3,849 research outputs found

    Spinning off new ventures: a typology of facilitating services

    Get PDF
    This study analyses the spin-out activity in seven technology transfer units, which are considered to be successes in Europe: Crealys in France, the Top Initiative of the university of Twente in the Netherlands, Leuven R&D at the KUL in Belgium, Business Develop-ment at IMEC in Belgium, BioM in Germany (Munich area), Technology Transfer Partners (TTP) and Scientific Generics, both in Cam-bridge, UK. In each of these institutes, an in depth analysis is made of how they organise the following activities: (1) sensibilisation and Detection of opportunities, (2) management of IPR, (3) selection of spin-out projects, (4) incubation and business plan preparation, (5) financing of these spin-outs and finally (6) the follow-up of spin-outs after start-up. Based upon the analysis of these activities, three different models have been defined: a self selective model, a supportive model and a protective model. In the first model, the specific aim is to generate as many start-ups as possible. Stimulating general entrepreneurship rather than financially or economically attractive companies are thus the goal. This means that sensibilisation and opportunity seeking is the main activity. In the second model, the emphasis lies on creating economically attractive companies with a transitional starter profile. These companies might not yet have a financially attractive business plan but have the ambition to make one in the future. Usually they are based upon the IP generated in the mother institute. Management of IPR and business plan preparation are crucial activities in this model. Finally, the protective model focuses on the creation of financially attractive companies, which receive VC-money at start. In addition to the previous activities, also financing activities are of crucial importance here. In addition to analysing the activities developed in each of these models, also theresources necessary to organise these activities are examined. In the first model, the crucial resources seem to be an experienced entrepreneur as manager who can sensibilise students, researchers and professors to start up a company and public money to facilitate this start up. In the second model, a financially autonomous organisation is needed which is strongly supported by the top management of the university in its activities. This organisation needs to have a minimum critical mass of people specialised in legal issues, IPR and business plan development. In addition, a public-private early stage. Capital fund is needed to support the start-ups. Finally, the protective organisation needs a worldwide recognised leading research team in a particular technology. The tech transfer or business development unit needs to be able to incubate the organisation and facilitate the recruitment of external management, attraction of international early stage venture capital and the formation of the company's intellectual property base

    Digital Copyright Protection: Focus on Some Relevant Solutions

    Get PDF
    Copyright protection of digital content is considered a relevant problem of the current Internet since content digitalization and high performance interconnection networks have greatly increased the possibilities to reproduce and distribute digital content. Digital Rights Management (DRM) systems try to prevent the inappropriate or illegal use of copyrighted digital content. They are promoted by the major global media players, but they are also perceived as proprietary solutions that give rise to classic problems of privacy and fair use. On the other hand, watermarking protocols have become a possible solution to the problem of copyright protection. They have evolved during the last decade, and interesting proposals have been designed. This paper first presents current trends concerning the most significant solutions to the problem of copyright protection based on DRM systems and then focuses on the most promising approaches in the field of watermarking protocols. In this regard, the examined protocols are discussed in order to individuate which of them can better represent the right trade-off between opposite goals, such as, for example, security and easy of use, so as to prove that it is possible to implement open solutions compatible with the current web context without resorting to proprietary architectures or impairing the protection of copyrighted digital content

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Software-implemented attack tolerance for critical information retrieval

    Get PDF
    The fast-growing reliance of our daily life upon online information services often demands an appropriate level of privacy protection as well as highly available service provision. However, most existing solutions have attempted to address these problems separately. This thesis investigates and presents a solution that provides both privacy protection and fault tolerance for online information retrieval. A new approach to Attack-Tolerant Information Retrieval (ATIR) is developed based on an extension of existing theoretical results for Private Information Retrieval (PIR). ATIR uses replicated services to protect a user's privacy and to ensure service availability. In particular, ATIR can tolerate any collusion of up to t servers for privacy violation and up to ƒ faulty (either crashed or malicious) servers in a system with k replicated servers, provided that k ≥ t + ƒ + 1 where t ≥ 1 and ƒ ≤ t. In contrast to other related approaches, ATIR relies on neither enforced trust assumptions, such as the use of tanker-resistant hardware and trusted third parties, nor an increased number of replicated servers. While the best solution known so far requires k (≥ 3t + 1) replicated servers to cope with t malicious servers and any collusion of up to t servers with an O(n^*^) communication complexity, ATIR uses fewer servers with a much improved communication cost, O(n1/2)(where n is the size of a database managed by a server).The majority of current PIR research resides on a theoretical level. This thesis provides both theoretical schemes and their practical implementations with good performance results. In a LAN environment, it takes well under half a second to use an ATIR service for calculations over data sets with a size of up to 1MB. The performance of the ATIR systems remains at the same level even in the presence of server crashes and malicious attacks. Both analytical results and experimental evaluation show that ATIR offers an attractive and practical solution for ever-increasing online information applications

    Effects of demand-side financing on utilisation, experiences and outcomes of maternity care in low- and middle-income countries: a systematic review.

    Get PDF
    Demand-side financing, where funds for specific services are channelled through, or to, prospective users, is now employed in health and education sectors in many low- and middle-income countries. This systematic review aimed to critically examine the evidence on application of this approach to promote maternal health in these settings. Five modes were considered: unconditional cash transfers, conditional cash transfers, short-term payments to offset costs of accessing maternity services, vouchers for maternity services, and vouchers for merit goods. We sought to assess the effects of these interventions on utilisation of maternity services and on maternal health outcomes and infant health, the situation of underprivileged women and the healthcare system
    • …
    corecore