22,373 research outputs found
WARP: A ICN architecture for social data
Social network companies maintain complete visibility and ownership of the
data they store. However users should be able to maintain full control over
their content. For this purpose, we propose WARP, an architecture based upon
Information-Centric Networking (ICN) designs, which expands the scope of the
ICN architecture beyond media distribution, to provide data control in social
networks. The benefit of our solution lies in the lightweight nature of the
protocol and in its layered design. With WARP, data distribution and access
policies are enforced on the user side. Data can still be replicated in an ICN
fashion but we introduce control channels, named \textit{thread updates}, which
ensures that the access to the data is always updated to the latest control
policy. WARP decentralizes the social network but still offers APIs so that
social network providers can build products and business models on top of WARP.
Social applications run directly on the user's device and store their data on
the user's \textit{butler} that takes care of encryption and distribution.
Moreover, users can still rely on third parties to have high-availability
without renouncing their privacy
Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays
Major wireless operators are nowadays facing network capacity issues in
striving to meet the growing demands of mobile users. At the same time,
3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g.,
Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a
content dissemination framework that harnesses ad hoc communication
opportunities to minimize the load on the wireless infrastructure while
guaranteeing tight delivery delays. It achieves this through a control loop
that collects user-sent acknowledgements to determine if new copies need to be
reinjected into the network through the 3G interface. Push-and-Track includes
multiple strategies to determine how many copies of the content should be
injected, when, and to whom. The short delay-tolerance of common content, such
as news or road traffic updates, make them suitable for such a system. Based on
a realistic large-scale vehicular dataset from the city of Bologna composed of
more than 10,000 vehicles, we demonstrate that Push-and-Track consistently
meets its delivery objectives while reducing the use of the 3G network by over
90%.Comment: Accepted at IEEE WoWMoM 2011 conferenc
A high-performance data structure for mobile information systems
Mobile information systems can now be provided on small form-factor computers. Dictionary-based data compression extends the capabilities of systems with limited processing and memory to enable data intensive applications to be supported in such environments. The nature of judicial sentencing decisions requires that a support system provides accurate and up-to-date data and is compatible with the professional working experience of a judge. The difficulties caused by mobility and the data dependence of the decision-making process are addressed by an Internet-based architecture for collecting and distributing system data.We describe an approach to dictionary-based data compression and the structure of an information system that makes use of this technology
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment
Recommended from our members
Client-server-based LBS architecture: A novel positioning module for improved positioning performance
Permission to distribute obtained from publisher.This work presents a new efficient positioning module that operates over client-server LBS architectures. The
aim of the proposed module is to fulfil the position information requirements for LBS pedestrian applications
by ensuring the availability of reliable, highly accurate and precise position solutions based on GPS single
frequency (L1) positioning service. The positioning module operates at both LBS architecture sides; the client
(mobile device), and the server (positioning server). At the server side, the positioning module is responsible
for correcting userâs location information based on WADGPS corrections. In addition, at the mobile side,
the positioning module is continually in charge for monitoring the integrity and available of the position
solutions as well as managing the communication with the server. The integrity monitoring was based on
EGNOS integrity methods. A prototype of the proposed module was developed and used in experimental trials
to evaluate the efficiency of the module in terms of the achieved positioning performance. The positioning
module was capable of achieving a horizontal accuracy of less than 2 meters with a 95% confidence level
with integrity improvement of more than 30% from existing GPS/EGNOS services
A framework for the forensic investigation of unstructured email relationship data
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. Moreover, email investigations may involve many hundreds of actors and thousands of messages. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation
Horizon Report 2009
El informe anual Horizon investiga, identifica y clasifica las tecnologĂas emergentes que los expertos que lo elaboran prevĂ©n tendrĂĄn un impacto en la enseñanza aprendizaje, la investigaciĂłn y la producciĂłn creativa en el contexto educativo de la enseñanza superior. TambiĂ©n estudia las tendencias clave que permiten prever el uso que se harĂĄ de las mismas y los retos que ellos suponen para las aulas. Cada ediciĂłn identifica seis tecnologĂas o prĂĄcticas. Dos cuyo uso se prevĂ© emergerĂĄ en un futuro inmediato (un año o menos) dos que emergerĂĄn a medio plazo (en dos o tres años) y dos previstas a mĂĄs largo plazo (5 años)
Determinants in the on-line distribution of digital content: an exploratory analysis
This article shows the phases â and discusses the results â of an empirical analysis addressing the legal
business models that are adopted online to distribute digital content
- âŠ