10,811 research outputs found

    Social positioning: Designing the Seams between Social, Physical and Digital Space

    Get PDF
    Mobile settings are not only physically and digitally mediated; they are also inhabited by people - a social space. We argue that careful design exposing the connections, gaps, overlays and mismatches within and between physical, digital and social space allow for a better understanding and thereby mastering of the resulting combined space. Two concepts are explored in MobiTip, a social mobile service for exchanging opinions among peers: intramedia seams concerning network coverage and position technology, and intermedia seams between digitally transmitted tips and the physical, social context surrounding the user. We introduce social positioning as an alternative and complement to the current strive for seamless connectedness and exact positioning in physical space

    Simplified Distributed Programming with Micro Objects

    Full text link
    Developing large-scale distributed applications can be a daunting task. object-based environments have attempted to alleviate problems by providing distributed objects that look like local objects. We advocate that this approach has actually only made matters worse, as the developer needs to be aware of many intricate internal details in order to adequately handle partial failures. The result is an increase of application complexity. We present an alternative in which distribution transparency is lessened in favor of clearer semantics. In particular, we argue that a developer should always be offered the unambiguous semantics of local objects, and that distribution comes from copying those objects to where they are needed. We claim that it is often sufficient to provide only small, immutable objects, along with facilities to group objects into clusters.Comment: In Proceedings FOCLASA 2010, arXiv:1007.499

    A performance model of speculative prefetching in distributed information systems

    Full text link
    Previous studies in speculative prefetching focus on building and evaluating access models for the purpose of access prediction. This paper investigates a complementary area which has been largely ignored, that of performance modelling. We use improvement in access time as the performance metric, for which we derive a formula in terms of resource parameters (time available and time required for prefetching) and speculative parameters (probabilities for next access). The performance maximization problem is expressed as a stretch knapsack problem. We develop an algorithm to maximize the improvement in access time by solving the stretch knapsack problem, using theoretically proven apparatus to reduce the search space. Integration between speculative prefetching and caching is also investigated, albeit under the assumption of equal item sizes

    The Quest for Appropriate Remedies in the Microsoft Antitrust EU Cases: A Comparative Appraisal

    Get PDF
    The Microsoft cases in the United States and in Europe have been influential in determining the contours of the substantive liability standards for dominant firms in US antitrust law and in EC Competition law. The competition law remedies that were adopted, following the finding of liability, seem, however, to constitute the main measure for the “success” of the case(s). An important disagreement exists between those arguing that the remedies put in place failed to address the roots of the competition law violation identified in the liability decision and others who advance the view that the remedies were far-reaching and that their alleged failure demonstrates the weakness of the liability claim. This study evaluates these claims by examining the variety of remedies that were finally imposed in the European Microsoft cases, from a comparative perspective. The study begins with a discussion of the roots of the Microsoft issues in Europe and the consequent choice of a remedial approach by the Commission and the Court. It then explores the effectiveness of the remedies in achieving the aims that were set. The non-consideration of the structural remedy in the European case and the pros and cons of developing such a remedy in the future are briefly discussed before more emphasis is put on alternative remedies (competition and non-competition law ones) that have been suggested in the literature. The study concludes by discussing the fit between the remedy and the theory of consumer harm that led to the finding of liability and questions a total dissociation between the two. We believe that it is important to think seriously about potential remedies before litigation begins. However, we do not require an ex ante identification of an appropriate remedy by the plaintiffs, since this could lead to underenforcement or overenforcement.antitrust, remedies, Microsoft, complementarity, innovation, efficiency, monopoly, oligopoly, media player, interoperability, Internet browser

    IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN

    Get PDF
    Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks (LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of IoT networks in general
    • …
    corecore