CWI/CTIF seminar Oct2011. Integrating context- and content-aware mobile services into the cloud
|
|
- Britton McGee
- 8 years ago
- Views:
Transcription
1 Center for Wireless Innovation Norway cwin.no CWI Norway CWI/CTIF seminar Oct2011 Integrating context- and content-aware mobile services into the cloud Josef Noll, Zahid Iqbal, Mohammad M.R. Chowdhury University of Oslo/UNIK Member of CWI Norway
2 Outline Business collaboration for Future Internet From Sensors to Services Security, privacy and dependability in sensor systems Security in heterogeneous systems Sensors & Mobile in the Cloud example: virus protection trust-based privacy - trust the cloud? content- and context-awareness System architecture Identity-based access PID, SID, CID awareness implementation through semantic technologies Conclusions 2
3 Collaborative Enterprise Computing Paradigm Collaborative Enterprise Computing Combination of (i) Cloud Computing (ii) Social Computing (iii) Semantic Web Integrated Operations for Future Services here: service cloud focus: privacy, trust focus: integration, reasoning
4 Need for new & highly scalable technologies Sensors Downhole & onboard facilities Process control systems 40 bill US$ added economic value ( ) Integrated Operations on the NCS - OLF numbers Broadband communication Fiber optic cables & wireless networks source: Kaare Finbak, IBM 4
5 Security Challenges in sensorenabled clouds Security, here security (S) Cloud services privacy (P) dependability (D) across the value chain from sensors to services measurable security? Intelligence Overlay Network Sensors, Embedded Systems challenge: physics challenge: physics System Is made by Components and functionalities Could be SPD Components, SPD functionalities can be composed 5
6 Sensors/Mobile in the cloud Example: service download through secured cloud services (virus-protection) Trust the cloud? Cloud versus SIM 6
7 My phone collects all my security SIM with NFC & PKI 7
8 User-centric representation in the cloud Representation of the user through the mobile - my digital representative Distributed representation in the cloud - virtual mobile Corporate Identity - CID Social Identity - SID Privacy in the mobile (Personal) PID ensures/enables user-centric privacy cloud reasoning PID s User profile, privacy Community Roles, Identities Context, Presence Mobile cloud (virtual mobile) Contacts, Calendar, Context, SMS, ,... security User behaviour Location, Proximity SID CID 8
9 System view Identities (and roles) social identity - SID - (relations,...) corporate identity - CID - (roles,...) personal identity - PID - (sensitive data) Trust relation Context & content-aware SID CID Trust virtual Cloud services Service provider trust-based reasoning s s s PID profile preferences trustempowered context trust-empowered mobile cloud 9
10 Collaboration Framework Collaboration Ensemble Engine Provides information in the cloud Criterion Manager provides trust-based criteria Access Manager semantic attribute-based access Access manager Collaboration Ensemble Engine Criterion Manager
11 Semantic Representation Cloud service representation through semantic integration Overlay Policy-based Core Services Policy Trust Composition System Discovery Desired service Intelligence Overlay Cloud services Suggested service Overlay Embedded Intelligence Network Sensors, Embedded Systems s OWL goals OWL integration Semantic Technologies OWL integration 11
12 User profile ontology User profile ontology individual interests distributed for areas multiple roles Profile access coarse distribution Profile
13 Trust ontology Trust based on direction context topic Trust types direct (announced) Trust reputation history
14 Implementation: OWL Restrictions Through OWL restriction we can specify that the Class A to be a subclass of Class B, then every individual of Class A is also an individual of Class B. Restriction Category - Quantifier Restrictions - Cardinality Restrictions - hasvalue Restrictions OWL restrictions guarantee access to trust-based context data
15 Quantifier & value restrictions There are two quantifier and one value restrictions Existential Restriction Known as somevaluesfrom Existential restrictions describe the set of individuals that have at least one specific kind of relationship to individuals that are members of a specific class. Universal Restriction Known as allvaluesfrom Existential restrictions describe the set of individuals that have at least one specific kind of relationship to individuals that are members of a specific class. hasvalue Restriction describes an anonymous class of individuals that are related to another specific individual along a specified property.
