4,875 research outputs found

    Public transit route planning through lightweight linked data interfaces

    Get PDF
    While some public transit data publishers only provide a data dump – which only few reusers can afford to integrate within their applications – others provide a use case limiting origin-destination route planning api. The Linked Connections framework instead introduces a hypermedia api, over which the extendable base route planning algorithm “Connections Scan Algorithm” can be implemented. We compare the cpu usage and query execution time of a traditional server-side route planner with the cpu time and query execution time of a Linked Connections interface by evaluating query mixes with increasing load. We found that, at the expense of a higher bandwidth consumption, more queries can be answered using the same hardware with the Linked Connections server interface than with an origin-destination api, thanks to an average cache hit rate of 78%. The findings from this research show a cost-efficient way of publishing transport data that can bring federated public transit route planning at the fingertips of anyone

    Fourteenth Biennial Status Report: März 2017 - February 2019

    No full text

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    Integrated Scenario-based Design Methodology for Collaborative Technology Innovation

    Get PDF
    The paper presents a scenario-based methodology developed and tested throughout cooperative research and development projects. It is aimed at supporting information technology innovation with an end-to-end Human and Social Sciences assistance. This methodology provides an integrated approach combining a vision of the potential users, business aspects and technological challenges throughout the design process. An original combination of different methods is proposed and experimented: user-centred design, scenario-based design, user and functional requirements analysis, business value analysis, user acceptance studies, and visualization methods. This methodology has been implemented in three European R&D projects, in the domain of the telecommunications and Internet infrastructure. The key contributions of this approach are that it unifies brings together visions of the users, potential business value and technology challenges thanks to scenario construction.Scenario-based design ; user requirements ; business economics ; functional requirements ; visualization

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    Innovation in Mobile Learning: A European Perspective

    Get PDF
    In the evolving landscape of mobile learning, European researchers have conducted significant mobile learning projects, representing a distinct perspective on mobile learning research and development. Our paper aims to explore how these projects have arisen, showing the driving forces of European innovation in mobile learning. We propose context as a central construct in mobile learning and examine theories of learning for the mobile world, based on physical, technological, conceptual, social and temporal mobility. We also examine the impacts of mobile learning research on educational practices and the implications for policy. Throughout, we identify lessons learnt from European experiences to date

    HABITAT: An IoT Solution for Independent Elderly

    Get PDF
    In this work, a flexible and extensive digital platform for Smart Homes is presented, exploiting the most advanced technologies of the Internet of Things, such as Radio Frequency Identification, wearable electronics, Wireless Sensor Networks, and Artificial Intelligence. Thus, the main novelty of the paper is the system-level description of the platform flexibility allowing the interoperability of different smart devices. This research was developed within the framework of the operative project HABITAT (Home Assistance Based on the Internet of Things for the Autonomy of Everybody), aiming at developing smart devices to support elderly people both in their own houses and in retirement homes, and embedding them in everyday life objects, thus reducing the expenses for healthcare due to the lower need for personal assistance, and providing a better life quality to the elderly users
    corecore