-ment from the society (users, patients, citizens etc. in the process of co-development which needs to be considered
Communities/users /patients/citizens: increased ownership, engagement and interest Corporations Looking at long-run corporate performance
Passenger user experience at the Port â There is concern that Rosslare has become one of the shoddiest and least attractive entry/exit points on this island.
some small scale works could be undertaken at the terminal building to improve visitor facilities for tourism and freight users.
Around one third of airport users are business travellers, which is considerably above that of other regional airports
and is underlined by the high frequency of trips made by around 50%of all airport users. â
network administration and user support, â Schaart told Euractiv No image problem Higgins said that employers face a big
to the final user and the authors properly remunerated. â But open educational resources are not just a recommendation from the
development of technological artifacts and improvements in productivity for the users of those tools has indeed
The widespread acceptance of Moore's Law shapes user expectations and technological planning, not only in the integrated circuit industry,
features so that the diverse needs of an ever-growing user community can be fulfilled. It need not follow that
any particular user will experience performance improvement as the result of component improvement. As has
even if the user adopts the new technology, the learning time in mastering new software, the
however, it is apparent to most sophisticated users of computers that the extension of these capabilities also creates a vast new array of problems that must be solved to achieve desired
and new demands for"user support"to make the general purpose technology deliver its potential
30 For an historical account of a potential alternative path of user-driven technological development, one that entailed the
hardware and software in combination did"empower"users to think of"insanely great"new applications--to
permit them to make a difference to the performance of a large number of users. But the ubiquity and
engaged, is ultimately for the benefit of the user. From their perspective, the key to future success lies in
whereas among users, these developments may be welcomed by some while loathed by others. What can be predicted reliably, however, is
users will continue to severely constrain their contributions to productivity 5. Dark Journey Towards the Brighter Future?
Caminer, D. T.,J. B b. Aris, P m. R. Hermon and F. F. Land, User-Driven Innovation:
Website customisation for regular users 8. 4 Possibility of customers customising or designing products 7. 38
management (72.1%)and as a user information channel (56.8 %Out of the total number of companies, 87.3%stated that social media was useful, to a higher
enabled new forms of collaboration between users and firms. The concept and practice of â open
the participation, co-operation and â buy inâ of users Legitimacy of projects And fourth, citizen engagement can have the
users and communities â but equally, some innovation developed by these sectors does not qualify as social innovation
and nonprofessional users Future Internet research is an important cornerstone for a competitive Europe. We
Lack of inherited user and data privacy: In case data protection/encryption meth -ods are employed (even using asymmetric encryption and public key methods
violates the user and data privacy. More investigations into the larger privacy and data protection ecosystem are required to overcome current limits of how current
information systems deal with privacy and protection of information of users, and develop ways to better respect the needs and expectations 30,31, 32
â¢Accountability of resource usage and security without impeding user privacy utility and self-arbitration:
number of users with increasing heterogeneity in applicative communication needs â¢Robustness/stability, resiliency, and survivability:
and dependability demanded by users. Internet use is expected to grow massively over the next few years with an order of magnitude more Internet
-working resources being used, from its applications and users. This paper uses system virtualisation to provide virtual services and resources.
resources in response to changing user needs, business requirements, and environ -mental conditions. The low-level configuration (i e.,
user-facing services or network management services, which make use of or/and adapt themselves to context information.
