Journal articles on the topic 'Ad-hoc Collaboration'

To see the other types of publications on this topic, follow the link: Ad-hoc Collaboration.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ad-hoc Collaboration.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bendkowski, Jacek. "How to manage ad-hoc collaboration networks." Scientific Papers of Silesian University of Technology. Organization and Management Series 2017, no. 108 (2017): 23–34. http://dx.doi.org/10.29119/1641-3466.2017.108.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Broberg, Jacob Honoré, Søren Thorhauge Hede, Simon Bjerg Mikkelsen, Jesper Ellgaard Pedersen, Christian Bräuner Sørensen, Per Printz Madsen, and Ole Elenius Meilvang Borch. "Collaboration Layer for Robots in Mobile Ad-hoc Networks." IFAC Proceedings Volumes 42, no. 22 (2009): 103–10. http://dx.doi.org/10.3182/20091006-3-us-4006.00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Crowcroft, Jon, Richard Gibbens, Frank Kelly, and Sven Östring. "Modelling incentives for collaboration in mobile ad hoc networks." Performance Evaluation 57, no. 4 (August 2004): 427–39. http://dx.doi.org/10.1016/j.peva.2004.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pan, Jianping, Lin Cai, Xuemin (Sherman) Shen, and Jon W. Mark. "Identity-based secure collaboration in wireless ad hoc networks." Computer Networks 51, no. 3 (February 2007): 853–65. http://dx.doi.org/10.1016/j.comnet.2006.05.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ahn, Gail-Joon, Jing Jin, and Mohamed Shehab. "Policy-driven role-based access management for ad-hoc collaboration." Journal of Computer Security 20, no. 2-3 (June 12, 2012): 223–57. http://dx.doi.org/10.3233/jcs-2012-0446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Perlman, Bruce J., and J. Edwin Benton. "Devolutionary Realignment: Shedding Services, Ad Hoc Collaboration, and Political Reconfiguration." State and Local Government Review 46, no. 3 (September 2014): 205–10. http://dx.doi.org/10.1177/0160323x14553474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jacob, Jeevan, and Koshy Varghese. "A framework for ad hoc information management for the building design process." Engineering, Construction and Architectural Management 25, no. 8 (September 17, 2018): 1034–52. http://dx.doi.org/10.1108/ecam-06-2017-0097.

Full text
Abstract:
Purpose The building design processes today are complex, involving many disciplines and issues like collaboration, concurrency and collocation. Several studies have focused on understanding and modeling formal information exchange in these processes. Few past studies have also identified the importance of informal information exchanges in the design process and proposed passive solutions for facilitating this exchange. The purpose of this paper is to term the informal information as ad hoc information and explores if components of ad hoc information exchanges can be actively managed. Design/methodology/approach An MDM-based framework integrating product, process and people dependencies is proposed and a prototype platform to implement this framework is developed. The demonstration on the usage of this platform to identify information paths during collaboration and hence manage ad hoc information exchanges is presented through an example problem. Findings Based on the effectiveness of the prototype platform in identifying information paths for design queries, it is concluded that the proposed framework is useful for actively managing some components of ad hoc information exchange. Originality/value This research enables the design manager/participants to make a more informed decision on requesting and releasing design information.
APA, Harvard, Vancouver, ISO, and other styles
8

St Juste, Pierre, Kyuho Jeong, Heungsik Eom, Corey Baker, and Renato Figueiredo. "TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration." EAI Endorsed Transactions on Collaborative Computing 1, no. 2 (October 15, 2014): e4. http://dx.doi.org/10.4108/cc.1.2.e4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khawaja, Imran Abbas, Adnan Abid, Muhammad Shoaib Farooq, Adnan Shahzada, Uzma Farooq, and Kamran Abid. "Ad-Hoc Collaboration Space for Distributed Cross Device Mobile Application Development." IEEE Access 8 (2020): 62800–62814. http://dx.doi.org/10.1109/access.2020.2980319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raniwala, Ashish, Gefan Zhang, Ashwini Sridhar, Jian P. Zheng, and Tzi‐cker Chiueh. "WShare: an instant secure collaboration workspace over ad hoc wireless LAN." International Journal of Pervasive Computing and Communications 5, no. 4 (November 20, 2009): 428–47. http://dx.doi.org/10.1108/17427370911008839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jumadinova, Janyl, Prithviraj Dasgupta, and Leen-Kiat Soh. "Strategic Capability-Learning for Improved Multiagent Collaboration in Ad Hoc Environments." IEEE Transactions on Systems, Man, and Cybernetics: Systems 44, no. 8 (August 2014): 1003–14. http://dx.doi.org/10.1109/tsmc.2013.2285527.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Okataku, Yasukuni, Nobukazu Yoshioka, and Shinichi Honiden. "An authentication architecture for collaboration among agents in ad hoc networks." Electronics and Communications in Japan (Part I: Communications) 87, no. 5 (2004): 11–19. http://dx.doi.org/10.1002/ecja.10165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Stone, Peter, Gal A. Kaminka, Sarit Kraus, Jeffrey S. Rosenschein, and Noa Agmon. "Teaching and leading an ad hoc teammate: Collaboration without pre-coordination." Artificial Intelligence 203 (October 2013): 35–65. http://dx.doi.org/10.1016/j.artint.2013.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hegde, Seema B., B. Satish Babu, and Pallapa Venkataram. "A Cognitive Theory-based Opportunistic Resource-Pooling Scheme for Ad hoc Networks." Journal of Intelligent Systems 26, no. 1 (January 1, 2017): 47–68. http://dx.doi.org/10.1515/jisys-2015-0050.

