Skip to main content

Currently Skimming:

Appendix A: Two Research Topics Involving Social Applications
Pages 215-223

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 215...
... Appendixes
From page 217...
... It is touched on here to demonstrate its interdisciplinary aspects. DECONSTRUCTING WIRELESS One actual research project on the social applications of IT is "deconstructing wireless," which is being conducted by researchers at the University of California at Berkeley, Princeton University, and the Swiss Federal Institute of Technology at Lausanne.~ This collaboration of engineers and economists is taking a fresh look at the wireless communication industry.
From page 218...
... This project recognizes that there are strong relationships between these influences that can be exploited to create new opportunities. Although wireless technology can be shaped in many ways, the most effective design for the technology needs to take into account economics, industry, and policy issues.
From page 219...
... are economists with experience in telecommunications regulation at the Federal Communications Commission and can address economic and policy issues. The other three researchers are technologists who can address technical issues.
From page 220...
... Mobile code is a promising technology for dynamically downloading software to processors internal to the network and to terminals. Such processing has been proposed, for example, for converting between different data representations or for accommodating parts of a network with widely different capabilities (like wireless access and fiber backbone)
From page 221...
... Service management enables the opportunistic establishment of end-to-end services in response to customer requests. Business management ensures that customers are monitored and billed for services and that the resulting revenue is passed back to constituent service providers.
From page 222...
... To a large extent, security is a technical challenge, as the questions raised have significant technical components. How can malicious behavior be distinguished from normal innocuous network usage (the answer may involve a kind of pattern matching at both micro and macro levels)
From page 223...
... NOTE 1. The researchers are David Messerschmitt, Michael Katz, and Joseph Farrell from the University of California at Berkeley, Sergio Verdu from Princeton, and Jean-Pierre Hubaux from the Swiss Federal Institute of Technology.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.