The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework...
Simple Network Management Protocol “SNMP”, which is a component of the Internet Protocol Suite, is the most widely-used protocol in network management systems today. It is used to monitor network-attached devices such as routers, switches, Servers, workstations, printers, etc., for conditions that warrant administrative attention. In its initial versions, SNMPv1 and SNMPv2, SNMP was criticized for...
This paper describes how members of a community can collaboratively protect the privacy of the information they share via email. An extension of email tagging is used to represent communities and establish privacy protection boundaries. The approach is illustrated informally by scenarios and the key concepts are defined formally. The contributions of this paper are: (1) extending the idea of boundary...
In this paper, we propose a standardization scheme for a new paradigm: Advanced Internet of Things (AIoT), which is based on our proposed Unified Object Description Language (UODL) and allows: 1) identifying and interconnecting every object with a standard format, 2) making it easier and flexible for the third party control and management. The purpose of AIoT scheme is to build a smart world of always-on,...
Although community detection has drawn tremendous amount of attention across the sciences in the past decades, no formal consensus has been reached on the very nature of what qualifies a community as such. In this article we take an orthogonal approach by introducing a novel point of view to the problem of overlapping communities. Instead of quantifying the quality of a set of communities, we choose...
There is a multitude of systems in the area of mobile and pervasive social computing providing and using social context for pervasive interaction between persons. Currently, it is hard to distinguish the different approaches as there is no appropriate taxonomy available yet. In this paper we introduce the STIP taxonomy to define social context in the area of social computing and further propose to...
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
We present the design, implementation, deployment and evaluation of novel urban computing infrastructure called `UBI-hotspot'. It is effectively a large interactive public display embedded with other computing resources. We have deployed a network of UBI-hotspots around downtown Oulu, Finland, to establish a public laboratory for conducting experimental ubiquitous computing research in authentic urban...
As a means of resources sharing, peer-to-peer (P2P) networks are currently receiving much attention. However, the open and anonymous nature of P2P networks also paves the way for malicious users to abuse the systems such as disseminating of inauthentic files or even viruses. To counter such menacing vulnerabilities in P2P networks, this paper presents a reputation-based approach that combines personal...
Based on the characteristics of using microblog in mobile learning environment, this study proposes a new approach, a location-based and knowledge-oriented microblogging system. To develop such microblogging system there are several principles and features that must be addressed. This study strives to build a foundation for the microblogging system by focusing on microblogging system framework for...
A wireless connectivity island is a geographic area covered by a particular wireless ISP. Nowadays, mobile users possessing multi-homing mobile devices can have IP-connectivity almost everywhere, while being on the move. In terms of vertical handover, these users jump from a connectivity island to another that could differ by communication technology, access provider, QoS conditions and price. The...
The Eureka-ITEA2 WellCom project addresses issues related to the creation, delivery and management of advanced multimedia applications and services in the context of distributed home environment. To enable the delivery of such services with the required quality and security, WellCom proposes to push a part of the service logic as close as possible to the end-user. The paper presents some results of...
This paper examines two parallel case studies to promote remote medical consultation in Ghana. These projects, initiated independently by different researchers in different organizations, both deployed ICT solutions in the same medical community in the same year. The Ghana Consultation Network currently has over 125 users running a Web-based application over a delay-tolerant network of servers. OneTouch...
For the last decade, the areas of e-business and e-service have expanded rapidly. Service oriented architecture (SOA) is introduced to create and execute business process on the Web. In SOA, the importance of managing the reputation ofservices has emerged. Thus, there has been much research to evaluate and manage the reputation of services. This paper proposes the context-aware distributed reputation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.