632,712 research outputs found

    Examining the issues & challenges of email & e-communications. 2nd Northumbria Witness Seminar Conference, 24-25 Oct 2007 Northumbria University, Newcastle upon Tyne.

    Get PDF
    These proceedings capture the content of the second Witness Seminar hosted by Northumbria University’s School of Computing, Engineering and Information Sciences. It followed the success of the first witness seminar in terms of its format and style but differed in that it focused on one topic - managing email and other electronic communications technologies from a records perspective. As before the witnesses were invited to share their views and opinions on a specific aspect taking as their starting point a pertinent published article(s). Three seminars explored the business, people and technology perspectives of email and e-communications, asking the following questions: What are the records management implications and challenges of doing business electronically? Are people the problem and the solution? Is technology the problem or panacea? The final seminar, 'Futurewatch', focused on moving forward, exploring new ways of working, potential new technologies and what records professionals and others need to keep on their radar screens

    New Trends in Quantum Computing

    Full text link
    Classical and quantum information are very different. Together they can perform feats that neither could achieve alone, such as quantum computing, quantum cryptography and quantum teleportation. Some of the applications range from helping to preventing spies from reading private communications. Among the tools that will facilitate their implementation, we note quantum purification and quantum error correction. Although some of these ideas are still beyond the grasp of current technology, quantum cryptography has been implemented and the prospects are encouraging for small-scale prototypes of quantum computation devices before the end of the millennium.Comment: 8 pages. Presented at the 13th Symposium on Theoretical Aspects of Computer Science, Grenoble, 22 February 1996. Will appear in the proceedings, Lecture Notes in Computer Science, Springer-Verlag. Standard LaTeX. Requires llncs.sty (included

    A systematic review

    Get PDF
    França, T. J. F., Mamede, H. S., & Dos Santos, V. D. (2020). Managing millennials as outsourced information technology professionals: A systematic review. In Proceedings of the 13th IADIS International Conference ICT, Society and Human Beings 2020, ICT 2020 and Proceedings of the 6th IADIS International Conference Connected Smart Cities 2020, CSC 2020 and Proceedings of the 17th IADIS International Conference Web Based Communities and Social Media 2020, WBC 2020 - Part of the 14th Multi Conference on Computer Science and Information Systems, MCCSIS 2020 (pp. 3-10). (Proceedings of the 13th IADIS International Conference ICT, Society and Human Beings 2020, ICT 2020 and Proceedings of the 6th IADIS International Conference Connected Smart Cities 2020, CSC 2020 and Proceedings of the 17th IADIS International Conference Web Based Communities and Social Media 2020, WBC 2020 - Part of the 14th Multi Conference on Computer Science and Information Systems, MCCSIS 2020). IADIS Press.The Information Technology Outsourcing (ITO) model has been a trend in recent decades, becoming the dominant trend in contemporary outsourcing scenario. Millennials will soon, globally, be the majority of the workforce, having a particular way of relating to organizations and to work itself as no previous generation did. Information technologies continue to employ more and more human resources, having an increasing demand and a shortage of competent resources. It is therefore important to rethink current Human Resources Management (HRM) models and design a new strategic and appropriate model to accommodate and anticipate the needs of managers and monitor the development of this generation as Information Technology (IT) professionals. The intersection and analysis of the Information and Communications Technologies (ICT), millennials, Human Resource Management, outsourcing and organizations is the objective of this study, to identify the most relevant articles regarding millennials as outsourced IT professionals.publishersversionpublishe