Mobile Internet has started recently to become a reality for both users and operators thanks to the success of novel, extremely practical smartphones, portable computers
customers by balancing user traffic between a large variety of access networks. Scal -ability of traffic, network and mobility management functions has become one of the
The growing number of mobile users, the increasing traffic volume, the complexity of mobility scenarios,
a limited part of users is attracted or open to pay for the Wireless internet services meaning that voice communication will remain the dominant mobile application also
users will choose from a growing scale of services to communicate (e g.,, e-mail, Instant Mes
On one hand user plane scalability issues are foreseen for anchor-based mobile Internet architectures, where mechanisms of IP ADDRESS allocation and tunnel estab
and route user traffic by the anchor point (s) towards the end terminals and vice versa. However, network ele
operator policy and user subscription. Due to the number of standardized interfaces e g.,, towards IP Multimedia Subsystem for delivering IP multimedia services), the
domain, including the main user plane anchors in the RAN and the CN In Phase 1 (1995) the basic elements of the GSM architecture have been defined
main user plane anchors in the RAN and the CN 40 L. Bokor, Z. Faigl, and S. Imre
Direct Tunnel allows to offload user traffic from SGSN by bypassing it. The Direct Tunnel enabled SGSNS can initiate the reactivation of the PDP context to tun
-nel user traffic directly from the RNC to the GGSN or to the Serving GW introduced
in Release 8. This mechanism tries to reduce the number of user-plane traffic anchors
entities in the same residential/enterprise IP network without the user plane traversing the core network entities.
LTE-A architectures concerns only the control plane but not the user plane: LTE is
-ized, keeping user IP traffic anchored. There are several schemes to eliminate the residual centralization and further extend 3gpp
Back User Agents (B2buas) in UFA GWS can prepare for fast handovers by com -municating the necessary contexts, e g.,
and user traffic forward -ing. In 3g UMTS architectures centralized and hierarchical mobility anchors are
both signaling and user plane trafficâ administers mobile terminalsâ location informa -tion, and tunnels user traffic towards the mobileâ s current locations and vice versa
Several enhancements and extensions such as Fast Handoffs for Mobile IPV6 (FMIP 22, Hierarchical Mobile IPV6 (HMIP) 23, Multiple Care-of Addresses Registration
mechanisms in current wireless and mobile networks anchor the user traffic relatively far from usersâ location.
case of motionless users, centralized context maintenance and single point of failures Anchor-based traffic forwarding
-ployment issues for caching contents near the user To solve all these problems and questions novel, distributed and dynamic mobility
the access network side and terminals on the user side. Core network nodes are mainly simple IP routers.
MIPV6 which is able to bypass the user plane anchor (i e.,, Home Agent) due to its
-ing and user planes based on their differences in traffic volume or end-host behavior i e.,
, only the user plane is distributed), or by granting mobility support only to nodes that actually need it (i e.,
Mobile IP without route optimization) do not separate signaling and user planes which means that all control
Since the volume of user plane traffic is compared much higher to the signaling traffic, the separation of signaling and user planes together with the
distribution of the user plane but without eliminating signaling anchors can still result in effective and scalable mobility management.
This is exploited by the HIP based UFA scheme 18â 20 where a relatively simple inter-UFA GW protocol can be used
but the user plane is still fully distrib -uted. Mobile IP based DMM solutions also rely on the advantages of this partial dis
additional delay that user and signaling plane messages perceive over a hierarchical and multi-element access
-flect cost reduction and increase systems flexibility to react to user demands, by re -placing a plethora of proprietary hardware and software platforms with generic solu
that meet the rapidly changing needs of the communities of users for which the hour
support and sustain interactions between various communities of users in straight rela -tion with communication infrastructure mechanisms.
communities of users (heterogeneous data & infrastructure The federated architecture must be enabled for ensuring the information is avail
-to end delivery of services to end-users. Furthermore, there are challenges relating to securing the delivery of services across (possible multiple) wireless mesh infrastruc
The complex nature of user requests can result in numer -ous traffic flows within the networks that can not be correlated with each other, thus
Particularly as users have been empowered to mix and match applications to create customised functionality (e g. mash-ups). Similarly
) Value networks share with Web 2. 0 application users a concern with value of interacting effectively with rest of the network community (federation
Autonomic Networking and Communication, Birkhã¤user, Basel (2008 8. Raymer, D.,van der Meer, S.,Strassner, J.:
c) Resource Users which represent the physical people or application software that intends to interact with Resources and Eoi
physical and the digital world by allowing users/applications to interact with the Re -sources and Eoi is the main contribution of the RWI reference architecture towards a
On the resource level, resource users directly interact with resources. Such interac -tions are suitable for certain types of RWI applications where the provided informa
3. Resource Users who are the main users of the resources or architectural services 3. 1 Functional Coverage of RWI Architectures
resource users and the corresponding business roles inside the RWI ecosystem Resource discovery is one of the basic services RWI architectures provide for re
It allows resource users to lookup and find resources that are made available by resource providers in an RWI community.
