5,206 research outputs found
COBRA framework to evaluate e-government services: A citizen-centric perspective
E-government services involve many stakeholders who have different objectives that can have an impact on success. Among these stakeholders, citizens are the primary stakeholders of government activities. Accordingly, their satisfaction plays an important role in e-government success. Although several models have been proposed to assess the success of e-government services through measuring users' satisfaction levels, they fail to provide a comprehensive evaluation model. This study provides an insight and critical analysis of the extant literature to identify the most critical factors and their manifested variables for user satisfaction in the provision of e-government services. The various manifested variables are then grouped into a new quantitative analysis framework consisting of four main constructs: cost; benefit; risk and opportunity (COBRA) by analogy to the well-known SWOT qualitative analysis framework. The COBRA measurement scale is developed, tested, refined and validated on a sample group of e-government service users in Turkey. A structured equation model is used to establish relationships among the identified constructs, associated variables and users' satisfaction. The results confirm that COBRA framework is a useful approach for evaluating the success of e-government services from citizens' perspective and it can be generalised to other perspectives and measurement contexts. Crown Copyright © 2014.PIAP-GA-2008-230658) from the European Union Framework Program and another grant (NPRP 09-1023-5-158) from the Qatar National Research Fund (amember of Qatar Foundation
Target and (Astro-)WISE technologies - Data federations and its applications
After its first implementation in 2003 the Astro-WISE technology has been
rolled out in several European countries and is used for the production of the
KiDS survey data. In the multi-disciplinary Target initiative this technology,
nicknamed WISE technology, has been further applied to a large number of
projects. Here, we highlight the data handling of other astronomical
applications, such as VLT-MUSE and LOFAR, together with some non-astronomical
applications such as the medical projects Lifelines and GLIMPS, the MONK
handwritten text recognition system, and business applications, by amongst
others, the Target Holding. We describe some of the most important lessons
learned and describe the application of the data-centric WISE type of approach
to the Science Ground Segment of the Euclid satellite.Comment: 9 pages, 5 figures, Proceedngs IAU Symposium No 325 Astroinformatics
201
Traffic monitoring for assuring quality of advanced services in future internet
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-21560-5_16Services based on packet switched networks are becoming dominant in telecommunication business and both operators and service providers must evolve in order to guarantee the required quality. Increasing bandwidth is no longer a viable solution because of the business erosion for network operators which cannot expect revenues due to the large investments required to satisfy new applications demand of bandwidth. This paper presents devices and a specific architecture of services monitoring platform that allows network operators and service providers to analyze the perceived quality of service and check their service level agreements. Thus, a cost-effective service management, based on direct IP traffic measuring, can be supported on integrated monitoring systems to provide network-centric mechanisms for differentiated quality of service, security and other advanced services.This work has been partially developed in the framework of the Celtic and EUREKA initiative IPNQSIS (IP Network Monitoring for Quality of Service Intelligent Support)
Living Innovation Laboratory Model Design and Implementation
Living Innovation Laboratory (LIL) is an open and recyclable way for
multidisciplinary researchers to remote control resources and co-develop user
centered projects. In the past few years, there were several papers about LIL
published and trying to discuss and define the model and architecture of LIL.
People all acknowledge about the three characteristics of LIL: user centered,
co-creation, and context aware, which make it distinguished from test platform
and other innovation approaches. Its existing model consists of five phases:
initialization, preparation, formation, development, and evaluation.
Goal Net is a goal-oriented methodology to formularize a progress. In this
thesis, Goal Net is adopted to subtract a detailed and systemic methodology for
LIL. LIL Goal Net Model breaks the five phases of LIL into more detailed steps.
Big data, crowd sourcing, crowd funding and crowd testing take place in
suitable steps to realize UUI, MCC and PCA throughout the innovation process in
LIL 2.0. It would become a guideline for any company or organization to develop
a project in the form of an LIL 2.0 project.
To prove the feasibility of LIL Goal Net Model, it was applied to two real
cases. One project is a Kinect game and the other one is an Internet product.
They were both transformed to LIL 2.0 successfully, based on LIL goal net based
methodology. The two projects were evaluated by phenomenography, which was a
qualitative research method to study human experiences and their relations in
hope of finding the better way to improve human experiences. Through
phenomenographic study, the positive evaluation results showed that the new
generation of LIL had more advantages in terms of effectiveness and efficiency.Comment: This is a book draf
Domain-specific Architectures for Data-intensive Applications
Graphs' versatile ability to represent diverse relationships, make them effective for a wide range of applications. For instance, search engines use graph-based applications to provide high-quality search results. Medical centers use them to aid in patient diagnosis. Most recently, graphs are also being employed to support the management of viral pandemics. Looking forward, they are showing promise of being critical in unlocking several other opportunities, including combating the spread of fake content in social networks, detecting and preventing fraudulent online transactions in a timely fashion, and in ensuring collision avoidance in autonomous vehicle navigation, to name a few. Unfortunately, all these applications require more computational power than what can be provided by conventional computing systems. The key reason is that graph applications present large working sets that fail to fit in the small on-chip storage of existing computing systems, while at the same time they access data in seemingly unpredictable patterns, thus cannot draw benefit from traditional on-chip storage.