Full text
Abstract:
AbstractResource pooling in ad hoc networks deals with accumulating computing and network resources to implement network control schemes such as routing, congestion, traffic management, and so on. Pooling of resources can be accomplished using the distributed and dynamic nature of ad hoc networks to achieve collaboration between the devices. Ad hoc networks need a resource-pooling technique that offers quick response, adaptability, and reliability. In this context, we are proposing an opportunistic resource-pooling scheme that uses a cognitive computing model to accumulate the resources with faster resource convergence rate, reliability, and lower latency. The proposed scheme is implemented using the behaviors-observations-beliefs cognitive model, in which the resource-pooling decisions are made based on accumulated knowledge over various behaviors exhibited by nodes in ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Ludwig, Thomas, Oliver Stickel, Peter Tolmie, and Malte Sellmer. "shARe-IT: Ad hoc Remote Troubleshooting through Augmented Reality." Computer Supported Cooperative Work (CSCW) 30, no. 1 (February 2021): 119–67. http://dx.doi.org/10.1007/s10606-021-09393-5.

Full text
Abstract:
Abstract10 years ago, Castellani et al. (Journal of Computer Supported Cooperative Work, vol. 18, no. 2–3, 2009, pp. 199–227, 2009) showed that using just an audio channel for remote troubleshooting can lead to a range of problems and already envisioned a future in which augmented reality (AR) could solve many of these issues. In the meantime, AR technologies have found their way into our everyday lives and using such technologies to support remote collaboration has been widely studied within the fields of Human-Computer Interaction and Computer-Supported Cooperative Work. In this paper, we contribute to this body of research by reporting on an extensive empirical study within a Fab Lab of troubleshooting and expertise sharing and the potential relevance of articulation work to their realization. Based on the findings of this study, we derived design challenges that led to an AR-based concept, implemented as a HoloLens application, called shARe-it. This application is designed to support remote troubleshooting and expertise sharing through different communication channels and AR-based interaction modalities. Early testing of the application revealed that novel interaction modalities such as AR-based markers and drawings play only a minor role in remote collaboration due to various limiting factors. Instead, the transmission of a shared view and especially arriving at a shared understanding of the situation as a prerequisite for articulation work continue to be the decisive factors in remote troubleshooting.
APA, Harvard, Vancouver, ISO, and other styles
16

Dustdar, Schahram. "Caramba—A Process-Aware Collaboration System Supporting Ad hoc and Collaborative Processes in Virtual Teams." Distributed and Parallel Databases 15, no. 1 (January 2004): 45–66. http://dx.doi.org/10.1023/b:dapd.0000009431.20250.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Subramani, A., A. Krishnan, and A. Muthusamy. "Trust Enhanced Secure Mobile Ad-hoc Network with Neighbor Collaboration Routing (SMNCR)." i-manager's Journal on Software Engineering 6, no. 1 (September 15, 2011): 45–52. http://dx.doi.org/10.26634/jse.6.1.1538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Spinuzzi, Clay. "How Nonemployer Firms Stage-Manage Ad Hoc Collaboration: An Activity Theory Analysis." Technical Communication Quarterly 23, no. 2 (March 4, 2014): 88–114. http://dx.doi.org/10.1080/10572252.2013.797334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cherry, Sébastien, and Pierre N. Robillard. "The social side of software engineering—A real ad hoc collaboration network." International Journal of Human-Computer Studies 66, no. 7 (July 2008): 495–505. http://dx.doi.org/10.1016/j.ijhcs.2008.01.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Maamar, Zakaria, Qusay H. Mahmoud, and Abdelouahid Derhab. "Enabling ad-hoc collaboration between mobile users in the $\mathcal{MESSENGER}$ project." Cluster Computing 10, no. 1 (March 15, 2007): 67–79. http://dx.doi.org/10.1007/s10586-007-0009-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Amjad, Muhammad Faisal, Baber Aslam, Afraa Attiah, and Cliff C. Zou. "Towards trustworthy collaboration in spectrum sensing for ad hoc cognitive radio networks." Wireless Networks 22, no. 3 (June 30, 2015): 781–97. http://dx.doi.org/10.1007/s11276-015-1004-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Xiaojie, and Ulrich Speidel. "RAODV Routing Protocol for Congestion Detection and Relief in Ad Hoc Wireless Networks." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 4 (October 2021): 21–34. http://dx.doi.org/10.4018/ijitn.2021100103.