16 Cardinality Restrictions Comes in three flavors Minimum Cardinality: specify the minimum number of relationships that an individual must participate in for a given property Maximum Cardinality: specify the maximum number of relationships that an individual can participate in for a given property Cardinality Restriction: specify the exact number of relationships that an individual must participate in for a given property. properties used for semantic access
17 Idea Ontology (some classes) Definition of idea with OWL Restrictions Definition of ExcellentIdea, helps reasoner to classify any idea as excellent.
18 Conclusions Access manager Future services means business collaboration Collaborative enterprise computing based on Collaboration Ensemble Engine Collaboration Criterion Manager Access Manager Ontologies for user profiles (adapted from WWRF) trust context and content Description Logic for Reasoning Challenges real-world complexity - can we represent? topic specific trust-metrics Intelligence Overlay Cloud services Network Sensors, Embedded Systems Collaboration Ensemble Engine Criterion Manager Collaborative Radio & Operation, the driver for cost-effective future wireless broadband networks 18
Security, Privacy and Dependability in the Internet of Things
CWI University of Karlstad - Colloq. 10. Oct 2011 Security, Privacy and Dependability in the Internet of Things represented by: Josef Noll, Professor University of Oslo/UNIK josef@unik.no on behalf of
More informationCenter for Wireless Innovation Norway cwin.no. CWI Norway. Strategic Workshop - Malaga - May 2013. Measurable Security for the Internet of Things
Center for Wireless Innovation Norway cwin.no CWI Norway Strategic Workshop - Malaga - May 2013 Measurable Security for the Internet of Things 1 Outline l Measurable Security Application in the IoT threat,
More informationIntro to personalisation (personalization)
Intro to personalisation (personalization) Josef Noll, UNIK 22 Sep 2008, Oslo Personalisation of services Linking the service world to the user preferences Enabling secure services Protecting the privacy
More informationINTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS
INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS Mohammad M. R. Chowdhury UniK University Graduate Center P.O. Box 70, N-2007 Kjeller, Norway. mohammad@unik.no Josef Noll UniK University Graduate
More informationVitenkafe, Lillestrøm, Nov 2013 Livet er trådløs, Mobilen styrer
Center for Wireless Innovation Norway cwin.no CWI Norway Vitenkafe, Lillestrøm, Nov 2013! Livet er trådløs, Mobilen styrer Josef Noll Professor University of Oslo/UNIK josef@unik.no Min devise The last
More informationThe ebbits project: from the Internet of Things to Food Traceability
The ebbits project: from the Internet of Things to Food Traceability Smart AgriMatics2014 Contribution to session 5.2 Meat Information Provenance 18-19 June 2014 Paolo Brizzi Istituto Superiore Mario Boella
More informationAccess Control and Privacy Enhancement through Role-based Identity Management
Access Control and Privacy Enhancement through Role-based Identity Management MOHAMMAD M.R. CHOWDHURY, JOSEF NOLL Managing user identities for information security and privacy in today s connected systems
More informationComprehensive geospatial network management based on MapInfo. Supporting both physical and logical network resource management
Comprehensive geospatial network management based on MapInfo Supporting both physical and logical network resource management ConnectMaster is an open, integratable, scalable software solution for the
More informationIdentity Management in Federated Telecommunication Systems
Identity Management in Federated Telecommunication Systems Christian Hauser Institute of Communication Networks and Computer Engineering University of Stuttgart christian.hauser@ikr.uni-stuttgart.de 07/07/2006
More informationAddressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach
Addressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach Rustem Dautov Iraklis Paraskakis Dimitrios Kourtesis South-East European Research Centre International Faculty, The University
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationRotary Medlemsmøte, Skedsmo Nord, 11May2015. Livet er trådløs, Mobilen styrer og Internet blir alt
Rotary Medlemsmøte, Skedsmo Nord, 11May2015 Livet er trådløs, Mobilen styrer og Internet blir alt 1 About PPP Penger, Penny,.. Identity? Prestige Publicity 2 ... and the Internet Research and Education
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More informationCWI Norway. Center for Wireless Innovation Norway http://cwin.no CWI. represented by: Josef Noll, Professor University of Oslo/UNIK josef@unik.