In this dissertation, we set out to address the performance limitations of existing computing systems so to enable emerging graph applications like those described above. To achieve this, we identified three key strategies: 1) specializing memory architecture, 2) processing data near its storage, and 3) message coalescing in the network. Based on these strategies, this dissertation develops several solutions: OMEGA, which employs specialized on-chip storage units, with co-located specialized compute engines to accelerate the computation; MessageFusion, which coalesces messages in the interconnect; and Centaur, providing an architecture that optimizes the processing of infrequently-accessed data. Overall, these solutions provide 2x in performance improvements, with negligible hardware overheads, across a wide range of applications.
Finally, we demonstrate the applicability of our strategies to other data-intensive domains, by exploring an acceleration solution for MapReduce applications, which achieves a 4x performance speedup, also with negligible area and power overheads.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/163186/1/abrahad_1.pd
An analysis of mobile internet service in Thailand: Implications for bridging digital divide
Mobile Internet is growing around the world without exception for developing countries like Thailand by passing the poor legacy wired infrastructure. This study attempts to provide guidance to a national regulatory agency (NRA) by addressing the following question: What are the key determining factors to explain the probability that individual consumer will use mobile Internet? The discrete choice model is employed to empirically examine whether the service and application attributes, socio-economic variables and service provider has systematic link with the decision of consumer. The data from a national survey in 2010 commissioned by the National Telecommunications Commission (NTC) of Thailand is used for the analysis. Based on the findings, fixed telephony, e-mail, age, area of living and mobile operator are recognized as the strongest determinants for mobile Internet adoption. The findings suggest that the mobile Internet becomes an alternative technology to bridge the digital divide since a group of people who have no fixed Internet connection at home they can connect the Internet via mobile Internet. As such, telecom regulator and policy makers need to consider the policies regarding to infrastructure investment frequency allocation, content and application development and competition in order to stimulate the growth of mobile Internet adoption and close the digital divide within country. --Mobile Internet,digital divide,developing country
Security supportive energy-aware scheduling and energy policies for cloud environments
Cloud computing (CC) systems are the most popular computational environments for providing elastic
and scalable services on a massive scale. The nature of such systems often results in energy-related
problems that have to be solved for sustainability, cost reduction, and environment protection.
In this paper we defined and developed a set of performance and energy-aware strategies for resource
allocation, task scheduling, and for the hibernation of virtual machines. The idea behind this model is to
combine energy and performance-aware scheduling policies in order to hibernate those virtual machines
that operate in idle state. The efficiency achieved by applying the proposed models has been tested using
a realistic large-scale CC system simulator. Obtained results show that a balance between low energy
consumption and short makespan can be achieved.
Several security constraints may be considered in this model. Each security constraint is characterized
by: (a) Security Demands (SD) of tasks; and (b) Trust Levels (TL) provided by virtual machines. SD and TL
are computed during the scheduling process in order to provide proper security services.
Experimental results show that the proposed solution reduces up to 45% of the energy consumption
of the CC system. Such significant improvement was achieved by the combination of an energy-aware
scheduler with energy-efficiency policies focused on the hibernation of VMs.COST Action IC140
The Role of Social Agile Practices for Direct and Indirect Communication in Information Systems Development Teams
Methods for Agile information systems development (ISD) are widely accepted in industry. One key difference in comparison to traditional, plan-driven ISD approaches is that Agile ISD teams rely heavily on direct, informal face-to-face communication instead of indirect and formal documents, models, and plans. While the importance of communication in Agile ISD is generally acknowledged, empirical studies investigating this phenomenon are scarce. We empirically open up the “black box” of the Agile ISD process to enhance the knowledge about the communication mechanisms of Agile ISD teams. We conducted a case study at two medium-sized ISD companies. As our primary data collection technique, we carried out semi-structured interviews, which we complemented with observations and, in one case, a survey. Our study’s main contribution is a set of so-called social Agile practices that positively impact the direct communication of team members. Our data suggests including the Agile practices co-located office space, daily stand-up meeting, iteration planning meeting, pair programming, sprint retrospective, and sprint review in this set. Furthermore, we investigate the role of more formal, indirect communication in Agile ISD projects. We highlight areas in which formal documents remain important so that a trade-off between indirect and direct communication is necessary
- …