skip to main content
article

Making the world (of communications) a different place

Published: 01 July 2005 Publication History

Abstract

How might the computing and communications world be materially different in 10 to 15 years, and how might we define a research agenda that would get us to that world?

Cited By

View all
  • (2024)ReferencesMobile Edge Computing and Communications10.1002/9781119611646.refs(209-243)Online publication date: 27-Dec-2024
  • (2023)The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativitySocial Studies of Science10.1177/0306312723122110754:5(655-677)Online publication date: 28-Dec-2023
  • (2021)Trustworthy and Sustainable Edge AI: A Research Agenda2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPSISA52974.2021.00019(164-172)Online publication date: Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 35, Issue 3
July 2005
90 pages
ISSN:0146-4833
DOI:10.1145/1070873
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2005
Published in SIGCOMM-CCR Volume 35, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)2
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)ReferencesMobile Edge Computing and Communications10.1002/9781119611646.refs(209-243)Online publication date: 27-Dec-2024
  • (2023)The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativitySocial Studies of Science10.1177/0306312723122110754:5(655-677)Online publication date: 28-Dec-2023
  • (2021)Trustworthy and Sustainable Edge AI: A Research Agenda2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPSISA52974.2021.00019(164-172)Online publication date: Dec-2021
  • (2019)How to see through the Fog? Using Peer to Peer (P2P) for the Internet of Things2019 IEEE 5th World Forum on Internet of Things (WF-IoT)10.1109/WF-IoT.2019.8767275(47-52)Online publication date: Apr-2019
  • (2013)A holistic architecture for the internet of things, sensing services and big dataProceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing10.1109/CCGrid.2013.100(546-553)Online publication date: 13-May-2013
  • (2013)Evaluation and aggregation of pay-as-you-drive insurance rate factorsDecision Support Systems10.1016/j.dss.2013.06.00156:C(192-201)Online publication date: 1-Dec-2013
  • (2012)Architecting for edge diversityProceedings of the 8th international conference on Emerging networking experiments and technologies10.1145/2413176.2413179(13-24)Online publication date: 10-Dec-2012
  • (2012)SARTACM SIGAPP Applied Computing Review10.1145/2387358.238736312:3(60-74)Online publication date: 1-Sep-2012
  • (2012)SARTProceedings of the 27th Annual ACM Symposium on Applied Computing10.1145/2245276.2245442(847-852)Online publication date: 26-Mar-2012
  • (2012)BibliographyComputer Networks10.1016/B978-0-12-385059-1.00010-7(837-850)Online publication date: 2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media