1,929 research outputs found

    An overview of bluetooth device discovery and fingerprinting techniques – assessing the local context

    Get PDF
    The ubiquitous nature of portable communication devices presents a number of opportunities for automated device discovery, tracking and possible owner identification. Consumer devices such as smartphones, tablets, wearables, laptops and vehicle entertainment systems commonly support the 802.15.1 (Bluetooth) wireless communication protocol that enables a variety device discovery and fingerprinting techniques. We provide an overview of these techniques encompassing those native to the protocol as well as those that are possibly protocol-agnostic due to their inherently generic nature. We then introduce an opportunity for a comparison study that sets out to examine and quantify the effectiveness of selected techniques in the field. To assess the potential viability of such study in the local context, we employ location-aware inquiry scanning and discuss the results of the exploratory data collection. We conclude that in this context the simplest technique being inquiry scanning can be used to establish a baseline for comparison with other techniques

    GUARDIANS final report part 1 (draft): a robot swarm assisting a human fire fighter

    Get PDF
    Emergencies in industrial warehouses are a major concern for fire fighters. The large dimensions together with the development of dense smoke that drastically reduces visibility, represent major challenges. The Guardians robot swarm is designed to assist re ghters in searching a large warehouse. In this paper we discuss the technology developed for a swarm of robots assisting re ghters. We explain the swarming algorithms which provide the functionality by which the robots react to and follow humans while no communication is required. Next we discuss the wireless communication system, which is a so-called mobile ad-hoc network. The communication network provides also the means to locate the robots and humans. Thus the robot swarm is able to provide guidance information to the humans. Together with the fire fighters we explored how the robot swarm should feed information back to the human fire fighter. We have designed and experimented with interfaces for presenting swarm based information to human beings

    Privacy conscious architecture for personal information transfer from a personal trusted device to an HTTP based service

    Get PDF
    Modern services request personal information from their customers. The personal information is not needed only for identifying the customer but also for customising the service for each customer. In this paper we first analyse the existing approaches for personal information handling and point out their weaknesses. We desribe an architecture for the delivery of personal information from the customer to the HTTP based service in the Internet. For personal information storing our architecture relies on a mobile device, such as a customer’s mobile phone. The access of the service is conducted with a traditional desktop computer. The information is transmitted to the service on request via a desktop computer that fetches the information from a mobile device over a wireless link. The goal of our approach is to simplify the use of services by helping the customer to provide the required personal information. Furthermore our approach is designed so that existing services require only minor changes. We introduce methods for the customer to control his own privacy by providing notation to define the required security measures for automated data transfer. Finally we discuss the possible security risks of our architecture

    Mobile operators as banks or vice-versa? and: the challenges of Mobile channels for banks

    Get PDF
    This short paper addresses the strategic challenges of deposit banks, and payment clearinghouses, posed by the growing role of mobile operators as collectors and payment agents of flow of cash for themselves and third parties. Through analysis and data analysis from selected operators , it is shown that mobile operators achieve as money flow handlers levels of efficiency , profitability ,and risk control comparable with deposit banks – Furthermore , the payment infrastructures deployed by both are found to be quite similar , and are analyzed in relation to strategic challenges and opportunities This paves the way to either mobile operators taking a bigger role ,or for banks to tie up such operators to them even more tightly ,or for alliances/mergers to take place ,all these options being subject to regulatory evolution as analyzed as well . The reader should acknowledge that there is no emphasis on specific Mobile banking (M-Banking) technologies (security, terminals, application software) , nor on related market forces from the user demand point of view.banking;industry structure;mobile networks;operational cash flow;regulations;transaction systems

    Cognitive Radio Networks: Realistic or Not?

    Full text link
    A large volume of research has been conducted in the cognitive radio (CR) area the last decade. However, the deployment of a commercial CR network is yet to emerge. A large portion of the existing literature does not build on real world scenarios, hence, neglecting various important interactions of the research with commercial telecommunication networks. For instance, a lot of attention has been paid to spectrum sensing as the front line functionality that needs to be completed in an efficient and accurate manner to enable an opportunistic CR network architecture. This is necessary to detect the existence of spectrum holes without which no other procedure can be fulfilled. However, simply sensing (cooperatively or not) the energy received from a primary transmitter cannot enable correct dynamic spectrum access. For example, the low strength of a primary transmitter's signal does not assure that there will be no interference to a nearby primary receiver. In addition, the presence of a primary transmitter's signal does not mean that CR network users cannot access the spectrum since there might not be any primary receiver in the vicinity. Despite the existing elegant and clever solutions to the DSA problem no robust, implementable scheme has emerged. In this paper, we challenge the basic premises of the proposed schemes. We further argue that addressing the technical challenges we face in deploying robust CR networks can only be achieved if we radically change the way we design their basic functionalities. In support of our argument, we present a set of real-world scenarios, inspired by realistic settings in commercial telecommunications networks, focusing on spectrum sensing as a basic and critical functionality in the deployment of CRs. We use these scenarios to show why existing DSA paradigms are not amenable to realistic deployment in complex wireless environments.Comment: Work in progres

    Essential Law Firm Technology_ The Best of What\u27s Out There

    Get PDF
    Meeting proceedings of a seminar by the same name, held February 1, 2022

    Toward a process theory of entrepreneurship: revisiting opportunity identification and entrepreneurial actions

    Get PDF
    This dissertation studies the early development of new ventures and small business and the entrepreneurship process from initial ideas to viable ventures. I unpack the micro-foundations of entrepreneurial actions and new ventures’ investor communications through quality signals to finance their growth path. This dissertation includes two qualitative papers and one quantitative study. The qualitative papers employ an inductive multiple-case approach and include seven medical equipment manufacturers (new ventures) in a nascent market context (the mobile health industry) across six U.S. states and a secondary data analysis to understand the emergence of opportunities and the early development of new ventures. The quantitative research chapter includes 770 IPOs in the manufacturing industries in the U.S. and investigates the legitimation strategies of young ventures to gain resources from targeted resource-holders.Open Acces
    • …
    corecore