Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3141
Method for robust enhancement of P2P network
Published 2019-04-01“…With the widespread use of the Internet,the stability of network communication management architecture and service provision has become increasingly important.A P2P network model based on neighbor-neighbor lists was constructed,and two algorithms(network repairing and pruning) were proposed to improve the reliability and robustness of the network structure.Simulation experiments show that the proposed model and algorithm can effectively improve the self-healing of P2P networks under given threat conditions.…”
Get full text
Article -
3142
A Reconfigurable and Evolvable Platform for Network Function Innovation
Published 2015-12-01“…With the development of the internet, new network architectures and new protocols are emerging. …”
Get full text
Article -
3143
Study and Analysis of VoLTE Service and Its Implementation
Published 2013-02-01“…Voice service is one of the basic services that the mobile internet carrier provides for its users. There are severa1 schemes to carry on the voice service in LTE era. …”
Get full text
Article -
3144
Containerizing solution based on Kubernetes of database and its cluster
Published 2018-12-01“…With the maturity of container technology,more and more internet companies and IT companies have begun to migrate their core business platforms to the container environment.After more than three years of rapid development,Kubernetes has become the industry's preferred container cluster management platform.The containerization scheme of MySQL database and its cluster was given from the perspective of database containerization,based on the analysis of the key technology of database containerization on Kubernetes.Through the evaluation and comparison of performance and reliability of various database models,problems that database containerization technology may encounter and suggestion of database container hosting scheme under different scenarios were proposed.…”
Get full text
Article -
3145
Tomando buenas decisiones: Estrategias de crianza para guiar a los niños pequeños sobre el uso de los medios de comunicación
Published 2011-07-01“…The series is designed to reach both professional educators and parents and to provide research summaries, tips for parents, and internet resources for further information. Spanish versions published by the UF Department of Family Youth and Community Sciences, June 2011. …”
Get full text
Article -
3146
RAP detection method based on AP fingerprint
Published 2018-05-01“…The access point (AP) is an integral part of the infrastructure mode in wireless network.While the attacks caused by rogue AP (RAP) divulge a lot of users' privates in a large extent,such as the user's location information,surfing behavior on the Internet and social relations.A RAP detection algorithm based on AP fingerprint was proposed.The validity of AP was judged by the unforgeability and stability of the parameters of beacon frames.And the feasibility and effectiveness of the proposed method were further verified by scheme comparisons and experimental analysis.…”
Get full text
Article -
3147
Être ou ne pas être subversives ?
Published 2009-07-01“…The preliminary results of an Internet survey conducted among French Canadian young lesbians indicate, notably, that the majority of the 362 respondents see themselves through the apparatus of sex and sexual difference rather than through the expected de/constructivist perspective, associated with the Postmodern era. …”
Get full text
Article -
3148
Tomando buenas decisiones: Medios de comunicación y salud física de los niños pequeños, consejos para los padres
Published 2011-07-01“…The series is designed to reach both professional educators and parents and to provide research summaries, tips for parents, and internet resources for further information. Spanish versions published by the UF Department of Family Youth and Community Sciences, June 2011. …”
Get full text
Article -
3149
Personalized recommendation helps carrier’s digital marketing
Published 2018-01-01“…The challenge and demands of telecom operator’ digital marketing were briefly analyzed,the advantages of internet thought were also drawled and then the personalized recommendations were proposed to help telecom operator’s digital marketing,and the history of carrier’s personalized recommendation was introduced.Then the principle and implementation process of telecom operator’s personalized recommendation which bases on carrier merchandise,user behavior data and the computing ability of big data platform was described.Finally,the implementation scenario of personalized recommendation in telecom operator digital content business was described,and the value and future of personalized recommendation have prospected.…”
Get full text
Article -
3150
Optical communication technologies for datacenters
Published 2016-05-01“…Due to the fast growth of internet services,datacenter related traffic has become the major part of the global network traffic.As a main technology for high-speed data transmission,optical communication technologies have been widely used in today's datacenter networks,from a few meter server-to-server interconnects to transoceanic datacenter-to-datacenter optical networks.Here the optical communication technologies for datacenters were reviewed,including technologies connecting datacenters in wider-area networks and metro-area networks as well as optical interconnect technologies within datacenters,and the advantages and disadvantages of some technologies in the networks were discussed.…”
Get full text
Article -
3151
TICs et la géographie : vers une « géographie 2.0 » ?
Published 2007-12-01“…Today, after ICTs, a new Internet takes shape, the Web 2.0 which corresponds to a new approach of data processing and diffusion of the knowledge. …”
Get full text
Article -
3152
Local communities on-line: mapping local Web-TVs in Italy
Published 2010-12-01“…This essay will map the distribution of these locally-originated web TVs in Italy investigating their ways of strengthening communication within the community and at the wider level of the global Internet network.…”
Get full text
Article -
3153
Un « Deep / dark web » ? Les métaphores de la profondeur et de l’ombre sur le réseau Tor
Published 2018-12-01“…Tor (The Onion Router) is a subnetwork of the Internet which makes it possible for mere users and contents providers to conceal their identity on special websites called location-hidden services. …”
Get full text
Article -
3154
Technology of the information and communication in public and private schools in Arequipa
Published 2015-01-01“…The most frequent ICTs were the computer, television, DVD player, radio and internet.…”
Get full text
Article -
3155
Les retours d’une exploration méthodologique croisant données Twitter, recrutement via Facebook et questionnaires web
Published 2017-12-01“…The presence of some groups of population on the Internet and the important activity they generate suggest that social scientists think about the methodological perspectives to capture such information. …”
Get full text
Article -
3156
Operation Management Mode Based on New Media Technology
Published 2015-07-01“…For tremendous impact has brought by the rapid development of the new media(such as Weibo,We-chat,micro video,e.g.)and the mobile internet,the difficulties the operators faced in the new media field and the way to deal with the challenges were analyzed.The methods and procedures for the new media analysis technique were proposed.The application of the new media technology in the marketing support analysis in several cases was elaborated.The function implementation of operational management and complaint management from the perspective of operational management were introduced,and then the system construction scheme and implementation effect for the new media operation and management system development were presented.…”
Get full text
Article -
3157
Seed Sources for Florida Homegrown Vegetables
Published 2013-11-01“…Although a huge selection of seeds and transplants are available through garden centers, seed catalogs, and the internet, choosing what to buy can be confusing. Some of the best varieties for Florida gardens and seed suppliers that currently sell them are listed in this 6-page fact sheet written by Ed Thralls, Sydney Park Brown, and Ed Paulson, and published by the UF Department of Environmental Horticulture, November 2013. …”
Get full text
Article -
3158
Editorial
Published 2023-12-01“…The journal was founded at a time a significant change in the information world, with the Internet and the World Wide Web being in the early stage of development, with the iPhone, the iPad, and social media yet to be invented. …”
Get full text
Article -
3159
Tomando buenas decisiones: La televisión y el aprendizaje de los niños pequeños, consejos para los padres
Published 2011-07-01“…The series is designed to reach both professional educators and parents and to provide research summaries, tips for parents, and internet resources for further information. Spanish versions published by the UF Department of Family Youth and Community Sciences, June 2011. …”
Get full text
Article -
3160
Research on Security Connotation and Response Strategies for Big Data
Published 2014-02-01“…Big data is easy to understand which has many potential application requirements and foreseeable enormous economic benefits.With the development of mobile internet,cloud computing and M2M,big data become a new focus in the information technology field.But,it brings some challenges and problems,such as data security and privacy protection.The security requirements of big data in various fields were reviewed,and the security features and problems in big data environment were analyzed.Then the security connotation of big data was summarized and some response strategies were proposed.…”
Get full text
Article