Resource users specify characteristics of a resource, e g.,, the identifier or type they are interested in, and
It allows resource users to directly access context information in the RWI concerning Eois or find resources from which such
It allows resource users to declaratively specify simple or complex actuation requests or expected outcomes of actuations on an Eoi
The respective functions ensure that resource users are provided with an adequate set of resources able to achieve the specified objectives
between resources and resource users, in particular if these interactions span multiple resources. Longer lasting interactions may require adaptation of the interactions to
complexity from the resource user Access control functionality is essential to ensure that only authorized resource us
users at request time and subsequent authorization of resource usage. Another aspect of resource access is access arbitration,
-thorized users. This requires mechanisms to resolve contention if multiple conflicting requests are made including preemption and prioritization
Based on the accounting model, resource users can be charged for the access to resources or provided information and actuation services
same way as a web user interacts with a web resource, e g.,, retrieve a web page, the
user can interact with the real-world resources, e g.,, retrieve sensor data from a sen -sor.
the user perspective (Resource End point â REP). Furthermore, the model distin -guishes between the devices hosting the resources (Resource Host) and the network
users or applications. A resource in the Smart Object model thus provides (context information or interaction capabilities concerning associated real-world entities
Interactions among resources and resource users can be 1: 1, 1: n or m: n
User and RWI Entities of Interest (Entities of Interest) are analogous to the contextual information provided by AAL contextual manager.
supporting nomadic users and remote collaboration among objects in different smart spaces in a seamless and automatic way.
It includes various useful services for both providers and users of real world resources to form a global market space for real world information and interaction.
services is a rendezvous mechanism that allows resource users to discover and query resources that fulfill their interaction requirements.
allowing resource users to declara -tively express context information or actuation tasks. Using a semantic query resolver
-tecture supports both onetime and longer lasting interactions between resource users and resource providers, that can be streaming
a security token service for resource users and AAA (Authentication, Authorization and Accounting) service to enforce access at the access controlled entities covering
a user-centric perspective, a service-centric perspective and a content -centric perspective. The user-centric perspective emphasizes the end-user experience as
the driving force for all technological innovation; the service-centric perspective is currently influenced in enterprise IT environment and in the Web2. 0 mashup culture
-tent, Services and User perspectives, a rough schema in Table 1 can provide highlights the main, original, driving forces of such approaches
Content-centric Service-centric Users-centric Approaches Web of Data /Linked Data REST Internet of
As a consequence of merging the three views (user, content, service-oriented the Future Internet Architecture herewith described essentially proposes a Virtual
-velopment of Applications fulfilling the user-centric needs and perspectives. Among the different paths to the Web of Data the one most explored is adding explicit data to
users to âoeactâ on pieces of information and documents. The IDN-SA implements the reference functionalities defining subsystems, protocols and interfaces for IDN docu
platforms available to the research and user communities In Europe, Future Internet research has been included as one of the topics in FP6
, users, contents, services, network re -sources, computing resources, device characteristics) via virtualization and data min
-alities in order to maximize the user Quality of Experience with the available re -sources The Chapter is organized as follows:
for instance, Actors include users, developers, network providers, service providers, content providers, etc A Cognitive Future Internet Architecture 93
reliable connection, satisfy the user perceived quality of experience and so on The control and management decisions taken by the Cognitive Enablers are han
Users Network Providers Prosumer Developers Content Providers Service Providers A pplications Semantic Virtualization Enablers Cognitive Enablers
AAA) at user and device level, Service Security, Intrusion Detection, etc..Another key role of this module is to dynamically decide, consistently with the application
content, host, user, cloud computing and sensor networks. The notion of entity in the Title Model diï ers from the notion of resources in some relevant litera
For example, one user, that demands resources, is one communication entity in the Title Model. Also, applications
host, user. Also can be created other kinds of classiï cation, such as hardware software and network, among others.