Full text
Abstract:
Ad hoc wireless networks depend on mutual collaboration among nodes. Congestion in ad hoc wireless networks thus presents more of a challenge than for other network types. This article proposes RAODV (relieving AODV), a modification of the AODV routing protocol, to handle congestion via third party neighbour nodes in dense and static ad hoc networks. RAODV nodes use a T-entropy threshold-based congestion detection algorithm to determine the congestion status of their neighbours. If RAODV determines that congestion is occurring, it then tries to relieve congestion via a local repair modification algorithm that replaces the congested node by a suitable monitoring/third party neighbour node. This article also shows evidence that RAODV results in better network performance than AODV in simulations with random network topologies.
APA, Harvard, Vancouver, ISO, and other styles
23

MESSEGUER, ROC, ESUNLY MEDINA, SERGIO F. OCHOA, JOSÉ A. PINO, ANDRES NEYEM, LEANDRO NAVARRO, and DOLORS ROYO. "COMMUNICATION SUPPORT FOR MOBILE COLLABORATIVE WORK: AN EXPERIMENTAL STUDY." International Journal of Information Technology & Decision Making 11, no. 06 (November 2012): 1035–63. http://dx.doi.org/10.1142/s0219622012400147.

Full text
Abstract:
Advances in mobile computing and wireless communication are easing the evolution from traditional nomadic work to computer-mediated mobile collaborative work. Technology allows efficient and effective interaction among mobile users and also provides access to shared resources available to them. However, the features and capabilities of the communication infrastructure supporting these activities influence the type of coordination and collaboration employed by mobile collaborative applications in real work scenarios. Developers of these applications are typically unaware of the constraints the communication infrastructure imposes on mobile collaborative systems, because they are not easy to foresee. That leads to a high probability of communication problems in otherwise fully functional mobile collaborative support applications. This paper presents an experimental study with real devices and networks on a realistic physical environment that shows how ad hoc networks can effectively support mobile collaborative work and the practical limitations. The paper analyzes several networking issues and determines how they influence mobile collaborative work in various interaction scenarios. The paper also presents the lessons learned in the study and provides recommendations to deal with some networking issues related to real-world ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
24

Brown, Antony, Paul Sant, Nik Bessis, Tim French, and Carsten Maple. "Modelling Self-Led Trust Value Management in Grid and Service Oriented Infrastructures." International Journal of Systems and Service-Oriented Engineering 1, no. 4 (October 2010): 1–18. http://dx.doi.org/10.4018/jssoe.2010100101.

Full text
Abstract:
Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.
APA, Harvard, Vancouver, ISO, and other styles
25

Jiang, Ning, Kien A. Hua, and Danzhou Liu. "A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks." Journal of Communications and Networks 9, no. 1 (March 2007): 56–66. http://dx.doi.org/10.1109/jcn.2007.6182814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Peña-Mora, Feniosky, Albert Y. Chen, Zeeshan Aziz, Lucio Soibelman, Liang Y. Liu, Khaled El-Rayes, Carlos A. Arboleda, et al. "Mobile Ad Hoc Network-Enabled Collaboration Framework Supporting Civil Engineering Emergency Response Operations." Journal of Computing in Civil Engineering 24, no. 3 (May 2010): 302–12. http://dx.doi.org/10.1061/(asce)cp.1943-5487.0000033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Chuang, Ming-Chin. "Cooperation-Assisted Spectrum Handover Mechanism in Vehicular Ad Hoc Networks." Electronics 10, no. 6 (March 21, 2021): 742. http://dx.doi.org/10.3390/electronics10060742.

Full text
Abstract:
This paper proposes a cooperation-assisted spectrum handover (CASH) scheme in vehicular ad hoc networks (VANETs). In CASH, each vehicle uses cognitive radio technology to collect the surrounding spectrum information, computes the stability of the spectrum, exchanges neighbor information by vehicle-to-vehicle collaboration technology, and then executes a partial prescan mechanism to reduce the handover delay. The proposed method can improve the spectrum utilization, shorten the delay time of the spectrum handover, and reduce the total number of handovers. Finally, the simulation results show that the proposed method outperforms other existing schemes. In spectrum utilization, CASH is about 20% better than that of the traditional full scan method. In average scan time, the time of CASH is about 5 times less than the time of the traditional full scan method. In total number of handovers, CASH improves the performance of the full scan scheme by 33%.
APA, Harvard, Vancouver, ISO, and other styles
28

Sakr, M., A. Masiero, and N. El-Sheimy. "EVALUATION OF DYNAMIC AD-HOC UWB INDOOR POSITIONING SYSTEM." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-1 (September 26, 2018): 379–85. http://dx.doi.org/10.5194/isprs-archives-xlii-1-379-2018.

