Now showing items 11-20 of 20727
Design and Evaluation of the Optimal Cache Allocation for Content-Centric Networking
Content-centric networking (CCN) is a promising framework to rebuild the Internet's forwarding substrate around the concept of content. CCN advocates ubiquitous in-network caching to enhance content delivery, and thus each ...
Are People Really Social on Porn 2.0?
Double-dielectric-slab waveguides for guiding broadband THz wave with low propagation loss and small beam width
A double-dielectric-slab waveguide is proposed to guide broadband THz waves. We derive the dispersion equations of both the even mode and odd mode of the waveguide, which are used to study the relationships between the ...
SoDaMaT RDM Training Materials
The JISC-funded Sound Data Management Training (SoDaMaT) project developed and presented research data management (RDM) training to researchers in the field of digital audio. The dataset contains: an academic/management ...
Critical Interventions on Statebuilding
(Taylor & Francis, 2011-06-24)
Explaining Myanmar's Regime Transition: The Periphery is Central
(Taylor & Francis (Routledge), 2014-01-28)
In 2010, Myanmar (Burma) held its first elections after 22 years of direct military rule. Few compelling explanations for this regime transition have emerged. This article critiques popular accounts and potential explanations ...
Regulatory regionalism and anti-money-laundering governance in Asia
(Taylor & Francis (Routledge), 2014-11-28)
With the intensification of the Financial Action Task Force's (FATF's) worldwide campaign to promote anti-money-laundering regulation since the late 1990s, all Asian states except North Korea have signed up to its rules ...
The Political Economy of Non-Traditional Security: Explaining the Governance of Avian Influenza in Indonesia
(Palgrave Macmillan, 2015-07)
Given the common association of non-traditional security (NTS) problems with globalisation, surprisingly little attention has been paid to how the political economy context of given NTS issues shape how they are securitised ...