2,600 research outputs found

    The Egnatia Motorway and The Changes in Interregional Trade in Greece: An Ex Ante Assessment

    Get PDF
    The Egnatia Motorway, located in the northern part of Greece, constitutes one of the most important, as well as ambitious, projects of the Trans-European Transport Networks programme (TETN) funded by the European Commission. It is expected to greatly influence the spatial economic relationships of several regions across the country. The motorway crosses all administrative regions of Northern Greece, and the expectations currently sustained by the public as regards its contribution to regional development are exceptionally great. As numerous empirical studies have already shown, the most important changes in regional economy induced by interregional transportation infrastructure are associated with trade flows between different regions. This paper analyses the major determinants of interregional trade in Greece and estimates the changes in interregional trade flows which the construction of the Egnatia Motorway is capable of generating

    Securing Information-Centric Networking without negating Middleboxes

    Full text link
    Information-Centric Networking is a promising networking paradigm that overcomes many of the limitations of current networking architectures. Various research efforts investigate solutions for securing ICN. Nevertheless, most of these solutions relax security requirements in favor of network performance. In particular, they weaken end-user privacy and the architecture's tolerance to security breaches in order to support middleboxes that offer services such as caching and content replication. In this paper, we adapt TLS, a widely used security standard, to an ICN context. We design solutions that allow session reuse and migration among multiple stakeholders and we propose an extension that allows authorized middleboxes to lawfully and transparently intercept secured communications.Comment: 8th IFIP International Conference on New Technologies, Mobility & Security, IFIP, 201

    Efficient Proactive Caching for Supporting Seamless Mobility

    Full text link
    We present a distributed proactive caching approach that exploits user mobility information to decide where to proactively cache data to support seamless mobility, while efficiently utilizing cache storage using a congestion pricing scheme. The proposed approach is applicable to the case where objects have different sizes and to a two-level cache hierarchy, for both of which the proactive caching problem is hard. Additionally, our modeling framework considers the case where the delay is independent of the requested data object size and the case where the delay is a function of the object size. Our evaluation results show how various system parameters influence the delay gains of the proposed approach, which achieves robust and good performance relative to an oracle and an optimal scheme for a flat cache structure.Comment: 10 pages, 9 figure

    Examining the asymmetric impact of macroeconomic policy in the UAE: Evidence from quartile impulse responses and machine learning

    Get PDF
    The current paper examines the asymmetric effects of changes to monetary and fiscal variables on different types of firms in the UAE. We compute impulse responses based on local projections and select shock and switching variables using machine learning. We examine 180 firms listed in the UAE exchanges and find significant asymmetries among financial and non-financial firms and among low- and high-debt firms when there is a shock to macroeconomic monetary or fiscal variables. Quartile analysis shows that firms belonging to the first and last quartile of debt respond negatively to expansionary policies, while middle-quartile firms respond more positively. Our results demonstrate the importance of comprehending the heterogeneity in the micro characteristics of the underlying corporate environment when evaluating macroeconomic policies. Our work can facilitate the design and implementation of policy in the UAE and helps explain the transmission mechanisms towards corporations

    CoAP over ICN

    Full text link
    The Constrained Application Protocol (CoAP) is a specialized Web transfer protocol for resource-oriented applications intended to run on constrained devices, typically part of the Internet of Things. In this paper we leverage Information-Centric Networking (ICN), deployed within the domain of a network provider that interconnects, in addition to other terminals, CoAP endpoints in order to provide enhanced CoAP services. We present various CoAP-specific communication scenarios and discuss how ICN can provide benefits to both network providers and CoAP applications, even though the latter are not aware of the existence of ICN. In particular, the use of ICN results in smaller state management complexity at CoAP endpoints, simpler implementation at CoAP endpoints, and less communication overhead in the network.Comment: Proc. of the 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus, November, 201
    corecore