Full text
Abstract:
<p><strong>Abstract.</strong> Ultra-wideband (UWB) technology has witnessed tremendous development and advancement in the past few years. Currently available UWB transceivers can provide high-precision time-of-flight measurements which corresponds to range measurements with theoretical accuracy of few centimetres. Position estimation using range measurement is determined by measuring the ranges from a rover or a dynamic node, to a set of anchor points with known positions. However, building a flexible and accurate indoor positioning system requires more than just accurate range measurements. The performance of indoor positioning system is affected by the number and the configuration of the anchor points used, along with the accuracy of the anchor positions.</p><p>This paper introduces LocSpeck, a dynamic ad-hoc positioning system based on the DW1000 UWB transceiver from Decawave. LocSpeck is composed of a set of identical nodes communicating on a common RF channel, forming a fully or partially connected network where the positioning algorithm run on each node. Each LocSpeck node could act as an anchor or a rover, and the role could change dynamically during the same session. The number of nodes in the network could change dynamically, since the firmware of LocSpeck supports adding and removing nodes on-the-fly. The paper compares the performance of the LocSpeck system with commercially available off-the-shelf UWB positioning system. Different operating scenarios are considered when evaluating the performance of the system, including cases where collaboration between the two systems is considered.</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Kakkar, Ajay, and Maninder Singh. "Robust authenticated encryption scheme with multiple keys for ad hoc networks." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 1 (July 1, 2019): 421. http://dx.doi.org/10.11591/ijeecs.v15.i1.pp421-426.

Full text
Abstract:
Data security in a computing dynamic infrastructure without explicit user intervention is tough to achieve. A robust authenticated encryption scheme with multiple keys for ad hoc networks has been proposed. Real time attacks has been monitored and coped up using re-encryption algorithm. The effectiveness of the work has been validated by extensive simulations on various combination in terms of S-Boxes, key and data length. The proposed work is a collaboration of optimal selection of S-Boxes, key and data lengths with evaluation of heat dissipation. The work has been carried out to develop an optimized efficient key management technique to reduce the time available for hackers. To verify the effectiveness of proposed algorithm, the results have been compared with K. Xue et al. (2013) , Li et al. (2011) and S. K. Sood et al.’s protocol (2011)
APA, Harvard, Vancouver, ISO, and other styles
30

Bezerra, Paulo, Adalberto Melo, Allan Douglas, Hugo Santos, Denis Rosário, and Eduardo Cerqueira. "A collaborative routing protocol for video streaming with fog computing in vehicular ad hoc networks." International Journal of Distributed Sensor Networks 15, no. 3 (March 2019): 155014771983283. http://dx.doi.org/10.1177/1550147719832839.

Full text
Abstract:
Vehicular ad hoc networks play an important role in the efficiency of road traffic by improving safety and acting as a facilitator of services for passengers, drivers, and public safety officers. Recent improvements in the routing protocols and topologies used in vehicular networks have contributed to improvements in scalability, reliability, and the quality of the information-sharing experience. Vehicles can cooperate with each other to stream videos of accidents or disasters and provide visual information of the monitored area with great precision. This article proposes a collaborative routing protocol for video streaming vehicular ad hoc networks using the service of fog storage to minimize the sharing of content. The routing table is based on an indicator that is generated by combining the speed, location, and recording angle parameters of each vehicle involved in vehicular collaboration to reduce the unnecessary exchange of video data in vehicle-to-vehicle communications. The results of the simulations show that the proposed model performs favorably when compared with other routing protocols with respect to the availability of end-to-end communication.
APA, Harvard, Vancouver, ISO, and other styles
31

Gui, Jin Song, Zhi Gang Chen, and Xiao Heng Deng. "A Game Incentive Scheme Integrating Punishment in Vehicular Ad Hoc Networks." Advanced Materials Research 219-220 (March 2011): 351–57. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.351.

Full text
Abstract:
In vehicular ad hoc networks, uncooperative behaviors will impact the reliability of comfort applications, as well as drivers’ decisions, and even invoke serious traffic accidents. In this paper, we propose a novel game incentive scheme to stimulate cooperation among vehicle nodes, consider selfish nodes’ expectations to future payoff and their long-term desires for profit, and show analytically the three incentive-compatible conditions under which selfish nodes will be deterred from cheating by the subsequent punishments. We also discuss the impact on selfish nodes’ behavior, which is caused by their willingness for future collaboration, the parameter values of punishment mechanism and the variation of network load. Simulation results show that, the increase of network load and the deterioration of node’s future profit expectation will motivate nodes toward self-interested action, but our scheme can neutralize this tendency by the careful configuration of punishment parameters, and have favorable incentive effect.
APA, Harvard, Vancouver, ISO, and other styles
32

H. Sawalmeh, Ahmad, and Noor Shamsiah Othman. "An Overview of Collision Avoidance Approaches and Network Architecture of Unmanned Aerial Vehicles (UAVs)." International Journal of Engineering & Technology 7, no. 4.35 (November 30, 2018): 924. http://dx.doi.org/10.14419/ijet.v7i4.35.27395.

