38,045 research outputs found

    A Methodology to Evaluate Accessibility to Bus Stops as a Contribution to Improve Sustainability in Urban Mobility

    Get PDF
    Walking and transit are the backbone of sustainable mobility. Bus stops not only represent the connection between the two, but are also central in dictating the attractiveness of the latter. Accessibility of bus stops becomes, then, pivotal in increasing both attractiveness and sustainability of public transport. The paper describes a multi-step methodology to evaluate bus stops’ accessibility starting from a cluster of seven indicators describing objective and subjective features influencing passengers’ choice toward a given bus stop. The indicators are weighed by a questionnaire submitted to experts. Finally, a multicriteria analysis is developed to obtain a final score describing univocally the accessibility of each stop. Outcomes are mapped and a case study in Rome is reported as an example, with 231 bus and tram stops assessed accordingly. Results shows the relevance of the urban network and environment in evaluating the accessibility and in promoting more sustainable mobility patterns. Research innovation relies on the possibility to merge data from different fields into a specific GIS map and easily highlight for each bus stop the relationships between built environment, passengers’ comfort, and accessibility, with the concluding goal to provide advanced knowledge for further application

    Trustworthy content push

    Full text link
    Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry. These systems are facing security challenges regarding data transport to, and storage of the data on the end user equipment. The emerging Trusted Computing technology offers new answers to these open questions.Comment: 4 pages, 4 eps figure

    Designing Redress: A Study About Grievances Against Public Bodies

    Get PDF
    How grievances against public bodies are resolved is important not only for the individuals concerned and the decision-makers complained about but also to the whole system of government. People need to have confidence that when things go wrong, they will be put right. There is a general public interest in that being done in accordance with constitutional principles and in ways that are effective and efficient. Over many years, a great variety of different ?mechanisms? for dealing with grievances have been created, ranging from internal complaints processes through to the work of external bodies (including ombudsmen, tribunals and courts). This project has focused on how mechanisms are designed. The study explores how different mechanisms can be thought of as relating to each other. It also looks at the various reasons why mechanisms have to be designed. Drawing on interviews with people involved in the design process and analysis of public information, a map of where the activity of designing redress has been created. Evaluating the ?administrative justice landscape?, two particular deficiencies emerge: there is no strong political or official leadership in relation to how mechanisms ought to be designed and the system is fragmented, with many different people, in various organisations all contributing to design activities. Might a toolkit of guiding principles for designing redress be one way of achieving a better design process and outcomes? A number of principles are proposed in this report, and the authors hope to engage stakeholders in a debate about how this might best be taken forward

    A Calculus for Orchestration of Web Services

    Get PDF
    Service-oriented computing, an emerging paradigm for distributed computing based on the use of services, is calling for the development of tools and techniques to build safe and trustworthy systems, and to analyse their behaviour. Therefore, many researchers have proposed to use process calculi, a cornerstone of current foundational research on specification and analysis of concurrent, reactive, and distributed systems. In this paper, we follow this approach and introduce CWS, a process calculus expressly designed for specifying and combining service-oriented applications, while modelling their dynamic behaviour. We show that CWS can model all the phases of the life cycle of service-oriented applications, such as publication, discovery, negotiation, orchestration, deployment, reconfiguration and execution. We illustrate the specification style that CWS supports by means of a large case study from the automotive domain and a number of more specific examples drawn from it

    Pro-Poor Growth Using Non-Income Indicators: An Empirical Illustration for Colombia

    Get PDF
    In this paper, we analyze how the distribution of selected non-income welfare indicators changed between 1997 and 2003 in Colombia. We use multidimensional pro-poor growth measurement techniques and create indices for assets, health, education, and subjective welfare using two alternative weighing techniques: polychoric principal components and normatively selected weights. Results show that while income and expenditures fluctuated according to economic growth, reflecting the effects of the 1999 economic crisis, non-income indicators had minor changes. While income and expenditures decreased for all income percentiles, and relatively more for the richest, the non-income dimensions stagnated and remained in 2003 as unequally distributed as in 1997.Pro-Poor Growth, Inequality, Welfare Measurement, Multidimensionality of Poverty, Latin America, Colombia

    Evaluating On-demand Pseudonym Acquisition Policies in Vehicular Communication Systems

    Full text link
    Standardization and harmonization efforts have reached a consensus towards using a special-purpose Vehicular Public-Key Infrastructure (VPKI) in upcoming Vehicular Communication (VC) systems. However, there are still several technical challenges with no conclusive answers; one such an important yet open challenge is the acquisition of shortterm credentials, pseudonym: how should each vehicle interact with the VPKI, e.g., how frequently and for how long? Should each vehicle itself determine the pseudonym lifetime? Answering these questions is far from trivial. Each choice can affect both the user privacy and the system performance and possibly, as a result, its security. In this paper, we make a novel systematic effort to address this multifaceted question. We craft three generally applicable policies and experimentally evaluate the VPKI system performance, leveraging two large-scale mobility datasets. We consider the most promising, in terms of efficiency, pseudonym acquisition policies; we find that within this class of policies, the most promising policy in terms of privacy protection can be supported with moderate overhead. Moreover, in all cases, this work is the first to provide tangible evidence that the state-of-the-art VPKI can serve sizable areas or domain with modest computing resources.Comment: 6 pages, 7 figures, IoV-VoI'1

    Automated Negotiation for Provisioning Virtual Private Networks Using FIPA-Compliant Agents

    No full text
    This paper describes the design and implementation of negotiating agents for the task of provisioning virtual private networks. The agents and their interactions comply with the FIPA specification and they are implemented using the FIPA-OS agent framework. Particular attention is focused on the design and implementation of the negotiation algorithms
    • …
    corecore