SOCIENTIZE participatory experiments, dissemination and networking activities in perspective

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Participatory Networking

We present the design, implementation, and evaluation of an API for applications to control a software-defined network (SDN). Our API is implemented by an OpenFlow controller that delegates read and write authority from the network’s administrators to end users, or applications and devices acting on their behalf. Users can then work with the network, rather than around it, to achieve better per...

متن کامل

Fair content dissemination in participatory DTNs

Thanks to advances in the computing capabilities and added functionalities of modern mobile devices, creating and consuming digital media on the move has never been so easy and popular. Most of the DTN routing protocols proposed in the literature to enable content sharing have been exploiting users’ mobility patterns, in order to maximise the delivery probability, while minimising the overall n...

متن کامل

Content dissemination in participatory delay tolerant networks

As experience with the Web 2.0 has demonstrated, users have evolved from being only consumers of digital content to producers. Powerful handheld devices have further pushed this trend, enabling users to consume rich media (for example, through high resolution displays), as well as create it on the go by means of peripherals such as built-in cameras. As a result, there is an enormous amount of u...

متن کامل

Experiments in Mobile Social Networking

In this report we consider a mobile ad hoc network setting where users of Bluetooth enabled devices meet and communicate opportunistically as when random people meet in a cafe, or researchers meet at a conference. Ad hoc opportunistic contacts are built on the basis of pre-defined relationships in online social networks. Our approach distinguishes itself from previous work in the area by three ...

متن کامل

Quantum Networking Experiments

Quantum cryptography involves two parties sharing a secret key that is created using the states of quantum particles such as photons. The communicating parties can then exchange messages by conventional means, in principle with complete security, by encrypting them using the secret key. Any eavesdropper trying to intercept the key automatically reveals their presence by destroying the quantum s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Human Computation

سال: 2014

ISSN: 2330-8001

DOI: 10.15346/hc.v1i2.16