Full text
Abstract:
As an autonomous vehicle, Unmanned Aerial Vehicles (UAVs) are subjected to several challenges. One of the challenges is for UAV to be able to avoid collision. Many collision avoidance methods have been proposed to address this issue. Furthermore, in a multi-UAV system, it is also important to address communication issue among UAVs for cooperation and collaboration. This issue can be addressed by setting up an ad-hoc network among UAVs. There is also a need to consider the challenges in the deployment of UAVs, as well as, in the development of collision avoidance methods and the establishment of communication for cooperation and collaboration in a multi-UAV system. In this paper, we present general challenges in the deployment of UAV and comparison of UAV communication services based on its operating frequency. We also present major collision avoidance approaches, and specifically discuss collision avoidance approaches that are suitable for indoor applications. We also present the Flying Ad-hoc Networks (FANET) network architecture, communication and routing protocols for each Open System Interconnection (OSI) communication layers.
APA, Harvard, Vancouver, ISO, and other styles
33

Neumann, Christoph P., and Richard Lenz. "The Alpha-Flow Approach to Inter-Institutional Process Support in Healthcare." International Journal of Knowledge-Based Organizations 2, no. 4 (October 2012): 52–68. http://dx.doi.org/10.4018/ijkbo.2012100104.

Full text
Abstract:
Inter-institutional collaboration among physicians becomes increasingly important and yet, it’s unrealistic to assume that cooperation can be supported via a homogeneous system which is pre-installed in every organization. Instead physicians will typically have their own autonomous systems that support internal processes. Traditional activity-oriented workflow models or content-oriented process models do not resolve inter-institutional integration challenges. The authors present the a-Flow approach for distributed process management, which enables ad hoc collaboration via active electronic documents without the need to integrate local systems. A distributed case file, the a-Doc, is used to coordinate cooperating parties. Using this case file does not require any preinstalled system components, so true ad-hoc information interchange is enabled. The case file contains both, the inter-organizational process schema as a document, as well as arbitrary content documents that are shared among the cooperating parties. To illustrate the approach an inter-institutional use case is provided by cooperative breast-cancer treatment. The authors explain the rationale behind separating content, decision support, and coordination work and in large-scale inter-institutional scenarios its necessary to decouple collaboration functionality from the existing applications and to resolve the duality between content-oriented and activity-oriented process models.
APA, Harvard, Vancouver, ISO, and other styles
34

FULLING, S. A., K. A. MILTON, and JEF WAGNER. "ENERGY DENSITY AND PRESSURE IN POWER-WALL MODELS." International Journal of Modern Physics A 27, no. 15 (June 14, 2012): 1260009. http://dx.doi.org/10.1142/s0217751x12600093.

Full text
Abstract:
A finite ultraviolet cutoff near a reflecting boundary yields a stress tensor that violates the basic energy-pressure relation. Therefore, a "soft" wall described by a power-law potential, which needs no ad hoc cutoff, is being investigated by the collaboration centered at Texas A&M University and the University of Oklahoma. Progress is reported here.
APA, Harvard, Vancouver, ISO, and other styles
35

FULLING, S. A., K. A. MILTON, and JEF WAGNER. "ENERGY DENSITY AND PRESSURE IN POWER-WALL MODELS." International Journal of Modern Physics: Conference Series 14 (January 2012): 115–26. http://dx.doi.org/10.1142/s2010194512007271.

Full text
Abstract:
A finite ultraviolet cutoff near a reflecting boundary yields a stress tensor that violates the basic energy-pressure relation. Therefore, a "soft" wall described by a power-law potential, which needs no ad hoc cutoff, is being investigated by the collaboration centered at Texas A&M University and the University of Oklahoma. Progress is reported here.
APA, Harvard, Vancouver, ISO, and other styles
36

Rifa-Pous, Helena, and Jordi Herrera-Joancomarti. "A Forwarding Cooperation Protocol for Plain and Cluster-based Ad Hoc Networks." Journal of Communications Software and Systems 4, no. 1 (March 20, 2008): 3. http://dx.doi.org/10.24138/jcomss.v4i1.231.

Full text
Abstract:
In ad hoc networks, due to the lack of a dedicated network infrastructure, members have to collaborate ones with the others to support the basic networking functions that allowthem to communicate. The main challenge of this model iscombating the intrinsic selfish behavior of the participants,which are usually equipped with handheld and mobile devices with limited resources. In this paper, a forwarding protocol is presented that stimulates the cooperation through a mechanism that combines both credit and reputation-based solutions. A micropayment protocol is used to charge and reward the applier and forwarders of a transmission respectively. The credits obtained for collaboration not only are a mean to pay for network services, but are a symbol of the cooperative range of a node. Using this information, the presented model benefits most cooperative nodes with preferential transmission channels and a higher quality of service. The model is suited for plain and cluster-based ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
37

Rosa-Lugo, Linda I., Silvia Martinez, Gloria Weddington, and Lily Waterston. "ASHA-PAHO Collaboration: Addressing Communication Disorders Across Three Countries." Perspectives on Global Issues in Communication Sciences and Related Disorders 5, no. 2 (October 2015): 56–66. http://dx.doi.org/10.1044/gics5.2.56.

