749 research outputs found
Keep Your Nice Friends Close, but Your Rich Friends Closer -- Computation Offloading Using NFC
The increasing complexity of smartphone applications and services necessitate
high battery consumption but the growth of smartphones' battery capacity is not
keeping pace with these increasing power demands. To overcome this problem,
researchers gave birth to the Mobile Cloud Computing (MCC) research area. In
this paper we advance on previous ideas, by proposing and implementing the
first known Near Field Communication (NFC)-based computation offloading
framework. This research is motivated by the advantages of NFC's short distance
communication, with its better security, and its low battery consumption. We
design a new NFC communication protocol that overcomes the limitations of the
default protocol; removing the need for constant user interaction, the one-way
communication restraint, and the limit on low data size transfer. We present
experimental results of the energy consumption and the time duration of two
computationally intensive representative applications: (i) RSA key generation
and encryption, and (ii) gaming/puzzles. We show that when the helper device is
more powerful than the device offloading the computations, the execution time
of the tasks is reduced. Finally, we show that devices that offload application
parts considerably reduce their energy consumption due to the low-power NFC
interface and the benefits of offloading.Comment: 9 pages, 4 tables, 13 figure
ENHANCING USERSâ EXPERIENCE WITH SMART MOBILE TECHNOLOGY
The aim of this thesis is to investigate mobile guides for use with smartphones. Mobile guides have been successfully used to provide information, personalisation and navigation for the user. The researcher also wanted to ascertain how and in what ways mobile guides can enhance users' experience.
This research involved designing and developing web based applications to run on smartphones. Four studies were conducted, two of which involved testing of the particular application. The applications tested were a museum mobile guide application and a university mobile guide mapping application. Initial testing examined the prototype work for the âChronology of His Majesty Sultan Haji Hassanal Bolkiahâ application. The results were used to assess the potential of using similar mobile guides in Brunei Darussalamâs museums. The second study involved testing of the âKent LiveMapâ application for use at the University of Kent. Students at the university tested this mapping application, which uses crowdsourcing of information to provide live data. The results were promising and indicate that users' experience was enhanced when using the application.
Overall results from testing and using the two applications that were developed as part of this thesis show that mobile guides have the potential to be implemented in Brunei Darussalamâs museums and on campus at the University of Kent. However, modifications to both applications are required to fulfil their potential and take them beyond the prototype stage in order to be fully functioning and commercially viable
Multidimensional catalogs for systematic exploration of component-based design spaces
Most component-based approaches to elaborate software require complete and consistent descriptions of components, but in practical settings components information is incomplete, imprecise and changing, and requirements may be likewise. More realistically deployable are approaches that combine exploration of candidate architectures with their evaluation vis-a-vis requirements, and deal with the fuzzyness of available component information. This article presents an approach to systematic generation, evaluation and re-generation of component assemblies, using potentially incomplete, imprecise, unreliable and changing descriptions of requirements and components. The key ideas are representation of NFRs using architectural policies, systematic reification of policies into mechanisms and components that implement them, multi-dimensional characterizations of these three levels, and catalogs of them. The Azimut framework embodies these ideas and enables traceability of architecture by supporting architecture-level reasoning, and allows architects to engage into systematic exploration of design spaces.
A detailed illustrative example illustrates the approach.1st International Workshop on Advanced Software Engineering: Expanding the Frontiers of Software Technology - Session 1: Software ArchitectureRed de Universidades con Carreras en InformĂĄtica (RedUNCI
A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Social engineering is used as an umbrella term for a broad spectrum of computer exploitations that employ a variety of attack vectors and strategies to psychologically manipulate a user. Semantic attacks are the specific type of social engineering attacks that bypass technical defences by actively manipulating object characteristics, such as platform or system applications, to deceive rather than directly attack the user. Commonly observed examples include obfuscated URLs, phishing emails, drive-by downloads, spoofed web- sites and scareware to name a few. This paper presents a taxonomy of semantic attacks, as well as a survey of applicable defences. By contrasting the threat landscape and the associated mitigation techniques in a single comparative matrix, we identify the areas where further research can be particularly beneficial
Proceedings of the Twenty-Third Annual Software Engineering Workshop
The Twenty-third Annual Software Engineering Workshop (SEW) provided 20 presentations designed to further the goals of the Software Engineering Laboratory (SEL) of the NASA-GSFC. The presentations were selected on their creativity. The sessions which were held on 2-3 of December 1998, centered on the SEL, Experimentation, Inspections, Fault Prediction, Verification and Validation, and Embedded Systems and Safety-Critical Systems
IntegraDos: facilitating the adoption of the Internet of Things through the integration of technologies
TambiĂ©n, han sido analizados los componentes para una integraciĂłn del IoT y cloud computing, concluyendo en la arquitectura Lambda-CoAP. Y por Ășltimo, los desafĂos para una integraciĂłn del IoT y Blockchain han sido analizados junto con una evaluaciĂłn de las posibilidades de los dispositivos del IoT para incorporar nodos de Blockchain. Las contribuciones de esta tesis doctoral contribuyen a acercar la adopciĂłn del IoT en la sociedad, y por tanto, a la expansiĂłn de esta prominente tecnologĂa.
Fecha de lectura de Tesis: 17 de diciembre 2018.El Internet de las Cosas (IoT) fue un nuevo concepto introducido por K. Asthon en 1999 para referirse a un conjunto identificable de objetos conectados a travĂ©s de RFID. Actualmente, el IoT se caracteriza por ser una tecnologĂa ubicua que estĂĄ presente en un gran nĂșmero de ĂĄreas, como puede ser la monitorizaciĂłn de infraestructuras crĂticas, sistemas de trazabilidad o sistemas asistidos para el cuidado de la salud. El IoT estĂĄ cada vez mĂĄs presente en nuestro dĂa a dĂa, cubriendo un gran abanico de posibilidades con el fin de optimizar los procesos y problemas a los que se enfrenta la sociedad. Es por ello por lo que el IoT es una tecnologĂa prometedora que estĂĄ continuamente evolucionando gracias a la continua investigaciĂłn y el gran nĂșmero de dispositivos, sistemas y componentes emergidos cada dĂa. Sin embargo, los dispositivos involucrados en el IoT se corresponden normalmente con dispositivos embebidos con limitaciones de almacenamiento y procesamiento, asĂ como restricciones de memoria y potencia. AdemĂĄs, el nĂșmero de objetos o dispositivos conectados a Internet contiene grandes previsiones de crecimiento para los prĂłximos años, con unas expectativas de 500 miles de millones de objetos conectados para 2030. Por lo tanto, para dar cabida a despliegues globales del IoT, ademĂĄs de suplir las limitaciones que existen, es necesario involucrar nuevos sistemas y paradigmas que faciliten la adopciĂłn de este campo. El principal objetivo de esta tesis doctoral, conocida como IntegraDos, es facilitar la adopciĂłn del IoT a travĂ©s de la integraciĂłn con una serie de tecnologĂas. Por un lado, ha sido abordado cĂłmo puede ser facilitada la gestiĂłn de sensores y actuadores en dispositivos fĂsicos sin tener que acceder y programar las placas de desarrollo. Por otro lado, un sistema para programar aplicaciones del IoT portables, adaptables, personalizadas y desacopladas de los dispositivos ha sido definido
FastPay: High-Performance Byzantine Fault Tolerant Settlement
FastPay allows a set of distributed authorities, some of which are Byzantine,
to maintain a high-integrity and availability settlement system for pre-funded
payments. It can be used to settle payments in a native unit of value
(crypto-currency), or as a financial side-infrastructure to support retail
payments in fiat currencies. FastPay is based on Byzantine Consistent Broadcast
as its core primitive, foregoing the expenses of full atomic commit channels
(consensus). The resulting system has low-latency for both confirmation and
payment finality. Remarkably, each authority can be sharded across many
machines to allow unbounded horizontal scalability. Our experiments demonstrate
intra-continental confirmation latency of less than 100ms, making FastPay
applicable to point of sale payments. In laboratory environments, we achieve
over 80,000 transactions per second with 20 authorities---surpassing the
requirements of current retail card payment networks, while significantly
increasing their robustness
New Waves of IoT Technologies Research â Transcending Intelligence and Senses at the Edge to Create Multi Experience Environments
The next wave of Internet of Things (IoT) and Industrial Internet of Things (IIoT) brings new technological developments that incorporate radical advances in Artificial Intelligence (AI), edge computing processing, new sensing capabilities, more security protection and autonomous functions accelerating progress towards the ability for IoT systems to self-develop, self-maintain and self-optimise. The emergence of hyper autonomous IoT applications with enhanced sensing, distributed intelligence, edge processing and connectivity, combined with human augmentation, has the potential to power the transformation and optimisation of industrial sectors and to change the innovation landscape. This chapter is reviewing the most recent advances in the next wave of the IoT by looking not only at the technology enabling the IoT but also at the platforms and smart data aspects that will bring intelligence, sustainability, dependability, autonomy, and will support human-centric solutions.acceptedVersio
- âŠ