The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Following the trend of big data, the business value of data is becoming a hot research field in recent years. The novel concept of Data Jacket introduced by Ohsawa et al. solved the difficult problem of data transactions due to the particular characteristic of data, i.e. the safeguarding privacy. In order to make sure the mechanism of the market of data, there are some researchers proposed a gamified...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
Cloud computing has recently become an extremely useful facet of modern distributed systems. Some of its many applications lie in the development of web services, its federation with the Internet of Things (IoT) and services for users in the form of storage, computing and networking facilities. However, as more services start utilizing the Cloud as a viable option, security concerns regarding user...
In this paper, we present an NDN-based architecture for the dissemination of roadside information to cars. Our focus is on flooding events which are often caused by severe weather which also impacts the communication infrastructure. We compare the performance of different message forwarding strategies in VANETs (Vehicular Adhoc Networks) through simulation. In addition, we analyze how our approach...
Undergraduates perform independent research or use research, regardless of their discipline. For most students, this work is part of a formalized experience. However, formalized training in research methods, biases, and disposition is rare; students acquire these skills through mentoring, modeling, and making mistakes, and in the context and content of the discipline. These methods are not ideal....
It is predicted that cryptocurrencies will play an important role in the global economy. Therefore, it is prudent for us to understand the importance and monetary value of such cryptocurrencies, and strategize our investments accordingly. One of the ways to obtain cryptocurrency is via mining. As solo mining is not possible because of the computational requirements, pool mining has gained popularity...
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health...
Administrative Role-Based Access Control (ARBAC) models deal with how to manage user-role assignments (URA), permission-role assignments (PRA), and role- role assignments (RRA). A wide-variety of approaches have been proposed in the literature for URA, PRA, and RRA. In this paper, we propose attribute-based administrative models that unify many prior approaches for URA and PRA. The motivating factor...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
This study examines e-Collaboration processes within temporary and ongoing virtual team by analyzing the level gaps of these processes according to the virtual team type. A quantitative test was carried out to compare the means gaps between the two virtual team types in five common collaboration processes. Then, employing a qualitative analysis, we constructed a conceptual model to understand the...
The desire of moving from data to intelligence has become a trend that pushes the world we live in today fast forward. Machine learning and data mining techniques are being used as important tools to unlock the wealth of voluminous amounts of data owned by organizations. Despite the existing effort of explaining their underlying machinery in layman's terms, data mining models and their output remain...
Volunteer computing is currently successfully used to make hundreds of thousands of CPUs available free-of-charge to projects of general interest. However the effort and cost involved in participating in and launching such projects may explain why only a few high-profile projects use it and why only 0.1% of Internet users participate in them. We present Pando, a system designed to be easy to deploy...
The ability to learn at runtime is a fundamental prerequisite for self-adaptive and self-organising systems that allows for dealing with unanticipated conditions and dynamic environments. Often, this machine learning process has to be highly or fully autonomous. That is, the degree of interaction with humans must be reduced to a minimum. In principle, there exist various learning paradigms for this...
In order to enable the development of smart services, many IoT platforms were proposed to securely and reliably connect IoT devices to the Internet and to each other. Examples are IoTivity from Open Connectivity Foundation (OCF), AllJoyn from AllSeen Alliance, Weave from Google and HomeKit from Apple. However, such fragmentation of IoT platforms has made the development of IoT applications very difficult...
The Costa Rican Ministry of Science, Technology and Telecommunications (MICITT) promotes The Science and Technology Month. This is a yearly celebration aimed at bringing young students closer to science and technology. In 2016, the activity included events in six rural areas around the country. Laboratorio Experimental is a group for research and outreach in computer science education hosted by Instituto...
Many animal species exist in this world and there are always new species being discovered each year. Therefore, it is very important that these valuable species be documented properly to be referred to in future. Numerous information retrieval systems for managing and documenting animal species today only allow users to search animal images and descriptions online via text-based input. Therefore,...
Hybrid broadcast-broadband TV (HbbTV) is a global initiative that brings new solutions to world of digital television (DTV) in terms of entertainment. In comparison to previous initiatives, different services are additionally provided in HbbTV. This paper describes an application for displaying of hybrid Electronic Program Guide (EPG) for a digital TV receiver. The application works with and without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.