Full text
Abstract:
This article will focus on the work, challenges, and experiences of three American Speech-Language-Hearing Association (ASHA) Ad Hoc Committees that are collaborating in a project between ASHA and the Pan American Health Organization/Regional Office for the Americas of the World Health Organization (PAHO/WHO), known as the ASHA-PAHO/WHO project. Their charge, to provide technical assistance on educational initiatives and the delivery of high quality speech- language-pathology/audiology services in three of PAHO's priority countries in Latin America, El Salvador, Honduras and Guyana, is being addressed by ASHA professionals as they share their participation in the implementation phase in these three countries.
APA, Harvard, Vancouver, ISO, and other styles
38

Hansen, Katy, Megan Mullin, and Erin K. Riggs. "Collaboration Risk and the Choice to Consolidate Local Government Services." Perspectives on Public Management and Governance 3, no. 3 (November 18, 2019): 223–38. http://dx.doi.org/10.1093/ppmgov/gvz017.

Full text
Abstract:
Abstract Collaboration among local governments occurs through a range of mechanisms, which vary in degree of formality from contracts and ad hoc agreements to full consolidation. Prior work indicates that local decision makers favor formal mechanisms when expected gains from less formal collaboration may not be realized. This article explicates the concept of collaboration risk, treating it as a product of the likelihood that collaboration fails and the severity of consequences should failure occur. We examine how characteristics of a local service contribute to collaboration risk and thereby influence the choice to consolidate service delivery. Focusing on the case of drinking water provision, we identify physical and financial features of service delivery that contribute to the likelihood and severity of collaboration failure. Drawing on seven case studies of water system consolidation, we then analyze the importance of these service characteristics in the choice to enter into consolidation agreements.
APA, Harvard, Vancouver, ISO, and other styles
39

Aldunate, Roberto, Sergio F. Ochoa, Feniosky Peña-Mora, and Miguel Nussbaum. "Robust Mobile Ad Hoc Space for Collaboration to Support Disaster Relief Efforts Involving Critical Physical Infrastructure." Journal of Computing in Civil Engineering 20, no. 1 (January 2006): 13–27. http://dx.doi.org/10.1061/(asce)0887-3801(2006)20:1(13).

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Mori, Tatsuya, Makoto Nakashima, and Tetsuro Ito. "SpACCE: a sophisticated ad hoc cloud computing environment built by server migration to facilitate distributed collaboration." International Journal of Space-Based and Situated Computing 2, no. 4 (2012): 230. http://dx.doi.org/10.1504/ijssc.2012.050000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Atat, Rachad, Elias Yaacoub, Mohamed-Slim Alouini, Fethi Filali, and Adnan Abu-Dayya. "Delay-sensitive content distribution via peer-to-peer collaboration in public safety vehicular ad-hoc networks." Ad Hoc Networks 16 (May 2014): 182–96. http://dx.doi.org/10.1016/j.adhoc.2013.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Xie, Jiquan, and Tutomu Murase. "Effective Collaboration to Maximize Throughput Based on Multiuser Cooperative Mobility in Social-Physical Ad Hoc Networks." IEEE Open Journal of the Communications Society 2 (2021): 818–35. http://dx.doi.org/10.1109/ojcoms.2021.3071853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Cancan, and Rony Medaglia. "Governments’ social media use for external collaboration." Transforming Government: People, Process and Policy 11, no. 4 (October 16, 2017): 572–95. http://dx.doi.org/10.1108/tg-02-2017-0009.

Full text
Abstract:
Purpose As social media technologies permeate public life, the current forms of collaboration between government and non-government stakeholders are changing. The purpose of this paper is to investigate how social media use reconfigures the organizing practices around such collaboration. A case study of a collaborative e-government project showcases how emergent organizing practices through external social media differ from existing ones along the dimensions of time, task, team and transition. Design/methodology/approach This paper presents a case study of a collaborative e-government project on open data, organized by Shanghai Municipality, local businesses, universities and non-governmental organizations, using an external social media platform, WeChat. Adopting the theoretical lens of temporary organization, the paper identifies the key aspects of change emerged in the organizing practices of this collaboration. Findings The findings outline how the use of external social media reconfigures the collaboration between government and non-government stakeholders along the four dimensions of time, task, team and transition. The new form of collaboration is reconfigured along the lines of (1) an ad hoc and non-linear management of time; (2) discursive task creation, assignment and engagement among stakeholders; (3) a serendipitous engagement of team members based on expertise; and (4) a shift in formal and informal organizing practices. Originality/value This paper provides insights on the use of external social media for collaboration in e-government research and develops the concept of temporary organization in a sociomaterial setting. It also provides practical suggestions on how to manage new forms of public projects leveraging on the capacity of external social media.
APA, Harvard, Vancouver, ISO, and other styles
44

Harkin, Kathleen. "OP93 Collaboration Between Health Technology Assessment And Procurement: A Rapid Mixed-Methods Study." International Journal of Technology Assessment in Health Care 35, S1 (2019): 23–24. http://dx.doi.org/10.1017/s0266462319001454.

