Papers published on a yearly basis
Papers
More filters
01 Jan 2002
TL;DR: Ling et al. as mentioned in this paper found that the mobile phone is a big part of teenagers' lives and that it is used for a range of interaction and is also important as a symbol.
Abstract: Introduction The mobile telephone is a big part of my life . A mobile telephone is actually an expression of your personality . These words of two teenaged female informants describe their relationship to the mobile telephone. Yet their use of the device is a recent phenomenon. None of the teens included in this analysis had had a mobile telephone for more than four years. What is surprising is the degree to which the mobile telephone has been integrated into their lives. It is not simply a security device, nor is it used only to coordinate everyday events spontaneously. It is used for a range of interaction and is also important as a symbol. Our chapter looks at how the mobile telephone's adoption has yielded new forms of interaction and especially coordination. We call these micro-coordination and hyper-coordination. In Norway, where the analysis has taken place, the mobile telephone is well entrenched. With more than half the population armed with at least one mobile phone, no other country, save Finland, has a higher per capita consumption. The penetration is even higher among certain groups. In one of the focus groups, five of nine boys had two mobile telephones. For example, as of May 2001, as many as 94% of the oldest teens have a mobile telephone (Ling, forthcoming). Owing to the recent yet explosive growth of mobiles, it is quite noticeable as a cultural phenomenon. All the informants, even the youngest ones, remember life before its popularization.
778 citations
TL;DR: It is shown that an epidemiological model of dengue transmission in travelers, based on mobility data from ∼40 million mobile phone subscribers and climatic information, predicts the geographic spread and timing of epidemics throughout the country.
Abstract: The recent emergence of dengue viruses into new susceptible human populations throughout Asia and the Middle East, driven in part by human travel on both local and global scales, represents a significant global health risk, particularly in areas with changing climatic suitability for the mosquito vector. In Pakistan, dengue has been endemic for decades in the southern port city of Karachi, but large epidemics in the northeast have emerged only since 2011. Pakistan is therefore representative of many countries on the verge of countrywide endemic dengue transmission, where prevention, surveillance, and preparedness are key priorities in previously dengue-free regions. We analyze spatially explicit dengue case data from a large outbreak in Pakistan in 2013 and compare the dynamics of the epidemic to an epidemiological model of dengue virus transmission based on climate and mobility data from ∼40 million mobile phone subscribers. We find that mobile phone-based mobility estimates predict the geographic spread and timing of epidemics in both recently epidemic and emerging locations. We combine transmission suitability maps with estimates of seasonal dengue virus importation to generate fine-scale dynamic risk maps with direct application to dengue containment and epidemic preparedness.
408 citations
TL;DR: This article proposes a conceptual framework that captures several basic biological processes in the form of a family of design patterns that inherit desirable properties of biological systems including adaptivity and robustness and shows how to implement important functions for distributed computing based on these patterns.
Abstract: Recent developments in information technology have brought about important changes in distributed computing. New environments such as massively large-scale, wide-area computer networks and mobile ad hoc networks have emerged. Common characteristics of these environments include extreme dynamicity, unreliability, and large scale. Traditional approaches to designing distributed applications in these environments based on central control, small scale, or strong reliability assumptions are not suitable for exploiting their enormous potential. Based on the observation that living organisms can effectively organize large numbers of unreliable and dynamically-changing components (cells, molecules, individuals, etc.) into robust and adaptive structures, it has long been a research challenge to characterize the key ideas and mechanisms that make biological systems work and to apply them to distributed systems engineering. In this article we propose a conceptual framework that captures several basic biological processes in the form of a family of design patterns. Examples include plain diffusion, replication, chemotaxis, and stigmergy. We show through examples how to implement important functions for distributed computing based on these patterns. Using a common evaluation methodology, we show that our bio-inspired solutions have performance comparable to traditional, state-of-the-art solutions while they inherit desirable properties of biological systems including adaptivity and robustness.
292 citations
TL;DR: The results indicate that personality influence behavioural intention (BI) both directly and mediated through the TAM beliefs.
Abstract: The Technology Acceptance Model TAM is one of the most used models in information science. Although several studies investigate the relationship between individual difference variables and TAM, none are conclusive about the relationship between personality and the TAM constructs. The current study seeks to investigate the degree to which users' assessments of the core constructs of TAM are influenced by their personality as measured by a short version of the IPIP Big Five inventory. A web-based survey method was used where users n = 1004 read a description of a software tool before completing personality and TAM inventories. The results indicate that personality influence behavioural intention BI both directly and mediated through the TAM beliefs. Personality can also influence the TAM beliefs without influencing BI. Extraversion has significant, positive relations to BI and this relation is fully mediated by the TAM beliefs. Emotional stability is related to BI, but this relation is not mediated by the TAM beliefs. Openness to experience is significantly and positively related to perceived ease of use, but does not influence BI.
267 citations
Patent•
21 May 1996TL;DR: In this article, a database server with a shared nothing architecture has multiple nodes, each having its own central processing unit, primary and secondary memory for storing database tables and other data structures, and communication channels for communication with other ones of the nodes.
Abstract: A database server with a 'shared nothing' system architecture has multiple nodes, each having its own central processing unit, primary and secondary memory for storing database tables and other data structures, and communication channels for communication with other ones of the nodes. The nodes are divided into at least two groups that share no resources, including power supply and cooling system. Each database table in the system is divided into fragments distributed for storage purposes over all the nodes in the system. To ensure continued data availability after a node failure, a 'primary replica' and a 'standby replica' of each fragment are each stored on nodes in different ones of the groups. Database transactions are performed using the primary fragment replicas, and the standby replicas are updated using transaction log records. Every node of the system includes a data dictionary that stores information indicating where each primary and standby fragment replica is stored among the system's nodes. The records of each dtabase table are allocated as evenly as possible among the table fragments, for example, by hashing a primary key value for each record with a predefined hash function and using the resulting value to select one of the database table fragments. A transaction manager on each node responds to database queries by determining which fragment of a database is being accessed by the query and then forwarding the database query to the node processor on which the primary replica of that fragment is stored. Upon failure of any one of the data processors in the system, each node updates the information in its data dictionary accordingly. In addition, the fragment replicas made unavailable by the node failure are regenerated and stored on the remaining available nodes in the same node group as the failed node.
259 citations
Authors
Showing all 493 results
Name | H-index | Papers | Citations |
---|---|---|---|
Min Xie | 70 | 566 | 19451 |
Audun Jøsang | 46 | 207 | 14280 |
Rich Ling | 26 | 78 | 4035 |
Paal E. Engelstad | 25 | 143 | 1929 |
Geoffrey Canright | 23 | 71 | 2206 |
Erik Vanem | 22 | 121 | 1768 |
Kenth Engø-Monsen | 20 | 58 | 1782 |
Audun Fosselie Hansen | 20 | 33 | 1240 |
Josef Noll | 17 | 117 | 1409 |
Siv Hilde Houmb | 15 | 38 | 789 |
Do Van Thanh | 15 | 68 | 799 |
Svein Bergvik | 15 | 40 | 1183 |
Øystein D. Fjeldstad | 15 | 28 | 2755 |
Xiaomeng Su | 14 | 34 | 1777 |
Yngve Dahl | 13 | 45 | 557 |