Center for Wireless Innovation Norway http://cwin.no Norway represented by: Josef Noll, Professor University of Oslo/UNIK josef@unik.no Center for Wireless Innovation A facilitator for industry and seven
More informationChallenges. Department of Informatics University of Oslo. Presenter. kashifd@ifi.uio.no. October 25, 2011
Internet t of Things: Applications and Challenges Presenter Kashif Dar kashifd@ifi.uio.no INF9910: Cyber Physical Systems Department of Informatics University of Oslo October 25, 2011 Overview Internet
More informationSmart Cities. Photo used under Creative Commons from nigelhowe
Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,
More informationSupply Chain Platform as a Service: a Cloud Perspective on Business Collaboration
Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore
More informationSeminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
More informationAn Open Agent Environment for Context-Aware mcommerce
15 th Bled Electronic Commerce Conference ereality: Constructing the eeconomy Bled, Slovenia, June 17-19, 2002 An Open Agent Environment for Context-Aware mcommerce Norman M. Sadeh School of Computer Science,
More informationINTRODUCTION TO NETWORK VIRTUALIZATION
1 INTRODUCTION TO NETWORK VIRTUALIZATION Wednesday, May 14, 2008 Mosharaf Chowdhury Member, envy Project What is Virtualization? 2 Transparent abstraction of computing platform and resources Multiple logical
More informationService Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
More informationMaster Studies @ UNIK. Performing your Master Studies in. Wireless Networks and Information Security
Master Studies @ UNIK - Performing your Master Studies in Wireless Networks and Information Security, Audun Jøsang, Øivind Kure, Leif Nilsen, Pål Orten, Abul Kaosher, Torleiv Maseng, Paal Engelstad, Terje
More informationData collection architecture for Big Data
Data collection architecture for Big Data a framework for a research agenda (Research in progress - ERP Sense Making of Big Data) Wout Hofman, May 2015, BDEI workshop 2 Big Data succes stories bias our
More informationHorizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges
More informationCloud Thinking. Simplifying Big Data Processing. Rui L. Aguiar, Diogo Gomes Universidade de Aveiro - Portugal
Cloud Thinking Simplifying Big Data Processing Rui L. Aguiar, Diogo Gomes Universidade de Aveiro - Portugal Problem A connected world of Information Systems and Electronic Devices produces terabytes of
More informationIEEE JAVA Project 2012
IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing
More informationContext Aware Mobile Network Marketing Services
Context-aware Mobile Multimedia Services in the Cloud Dejan Kovachev, Ralf Klamma Chair for Computer Science 5 (Information Systems), RWTH Aachen University Ahornstr. 55, D-52056, Aachen, Germany {kovachev,
More informationOWL Ontology Translation for the Semantic Web
OWL Ontology Translation for the Semantic Web Luís Mota and Luís Botelho We, the Body and the Mind Research Lab ADETTI/ISCTE Av. das Forças Armadas, 1649-026 Lisboa, Portugal luis.mota@iscte.pt,luis.botelho@we-b-mind.org
More informationIoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA
HORIZON 2020 WP 2016-17 IoT-03-2017 R&I on IoT integration and platforms INTERNET OF THINGS DG CONNECT European Commission Internet of Things As enabler of a future hyper-connected society, the Internet
More informationIoT Prospects of Worldwide Development and Current Global Circumstances
IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in
More informationKey Challenges in Cloud Computing to Enable Future Internet of Things
The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet
More informationHControl offers you not One, nor Two, or even Three but Four vital home services with our exclusive Smart Home System.