    Beaconing Approaches in Vehicular Ad Hoc Networks: A Survey

    Full text link
    A Vehicular Ad hoc Network (VANET) is a type of wireless ad hoc network that facilitates ubiquitous connectivity between vehicles in the absence of fixed infrastructure. Beaconing approaches is an important research challenge in high mobility vehicular networks with enabling safety applications. In this article, we perform a survey and a comparative study of state-of-the-art adaptive beaconing approaches in VANET, that explores the main advantages and drawbacks behind their design. The survey part of the paper presents a review of existing adaptive beaconing approaches such as adaptive beacon transmission power, beacon rate adaptation, contention window size adjustment and Hybrid adaptation beaconing techniques. The comparative study of the paper compares the representatives of adaptive beaconing approaches in terms of their objective of study, summary of their study, the utilized simulator and the type of vehicular scenario. Finally, we discussed the open issues and research directions related to VANET adaptive beaconing approaches.Ghafoor, KZ.; Lloret, J.; Abu Bakar, K.; Sadiq, AS.; Ben Mussa, SA. (2013). Beaconing Approaches in Vehicular Ad Hoc Networks: A Survey. Wireless Personal Communications. 73(3):885-912. doi:10.1007/s11277-013-1222-9S885912733ITS-Standards (1996) Intelligent transportation systems, U.S. Department of Transportation, http://www.standards.its.dot.gov/about.aspCheng, L., Henty, B., Stancil, D., Bai, F., & Mudalige, P. (2005). Mobile vehicle-to-vehicle narrow-band channel measurement and characterization of the 5.9 Ghz dedicated short range communication (DSRC) frequency band. IEEE Transactions on Selected Areas in Communications, 25(8), 1501–1516.van Eenennaam, E., Wolterink, K., Karagiannis, G., & Heijenk, G. (2009). Exploring the solution space of beaconing in vanets. In Proceedings of the 2009 IEEE international vehicular networking conference, Tokyo (pp. 1–8).Torrent-Moreno, M. (2007). Inter-vehicle communications: Assessing information dissemination under safety constraints. In Proceedings of the 2007 IEEE conference wireless on demand network systems and services, Austria (pp. 59–64).Lloret, J., Canovas, A., Catalá, A., & Garcia, M. (2012). Group-based protocol and mobility model for vanets to offer internet access. Journal of Network and Computer Applications 2224–2245 doi: 10.1016j.jnca.2012.02.009 .Nzouonta, J., Rajgure, N., Wang, G., & Borcea, C. (2009). Vanet routing on city roads using real-time vehicular traffic information. IEEE Transactions on Vehicular Technology, 58(7), 3609–3626.Fukui, R., Koike, H., & Okada, H. (2002). Dynamic integrated transmission control(ditrac) over inter-vehicle communications. In Proceedings of the 2002 IEEE vehicular technology conference, Birmingham (pp. 483–487).Schmidt, R., Leinmuller, T., Schoch, E., Kargl, F., & Schafer, G. (2010). Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Network, 24(1), 14–19.Ghafoor, K., Bakar, K., van Eenennaam, E., Khokhar, R., Gonzalez, A. A fuzzy logic approach to beaconing for vehicular ad hoc networks, Accepted for publication in Telecommunication Systems Journal.Ghafoor, K., & Bakar, K. (2010). A novel delay and reliability aware inter vehicle routing protocol. Network Protocols and Algorithms, 2(2), 66–88.Mittag, J., Thomas, F., Härri, J., & Hartenstein, H. (2009). A comparison of single-and multi-hop beaconing in vanets. In Proceedings of the 2009 ACM international workshop on vehicular internetworking, Beijing (pp. 69–78).Sommer, C., Tonguz, O., & Dressler, F. (2010). Adaptive beaconing for delay-sensitive and congestion-aware traffic information systems. In Proceedings of the 2010 IEEE international vehicular networking conference (VNC), New Jersey (pp. 1–8).Guan, X., Sengupta, R., Krishnan, H., & Bai, F. (2007). A feedback-based power control algorithm design for vanet. In Proceedings of the 2007 IEEE international conference on mobile networking for vehicular environments, USA (pp. 67–72).AL-Hashimi, H., Bakar, K., & Ghafoor, K. (2011). Inter-domain proxy mobile ipv6 based vehicular network. Network Protocols and Algorithms, 2(4), 1–15.Rawat, D., Popescu, D., Yan, G., & Olariu, S. (2011). Enhancing vanet performance by joint adaptation of