4,656 research outputs found

    The live social semantics application: A platform for integrating face-to-face presence with on-line social networking

    Get PDF
    We describe a novel application that integrates real-world data on the face-to-face proximity of individuals with their identities and contacts in on-line social networks. This application was successfully deployed at two conference gatherings, ESWC09 and HT2009, and actively used by hundreds of people. Personal profiles of the participants were automatically generated using several Web 2.0 systems and semantic data sources, and integrated in real-time with face-to-face proximity relations detected using RFID-enabled badges. The integration of these heterogeneous data sources enables various services that enhance the experience of conference attendees, allowing them to explore their social neighbourhood and to connect with other participants. This paper describes the architecture of the application, the services we provided, and the results we achieved in these deployments

    Horizon Report 2009

    Get PDF
    El informe anual Horizon investiga, identifica y clasifica las tecnologías emergentes que los expertos que lo elaboran prevén tendrán un impacto en la enseñanza aprendizaje, la investigación y la producción creativa en el contexto educativo de la enseñanza superior. También estudia las tendencias clave que permiten prever el uso que se hará de las mismas y los retos que ellos suponen para las aulas. Cada edición identifica seis tecnologías o prácticas. Dos cuyo uso se prevé emergerá en un futuro inmediato (un año o menos) dos que emergerán a medio plazo (en dos o tres años) y dos previstas a más largo plazo (5 años)

    Digital learning objects: a local response to the California State University system initiative

    Get PDF
    The purpose of this paper is to present a virtual library plan created by library directors of the 23 California State University (CSU) system campuses. The information literacy portion of the project offers a repository of high quality interactive digital learning objects (DLOs) in the MERLOT repository. Therefore, DLOs created locally at the Dr Martin Luther King, Jr Library at San José State University (SJSU) focus on topics that supplement the “core” DLO collection

    Academic and Public Libraries’ Use of Web 2.0 Applications and Services in Mississippi

    Get PDF
    Libraries have guidelines and standards that hold them accountable to be effective institutions (Husid, 2010). The American Library Association’s (ALA) “Library Bill of Rights” sets six basic standards for all libraries to follow. Among other things, these standards encourage libraries to resist forms of censorship, grant access to all types of materials, and resist biases (ALA, 2007). However, as libraries have evolved, so have many of these guidelines and standards with respect to technology specifically. For example, the American Association of School Libraries (AASL) Standards for the 21st Century Learner requires that the students in today’s classroom strive to master technology skills (ALA, 2007). The Young Adult Library Services Association’s (YALSA) Public Library Evaluation Tool and The Competencies for Librarians Serving Youth: Young Adults Deserve the Best supports the use of social networking and Web 2.0 services like blogs and podcasts in the classroom and library (Husid, 2010). The Association of College and Research Libraries (ACRL) Standards for Libraries in Higher Education not only encourages academic libraries to educate students and build a sense of campus community, their principal performance indicator “Discovery” asks libraries to “enable users to discover information in all formats through effective use of technology and organization of knowledge” (ALA, 2011,pg. 9)

    Shall I post this now? Optimized, delay-based privacy protection in social networks

    Get PDF
    The final publication is available at Springer via http://dx.doi.org/10.1007/s10115-016-1010-4Despite the several advantages commonly attributed to social networks such as easiness and immediacy to communicate with acquaintances and friends, significant privacy threats provoked by unexperienced or even irresponsible users recklessly publishing sensitive material are also noticeable. Yet, a different, but equally significant privacy risk might arise from social networks profiling the online activity of their users based on the timestamp of the interactions between the former and the latter. In order to thwart this last type of commonly neglected attacks, this paper proposes an optimized deferral mechanism for messages in online social networks. Such solution suggests intelligently delaying certain messages posted by end users in social networks in a way that the observed online activity profile generated by the attacker does not reveal any time-based sensitive information, while preserving the usability of the system. Experimental results as well as a proposed architecture implementing this approach demonstrate the suitability and feasibility of our mechanism.Peer ReviewedPostprint (author's final draft

    IPTV 2.0 from Triple Play to social TV

    Get PDF
    International audienceThe great success of social technologies is transforming the Internet into a collaborative community. With a vision of IPTV 2.0, this paper presents our research work towards the exploitation of social phenomena in the domain of TV. Based on the advantage of IP Multimedia Subsystem (IMS) service architecture, the current IPTV service is extended from two aspects: TV-enriched communication and sociability-enhanced TV. Two applications namely TV Buddy and Social Electronic Program Guide (EPG) are proposed to demonstrate them respectively. Finally, we developed a prototype system on Ericsson IMS Software Development Studio (SDS)
    corecore