We are proud to announce that Mandarin Lakes is one of only a handful of communities in Florida where every home is served by its own fiber optic cable. You are now able to take advantage of the next generation
More informationFuture Networks and Communications (Priority Area A)
PRIORITY AREA A: FUTURE NETWORKS AND COMMUNICATIONS ACTION PLAN Future Networks and (Priority Area A) Context The Internet has become a critical infrastructure that forms a key element of our social and
More informationSEMANTICS ENABLED PROACTIVE AND TARGETED DISSEMINATION OF NEW MEDICAL KNOWLEDGE
SEMANTICS ENABLED PROACTIVE AND TARGETED DISSEMINATION OF NEW MEDICAL KNOWLEDGE Lakshmish Ramaswamy & I. Budak Arpinar Dept. of Computer Science, University of Georgia laks@cs.uga.edu, budak@cs.uga.edu
More informationInternet of Things, Privacy, and Novel Services
Norstella årsmøte, 30Mar2016 Internet of Things, Privacy, and Novel Services How can we teach Sensors to talk Norwegian Josef Noll, Olaf Owe, Christian Johansen 1 University of Oslo/UNIK & IFI ConSeRNS,
More informationA Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
More informationBig Data & Security. Aljosa Pasic 12/02/2015
Big Data & Security Aljosa Pasic 12/02/2015 Welcome to Madrid!!! Big Data AND security: what is there on our minds? Big Data tools and technologies Big Data T&T chain and security/privacy concern mappings
More informationMaster of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
More informationContext Model Based on Ontology in Mobile Cloud Computing
Context Model Based on Ontology in Mobile Cloud Computing Changbok Jang, Euiin Choi * Dept. Of Computer Engineering, Hannam University, Daejeon, Korea chbjang@dblab.hannam.ac.kr, eichoi@hnu.kr Abstract.
More informationCombining the INTERNET of THINGS and the INTERNET of SERVICES
On RFID Conference and Exhibition LAGOAS PARK, LISBON Combining the INTERNET of THINGS and the INTERNET of SERVICES Dr. Joachim Schaper Vice President SAP Research EMEA, SAP AG Agenda 1 2 3 4 5 The VISION
More informationA COLLABORATIVE PERSPECTIVE OF CRM
A COLLABORATIVE PERSPECTIVE OF CRM Mărginean Nicolae Bogdan-Vodă University, Faculty of Economics, Cluj-Napoca, Spinoasa 14 street, e-mail: nicolae1976@yahoo.com, telef: 0745/318321 Today, companies are
More informationService management evolution
management evolution Vilho Räisänen 1, Wolfgang Kellerer 2, Pertti Hölttä 3, Olavi Karasti 4 and Seppo Heikkinen 4 Abstract This paper presents an outline for the evolution of service management. The outline
More informationAutonomic computing system for selfmanagement of Machine-to-Machine networks
Self-IoT 2012, September 17th 2012, San Jose, California, USA in conjunction with ICAC 2012 Autonomic computing system for selfmanagement of Machine-to-Machine networks Mahdi BEN ALAYA, Salma MATOUSSI,Thierry
More informationSome Research Challenges for Big Data Analytics of Intelligent Security
Some Research Challenges for Big Data Analytics of Intelligent Security Yuh-Jong Hu hu at cs.nccu.edu.tw Emerging Network Technology (ENT) Lab. Department of Computer Science National Chengchi University,
More informationNetworking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
More informationTen Things You Need to Know About Data Virtualization
White Paper Ten Things You Need to Know About Data Virtualization What is Data Virtualization? Data virtualization is an agile data integration method that simplifies information access. Data virtualization
More informationComponent 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science University, funded by the Department of Health
More informationHow To Build A Cloud Based Intelligence System
Semantic Technology and Cloud Computing Applied to Tactical Intelligence Domain Steve Hamby Chief Technology Officer Orbis Technologies, Inc. shamby@orbistechnologies.com 678.346.6386 1 Abstract The tactical
More informationFIA 2011 Linked Data Session Linked Data for Telecom Networks