transmission power and contention window size. Transactions on Parallel and Distributed Systems, 22(9), 1528–1535.European-ITS (2009) Eits-technical report 102 638 v1.1.1, European Telecommunications Standards Institute (ETSI), http://www.etsi.org/WebSite/homepage.aspxNHTSA, I. Joint program office”, report to congress on the national highway traffic safety administration its program, program progress during 1992–1996 and strategic plan for 1997–2002, US Department of Transportation, Washington, DC.Godbole, D., Sengupta, R., Misener, J., Kourjanskaia, N., & Michael, J. (1998). Benefit evaluation of crash avoidance systems. Transportation Research, 1621(1), 1–9.Reinders, R., van Eenennaam, M., Karagiannis, G., & Heijenk, G. (2004). Contention window analysis for beaconing in vanets. In Proceedings of the 2011 IEEE international conference on wireless communications and mobile computing (IWCMC), Istanbul (pp. 1481–1487).Yang, L., Guo, J., & Wu, Y. (2008). Channel adaptive one hop broadcasting for vanets. In Proceedings of the 2008 IEEE international conference on intelligent transportation systems, Beijing (pp. 369–374).Tseng, Y., Ni, S., Chen, Y., & Sheu, J. (2002). The broadcast storm problem in a mobile ad hoc network. Wireless Networks, 8(2), 153–167.van Eenennaam, E. M., Karagiannis, G., & Heijenk, G. (2010). Towards scalable beaconing in vanets. In Proceedings of the 2010 ERCIM workshop on eMobility, Lulea (pp. 103–108).Ros, F., Ruiz, P., & Stojmenovic, I. (2012). Acknowledgment-based broadcast protocol for reliable and efficient data dissemination in vehicular ad-hoc networks. IEEE Transactions on Mobile Computing, 11(1), 33–46.Torrent-Moreno, M., Santi, P., & Hartenstein, H. (2006). Distributed fair transmit power adjustment for vehicular ad hoc networks. In Proceedings of the 2007 IEEE international conference on sensor and ad hoc communications and networks, Reston, VA (pp. 479–488).Artimy, M. (2007). Local density estimation and dynamic transmission-range assignment in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 8(3), 400–412.Caizzone, G., Giacomazzi, P., Musumeci, L., & Verticale, G. (2005). A power control algorithm with high channel availability for vehicular ad hoc networks. In Proceedings of the 2005 IEEE international conference on communications, Seoul (pp. 3171–3176).Torrent-Moreno, M., Santi, P., & Hartenstein, H. (2009). Vehicle-to-vehicle communication: Fair transmit power control for safety critical information. IEEE Transaction for Vehicular Technology, 58(7), 3684–3703.Torrent-Moreno, M., Schmidt-Eisenlohr, F., Fubler, H., & Hartenstein, H. (2006). Effects of a realistic channel model on packet forwarding in vehicular ad hoc networks. In Proceedings of the 2007 IEEE conference on wireless communications and networking, USA (pp. 385–391).NS, Network simulator (June 2011). http://nsnam.isi.edu/nsnam/index.php/MainPageNakagami, M. (1960). The m-distribution: A general formula of intensity distribution of rapid fadinge. In W. C. Hoffman (Ed.), Statistical method of radio propagation. New York: Pergamon Press.Narayanaswamy, S., Kawadia, V., Sreenivas, R., & Kumar, P. (2002). Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the compow protocol. In Proceedings of the 2002 European wireless conference next generation wireless networks: technologies, protocols, Italy (pp. 1–6).Cheng, P., Lee, K., Gerla, M., & Harri, J. (2010). Geodtn+ nav: Geographic dtn routing with navigator prediction for urban vehicular environments. Mobile Networks and Applications, 15(1), 61–82.Gomez, J., & Campbell, A. (2004). A case for variable-range transmission power control in wireless multihop networks. In Proceedings twenty-third annual joint conference of the IEEE computer and communications societies, Hong kong (pp. 1425–1436).Ramanathan, R., & Rosales-Hain, R. (2000). Topology control of multihop wireless networks using transmit power adjustment. In Proceedings nineteenth annual joint conference of the IEEE computer and communications societies, Hong kong (pp. 404–413).Artimy, M., Robertson, W., & Phillips, W. (2005). Assignment of dynamic transmission range based on estimation of vehicle density. In Proceedings of the 2nd ACM international workshop on vehicular ad hoc networks, Germany (pp. 40–48).Samara, G., Ramadas, S., & Al-Salihy, W. (2010). Safety