图书情报专题研究2012-3(4)

2019-04-23 11:41

However, Facebook is somewhat different from other Social Networking Sites as it demonstrates an offline-to-online trend; that is, the majority of Facebook Friends are met offline and then added later. The present research investigated how the Five-Factor Model of personality relates to Facebook use. Despite some expected trends regarding Extraversion and Openness to Experience, results indicated that personality factors were not as influential as previous literature would suggest. The results also indicated that a motivation to communicate was influential in terms of Facebook use. It is suggested that different motivations may be influential in the decision to use tools such as Facebook, especially when individual functions of Facebook are being considered.

5. 题名:Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

出处:Future Generation Computer Systems, Volume 25, Issue 6, June 2009, Pages 599-616 作者:Buyya, R.; Yeo, C.S.; Venugopal, S.; Broberg, J.; Brandic, I.

摘要:With the significant advances in Information and Communications Technology (ICT) over the last half century, there is an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level of computing service that is considered essential to meet the everyday needs of the general community. To deliver this vision, a number of computing paradigms have been proposed, of which the latest one is known as Cloud computing. Hence, in this paper, we define Cloud computing and provide the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs). We also provide insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA)-oriented resource allocation. In addition, we reveal our early thoughts on interconnecting Clouds for dynamically creating global Cloud exchanges and markets. Then, we present some representative Cloud platforms, especially those developed in industries, along with our current work towards realizing market-oriented resource allocation of Clouds as realized in Aneka enterprise Cloud technology. Furthermore, we highlight the difference between High Performance Computing (HPC) workload and Internet-based services workload. We also describe a meta-negotiation infrastructure to establish global Cloud exchanges and markets, and illustrate a case study of harnessing ?Storage Clouds‘ for high performance content delivery. Finally, we conclude with the need for convergence of competing IT paradigms to deliver our 21st century vision.

6. 题名:Wireless sensor networks: a survey

出处:Computer Networks, Volume 38, Issue 4, March 2002, Pages 393-422 作者:Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E.

摘要:This paper describes the concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics. First, the sensing tasks and the potential sensor networks applications are explored, and a review of factors influencing the design of sensor networks is provided. Then, the communication architecture for sensor networks is outlined, and the algorithms and protocols developed for each layer in the literature are explored. Open research issues for the realization of sensor networks are also discussed.

13

7. 题名:Energy based competitive learning

出处:Neurocomputing, Volume 74, Issue 12-13, June 2011, Pages 2265-2275 作者:Wang, C.D.; Lai, J.H.

摘要:This paper addresses the three important issues associated with competitive learning clustering, which are auto-initialization, adaptation to clusters of different size and sparsity, and eliminating the disturbance caused by outliers. Although many competitive learning methods have been developed to deal with some of these problems, few of them can solve all the three problems simultaneously. In this paper, we propose a new competitive learning clustering method termed energy based competitive learning (EBCL) to simultaneously tackle these problems. Auto-initialization is achieved by extracting samples of high energy to form a core point set, whereby connected components are obtained as initial clusters. To adapt to clusters of different size and sparsity, a novel competition mechanism, namely, size-sparsity balance of clusters (SSB), is developed to select a winning prototype. For eliminating the disturbance caused by outliers, another new competition mechanism, namely, adaptive learning rate based on samples' energy (ALR), is proposed to update the winner. Data clustering experiments on 2000 simulated datasets comprising clusters of different size and sparsity, as well as with outliers, have been performed to verify the effectiveness of the proposed method. Then we apply EBCL to automatic color image segmentation. Comparison results show that the proposed EBCL outperforms existing competitive learning algorithms.

8. 题名:A survey on security issues in service delivery models of cloud computing

出处:Journal of Network and Computer Applications, Volume 34, Issue 1, January 2011, Pages 1-11

作者:Subashini, S.; Kavitha, V.

摘要:Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. It extends Information Technology‘s (IT) existing capabilities. In the last few years, cloud computing has grown from being a promising business concept to one of the fast growing segments of the IT industry. But as more and more information on individuals and companies are placed in the cloud, concerns are beginning to grow about just how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. A new model targeting at improving features of an existing model must not risk or threaten other important features of the current model. The architecture of cloud poses such a threat to the security of the existing technologies when deployed in a cloud environment. Cloud service users need to be vigilant in understanding the risks of data breaches in this new environment. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system.

9. 题名:Mobile cloud computing: A survey

14

出处:Future Generation Computer Systems, Volume 29, Issue 1, January 2013, Pages 84-106 作者:Niroshinie; Seng W.; Wenny 摘要:Despite increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers external to the mobile device. In this paper, we provide an extensive survey of mobile cloud computing research, while highlighting the specific concerns in mobile cloud computing. We present a taxonomy based on the key issues in this area, and discuss the different approaches taken to tackle these issues. We conclude the paper with a critical analysis of challenges that have not yet been fully met, and highlight directions for future work.

10. 题名:A letter from the frustrated author of a journal paper

出处:Journal of Systems and Software, Volume 54, Issue 1, September 2000, Pages 1 作者:Glass, R.L.

11. 题名:Addressing cloud computing security issues

出处:Future Generation Computer Systems, Volume 28, Issue 3, March 2012, Pages 583-592 作者:Zissis, D.; Lekkas, D.

摘要:The recent emergence of cloud computing has drastically altered everyone‘s perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.