FIA 2011 Linked Data Session Linked Data for Telecom Networks Ivan BEDINI, Bell Labs Research Budapest May 18, 2011 AGENDA 1. Telecom Network Trends 2. cell Testbed Network Experiments 3. Linking Network
More informationINTERNET CONNECTIVITY
INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet
More informationCyber Security: Finding Synergy Between Industry and Government
Cyber Security: Finding Synergy Between Industry and Government Tuesday, 20 Sept 2011 Jeff G. Chief, Cyber Security Architect CIA Agenda Drivers Issues & Challenges Efficiencies Loss of Control What Users
More informationVertical Integration of Enterprise Industrial Systems Utilizing Web Services
Vertical Integration of Enterprise Industrial Systems Utilizing Web Services A.P. Kalogeras 1, J. Gialelis 2, C. Alexakos 1, M. Georgoudakis 2, and S. Koubias 2 1 Industrial Systems Institute, Building
More informationGovernance van Mobiele Service Platforms
Governance van Mobiele Service Platforms Trends en ontwikkelingen Dr. ir. Mark de Reuver Section Information and Communication Technology Faculty Technology Policy and Management Delft University of Technology
More informationPaving the way for billions of objects online. Hans-Christian.Haugli@telenor.com Head Telenor Research & Innovation
OECD ANACOM Paving the way for billions of objects online Hans-Christian.Haugli@telenor.com Head Telenor Research & Innovation USING SENSOR-BASED NETWORKS TO ADDRESS GLOBAL ISSUES: POLICY OPPORTUNITIES
More informationThe HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 With an Evaluation of DAS & Cloud
The HetNet Bible (Small Cells and Carrier WiFi) - Opportunities, Challenges, Strategies and Forecasts: 2013 2020 Revision Date: 10 May 2013 2.1.3 HetNets: An Evolution of Network Topology Driven by both
More informationNIST Big Data Public Working Group
NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption
More informationITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.
ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide
More informationThe Internet of the future: What could it be and what are the challenges
The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and
More informationSensor Information Representation for the Internet of Things
Sensor Information Representation for the Internet of Things Jiehan Zhou Jiehan.zhou@ee.oulu.fi University of Oulu, Finland Carleton University, Canada Agenda Internet of Things and Challenges Application
More informationFostering IoT Deployment Challenges and Assets of SDN Techniques
Fostering IoT Deployment Challenges and Assets of SDN Techniques C. Jacquenet christian.jacquenet@orange.com Slide 1 Outline Context On IoT networking, routing and service design Additional IoT challenges
More informationcloud SOA www.cloud4soa.eu Research Guide
cloud SOA A Cloud interoperability framework and platform for user-centric, semantically-enhanced, service-oriented application design, deployment and distributed execution Research Guide www.cloud4soa.eu
More informationTrusted Personal Data Management A User-Centric Approach
GRUPPO TELECOM ITALIA Future Cloud Seminar Oulu, August 13th 2014 A User-Centric Approach SKIL Lab, Trento - Italy Why are we talking about #privacy and #personaldata today? 3 Our data footprint Every
More informationBusiness Process Ontology and Software Service Models for Environmentally Sustainable Manufacturing Enterprises
Business Process Ontology and Software Service Models for Environmentally Sustainable Manufacturing Enterprises Sita Ramakrishnan and Subramania Ramakrishnan Faculty of IT and Faculty of Engineering, Monash
More informationHow To Understand The Role Of Internet Of Services
Towards the Future Internet G. Tselentis et al. (Eds.) IOS Press, 2009 2009 The authors and IOS Press. All rights reserved. doi:10.3233/978-1-60750-007-0-183 183 From Software Services to a Future Internet
More informationOntology-centric knowledge discovery in a