message power transmission control for vehicular ad hoc networks. Computer Science, 6(10), 1027–1032.Rezaei, S., Sengupta, R., Krishnan, H., Guan, X., & Student, P. (2008). Adaptive communication scheme for cooperative active safety system.Rezaei, S., Sengupta, R., Krishnan, H., & Guan, X. (2007). Reducing the communication required by dsrc-based vehicle safety systems. In Proceedings of the 2007 IEEE international conference on intelligent transportation systems, Bellevue, WA (pp. 361–366).Sommer, C., Tonguz, O., & Dressler, F. (2011). Traffic information systems: Efficient message dissemination via adaptive beaconing. IEEE Communications Magazine, 49(5), 173–179.Thaina, C., Nakorn, K., & Rojviboonchai, K. (2011). A study of adaptive beacon transmission on vehicular ad-hoc networks. In Proceeding of the 2011 IEEE 13th international conference on communication technology (ICCT), Vancouver (pp. 597–602).Boukerche, A., Rezende, C., & Pazzi, R. (2009). Improving neighbor localization in vehicular ad hoc networks to avoid overhead from periodic messages. In Proceedings of the 2009 IEEE global telecommunications conference, USA (pp. 1–6).Bai, F., Sadagopan, N., & Helmy, A. (2008). Important: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. In Proceedings of the 2003 22th annual joint conference of the IEEE computer and communications, USA (pp. 825–835).Nguyen, H., Bhawiyuga, A., & Jeong, H. (2012). A comprehensive analysis of beacon dissemination in vehicular networks. In Proceedings of the 75th IEEE vehicular technology conference, Korea (pp. 1–5).Djahel, S., & Ghamri-Doudane, Y. (2012). A robust congestion control scheme for fast and reliable dissemination of safety messages in vanets. In Proceeding of the 2012 IEEE conference wireless communications and networking, Paris, France (pp. 2264–2269).O. Technologies (Augast 2012) Opnet modeler, http://www.opnet.com/Huang, C., Fallah, Y., Sengupta, R., & Krishnan, H. (2010). Adaptive intervehicle communication control for cooperative safety systems. IEEE Network, 24(1), 6–13.OPNET (June 2012) Opnet modeler, http://www.opnet.com/Kerner, B. (2004). The physics of traffic: Empirical freeway pattern features, engineering applications, and theory. Berlin: Springer.Vinel, A., Vishnevsky, V., & Koucheryavy, Y. (2008). A simple analytical model for the periodic broadcasting in vehicular ad-hoc networks. In Proceedings of the 2008 IEEE international GLOBECOM workshops, Philadelphia, PA (pp. 1–5).Mariyasagayam, N., Menouar, H., & Lenardi, M. (2009). An adaptive forwarding mechanism for data dissemination in vehicular networks. In Proceedings of the 2009 IEEE Vehicular Networking Conference, Boston (pp. 1–5).Hung, C., Chan, H., & Wu, E. (2008). Mobility pattern aware routing for heterogeneous vehicular networks. In Proceedings of the 2008 international conference on wireless communications and networking, Las Vegas (pp. 2200–2205).Yang, K., Ou, S., Chen, H., & He, J. (2007). A multihop peer-communication protocol with fairness guarantee for ieee 802.16-based vehicular networks. IEEE Transactions on Vehicular Technology, 56(6), 3358–3370.Lequerica, I., Ruiz, P., & Cabrera, V. (2010). Improvement of vehicular communications by using 3G capabilities to disseminate control information. IEEE Network Magazine, 24(1), 32–38.Oh, D., Kim, P., Song, J., Jeon, S., & Lee, H. (2005). Design considerations of satellite-based vehicular broadband networks. IEEE Wireless Communications Magazine, 12(5), 91–97.Ko, Y., Sim, M., & Nekovee, M. (2006). Wi-fi based broadband wireless access for users on the road. BT Technology Journal, 24(2), 123–129.Choffnes, D., & Bustamante, F. (2005). An integrated mobility and traffic model for vehicular wireless networks. In Proceedings of the 2005 ACM international workshop on vehicular ad hoc networks, Cologne (pp. 69–78).TIGER (October 2010) Topologically integrated geographic encoding and referencing system, http://www.census.gov/geo/www/tiger/Mittag, J., Thomas, F., Harri, J., & Hartenstein, H. (2009). A comparison of single and multi-hop beaconing in vanets. In Proceedings of the 2009 ACM international workshop on vehiculaar internetworking, Beijing (pp. 69–78).Rappaport, T. (1996). Wireless communications: Principles and practice (2nd ed.). New Jersey: Prentice Hall PTR

