9,791 research outputs found

    Virtual Location-Based Services: Merging the Physical and Virtual World

    Get PDF
    Location-based services gained much popularity through providing users with helpful information with respect to their current location. The search and recommendation of nearby locations or places, and the navigation to a specific location are some of the most prominent location-based services. As a recent trend, virtual location-based services consider webpages or sites associated with a location as 'virtual locations' that online users can visit in spite of not being physically present at the location. The presence of links between virtual locations and the corresponding physical locations (e.g., geo-location information of a restaurant linked to its website), allows for novel types of services and applications which constitute virtual location-based services (VLBS). The quality and potential benefits of such services largely depends on the existence of websites referring to physical locations. In this paper, we investigate the usefulness of linking virtual and physical locations. For this, we analyze the presence and distribution of virtual locations, i.e., websites referring to places, for two Irish cities. Using simulated tracks based on a user movement model, we investigate how mobile users move through the Web as virtual space. Our results show that virtual locations are omnipresent in urban areas, and that the situation that a user is close to even several such locations at any time is rather the normal case instead of the exception

    Access to information: Challenges and opportunities for the records profession

    Get PDF

    Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability

    Get PDF
    The fifth generation (5G) mobile telecommunication network is expected to support Multi- Access Edge Computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable a more decentralized approach for authentication and authorization processes. This paper proposes a novel decentralized authentication architecture that supports flexible and low-cost local authentication with the awareness of context information of network elements such as user equipment and virtual network functions. Based on a Markov model for backhaul link quality, as well as a random walk mobility model with mixed mobility classes and traffic scenarios, numerical simulations have demonstrated that the proposed approach is able to achieve a flexible balance between the network operating cost and the MEC reliability.Comment: Accepted by IEEE Access on Feb. 02, 201

    Big data for monitoring educational systems

    Get PDF
    This report considers “how advances in big data are likely to transform the context and methodology of monitoring educational systems within a long-term perspective (10-30 years) and impact the evidence based policy development in the sector”, big data are “large amounts of different types of data produced with high velocity from a high number of various types of sources.” Five independent experts were commissioned by Ecorys, responding to themes of: students' privacy, educational equity and efficiency, student tracking, assessment and skills. The experts were asked to consider the “macro perspective on governance on educational systems at all levels from primary, secondary education and tertiary – the latter covering all aspects of tertiary from further, to higher, and to VET”, prioritising primary and secondary levels of education

    Support for the Rightscon Toronto 2018 conference

    Get PDF
    The report documents key advances, significant research findings, important outcomes, and innovative outputs of the conference. RightsCon is the leading global summit on human rights in the digital age. By bringing together a diverse community of world leading experts, a wide-ranging program addressed key issues at the intersection of human rights, technology, and society. Thousands of the world’s leading experts convened to participate in, and advance conversations around these issues. Twelve hundred participants (from Azerbaijan, Brazil, Cameroon, Egypt, Gambia, Honduras, India, Kenya, Malaysia, Nigeria, Pakistan, Syria, Thailand, Uganda, Venezuela, Zimbabwe, and other Global South countries) received complimentary tickets

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Full text link
    Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recently published proof-of-concept attacks, the topic is becoming ever more pressing, especially with the deadline for mandatory implementation in most airspaces fast approaching. This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security. Thereafter, it surveys both the theoretical and practical efforts which have been previously conducted concerning these issues, including possible countermeasures. In addition, the survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.Comment: Survey, 22 Pages, 21 Figure

    The market, the regulator, and the government: Making a blockchain ecosystem in the Netherlands

    Get PDF
    This article presents a socio-anthropological analysis of the formation of a business ecosystem around blockchain technology in the Netherlands, within the broader context of the European Union and the digital single market. I argue that while reproducing widespread global models of business group and network formation, the relations created by these networks also reveal particularities of local business and governance cultures. Such particularities emerge from the pragmatics of collaboration and competitive market relationships, as well as legal heterogeneity and plans for legal harmonisation in digital innovation and governance in Europe. They also emerge from the challenges and transformations that current experimentation cultures for digital innovation bring to the interactions between market players, regulators, and government. These challenges and transformations materialise in increasingly informal connections and strategies for experimental legitimisation, which occur in parallel to more formal and traditional forms of regulatory and governmental interaction. The article is based on ethnographic fieldwork in the Netherlands and in online terrains, including observation periods and 32 interviews with entrepreneurial project teams, as well as with individuals involved in financial incumbents’ innovation labs
    corecore