3,833 research outputs found

    TRULLO - local trust bootstrapping for ubiquitous devices

    Get PDF
    Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such content is growing rapidly and, from the perspective of each user, selecting relevant content is key. To this end, each user may run a trust model - a software agent that keeps track of who disseminates content that its user finds relevant. This agent does so by assigning an initial trust value to each producer for a specific category (context); then, whenever it receives new content, the agent rates the content and accordingly updates its trust value for the producer in the content category. However, a problem with such an approach is that, as the number of content categories increases, so does the number of trust values to be initially set. This paper focuses on how to effectively set initial trust values. The most sophisticated of the current solutions employ predefined context ontologies, using which initial trust in a given context is set based on that already held in similar contexts. However, universally accepted (and time invariant) ontologies are rarely found in practice. For this reason, we propose a mechanism called TRULLO (TRUst bootstrapping by Latently Lifting cOntext) that assigns initial trust values based only on local information (on the ratings of its user’s past experiences) and that, as such, does not rely on third-party recommendations. We evaluate the effectiveness of TRULLO by simulating its use in an informal antique market setting. We also evaluate the computational cost of a J2ME implementation of TRULLO on a mobile phone

    Q-CAD: QoS and Context Aware Discovery framework for adaptive mobile systems

    Get PDF
    This paper presents Q-CALl, a resource discovery framework that enables pervasive computing applications to discover and select the resource(s) best satisfying the user needs, taking the current execution context and quality-ofservice (QoS} requirements into account. The available resources are first screened, so that only those suirable to the current execution context of the application will be considered; the shortlisted resources are then evaluated against the QoS needs of the application, and a binding is established to the best available

    Trust based collaborative filtering

    Get PDF
    k-nearest neighbour (kNN) collaborative filtering (CF), the widely successful algorithm supporting recommender systems, attempts to relieve the problem of information overload by generating predicted ratings for items users have not expressed their opinions about; to do so, each predicted rating is computed based on ratings given by like-minded individuals. Like-mindedness, or similarity-based recommendation, is the cause of a variety of problems that plague recommender systems. An alternative view of the problem, based on trust, offers the potential to address many of the previous limiations in CF. In this work we present a varation of kNN, the trusted k-nearest recommenders (or kNR) algorithm, which allows users to learn who and how much to trust one another by evaluating the utility of the rating information they receive. This method redefines the way CF is performed, and while avoiding some of the pitfalls that similarity-based CF is prone to, outperforms the basic similarity-based methods in terms of prediction accuracy

    Towards a mobile computing middleware: a synergy of reflection and mobile code techniques

    Get PDF
    The increasing popularity of wireless devices, such as mobile phones, personal digital assistants, watches and the like. is enabling new classes of applications that present challenging problems to designers. Applications have to be aware of, and adapt to, frequent variations in the context of execution, such as fluctuating network bandwidth, decreasing batten, power, changes in location or device capabilities, and so on. In this paper, we argue that middleware solutions for wired distributed systems cannot be used in a mobile setting, as the principle of transparency that has driven their design runs counter to the new degrees of awareness imposed by mobility: We propose a synergy of reflection and code mobility as a means for middleware to give applications the desired level of flexibility to react to changes happening in the environment, including those that have not necessarily been foreseen by middleware designers. We ruse the sharing and processing of images as an application scenario to highlight the advantages of our approach

    SIRT1 and SIRT3 deacetylate homologous substrates: AceCS1,2 and HMGCS1,2.

    Get PDF
    SIRT1 and SIRT3 are NAD+-dependent protein deacetylases that are evolutionarily conserved across mammals. These proteins are located in the cytoplasm/nucleus and mitochondria, respectively. Previous reports demonstrated that human SIRT1 deacetylates Acetyl-CoA Synthase 1 (AceCS1) in the cytoplasm, whereas SIRT3 deacetylates the homologous Acetyl-CoA Synthase 2 (AceCS2) in the mitochondria. We recently showed that 3-hydroxy-3-methylglutaryl CoA synthase 2 (HMGCS2) is deacetylated by SIRT3 in mitochondria, and we demonstrate here that SIRT1 deacetylates the homologous 3-hydroxy-3-methylglutaryl CoA synthase 1 (HMGCS1) in the cytoplasm. This novel pattern of substrate homology between cytoplasmic SIRT1 and mitochondrial SIRT3 suggests that considering evolutionary relationships between the sirtuins and their substrates may help to identify and understand the functions and interactions of this gene family. In this perspective, we take a first step by characterizing the evolutionary history of the sirtuins and these substrate families

    Sens-Us: Designing Innovative Civic Technology for the Public Good

    Get PDF
    How can civic technology be designed to encourage more public engagement? What new methods of data collection and sharing can be used to engender a different relationship between citizens and the state? One approach has been to design physical systems that draw people in and which they can trust, leading them to give their views, opinions or other data. So far, they have been largely used to elicit feedback or votes for one or two questions about a given topic. Here, we describe a physical system, called Sens-Us, which was designed to ask a range of questions about personal and sensitive information, within the context of rethinking the UK Census. An in-the-wild study of its deployment in a city cultural center showed how a diversity of people approached, answered and compared the data that had been collected about themselves with others. We discuss the findings in relation to the pros and cons of using this kind of innovative technology when wanting to promote civic engagement or other forms of public engagement
    corecore