    Information and Communications Technology in Developing, Emerging and Transition Economies: An Assessment of Research

    Get PDF
    Information and communications technology (ICT) is a crucial driving force in economic globalization and the principal enabler in building a highly connected world. However, despite the ever-increasing importance of ICT in developing economies, the mainstream information system research remains focused on ICT in the limited number of highly developed countries. Comparatively little research is being reported that specifically addresses the issues that arise from using ICT in developing, emerging and transition economies. In this paper, we review twenty-five papers in this topic area that have been published in past proceedings of the Americas Conference on Information Systems (AMCIS). Based on this review, trends and shortcomings in the existing research are discussed and new research opportunities are proposed

    Experimental investigation of pulsed entangled photons and photonic quantum channels

    Full text link
    The development of key devices and systems in quantum information technology, such as entangled particle sources, quantum gates and quantum cryptographic systems, requires a reliable and well-established method for characterizing how well the devices or systems work. We report our recent work on experimental characterization of pulsed entangled photonic states and photonic quantum channels, using the methods of state and process tomography. By using state tomography, we could reliably evaluate the states generated from a two-photon source under development and develop a highly entangled pulsed photon source. We are also devoted to characterization of single-qubit and two-qubit photonic quantum channels. Characterization of typical single-qubit decoherence channels has been demonstrated using process tomography. Characterization of two-qubit channels, such as classically correlated channels and quantum mechanically correlated channels is under investigation. These characterization techniques for quantum states and quantum processes will be useful for developing photonic quantum devices and for improving their performances.Comment: 12 pages, 8 figures, in Quantum Optics in Computing and Communications, Songhao Liu, Guangcan Guo, Hoi-Kwong Lo, Nobuyuki Imoto, Eds., Proceedings of SPIE Vol. 4917, pp.13-24 (2002

    Nowe zasady komunikacji elektronicznej w postępowaniu sądowoadministracyjnym

    Get PDF
    The New Rules of Electronic Communications in Administrative Court ProceedingsThe purpose of this review is to analyse the legal regulations introducing new rules for electronic communications in administrative court proceedings as of 11 February 2017 and to demonstrate the benets but also risks resulting from the process of informatisation. One of the signicant changes refers to the admissibility of  submitting electronic-format pleadings at courts.On the one hand, the broader implementation of information technology in administrative court proceedings may contribute to accelerating such proceedings, but on the other hand. It may involve some risks such as technical issues related to hardware and so ware, problems with interpretation of new IT terms, or problems with impersonation or unauthorised disclosure of personal dat