Full text
Abstract:
IntroductionThe Irish Health Service (HSE) Health Technology Assessment Group (HTAG) aims to maximise the impact of its work by collaborating with HSE Procurement, formalised through an evidence-based Memorandum of Understanding (MOU). This study aims to inform the MOU.MethodsA sequential mixed-methods study design was used. A rapid review of the literature identified no substantive body of evidence on collaboration between independent national health technology assessment (HTA) and procurement bodies. Personnel involved in HTA or procurement were invited by email to complete a survey, take part in an interview, or both. The quantitative and qualitative data were analysed using descriptive statistics and thematic analysis, respectively. Findings were integrated using a conceptual framework that examined the complementarity of HTA and procurement processes relevant to an MOU.ResultsThirteen surveys were completed (response rate was 13 percent). Eleven interviews (five Ireland, two Canada, three UK, one New Zealand) were conducted between August and November, 2017. No formalised collaboration between independent national HTA and procurement bodies was identified. However in New Zealand, HTA and procurement are an integrated function of the Pharmaceutical Management Agency (PHARMAC). In other jurisdictions, successful ad hoc collaborations occurred where there was a clear need expressed by Procurement for additional evidence required for decision-making, and where HTA personnel tailored their research approaches accordingly. Key themes to successful collaboration were relationships, communication, clear roles, rigorous research and ‘system support’. Good individual relationships and ready access/communication promoted successful outcomes. Successful outcomes included improved clinical practice, and major cost savings. Collaboration may be focussed on: innovative or established devices; specific types of HTA/research products; specific categories/specialties; or specific procurement departments.ConclusionsAll participants considered collaboration to be beneficial but requiring good relationships and ‘system support’. Furthermore, successful collaboration requires clarity regarding the purpose, parties involved, their roles, responsibilities, modes of communication, information to be shared, and the expected outcomes.
APA, Harvard, Vancouver, ISO, and other styles
45

Lynn, Michael, and Veronica Holmes. "Training collaboration in Australia." APPEA Journal 56, no. 2 (2016): 573. http://dx.doi.org/10.1071/aj15079.

Full text
Abstract:
It is 2020 and the Australian oil and gas industry has experienced unprecedented growth. The transition to steady-state operations has been hugely successful. Australia is now well and truly on the global map for oil and gas, and is regarded as world class. Trades and technical operators are skilled, experienced, and safely delivering their jobs. The Australian collaborative training model has been successfully in place for three years, and operators and contractors are satisfied with its impact. But how did the industry successfully make this happen? Looking back to 2015, there were a number of ad hoc collaborative strategies in place to provide oil and gas related skills in Australia. The economic environment at that time, however, necessitated a new look at the collaborative mechanism for reducing operating costs and realising greater efficiencies on workforce development related activities. In 2015, the Resources Industry Training Council (a joint venture between APPEA and CME) identified workforce development collaboration opportunities, and to articulate the value that could be realised from these opportunities. This project sparked a successful Australian collaborative model for workforce development. A unique FutureNow visioning presentation will be used to bring to life a world in 2020 where workforce development collaboration is intrinsic to Australian operators’ DNA, and why and how it stuck this time round. The value will be clearly identified in terms cost optimisation, building an industry culture of trust, and how this was used as a springboard for other successful collaborative opportunities. FutureNow is a fictional representation of the Australian oil and gas industry in 2020, using storytelling to explain a possible journey and outcome for the operators, service providers, workforce, and training bodies.
APA, Harvard, Vancouver, ISO, and other styles
46

Raghavendar Raju, L., and C. R. K. Reddy Reddy. "A Key Exchange Approach for Proficient and Secure Routing in Mobile Adhoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 11, no. 4 (May 22, 2017): 43. http://dx.doi.org/10.3991/ijim.v11i4.6440.

Full text
Abstract:
<p>Mobile ad hoc networks (MANETs) are collection of wireless mobile devices with restricted broadcast range and resources. Communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. Discovery of such routes is a major task, both from efficiency and security point of view. This paper presents a proficient and secure routing, based on asymmetric authentication using key exchange approach (KEA). The proposed mechanism ensures secure routing and quality of service in MANETs and minimizes the network overhead. The KEA mechanism can be effectively used to develop a new routing protocol for Mobile Adhoc Networks which will provide maximum security against all kinds of attacks. In this paper, KEA is compared with other secure routing protocols like EEACK, AODV, and ARIADANE, to evaluate the efficiency of KEA in Ad Hoc Networks. The empirical results shows that there is an increase of 20% packet delivery ratio and a reduction of 10% routing overhead.</p>
APA, Harvard, Vancouver, ISO, and other styles
47

Arepalli, Gopi, and Suresh Babu Erukula. "Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 4 (August 1, 2016): 1857. http://dx.doi.org/10.11591/ijece.v6i4.9941.

Full text
Abstract:
An Ad-hoc Network covers a set of autonomous mobile nodes that communicates through wireless communication in an infrastructure-less environment. Mostly MANETs are used in group communication mechanisms like military applications, emergency search, rescue operations, vehicular ad-hoc communications and mining operations etc. In such type of networks, group communication is takes place by multicasting technique. Communication and collaboration is necessary among the nodes in the groups in multicast protocols. PUMA has the best multicast routing protocol compared to tree and mesh based multicast protocols although it suffers from security issues. PUMA mainly suffers from Man In The middle attack. MITM attack generates traffic flow, drop the packets and miscommunicate the neighbor nodes with false hop count. So defending from MITM attack we designed a new mechanism called Elliptic Curve Group Diffie-Hellman (ECGDH). This paper compares results of PUMA [1] routing protocol with legitimate, under attack and after providing security against attack. Finally we observed ECGDH [2] gives efficient results even attack has happened.
APA, Harvard, Vancouver, ISO, and other styles
48

Arepalli, Gopi, and Suresh Babu Erukula. "Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 4 (August 1, 2016): 1857. http://dx.doi.org/10.11591/ijece.v6i4.pp1857-1865.

Full text
Abstract:
An Ad-hoc Network covers a set of autonomous mobile nodes that communicates through wireless communication in an infrastructure-less environment. Mostly MANETs are used in group communication mechanisms like military applications, emergency search, rescue operations, vehicular ad-hoc communications and mining operations etc. In such type of networks, group communication is takes place by multicasting technique. Communication and collaboration is necessary among the nodes in the groups in multicast protocols. PUMA has the best multicast routing protocol compared to tree and mesh based multicast protocols although it suffers from security issues. PUMA mainly suffers from Man In The middle attack. MITM attack generates traffic flow, drop the packets and miscommunicate the neighbor nodes with false hop count. So defending from MITM attack we designed a new mechanism called Elliptic Curve Group Diffie-Hellman (ECGDH). This paper compares results of PUMA [1] routing protocol with legitimate, under attack and after providing security against attack. Finally we observed ECGDH [2] gives efficient results even attack has happened.
APA, Harvard, Vancouver, ISO, and other styles
49

Ramani, T., and P. Sengottuvelan. "An Efficient QOS Improvement Established on Unreasonable Investment, with a Half and Half Node Participation Clustering Approach in Mobile Ad Hoc Network." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 98. http://dx.doi.org/10.14419/ijet.v7i3.27.17663.

Full text
Abstract:
Mobile ad hoc network (MANET) is characterized as a self-arranging foundationless system utilized for correspondence by wireless connections with the help of nodes. A MANET is suggested as the wireless system with autonomous nodes moving naturally concerning each other. Because of the different free moves of nodes, a lot of packet misfortune happens in transmitting the packet from source to goal. The danger of lousy node conduct is extraordinarily high. The unsecured unplanned system condition is started because of the progressive idea of systems and node portability. Likewise, the assignment of central administration is more confused in an improvised order. Because of the concept of free moving attributes, MANET faces disgraceful node collaboration. In this proposed work manages node collaboration to security issues like Unreasonable Investment, with a Half and Half Node Participation based Clustering approach (UIH2NPC) in MANET. The node collaboration among the nodes in MANET is enhanced by estimating the weightage of helpfulness of every node in the system. The assessment of node collaboration weightage identifies the external nodes contribution in the order. Execution assessments are done.
APA, Harvard, Vancouver, ISO, and other styles
50

Sakr, Mostafa, Andrea Masiero, and Naser El-Sheimy. "LocSpeck: A Collaborative and Distributed Positioning System for Asymmetric Nodes Based on UWB Ad-Hoc Network and Wi-Fi Fingerprinting." Sensors 20, no. 1 (December 21, 2019): 78. http://dx.doi.org/10.3390/s20010078.

Full text
Abstract:
This paper presents LocSpeck, a collaborative and distributed indoor positioning system for dynamic nodes connected using an ad-hoc network, based on inter-node relative range measurements and Wi-Fi fingerprinting. The proposed system operates using peer-to-peer range measurements and does not need ultra-wideband (UWB) fixed anchor, nor it needs a predefined network topology. The nodes could be asymmetric in terms of the available sensors onboard, the computational resources, and the power capacity. This asymmetry adversely affects the positioning performance of the weaker nodes. Collaboration between different nodes is achieved through a distributed estimator without the need of a single centralized computing element. The ranging measurement component of the system is based on the DW1000 UWB transceiver chip from Decawave, which is attached to a set of smartphones equipped with asymmetric sensors. The distributed positioning filter fuses, locally on each node, the relative range measurements, the reading from the internal sensors, and the Wi-Fi received signal strength indicator (RSSI) readings to obtain an estimate of the position of each node. The described system does not depend on fixed UWB anchors and supports online addition and removal of nodes and dynamic node role assignment, either as an anchor or as a rover. The performance of the system is evaluated by real-world test scenarios using a set of four smartphones navigating an indoor environment on foot. The performance is compared to that of a commercial UWB-based system. The results presented in this paper show that weak mobile nodes, in terms of available positioning sensors, can benefit from collaboration with other nearby nodes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography