61,136 research outputs found

    When Things Matter: A Data-Centric View of the Internet of Things

    Full text link
    With the recent advances in radio-frequency identification (RFID), low-cost wireless sensor devices, and Web technologies, the Internet of Things (IoT) approach has gained momentum in connecting everyday objects to the Internet and facilitating machine-to-human and machine-to-machine communication with the physical world. While IoT offers the capability to connect and integrate both digital and physical entities, enabling a whole new class of applications and services, several significant challenges need to be addressed before these applications and services can be fully realized. A fundamental challenge centers around managing IoT data, typically produced in dynamic and volatile environments, which is not only extremely large in scale and volume, but also noisy, and continuous. This article surveys the main techniques and state-of-the-art research efforts in IoT from data-centric perspectives, including data stream processing, data storage models, complex event processing, and searching in IoT. Open research issues for IoT data management are also discussed

    Mobile support in CSCW applications and groupware development frameworks

    No full text
    Computer Supported Cooperative Work (CSCW) is an established subset of the field of Human Computer Interaction that deals with the how people use computing technology to enhance group interaction and collaboration. Mobile CSCW has emerged as a result of the progression from personal desktop computing to the mobile device platforms that are ubiquitous today. CSCW aims to not only connect people and facilitate communication through using computers; it aims to provide conceptual models coupled with technology to manage, mediate, and assist collaborative processes. Mobile CSCW research looks to fulfil these aims through the adoption of mobile technology and consideration for the mobile user. Facilitating collaboration using mobile devices brings new challenges. Some of these challenges are inherent to the nature of the device hardware, while others focus on the understanding of how to engineer software to maximize effectiveness for the end-users. This paper reviews seminal and state-of-the-art cooperative software applications and development frameworks, and their support for mobile devices

    Context Aware Computing for The Internet of Things: A Survey

    Get PDF
    As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201

    A Taxonomy of Self-configuring Service Discovery Systems

    Get PDF
    We analyze the fundamental concepts and issues in service discovery. This analysis places service discovery in the context of distributed systems by describing service discovery as a third generation naming system. We also describe the essential architectures and the functionalities in service discovery. We then proceed to show how service discovery fits into a system, by characterizing operational aspects. Subsequently, we describe how existing state of the art performs service discovery, in relation to the operational aspects and functionalities, and identify areas for improvement

    Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture

    Get PDF
    The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures. The author spends a large majority of the paper delineating China’s Internet infrastructure and prevalent Internet Censorship Technologies/Techniques (ICTs), paying particular attention to how the ICTs function at a technical level. The author further analyzes the state of Internet Censorship in both Iran and Russia from a broader perspective to give a better understanding of Internet Censorship around the globe. The author also highlights specific CTs, explaining how they function at a technical level. Findings indicate that among all three nation-states, state control of Internet Service Providers is the backbone of Internet Censorship. Specifically, within China, it is discovered that the infrastructure functions as an Intranet, thereby creating a closed system. Further, BGP Hijacking, DNS Poisoning, and TCP RST attacks are analyzed to understand their use-case within China. It is found that Iran functions much like a weaker version of China in regards to ICTs, with the state seemingly using the ICT of Bandwidth Throttling rather consistently. Russia’s approach to Internet censorship, in stark contrast to Iran and China, is found to rely mostly on the legislative system and fear to implement censorship, though their technical level of ICT implementation grows daily. TOR, VPNs, and Proxy Servers are all analyzed and found to be robust CTs. Drawing primarily from the examples given throughout the paper, the author highlights the various effects of Internet Censorship on culture – noting that at its core, Internet Censorship destroys democracy

    A usability study of online library systems: A case of Sultanah Bahiyah Library, Universiti Utara Malaysia

    Get PDF
    The purpose of this study was to investigate usability of online library systems in Universiti Utara Malaysia (UUM). This study evaluated the usability of Sultanah Bahiyah Library’s web based systems by investigating the aspects of simplicity, comfort, user friendliness, control, readability, information adequacy/task match, navigability, recognition, access time, relevancy, consistency and visual presentation. This study examined user’s views about the usability of digital libraries whereas current and perceived importance. A sample of 45 students of Master of Business Administration (MBA) has been chosen. The Sultanah Bahiyah Library’s web based systems is very important especially for students and academic staffs of Universiti Utara Malaysia. The usability of the Library’s web based systems makes students easy to connect and for that the website should be helpful and attractive within good contents. The result found that the parallel nature of the users’ current views about the usability of digital libraries and users’ perceived importance of digital library usability allows direct comparison of all usability properties. The overall results yielded significant difference for the variables of user’s current views and perceived importance

    Achieving a designed customer experience across multiple delivery platforms: A telco perspective

    Get PDF
    'Customer experience' is a term that covers a wide range of activities that take place between suppliers and users of products and services. LaSalle and Britton define it as 'a holistic experience which involves a person - as opposed to a customer - as a whole at different levels and in every interaction between such person and a company' (2003). This research considers a key aspect of such an holistic experience: that which is embodied in the product or service under consideration. In the context of increasing mobile technology convergence, the paper considers new approaches that focus on developing the necessary underlying enablers and common interaction flows that are required to deliver a designed experience, taking into account the increasing number of mobile operating systems and service delivery platforms. Ultimately these models move towards allowing users to 'co-create their own unique experiences' (Pralahad and Ramswamy, 2004). The convergence between IT and telecommunications domains presents a unique challenge to product and service designers. Services are increasingly accessible via multiple delivery devices and delivery networks. This trend has been seen most recently in the advent of Internet based services being delivered via mobile phones where 'mobile service delivery and technologies have become the glue between previously secluded 'telecom' and "IT' domains' (Karrberg and Liebenau, 2006). At the same time network operators are trying to tighten their relationship with their customers by offering 'sticky' services aimed at raising the barriers to customer mobility. These two trends lead to a new design challenge: how to design a recognisably consistent and compelling product customer experience that applies over all delivery services, operating systems and networks. Solutions to this problem have to date been either technology led, focussing on integrated delivery platforms, or reliant on rule-based design. Crucial to this analysis is the 'role Please use this identifier to cite or link to this item
    • 

    corecore