12. 题名:Facebook(R) and academic performance

出处:Computers in Human Behavior, Volume 26, Issue 6, November 2010, Pages 1237-1245 作者:Kirschner, P.A.; Karpinski, A.C.

摘要:There is much talk of a change in modern youth – often referred to as digital natives or Homo Zappiens – with respect to their ability to simultaneously process multiple channels of information. In other words, kids today can multitask. Unfortunately for proponents of this position, there is much empirical documentation concerning the negative effects of attempting to simultaneously process different streams of information showing that such behavior leads to both

15

increased study time to achieve learning parity and an increase in mistakes while processing information than those who are sequentially or serially processing that same information. This article presents the preliminary results of a descriptive and exploratory survey study involving Facebook use, often carried out simultaneously with other study activities, and its relation to academic performance as measured by self-reported Grade Point Average (GPA) and hours spent studying per week. Results show that Facebook? users reported having lower GPAs and spend fewer hours per week studying than nonusers.

13. 题名:Wireless sensor network survey

出处:Computer Networks, Volume 52, Issue 12, August 2008, Pages 2292-2330 作者:Yick, J.; Mukherjee, B.; Ghosal, D.

摘要:A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application‘s design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) internal platform and underlying operating system, (2) communication protocol stack, and (3) network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.

14. 题名:Modelling and simulation of a high penetration wind diesel system with battery energy storage

出处:International Journal of Electrical Power & Energy Systems, Volume 33, Issue 3, March 2011, Pages 767-774 作者:Sebastian, R.

摘要:Wind Diesel Hybrid Systems (WDHS) are isolated power systems which combine Diesel Generators (DG) with Wind Turbine Generators (WTG). Depending on the generators which are supplying, high penetration (HP) WDHS have three operation modes: Diesel Only (DO), Wind Diesel (WD) and Wind Only (WO). The HP-WDHS presented in this article consists of a Diesel Engine (DE), a Synchronous Machine (SM), a Wind Turbine Generator, the consumer load, a Ni-Cd Battery based Energy Storage System (BESS) and a Dump Load. The DE can be engaged (DO and WD modes) or disengaged (WO mode) from the SM by means of a clutch. All the models of the previously mentioned components are presented and the performance of the WDHS has been tested through dynamic simulation. Simulation results with graphs for the frequency and voltage of the isolated power system, active powers generated/absorbed by the different elements and the battery voltage/current/state of charge are presented for a load change in WO mode and for the transition from WO to WD mode in order to substitute a supplying BESS for the DE as the active power source.

16

15. 题名:Online social networks: Why do students use facebook?

出处:Computers in Human Behavior, Volume 27, Issue 4, July 2011, Pages 1337-1343 作者:Cheung, C.M.K.; Chiu, P.Y.; Lee, M.K.O.

摘要:The growth and popularity of online social networks has created a new world of collaboration and communication. More than a billion individuals around the world are connected and networked together to create, collaborate, and contribute their knowledge and wisdom. Despite the importance of online social networks, there is relatively little theory-driven empirical research available to address this new type of communication and interaction phenomena. In this paper, we explored the factors that drive students to use online social networks (e.g., Facebook). Specifically, we conceptualized the use of online social networks as intentional social action and we examined the relative impact of social influence, social presence, and the five key values from the uses and gratification paradigm on We-Intention to use online social networks. An empirical study of Facebook users (n = 182) revealed that We-Intention to use online social networks is strongly determined by social presence. Among the five values, social related factors had the most significant impact on the intention to use. Implications for research and practice are discussed.

16. 题名:Social network use and personality

出处:Computers in Human Behavior, Volume 26, Issue 6, November 2010, Pages 1289-1295 作者:Amichai-Hamburger, Y.; Vinitzky, G. 摘要:Studies have shown a connection between the individual personality of the user and the way he or she behaves on line. Today many millions of people around the world are connected by being members of various Internet social networks. Ross et al. (2009) studied the connection between the personality of the individual users and their behavior on a social network. They based their study on the self-reports of users of Facebook, one of the most popular social networks, and measured five personality factors using the NEO-PI-R (Costa & McCrae, 1992) questionnaire. They found that while there was a connection between the personalities of surfers and their behavior on Facebook, it was not strong. This study is based on that of Ross et al. (2009), but in our study the self-reports of subjects, were replaced by more objective criteria, measurements of the user-information upload on Facebook. A strong connection was found between personality and Facebook behavior. Implications of the results are discussed.

17. 题名:Identity construction on Facebook: Digital empowerment in anchored relationships 出处:Computers in Human Behavior, Volume 24, Issue 5, September 2008, Pages 1816-1836 作者:Zhao, S.; Grasmuck, S.; Martin, J.

摘要:Early research on online self-presentation mostly focused on identity constructions in anonymous online environments. Such studies found that individuals tended to engage in role-play games and anti-normative behaviors in the online world. More recent studies have examined identity performance in less anonymous online settings such as Internet dating sites and reported different findings. The present study investigates identity construction on Facebook, a newly emerged nonymous online environment. Based on content analysis of 63 Facebook accounts, we find that the identities produced in this nonymous environment differ from those constructed in the anonymous online environments previously reported. Facebook users predominantly claim their identities implicitly rather than explicitly; they ―show rather than tell‖ and stress group and consumer identities over personally narrated ones. The characteristics of such identities are

17


图书情报专题研究2012-3(4).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:八年级投资组合报告的解释

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: