show impaired executive control and enhanced reward sensitivities than healthy controls. However, how these two networks jointly affect the valuation process and drive IGD subjects' online-game-seeking behaviors remains unknown. Thirty-five IGD and 36 healthy controls underwent a resting-states scan in the MRI scanner. Functional connectivity (FC) was examined within control and reward network seeds regions, respectively. Nucleus accumbens (NAcc) was selected as the node to find the interactions between these two networks. IGD subjects show decreased FC in the executive control network and increased FC in the reward network when comparing with the healthy controls. When examining the correlations between the NAcc and the executive control/reward networks, the link between the NAcc - executive control network is negatively related with the link between NAcc - reward network. The changes (decrease/increase) in IGD subjects' brain synchrony in control/reward networks suggest the inefficient/overly processing within neural circuitry underlying these processes. The inverse proportion between control network and reward network in IGD suggest that impairments in executive control lead to inefficient inhibition of enhanced cravings to excessive online game playing. This might shed light on the mechanistic understanding of IGD.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The new digital technologies have led to widespread use of cloud computing, recognition of the potential of big data analytics, and significant progress in aspects of the Internet of Things, such as home automation, smart cities and grids and digital manufacturing. In addition to closing gaps in respect of the basic necessities of access and usage, now the conditions must be established for using the new platforms and finding ways to participate actively in the creation of content and even new applications and platforms. This message runs through the three chapters of this book. Chapter I presents the main features of the digital revolution, emphasizing that today’s world economy is a digital economy. Chapter II examines the region’s strengths and weaknesses with respect to digital access and consumption. Chapter III reviews the main policy debates and urges countries to take a more proactive approach towards, for example, regulation, network neutrality and combating cybercrime. The conclusion highlights two crucial elements: first, the need to take steps towards a single regional digital market that can compete in a world of global platforms by tapping the benefits of economies of scale and developing network economies; and second, the significance of the next stage of the digital agenda for Latin America and the Caribbean (eLAC2018), which will embody the latest updates to a cooperation strategy that has been in place for over a decade.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Present world's realities, so deeply interconnected technified and hypercomplex, can only be understood by means of an interdisciplinary and systemic approach.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the overall negotiations on the Transatlantic Trade and Investment Partnership (TTIP), the digital chapter appears to be growing in importance. This is due to several factors, including the recent Datagate scandal that undermined trust between the negotiating parties and led to calls to suspend the US-EU Safe Harbour agreement as well as the furious debate currently ongoing in both legal systems on key issues such as policies to encourage broadband infrastructure deployment, network neutrality policies and the application of competition policy in cyberspace. This paper explores the current divergences between the two legal systems on these key issues and discusses possible scenarios for the ultimate agreement to be reached in the TTIP: from a basic, minimal agreement (which would essentially include e-labelling and e-accessibility measures) to more ambitious scenarios on network neutrality, competition rules, privacy and interoperability measures.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O estudo aponta como a internet ampliou as possibilidades de comunicação dos cidadãos de uma forma que não era possível no período do controle e concentração dos meios broadcasting sobre a informação social, assim, oferecendo espaço para a livre circulação de informação e novas possibilidades de comunicação. Entretanto, ressalta que ainda há assimetrias tanto do ponto de vista do acesso quanto do uso da rede em todas as suas potencialidades. Verifica que o atual momento ainda é de disputas em relação à legislação que diz respeito aos direitos e deveres dos que utilizam a rede. O trabalho foi realizado por meio de pesquisa bibliográfica e documental, tendo com base autores que pesquisam sobre as áreas da Comunicação, Tecnologias Digitais, Direito à Informação Social Livre e Legislação de internet, como Cicília Peruzzo, Manuel Castells, Rousiley Maia, Sérgio Amadeu da Silveira, Tim Wu, Tim Berners-Lee, Walter Lima Junior, Wilson Gomes e Yochai Benkler. O resultado da pesquisa demonstra que no cenário brasileiro, as desigualdades socioeconômicas são fator de desigualdade tanto em relação ao acesso quanto aos usos da internet, sendo dificultador para quem desejar se apropriar com liberdade deste desenvolvimento tecnológico. Portanto, cabe ao setor público interferir com vistas à diminuição das assimetrias informativas para garantir o direito de comunicação dos brasileiros no espaço de comunicação digital conectada.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Background: Parkinson’s disease (PD) is an incurable neurological disease with approximately 0.3% prevalence. The hallmark symptom is gradual movement deterioration. Current scientific consensus about disease progression holds that symptoms will worsen smoothly over time unless treated. Accurate information about symptom dynamics is of critical importance to patients, caregivers, and the scientific community for the design of new treatments, clinical decision making, and individual disease management. Long-term studies characterize the typical time course of the disease as an early linear progression gradually reaching a plateau in later stages. However, symptom dynamics over durations of days to weeks remains unquantified. Currently, there is a scarcity of objective clinical information about symptom dynamics at intervals shorter than 3 months stretching over several years, but Internet-based patient self-report platforms may change this. Objective: To assess the clinical value of online self-reported PD symptom data recorded by users of the health-focused Internet social research platform PatientsLikeMe (PLM), in which patients quantify their symptoms on a regular basis on a subset of the Unified Parkinson’s Disease Ratings Scale (UPDRS). By analyzing this data, we aim for a scientific window on the nature of symptom dynamics for assessment intervals shorter than 3 months over durations of several years. Methods: Online self-reported data was validated against the gold standard Parkinson’s Disease Data and Organizing Center (PD-DOC) database, containing clinical symptom data at intervals greater than 3 months. The data were compared visually using quantile-quantile plots, and numerically using the Kolmogorov-Smirnov test. By using a simple piecewise linear trend estimation algorithm, the PLM data was smoothed to separate random fluctuations from continuous symptom dynamics. Subtracting the trends from the original data revealed random fluctuations in symptom severity. The average magnitude of fluctuations versus time since diagnosis was modeled by using a gamma generalized linear model. Results: Distributions of ages at diagnosis and UPDRS in the PLM and PD-DOC databases were broadly consistent. The PLM patients were systematically younger than the PD-DOC patients and showed increased symptom severity in the PD off state. The average fluctuation in symptoms (UPDRS Parts I and II) was 2.6 points at the time of diagnosis, rising to 5.9 points 16 years after diagnosis. This fluctuation exceeds the estimated minimal and moderate clinically important differences, respectively. Not all patients conformed to the current clinical picture of gradual, smooth changes: many patients had regimes where symptom severity varied in an unpredictable manner, or underwent large rapid changes in an otherwise more stable progression. Conclusions: This information about short-term PD symptom dynamics contributes new scientific understanding about the disease progression, currently very costly to obtain without self-administered Internet-based reporting. This understanding should have implications for the optimization of clinical trials into new treatments and for the choice of treatment decision timescales.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

The capacity of the internet to handle micro-transactions and to cater to niche markets is a boon for some areas of the creative industries, which have always been associated with smallscale micro business activities. This paper looks at the specific case of the specialist Social Networking Site Ravelry: a site for knitters, crocheters, spinners and dyers. It traces the interactions between amateurs and professionals through the emergence of social networking sites. An analytic framework of social network markets (see Potts, Cunningham, Hartley and Omerod, 2008) is employed to allow for the inclusion of amateur, social, semi-professional,professional and institutional actors within a networked sphere of activity, rather than excluding some of these actors as outside of recognised value-production. The reliance on social networks to determine the economic success of design, production and consumption is exemplified in this small scale example. This paper eschews the dichotomy of commercial and non-commercial by bringing to the fore the hybridity of this site where financial and social economies co-exist.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.