-cation element, based on âoeservice conceptâ presented by Vissers, where users communicate with each other through a âoeservice Providerâ,
Internet, as 4ward, Content-Centric, User-Centric, Service-Centric and Autoi Title Model Ontology for Future Internet Networks 109
User DTS NE1 NE2 NE NE3 Destination Service Content User Network Elements (NE Fig. 2. Entities Communication Orchestrated by the DTS
4 28. This ontology also supports the proposal of Horizontal Addressing by Entity Title, presented in 26,
support to approaches like the Content, Service and User Centric. In addition it permits semantic communication cross layers to contribute with, for example
one user may need the Content directly from Services or from other Users (thoughts. In this
perspective, the Entity Title Model and its ontology can contribute to converge some Future Internet projects,
as the Content, Service and User Centric works monitored and managed by the OSKMV planes using semantics cross layers
In this example for the contribution with the Content, Service and User Centric works, in the Title Model it is possible the uniï cation of the diï erent
host and user can have supported its needs and can be located by its title By this possibilities, this work aims to contribute with the discussions for
User-Centric, Service-Centric, 4ward and others. Also, is a possibility for the collaborative discussions about the reference model related to these, and others
-communication as well as application-based services) and the social life of user (here mainly addressing private customers of such services
which effect the user/customer-to-provider relation;(6 The investigation of (European) regulation for e-services markets and security regula
This metric is used in an ongoing external trial with real users As a measure of âoewinâ for end users Qoe metrics are used.
Users will use a given mechanism if this improves or, at least, preserves their download time.
Ideally, this should be guaranteed on a per individual user basis However, it is analyzed most often by comparing the average values of the metrics
coexistence of users employing ETM and ones declining support, even within a single swarm â¢Different swarm sizes;
-awareness on each of the different user groups separately. This is a new methodology in contrast to related work, where average results or a cumulative density function for
the overlay performance from the user's point of view. Here, download times of all peers are averaged in one AS in one simulation Run for each parameter setting 20
-spective, it is given not that users would accept such a mechanism, since they cannot be sure not to lose from it.
no reduction in the performance for the user, even if considering a more realistic sce -nario than typically used in related studies
links, and to improve performance experienced by the users of peer-to-peer applica -tions. Two approaches, the insertion of ISP-owned Peers (Iops),
verified (by running couples simulations) that users benefit with respect to perform -ance not just on the average but 95%of them on an individual basis too
Due to the additional upload capacity in the swarm, users benefit from this ETM mechanism, while the inter-AS traffic of the ISP employing the Iop is
users with a limited supply of addresses, and has some security benefit. As a counter
and users will complain if they adopt it and it breaks something Note that it is not possible to prove that the framework is necessary or sufficient to
-put of its âoelegacyâ users â¢It is designed to be application-friendly: it just uses TCP s API
user can still communicate with legacy TCP users and can still communicate if the signalling is corrupted by a middlebox
Another potential initial scenario would be a mobile user using MPTCP over multiple interfaces. The scenario reveals a potential distinction between deployment (which
The main intention of Congestion Exposure (Conex) is to make users and network nodes accountable for any congestion that is caused by the traffic they send or forward
Secondly, a policer to enforce policy specifically related to the user being served. A user pays, as part of its contract, to be allowed to cause a certain
amount of congestion. The policer checks the user is within its allowance by counting the Conex-Re-echo signals.
Similarly, a policer at a networkâ s border gateway checks that a neighbouring ISP is within its contractual allowance
volume caps and maybe deep packet inspection, to provide all users with a âoefair shareâ.
-effectively it can choose different Qos classes for different users Another way this scenario could develop is that the operator offers the service to
users use a virtualised instance of the new application. Although our adoption frame -work is still valid,
Every user can immediately use the new (virtualised) software, so effectively a large number of users can be enabled simultaneously
â¢These factors reduce the deployment risk, especially as it should also be easier to
access to the Internet via mobile devices, an ever-growing number of broadband users worldwide, lower entry barriers for nontechnical users to become content and ser
-vice providers, and trends like the Internet-of-Things or the success of Cloud services
a competitive marketplace with a growing number of both users and service provid -ers, tussle analysis becomes an important approach to assess the impact of stakeholder
In the first iteration, congestion control mainly affects heavy users (HUS), interac -tive users (IUS) and ISPS.
