SOCIENTIZE participatory experiments, dissemination and networking activities in perspective
نویسندگان
چکیده
منابع مشابه
Participatory Networking
We present the design, implementation, and evaluation of an API for applications to control a software-defined network (SDN). Our API is implemented by an OpenFlow controller that delegates read and write authority from the network’s administrators to end users, or applications and devices acting on their behalf. Users can then work with the network, rather than around it, to achieve better per...
متن کاملFair content dissemination in participatory DTNs
Thanks to advances in the computing capabilities and added functionalities of modern mobile devices, creating and consuming digital media on the move has never been so easy and popular. Most of the DTN routing protocols proposed in the literature to enable content sharing have been exploiting users’ mobility patterns, in order to maximise the delivery probability, while minimising the overall n...
متن کاملContent dissemination in participatory delay tolerant networks
As experience with the Web 2.0 has demonstrated, users have evolved from being only consumers of digital content to producers. Powerful handheld devices have further pushed this trend, enabling users to consume rich media (for example, through high resolution displays), as well as create it on the go by means of peripherals such as built-in cameras. As a result, there is an enormous amount of u...
متن کاملExperiments in Mobile Social Networking
In this report we consider a mobile ad hoc network setting where users of Bluetooth enabled devices meet and communicate opportunistically as when random people meet in a cafe, or researchers meet at a conference. Ad hoc opportunistic contacts are built on the basis of pre-defined relationships in online social networks. Our approach distinguishes itself from previous work in the area by three ...
متن کاملQuantum Networking Experiments
Quantum cryptography involves two parties sharing a secret key that is created using the states of quantum particles such as photons. The communicating parties can then exchange messages by conventional means, in principle with complete security, by encrypting them using the secret key. Any eavesdropper trying to intercept the key automatically reveals their presence by destroying the quantum s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Human Computation
سال: 2014
ISSN: 2330-8001
DOI: 10.15346/hc.v1i2.16