Ontology-centric knowledge discovery in a Contact Centre for Technical Product Support Christopher JO Baker bakerc@unb.ca Bradley Shoebottom bradley.shoebottom@innovatia.net Alex Kouznetzov alexk@unb.ca
More informationBig Data lisää älyä tiedosta
2011 Tieto Corporation Big Data lisää älyä tiedosta ebusiness Forum 21.5.2013 Ilkka Korkiakoski VP Financial Services Agenda Megatrends and needs for Big Data What is the value of Big Data? Use scenarios
More informationOntology Patterns for Complex Activity Modelling
Ontology Patterns for Complex Activity Modelling Georgios Meditskos, Stamatia Dasiopoulou, Vasiliki Efstathiou, Ioannis Kompatsiaris Information Technologies Institute Centre of Research & Technology Hellas
More informationSocial Data Science for Intelligent Cities
Social Data Science for Intelligent Cities The Role of Social Media for Sensing Crowds Prof.dr.ir. Geert-Jan Houben TU Delft Web Information Systems & Delft Data Science WIS - Web Information Systems Why
More informationTechnology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability
Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability Nick Bowen Colin Harrison IBM June 2008 1 Background Global Technology
More informationSemantically Enhanced Web Personalization Approaches and Techniques
Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,
More informationScientific Report. Jonathan Ouoba Burkina Faso. VTT Technical Research Centre of Finland. Tuomo Tuikka. First name / Family name.
Scientific Report First name / Family name Nationality Jonathan Ouoba Burkina Faso Name of the Host Organisation VTT Technical Research Centre of Finland First Name / family name Tuomo Tuikka of the Scientific
More informationATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
More informationUser Needs and Requirements Analysis for Big Data Healthcare Applications
User Needs and Requirements Analysis for Big Data Healthcare Applications Sonja Zillner, Siemens AG In collaboration with: Nelia Lasierra, Werner Faix, and Sabrina Neururer MIE 2014 in Istanbul: 01-09-2014
More informationWWW.6GBUSINESS.COM. Give your business the competitive advantage
WWW.6GBUSINESS.COM Give your business the competitive advantage 6G Internet s Technology Superfast wireless broadband providing speeds from 10Mbps to 10Gbps* 6G internet s Air Fibre is a forward thinking
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationHow To Develop An Open Play Context Framework For Android (For Android)
Dynamix: An Open Plug-and-Play Context Framework for Android Darren Carlson and Andreas Schrader Ambient Computing Group / Institute of Telematics University of Lübeck, Germany www.ambient.uni-luebeck.de
More informationSystèmes d information diffus avec l environnement SPREAD
Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain
More informationAdvanced Transportation Management Systems
Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
More informationCLOUD BASED SEMANTIC EVENT PROCESSING FOR
CLOUD BASED SEMANTIC EVENT PROCESSING FOR MONITORING AND MANAGEMENT OF SUPPLY CHAINS A VLTN White Paper Dr. Bill Karakostas Bill.karakostas@vltn.be Executive Summary Supply chain visibility is essential
More informationPolicy Interactions and Management of Traffic Engineering Services Based on Ontologies
Policy Interactions and Management of Traffic Engineering s Based on Ontologies Steven Davy 1, Keara Barrett 1, Martín Serrano 2, John Strassner 3, Brendan Jennings 1, Sven van der Meer 1 1 TSSG, Waterford
More informationThe Autonomic Management of Ubiquitous Systems meets the Semantic Web
The Autonomic Management of Ubiquitous Systems meets the Semantic Web Steven Heeps 1, Naranker Dulay 2, Alberto Egon Schaeffer Filho 2, Emil Lupu 2, Morris Sloman 2, Stephen Strowes 1, Joe Sventek 1 1
More informationpowl Features and Usage Overview
powl Features and Usage Overview Live demonstrations and further information is available from: http://powl.sourceforge.net/swc Sören Auer University of Leipzig auer@informatik.uni-leipzig.de Norman Beck
More informationCharacteristic-Based Security Analysis of Personal Networks
Characteristic-Based Security Analysis of Personal Networks Andrew J. Paverd Department of Computer Science University of Oxford andrew.paverd@cs.ox.ac.uk Fadi El-Moussa BT Research BT Technology, Service
More informationAppSymphony White Paper
AppSymphony White Paper Secure Self-Service Analytics for Curated Digital Collections Introduction Optensity, Inc. offers a self-service analytic app composition platform, AppSymphony, which enables data
More informationAmpersand and the Semantic Web
Ampersand and the Semantic Web The Ampersand Conference 2015 Lloyd Rutledge The Semantic Web Billions and billions of data units Triples (subject-predicate-object) of URI s Your data readily integrated
More informationHow To Design Software
The Software Development Life Cycle: An Overview Presented by Maxwell Drew and Dan Kaiser Southwest State University Computer Science Program Last Time The design process and design methods Design strategies
More informationThe data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
More informationMoB: A Mobile Bazaar for Wide area Wireless Services
MoB: A Mobile Bazaar for Wide area Wireless Services R. Chakravorty, S. Agarwal, S. Banerjee, I. Pratt T 110.7190 Research Seminar on Telecom Software 28.09.2005 Yrjö Raivio 28916V T 110.7190 Research
More informationDistributed Database for Environmental Data Integration
Distributed Database for Environmental Data Integration A. Amato', V. Di Lecce2, and V. Piuri 3 II Engineering Faculty of Politecnico di Bari - Italy 2 DIASS, Politecnico di Bari, Italy 3Dept Information
More informationMobile Enterprise and IPv6 Consumerization of IT
Mobile Enterprise and IPv6 Consumerization of IT Yanick Pouffary Distinguished Technologist - Technology Services - Networking HP IPv6 Global Leader April 18, 2013 Copyright 2012 Hewlett-Packard Development
More informationIntroduction to Track on Engineering Virtualized Services
Introduction to Track on Engineering Virtualized Services Reiner Hähnle 1 and Einar Broch Johnsen 2 1 Technical University of Darmstadt, Germany haehnle@cs.tu-darmstadt.de 2 Dept. of Informatics, University
More informationObjective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering
Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate General Software & Service Architectures and Infrastructures
More informationFuture of IMT Systems: Wireless World Vision 2020
Future of IMT Systems: Wireless World Vision 2020 Dr. Sudhir Dixit WWRF Vision Committee Chairman & Vice Chair Asia Pacific Director, Hewlett-Packard Laboratories Bangalore, India Outline Wireless World
More informationIntroduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
More informationReducing Configuration Complexity with Next Gen IoT Networks
Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration
More informationJAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining
S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and
More informationIoT Solutions from Things to the Cloud
IoT Solutions from Things to the Cloud Intel Quark SoC X1000 Applications Marketing Seminar Anaheim, California Oct. 29, 2014 Intel, the Intel logo, the Intel Inside logo, Intel Atom, Intel Core, Quark
More informationQuality of Service Requirements Specification Using an Ontology
Quality of Service Requirements Specification Using an Ontology Glen Dobson Russell Lock Ian Sommerville Computing Department, Lancaster University, Lancaster, UK Computing Department, Lancaster University,
More informationDevice-centric Code is deployed to individual devices, mostly preprovisioned
Programming Device Ensembles in the Web of Things A Position Paper for the W3C Workshop on the Web of Things Matias Cuenca, Marcelo Da Cruz, Ricardo Morin Intel Services Division (ISD), Software and Services
More information