Two tussles have been identified, which are related closely a) contention among HUS and IUS for bandwidth on congested links and (b) conten
shared between users and wireless devices. In the former case, modern transport con -trol protocols perform congestion control without considering the utility of the sender
with the prevalence of flat pricing schemes, has led to a contention tussle among user types, which economists identify as a âoetragedy of the commonsâ.
allocated across users and services The remaining tussle patterns are seen mostly in bilateral or multilateral transac
for example ISPS selecting the next hop of user traffic while users selecting the traffic source in their requests.
Repurposing tussles occur in regards to the privacy of user communication data be -tween users, ISPS, service providers and regulators.
The users are social actors who have a desire, generally speaking, that networks are trustworthy and private 2. The
privacy of communications is based on democratic ideals, that persons should be secure from unwarranted surveillance.
may be warranted in ways that individual users are willing to forego their privacy concerns in the interest of broader societal concerns.
have increasingly been able to monetize their user transaction data and personal data Google is feed able to advertisements based on past searching
These applications of user data as marketing tools are largely unregulated. And in many cases, users have proved willing to give up some of their privacy in exchange
for the economic benefit of better deals that can come from targeted advertising However, for users who wish to opt out of such systems,
the mechanisms for doing so are often less than clear, since the owners of the system prefer to keep people in
monitoring and monetizing the communication of their users, and the demands of gov -ernment bodies to be able to monitor the networks for illegal or unwanted activities
The Trilogy project 16 studied extensively the contention tussle among users as well as among an ISP and its customers, due to the aggressive behavior of popular
gestion control algorithm that gives the right incentives to users of bandwidth inten -sive applications.
are shared between users in a fairer manner. This is achieved by configuring MPTCP so that it acts less aggressively than TCP when the latter flows experience congestion
The MOBITHIN project 13 is related to a responsibility tussle between users of wireless services, mobile operators and regulators that has arisen from the social in
-tween wireless network operators and users of dual-band devices (e g. Wifi and UMTS) on the technology used to communicate.
-less users in an area. In this case, the spectrum is the resource in contention and the
-gies, applications and users to the next level of evolution, it also raises security and privacy concerns and introduces additional protection needs.
addressing one of the major obstacles preventing businesses and users to fully exploit the Future Internet opportunities today
seamless access to end users, as if they were working within a single cloud environ -ment. This advanced level of distribution offers increased economic benefits, but also
obligation engines allows for the evaluation of user-defined policies and their execu -tion, leaving control to the user
With the three groups of chapters, this section of the book provides directions on how security and trust risks emerging from the increased level of sharing and collabo
in a hostile environment, where a large number of users are assumed to collude against the network and other users.
In this paper we present a security design through the network stack for a data-centric pub/sub architecture that achieves
where PN is the public key of the user's own namespace. The contents of this publication point to another âoemovie frame dataâ
controlled by the local user. On the other hand, the movie frame publication on the right is stored inside movies studio's localized scope,
used to hide the location of the service from its users. We refer to our work in 2 for
user's e-mail address to be used as user's public key, simplifying the key distribution
PKG), which knows all private keys of its users 6 Conclusion and Future Work In this paper we introduced a data-centric inter-domain pub/sub architecture addressing
In addition, the user community of such FI services evolves and widens rapidly, including masses of typical end users in the role
In addition, this induces users at several levels to lose conï dence in the adoption of ICT-services
Some of these transactions might even happen transparently to the user; for example, a personâ s identity could be communicated seamlessly by a personal
the user but with their manufacturers, are examples of such devices. Such de -ployments inherit security risks from the classical Internet and, at the same time
-neous users and a high level of composition and adaptation is required. These factors increase the complexity of applications
-ple users, devices, third-party components interact continuously and seamlessly so security enforcement mechanisms are indispensable.
users to deviate from rigid best-practices while still maintaining security 4. 3 Platform Support for Security Enforcement
Ubiquitous Knowledge Discovery for Users at ECML/PKDD, pp. 51â 64 (2006 15. Hamlen, K. W.,Morrisett, G.,Schneider, F. B.:
in the release of ï awed products to end-users. This issue can be sig -niï cantly mitigated by empowering designers and developers with tools
9 The AVANTSSAR Platform allows users also to input their services by specifying them using the high-level formal speciï cation language ASLAN,
-sider the policies that a user U has access to a ï le F if U belongs to a group G
or U is the deputy of a user that has access to F access (U, F) â member (U, G) â§owner (G, F
For instance, if user Alice changes to another group within the organization, she will immediately obtain all access
except for those that she maintains due to her being a deputy for other users We consider transition systems in which a state is a set of facts like member
the example of Section 2, we may consider the set Ug of users that are currently
members of a group g. We can then identify all users that belong to the same set
, if a user changes from one group to another. Here, the set-abstraction method deï nes a mechanism to reason about
user would not delete any information that he has learned in the old group, but he
user on Google Apps, granting unauthorized access to private data and services email, docs, etc..
server to impersonate a user on any Google application. In 2, solutions that can be used to mitigate
to perform the same security-critical operations as the legitimate token user Formal validation of trust and security will become a reality in the Internet
-complished by means of the Need-to-Know principle (giving to the users enough rights to perform their job,
gives the user â programmatic controlâ over a part of the data centerâ 1, pp. 8-9
user, Microsoft oï ers dedicated private cloud hosting and supports third-party or customer-site hosting. This allows tailor made solutions to speciï c security
and the user, cloud services for more sensitive markets (such as Microsoft Health Vault) use SSL encryption by default
Since cloud computing often means outsourcing data processing, the user as well as the data subject might face risks of data loss, corruption or wiretap
According to European law, the user who processes PID in the cloud or else -where remains responsible for the compliance with the aforementioned principles
Outsourcing data processing does not absolve the user from his responsibilities and liabilities concerning the data.
This means that the user must be able to control and comprehend what happens to the data in the cloud
regarding the processes within the cloud is required to enable the user to carry out his legal obligations.
informative event and access logs which enable the user to retrace in detail what happens to his data,
Why not cloudsourcing for enterprise app user adoption/train -ing?( (2009), http://velocitymg. com/explorations/why-not-cloudsourcing
-for-enterprise-app-user-adoptiontraining /16. Organization for Economic Co-Operation and Development (OECD: Guidelines
a new perspective on how the users can control and visualize the use of their data stored in a remote server or in the cloud.
and informs the user on the compliance with a previously agreed privacy policy Keywords: Privacy, Usage control, Privacy Policy
The vision of the Future Internet heralds a new environment where users, services and devices transparently and seamlessly exchange
In the cloud users and businesses can buy computing resources (e g.,, servers services, applications) provided by the cloud,
for the user However, this ideal cloud world raises concerns about privacy for individu -als, organizations,
and, as a consequence, users cannot control their per -sonal information any more, as well as, honest businesses may lose conï dence in
the user when data are transfered to a third party. The sticky policy is prop -agated with the information throughout its lifetime, and data processors along
as setting and comparing user preferences with server privacy policies, ex -pressing conditions on complex secondary usage cases, specifying obligations
In many web applications, users are asked to provide various kinds of personal in -formation, starting from basic contact information (addresses, telephone, email
or less explicitly, presented to users during the data collection phase. Privacy policies are composed typically of a long text written in legal terms that are
or even read, by the users. As a result, most of the users creating accounts on web 2. 0 applications are not aware of the conditions under
which their data are handled Therefore, there is need to support the user in this process, providing an
as-automatic-as-possible means to handle privacy policies. In this context, the European FP7 project Primelife1 developed a novel privacy policy framework
policy with user privacy preferences The Primelife project introduced the Primelife Policy Language (PPL, herein
or by a user to specify his preferences about the use of his data (who can use it
-ing his personal information, the user can automatically match his preferences with the privacy policy of the website and the result of the matching generates
user whenever his data are shared with a third party, or deleting the credit card number after the payment transaction is ï nished, etc
In more detail, on the data provider side (user) the modules invoked are â The access control engine:
where a user can clearly understand how the information is handled if he accepts to continue the transaction with
user, is transformed into a sticky policy On the data collector side, after recovering the personal information with its
provider and acts as a user-side engine invoking access control and matching modules, and the third party plays the role of data collector invoking the obli
On the user side, a related question is, are the data owners ready to pay for privacy 9?