    Electronic evidence in criminal proceedings

    Get PDF
    The research question central to the thesis is stated as follows: what are the implications of new technological phenomena in South African law to the existing legal frameworks in relation to (i) investigatory powers of law enforcement and security and intelligence agencies to obtain electronic evidence, and (ii) its subsequent admissibility in criminal proceedings? Written with an emphasis on South African law, but also taking into account aspects of foreign and international law, the thesis seeks to investigate how our existing legal frameworks which regulate the use of and access to electronic evidence in criminal proceedings, including its admissibility, integrate and adapt to challenges raised by new and rapidly changing technological developments. The thesis provides a critical analysis of the existing legal framework regulating certain key investigative powers of law enforcement and security and intelligence agencies in the current modern environment of the information age in which they operate. Key among them is the Regulation of Interception of Communications and Provision of Communication-Related Information Act 70 of 2002. New technology has not only increased opportunities for criminal activity, it has also created opportunities for law enforcement and security and intelligence agencies to have access to more sophisticated and new capabilities. The range of intrusive capabilities now available to law enforcement and security and intelligence agencies triggers a range of issues and challenges for individual rights, including how those capabilities are used in investigation activities, the scale of their use, the extent to which such capabilities intrude on privacy rights, legislative authority for their use and safeguards that constrain and regulate such new technological capabilities. The challenges of regulating investigative powers in an era of new and fastpaced technological developments is explored in relation to (i) interception of communications (ii) acquisition and retention of communications data, and (iii) access to encrypted information. The introduction of electronic evidence in criminal legal proceedings raises unique challenges in the South African law on evidence. The most interesting perhaps is the extent to which the nature of the evidence presented, in this instance electronic evidence, impacts on admissibility in criminal proceedings. Potential anomalies arise as the relevant legislation, the Electronic Communications and Transactions Act 25 of 2002, is based on an electronic commerce model law concerned with commercial activities. In this regard, two separate issues are the focus of research interest. The thesis offers a rethinking of (a) admissibility of electronic evidence and (b) its weight. The meaning and application of certain statutory provisions, insofar as it applies to electronic evidence as hearsay or real evidence, or both, are key and controversial issues. Another relates to the business records exceptions, which directly translated for electronic records appears to have created a problematic presumption. On matters of evidential weight, there is no ‘one-size-fits-all' approach that will work. While a robust consideration of authentication is required in the court's assessment of evidential weight of electronic evidence, it should not be subject to inflexible tests that make it difficult for authentic electronic evidence to be admitted into evidence. A central premise of the thesis is that evolving technological phenomena can and do present challenges to existing legal concepts on evidence and the investigatory powers of law enforcement and the security and intelligence agencies to obtain electronic evidence and for its admissibility in criminal proceedings. This is done in the context of understanding whether South African law has developed appropriately in response to advancements in technology. In the final analysis, the thesis considers appropriate and meaningful reform towards a modern and transparent legal framework in South African law

    Communication-oriented smart grid framework

    Get PDF
    Upgrading the existing electricity grids into smart grids relies heavily on the development of information and communication technology which supports a highly reliable real-time monitoring and control system as well as coordination of various electricity utilities and market participants. In this upgrading process, smart grid communication is the key to success, and a simple but complete, innovative but compatible high-level communication-oriented smart grid framework is needed. This paper proposes a simple and flexible three-entity framework, so that devices employing the existing technologies are supported and can interoperate with those employing new technologies. © 2011 IEEE.published_or_final_versionThe 2nd IEEE International Conference on Smart Grid Communications (SmartGridComm 2011), Brussels, Belgium, 17-20 October 2011. In Proceedings of 2nd SmartGridComm, 2011, p. 61-6
    corecore