Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (2)
- Communication Technology and New Media (2)
- Communications Law (2)
- Computer Law (2)
- Law (2)
-
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Law (2)
- Science and Technology Policy (2)
- Science and Technology Studies (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- Broadcast and Video Studies (1)
- Electrical and Computer Engineering (1)
- Interpersonal and Small Group Communication (1)
- Mass Communication (1)
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo
The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo
All Faculty Scholarship
This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Electrical and Computer Engineering Faculty Publications
A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …
Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo
Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo
All Faculty Scholarship
The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …