{"title":"从用户的角度看自组织网络和网格计算:使用无线网格的屏幕共享案例","authors":"Lidwien De Wijngaert, K. Vermaas","doi":"10.1109/CANET.2006.279239","DOIUrl":null,"url":null,"abstract":"Recent developments in ad hoc and personal networking as well as grid computing have resulted in a range of new applications. In this paper we examine one of these applications from the perspective of its potential users. During a two week field trial a group of 24 high school students were able to use the ad hoc screen sharing application based on Wireless Grids technology. Results show that although students express a general belief in new technologies, they are also reluctant to use it when it comes to their personal situation. For the further development of applications in this area this means that developers should focus on applications that run within a trusted context and/or 'hide' these applications in the lower levels of the protocol stack.","PeriodicalId":382941,"journal":{"name":"2006 2nd IEEE/IFIP International Conference in Central Asia on Internet","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Ad hoc Networking and Grid Computing from the perspective of the user: The case of screen sharing using Wireless Grids\",\"authors\":\"Lidwien De Wijngaert, K. Vermaas\",\"doi\":\"10.1109/CANET.2006.279239\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent developments in ad hoc and personal networking as well as grid computing have resulted in a range of new applications. In this paper we examine one of these applications from the perspective of its potential users. During a two week field trial a group of 24 high school students were able to use the ad hoc screen sharing application based on Wireless Grids technology. Results show that although students express a general belief in new technologies, they are also reluctant to use it when it comes to their personal situation. For the further development of applications in this area this means that developers should focus on applications that run within a trusted context and/or 'hide' these applications in the lower levels of the protocol stack.\",\"PeriodicalId\":382941,\"journal\":{\"name\":\"2006 2nd IEEE/IFIP International Conference in Central Asia on Internet\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 2nd IEEE/IFIP International Conference in Central Asia on Internet\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CANET.2006.279239\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 2nd IEEE/IFIP International Conference in Central Asia on Internet","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CANET.2006.279239","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ad hoc Networking and Grid Computing from the perspective of the user: The case of screen sharing using Wireless Grids
Recent developments in ad hoc and personal networking as well as grid computing have resulted in a range of new applications. In this paper we examine one of these applications from the perspective of its potential users. During a two week field trial a group of 24 high school students were able to use the ad hoc screen sharing application based on Wireless Grids technology. Results show that although students express a general belief in new technologies, they are also reluctant to use it when it comes to their personal situation. For the further development of applications in this area this means that developers should focus on applications that run within a trusted context and/or 'hide' these applications in the lower levels of the protocol stack.