Home About us Contact | |||
Network Capabilities (network + capability)
Selected AbstractsInter-Firm R&D Networks: the Importance of Strategic Network Capabilities for High-Tech Partnership Formation,BRITISH JOURNAL OF MANAGEMENT, Issue 1 2006John Hagedoorn We examine the role of different network capabilities of companies that influence the formation of R&D partnerships in pharmaceutical biotechnology. Strategic network capabilities, specifically centrality-based capabilities and the efficiency with which companies choose their partners, are found to facilitate the formation of new partnerships. Unlike general experience with partnering, these strategic network capabilities play a crucial role in enabling companies to continue to interact with other companies through partnerships in a complex network setting. [source] Pipelines on heterogeneous systems: models and toolsCONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 9 2005F. Almeida Abstract We study the performance of pipeline algorithms in heterogeneous networks. The concept of heterogeneity is not only restricted to the differences in computational power of the nodes, but also refers to the network capabilities. We develop a skeleton tool that allows us an efficient block-cyclic mapping of pipelines on heterogeneous systems. The tool supports pipelines with a number of stages much larger than the number of physical processors available. We derive an analytical formula that allows us to predict the performance of pipelines in heterogeneous systems. According to the analytical complexity formula, numerical strategies to solve the optimal mapping problem are proposed. The computational results prove the accuracy of the predictions and effectiveness of the approach. Copyright © 2005 John Wiley & Sons, Ltd. [source] Trust management in wireless sensor networksEUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, Issue 4 2010Theodore Zahariadis The range of applications of wireless sensor networks is so wide that it tends to invade our every day life. In the future, a sensor network will survey our health, our home, the roads we follow, the office or the industry we work in or even the aircrafts we use, in an attempt to enhance our safety. However, the wireless sensor networks themselves are prone to security attacks. The list of security attacks, although already very long, continues to augment impeding the expansion of these networks. The trust management schemes consist of a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them, either for data forwarding, data aggregation or any other cooperative function. A variety of trust models which follow different directions regarding the distribution of measurement functionality, the monitored behaviours and the way measurements are used to calculate/define the node's trustworthiness has been presented in the literature. In this paper, we survey trust models in an attempt to explore the interplay among the implementation requirements, the resource consumption and the achieved security. Our goal is to draw guidelines for the design of deployable trust model designs with respect to the available node and network capabilities and application peculiarities. Copyright © 2010 John Wiley & Sons, Ltd. [source] The support of mobile internet applications in UMTS networks through the open service accessBELL LABS TECHNICAL JOURNAL, Issue 2 2001Musa R. Unmehopa Third-generation wireless networks are expected to enable the mobile Internet to become a reality, offering fast Internet access and high-speed data services to mobile subscribers. For network operators to allow for the rapid development of innovative value-added applications on the scale seen in the Internet today, the wireless core network needs to be opened up for third-party applications provided by independent software vendors (ISVs). The Third-Generation Partnership Project (3GPP) is currently working on the production of technical specifications to provide a mechanism that would permit ISVs a standard interface to access network capabilities traditionally available to network operators. Within 3GPP, this mechanism is commonly referred to as the open service access (OSA). This open service access is predominantly targeted at Universal Mobile Telecommunications System (UMTS) networks, allowing application developers to access the feature-rich core network capabilities. This open access enables network operators to offer innovative services to their subscribers allowing the ability to differentiate themselves in a competitive market. With the imminent commercial deployment of the General Packet Radio Service (GPRS), existing fixed-line Internet service providers (ISPs) can now offer mobile Internet to end users in a UMTS environment where the responsibility of the network operator is reduced to providing IP connectivity. The increased competition from ISPs poses a big threat to the revenue stream of the network operator. This paper explores the possibilities of OSA to facilitate network operators in providing the mutual support of network capabilities and Internet content. These possibilities would allow the network operator to become a value-added mobile Internet service provider (VAM-ISP). © 2002 Lucent Technologies Inc. [source] Inter-Firm R&D Networks: the Importance of Strategic Network Capabilities for High-Tech Partnership Formation,BRITISH JOURNAL OF MANAGEMENT, Issue 1 2006John Hagedoorn We examine the role of different network capabilities of companies that influence the formation of R&D partnerships in pharmaceutical biotechnology. Strategic network capabilities, specifically centrality-based capabilities and the efficiency with which companies choose their partners, are found to facilitate the formation of new partnerships. Unlike general experience with partnering, these strategic network capabilities play a crucial role in enabling companies to continue to interact with other companies through partnerships in a complex network setting. [source] Study on battlespace ontology construction approachINTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, Issue 12 2005Jun-feng Song In Network Centric Warfare, the sensor network's capability is much stronger than ever; the force can get a mass of information about battlespace in real or near-real time. How to utilize the information about battlespace effectively and transform the information superiority into knowledge superiority is a key problem for NCW research. To solve this problem, first we need to establish a suitable knowledge infrastructure. In this article, battlespace ontology is considered as the knowledge infrastructure of NCW, and we propose a battlespace ontology construction approach based on OWL, which consists of two parts: formal ontology construction approach to construct subdomain ontologies of battlespace and formal ontology integration approach to integrate subdomain ontologies of battlespace. Then a concrete application of the approach to an air combat battlespace is given. © 2005 Wiley Periodicals, Inc. Int J Int Syst 20: 1219,1231, 2005. [source] |