10,811 research outputs found
Social positioning: Designing the Seams between Social, Physical and Digital Space
Mobile settings are not only physically and digitally mediated; they are also inhabited by people - a social space. We argue that careful design exposing the connections, gaps, overlays and mismatches within and between physical, digital and social space allow for a better understanding and thereby mastering of the resulting combined space. Two concepts are explored in MobiTip, a social mobile service for exchanging opinions among peers: intramedia seams concerning network coverage and position technology, and intermedia seams between digitally transmitted tips and the physical, social context surrounding the user. We introduce social positioning as an alternative and complement to the current strive for seamless connectedness and exact positioning in physical space
Simplified Distributed Programming with Micro Objects
Developing large-scale distributed applications can be a daunting task.
object-based environments have attempted to alleviate problems by providing
distributed objects that look like local objects. We advocate that this
approach has actually only made matters worse, as the developer needs to be
aware of many intricate internal details in order to adequately handle partial
failures. The result is an increase of application complexity. We present an
alternative in which distribution transparency is lessened in favor of clearer
semantics. In particular, we argue that a developer should always be offered
the unambiguous semantics of local objects, and that distribution comes from
copying those objects to where they are needed. We claim that it is often
sufficient to provide only small, immutable objects, along with facilities to
group objects into clusters.Comment: In Proceedings FOCLASA 2010, arXiv:1007.499
A performance model of speculative prefetching in distributed information systems
Previous studies in speculative prefetching focus on building and evaluating access models for the purpose of access prediction. This paper investigates a complementary area which has been largely ignored, that of performance modelling. We use improvement in access time as the performance metric, for which we derive a formula in terms of resource parameters (time available and time required for prefetching) and speculative parameters (probabilities for next access). The performance maximization problem is expressed as a stretch knapsack problem. We develop an algorithm to maximize the improvement in access time by solving the stretch knapsack problem, using theoretically proven apparatus to reduce the search space. Integration between speculative prefetching and caching is also investigated, albeit under the assumption of equal item sizes
The Quest for Appropriate Remedies in the Microsoft Antitrust EU Cases: A Comparative Appraisal
The Microsoft cases in the United States and in Europe have been influential in determining the contours of the substantive liability standards for dominant firms in US antitrust law and in EC Competition law. The competition law remedies that were adopted, following the finding of liability, seem, however, to constitute the main measure for the “success” of the case(s). An important disagreement exists between those arguing that the remedies put in place failed to address the roots of the competition law violation identified in the liability decision and others who advance the view that the remedies were far-reaching and that their alleged failure demonstrates the weakness of the liability claim. This study evaluates these claims by examining the variety of remedies that were finally imposed in the European Microsoft cases, from a comparative perspective. The study begins with a discussion of the roots of the Microsoft issues in Europe and the consequent choice of a remedial approach by the Commission and the Court. It then explores the effectiveness of the remedies in achieving the aims that were set. The non-consideration of the structural remedy in the European case and the pros and cons of developing such a remedy in the future are briefly discussed before more emphasis is put on alternative remedies (competition and non-competition law ones) that have been suggested in the literature. The study concludes by discussing the fit between the remedy and the theory of consumer harm that led to the finding of liability and questions a total dissociation between the two. We believe that it is important to think seriously about potential remedies before litigation begins. However, we do not require an ex ante identification of an appropriate remedy by the plaintiffs, since this could lead to underenforcement or overenforcement.antitrust, remedies, Microsoft, complementarity, innovation, efficiency, monopoly, oligopoly, media player, interoperability, Internet browser
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of
deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
computation power, low battery life and low memory. As incorporating security features are resource expensive, IoT devices are
often found to be less protected and in recent times, more IoT devices have been routinely attacked due to high profile security
flaws. This paper aims to explore the security vulnerabilities of IoT devices particularly that use Low Power Wide Area Networks
(LPWANs). In this work, LoRaWAN based IoT security vulnerabilities are scrutinised and loopholes are identified. An attack was
designed and simulated with the use of a predictive model of the device data generation. The paper demonstrated that by predicting
the data generation model, jamming attack can be carried out to block devices from sending data successfully. This research will
aid in the continual development of any necessary countermeasures and mitigations for LoRaWAN and LPWAN functionality of
IoT networks in general
- …