43,649 research outputs found

    Ownership of co-creation assets: driving B2B value propositions in the service economy

    Get PDF
    The benefits of specialization have been driving the rise of the service economy and pushing capability frontiers and economic growth. In service economies, almost any activity, asset, and skill can be bought on competitive markets, making it harder to build competitive advantage on any of those inputs. Against that background, the question emerges what constitutes sustainable value propositions of service providers. Drawing on an emerging stream of research on the non-ownership value of services, we argue that service providers create value by taking on ownership of service assets and thereby transform uncertainty of value creation into economic opportunities. In our view, service providers offer the essential value proposition of transforming their clients’ uncertainty downsides into opportunities related to assets such as vehicles, real estate, equipment and computing platforms. Clients benefit by delegating ownership of assets to the domain of a service provider. In turn, clients can focus their investment on their most promising assets. Service providers create sustainable competitive advantage by assuming ownership and excelling at the management of (a) unique physical assets, (b) unique intangible assets and (c) maintaining an appropriate architecture of social capital through customer relationships and business ecosystems

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Building Programmable Wireless Networks: An Architectural Survey

    Full text link
    In recent times, there have been a lot of efforts for improving the ossified Internet architecture in a bid to sustain unstinted growth and innovation. A major reason for the perceived architectural ossification is the lack of ability to program the network as a system. This situation has resulted partly from historical decisions in the original Internet design which emphasized decentralized network operations through co-located data and control planes on each network device. The situation for wireless networks is no different resulting in a lot of complexity and a plethora of largely incompatible wireless technologies. The emergence of "programmable wireless networks", that allow greater flexibility, ease of management and configurability, is a step in the right direction to overcome the aforementioned shortcomings of the wireless networks. In this paper, we provide a broad overview of the architectures proposed in literature for building programmable wireless networks focusing primarily on three popular techniques, i.e., software defined networks, cognitive radio networks, and virtualized networks. This survey is a self-contained tutorial on these techniques and its applications. We also discuss the opportunities and challenges in building next-generation programmable wireless networks and identify open research issues and future research directions.Comment: 19 page

    Message from the EDOC 2020 Workshop, Demo, and Doctoral Consortium Chairs

    Get PDF
    International audienceFor over twenty years the EDOC conference has been the primary annual event for disseminating and discussing the latest developments in the area of enterprise computing. The workshop program is an important satellite event of the EDOC conference. Workshops cover more focused topics and allow for the presentation and discussion of work that is in the earlier development stages. As such, the workshops provide an excellent forum for discussing topics from the area of enterprise computing that have the potential to become important research streams within the next few years, and for discussing topics that are already important in a smaller and more focused setting. In addition to the workshop program, the EDOC Demonstration track offers an exciting and highly interactive outlet for researchers and practitioners to present prototypes and applications in the context of enterprise computing. Four demonstrations are presented this year. 2020 is the year of the COVID-19 pandemic, with a strong impact on research and social life. Despite the challenges of new organization (the conference and the workshops will be held on-line), we are proud to present an interesting program and the four workshops that will be held in conjunction with EDOC this year:• The workshop on Trends in Enterprise Architecture Research, (TEAR)• The workshop on Service-oriented Enterprise Architecture for Enterprise Engineering (SoEA4EE)• The workshop on Privacy and Security in Enterprise Modeling (PriSEM)• The workshop on Frontiers of Process Aware Systems (FoPAS).[...

    SOA services in higher education

    Get PDF
    Service Oriented Architecture (SOA) is a recent architectural framework for distributed software system development in which software components are packaged as Services. It has become increasingly popular in academia and in industry, but has been principally used in the business domain. However, in higher education, SOA has rarely been applied or investigated. In this paper, we propose the idea of applying SOA technologies in the education domain, to increase both interoperability and flexibility within the e-learning environment. We expect that both students and teachers in higher educational institutions can benefit from this approach. We also describe a number of possible SOA services, along with a high level service roadmap to support a university's learning and teaching activities

    Efficient HTTP based I/O on very large datasets for high performance computing with the libdavix library

    Full text link
    Remote data access for data analysis in high performance computing is commonly done with specialized data access protocols and storage systems. These protocols are highly optimized for high throughput on very large datasets, multi-streams, high availability, low latency and efficient parallel I/O. The purpose of this paper is to describe how we have adapted a generic protocol, the Hyper Text Transport Protocol (HTTP) to make it a competitive alternative for high performance I/O and data analysis applications in a global computing grid: the Worldwide LHC Computing Grid. In this work, we first analyze the design differences between the HTTP protocol and the most common high performance I/O protocols, pointing out the main performance weaknesses of HTTP. Then, we describe in detail how we solved these issues. Our solutions have been implemented in a toolkit called davix, available through several recent Linux distributions. Finally, we describe the results of our benchmarks where we compare the performance of davix against a HPC specific protocol for a data analysis use case.Comment: Presented at: Very large Data Bases (VLDB) 2014, Hangzho

    Profiling a decade of information systems frontiers’ research

    Get PDF
    This article analyses the first ten years of research published in the Information Systems Frontiers (ISF) from 1999 to 2008. The analysis of the published material includes examining variables such as most productive authors, citation analysis, universities associated with the most publications, geographic diversity, authors’ backgrounds and research methods. The keyword analysis suggests that ISF research has evolved from establishing concepts and domain of information systems (IS), technology and management to contemporary issues such as outsourcing, web services and security. The analysis presented in this paper has identified intellectually significant studies that have contributed to the development and accumulation of intellectual wealth of ISF. The analysis has also identified authors published in other journals whose work largely shaped and guided the researchers published in ISF. This research has implications for researchers, journal editors, and research institutions
    • …
    corecore