9,791 research outputs found
Virtual Location-Based Services: Merging the Physical and Virtual World
Location-based services gained much popularity through providing users with
helpful information with respect to their current location. The search and
recommendation of nearby locations or places, and the navigation to a specific
location are some of the most prominent location-based services. As a recent
trend, virtual location-based services consider webpages or sites associated
with a location as 'virtual locations' that online users can visit in spite of
not being physically present at the location. The presence of links between
virtual locations and the corresponding physical locations (e.g., geo-location
information of a restaurant linked to its website), allows for novel types of
services and applications which constitute virtual location-based services
(VLBS). The quality and potential benefits of such services largely depends on
the existence of websites referring to physical locations. In this paper, we
investigate the usefulness of linking virtual and physical locations. For this,
we analyze the presence and distribution of virtual locations, i.e., websites
referring to places, for two Irish cities. Using simulated tracks based on a
user movement model, we investigate how mobile users move through the Web as
virtual space. Our results show that virtual locations are omnipresent in urban
areas, and that the situation that a user is close to even several such
locations at any time is rather the normal case instead of the exception
Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability
The fifth generation (5G) mobile telecommunication network is expected to
support Multi- Access Edge Computing (MEC), which intends to distribute
computation tasks and services from the central cloud to the edge clouds.
Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services,
the current mobile network security architecture should enable a more
decentralized approach for authentication and authorization processes. This
paper proposes a novel decentralized authentication architecture that supports
flexible and low-cost local authentication with the awareness of context
information of network elements such as user equipment and virtual network
functions. Based on a Markov model for backhaul link quality, as well as a
random walk mobility model with mixed mobility classes and traffic scenarios,
numerical simulations have demonstrated that the proposed approach is able to
achieve a flexible balance between the network operating cost and the MEC
reliability.Comment: Accepted by IEEE Access on Feb. 02, 201
Big data for monitoring educational systems
This report considers “how advances in big data are likely to transform the context and methodology of monitoring educational systems within a long-term perspective (10-30 years) and impact the evidence based policy development in the sector”, big data are “large amounts of different types of data produced with high velocity from a high number of various types of sources.” Five independent experts were commissioned by Ecorys, responding to themes of: students' privacy, educational equity and efficiency, student tracking, assessment and skills. The experts were asked to consider the “macro perspective on governance on educational systems at all levels from primary, secondary education and tertiary – the latter covering all aspects of tertiary from further, to higher, and to VET”, prioritising primary and secondary levels of education
Support for the Rightscon Toronto 2018 conference
The report documents key advances, significant research findings, important outcomes, and innovative outputs of the conference. RightsCon is the leading global summit on human rights in the digital age. By bringing together a diverse community of world leading experts, a wide-ranging program addressed key issues at the intersection of human rights, technology, and society. Thousands of the world’s leading experts convened to participate in, and advance conversations around these issues. Twelve hundred participants (from Azerbaijan, Brazil, Cameroon, Egypt, Gambia, Honduras, India, Kenya, Malaysia, Nigeria, Pakistan, Syria, Thailand, Uganda, Venezuela, Zimbabwe, and other Global South countries) received complimentary tickets
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
The market, the regulator, and the government: Making a blockchain ecosystem in the Netherlands
This article presents a socio-anthropological analysis of the formation of a business ecosystem around blockchain technology in the Netherlands, within the broader context of the European Union and the digital single market. I argue that while reproducing widespread global models of business group and network formation, the relations created by these networks also reveal particularities of local business and governance cultures. Such particularities emerge from the pragmatics of collaboration and competitive market relationships, as well as legal heterogeneity and plans for legal harmonisation in digital innovation and governance in Europe. They also emerge from the challenges and transformations that current experimentation cultures for digital innovation bring to the interactions between market players, regulators, and government. These challenges and transformations materialise in increasingly informal connections and strategies for experimental legitimisation, which occur in parallel to more formal and traditional forms of regulatory and governmental interaction. The article is based on ethnographic fieldwork in the Netherlands and in online terrains, including observation periods and 32 interviews with entrepreneurial project teams, as well as with individuals involved in financial incumbents’ innovation labs
- …