In fact, in a typical web 2. 0 application the user is disclosing his own data, balancing the value of his personal data with the services obtained.
a matter of fact, users have diï culties to monetize the value of their personal information, and they tend to disclose their data quite easily.
the user control on the released data. The main idea is to introduce tamper -proof 6 obligation engine and event handler, certiï ed by a trusted third party
also be accessed (partly by the users to monitor the handling of their personal information. Lastly, the trusted-third party can ensure the auditing of the whole
It also allows the user to detect any improper usage of his data, and, in this case, notify the host or the trusted
geographies, businesses and transparently from the user point of view. However these new capabilities may entail privacy risks.
From the user perspective, the risk is that of losing control of his personal information once they are released in
The final user needs to provide the algorithm under test. He will just login to the
The user will not have access to the RUBIS resources (i e. cannot login) so there is a need to encapsulate the monitoring
The user can configure the re -source through some Configuration Parameters. The RA âoewrapsâ the parameters and
user. The Binding Parameters are used for internal purposes of the local testbed con -figuration. The On Update section describes what the rubis app RA does when it
This allows the User -Application/SUT to access the testbed resources during execution of the experiment
typically customized to particular user groups and oï er diï erent capabilities and interfaces. The federation of them still requires research on how these facilities
Free T-REX 2 provides a platform for testbed users, testbed op -erators and developers to oï er their measurement results and software tools to
of available tools in future Internet experimental facilities and, based on user feedback, the toolsâ feasibility for experiment requirements can be assessed.
flows with user-defined parameters that can be analyzed from the receiver to extract traffic Qos features (e g. packet loss, delay, jitter.
The user traffic from the Self-NET experimenta -tion is tunneled by using two IP tunnels over the Internet
the user premises â one for sending data to the uplink and receiving the downlink
-fault values are stored in each RA and the user of the VCT tool needs to input only
public IP ADDRESSES and user credentials for the two external tunneling machines in order to setup the IP tunnels and routes
-lishment of the tunnels between the wireless link and the remote user of the link and a
benefits to end users. For Congestion Exposure (Conex), a reasonable initial deploy -ment scenario is combined a CDN-ISP that offers a premium service using Conex, as
Future related facilities will âoeattractâ more users to innovative services requiring greater mobility and bandwidth, higher speeds and
and with the existent protocol pool targeting user and control plane operations with less emphasis on management tasks 18.
that characterizes the daily operation of FI users 21. Among the main Self-NETÂ s
benefits for all relevant âoeactorsâ (i e. for both operators and users), as follows Automatic network planning and reduction of management time of complex net
-ers the desired services to its users. In many cases, the network operator is obliged to
failures and to ensure continuity of service delivery is a critical matter for the user and
Station User Manual (2008 35. C.:open-source multimedia framework, player and server http://www. videolan. org/vlc
secure, remote access to users of e g. an office network. Also, Virtual LANS (VLANS which are another type of VNS are logical networks
the user profiles, the outcome of this phase will be to decide whether it is suitable to
lifetime to changing environment conditions (e g. context, operatorâ s policies, user profiles). ) In order to achieve this, after the successful completion of the creation
and enable service provisioning to end-users it is needed to gain awareness of the status of candidate,
cashflow as more users are being supported Another indicative scenario would comprise the notion of the opportunistic capac
Access providers are benefited from the fact that more users can be supported since new incoming users that otherwise would be blocked can now be served, while end
users experience improved Qos since congestion situations can be resolved as illus -trated in Fig. 4
ZÄ Å Ä Ç ï Å Ä Ä ae Å ae aeoeä Ä ï Å Ä Ä
or home/residential users. The Internetâ s architecture assumes that routers are stateless and the entire network is neutral.
and the network resources consumed by each user. It is assumed that users are well-behaving and have homogeneous requirements and consumption
After having dramatically enhanced our interpersonal and business commu -nications as well as general information exchangeâ thanks to emails, the web
even conventional Internetâ s users will be aï ected by the uncontrolled traï c or business activity over it
As of today, the users /applications that require bandwidth beyond 1 Gbps are rather common
resilience) can be oï ered economically and eï ciently to users and applications 4 Virtual Infrastructures in Action
by users. Cloud services can be divided into three target audiences: service providers software developers and users as follows6
â Infrastructure as a service â offering resources such as a virtual machine or storage services â Platform as a service â providing services for software vendors such as a soft
email to end-users Within this section we have three chapters which cover several of the issues outlined
From an implementation perspective, user interaction is via a web based UI, used by both IT customers and administrators.
system from the users, effectiveness of monitoring and adjustment functionalities The results obtained from this evaluation is integrated further
-siderations about contributions can be done at the Service, Content and User Centric approaches, when using the current TCP IP layers 3 and 4, and not
represented in OWL, the OSKMV planes and the Service, Content and User Centric works can have the beneï t to inform their needs to the Net-Ontology
>2. 3 Collaboration to the Complexity Reduction for {User, Service Content}- Centric Approaches This work can collaborate to reduce the complexity of the network use by the
user, service and content centric projects, as the ontology can oï er better com -prehension for the networks.
making the {user, service, content -centric approaches simpler, as shown in the sample code below
of network layers and, consequently, through the decreasing of users, services and content complexity is a possible way to achieve ï exibility in future networks
language nor does it provide any specific vocabulary that users should adopt WSMO-Lite builds upon SAWSDL by extending it with a model specifying the
The former is based a web tool that assists users in the creation of semantic annotations of Web APIS,
Similarly, the second tool, SOWER, assists users in the annotation of WSDL services and is based in this case on SAWSDL for adding links to semantic descriptions as
for instance LUF (Linked User Feedback) 16, which links service descriptions with users ratings, tags and comments about services in a separate server.
On the basis of these ratings and comments, service recommendation facilities have also been imple
with services and the invocation process itself, via the generation of appropriate user interfaces. Based on the annotations the user is presented with a set of fields, which
must be completed to allow the service to execute, and these fields cover input pa -rameters as well as authentication credentials.
whereas a user-encoded input may use variable decimal places for latitude and longi -tude.
-guage to formulate user goals, and to define the pre-and post-conditions of SAWSDL-based service descriptions,
On the one hand, atomic user desires can be encoded as a CONSTRUCT query and, under certain restrictions24, query processing techniques can be used to
whose results can be combined to satisfy the initial user request. On the other hand, where more sophisticated control flow is needed, a proc
by new multimedia authoring tools will significantly increase the user generated con -tent. On the other hand, new media sensor networks and tele-immersion applications
The Media Internet is evolving to support novel user experiences such as immer -sive environments including sensorial experiences beyond video and audio (engaging
taste and haptics) that are adaptable to the user the networks and the provisioned services
of the user beyond the classical DIGITAL TV interactivity Second, enhancing media encoding technologies is required for the Internet with
delivery device and user, and also optimize the quality of experience over the Internet Third, one of the areas where high investment in research has taken place in recent
for the users, and social media including personalization and recommendation, is one of the key orientations of future media technologies.
whether multimedia or text is generated collaboratively user content, of which the quality is not always controllable
enabling every user â first â to access the offered multimedia services in various con
and transparently to other users. The architecture also relies on autonomous systems to supply users with the necessary infrastructure and a security
framework Concerning the second point, media encoding technologies for the Internet, the ob -jective of the chapter âoescalable and Adaptable Media Coding Techniques for Future
user first to access the offered multimedia services in various contexts, and second to share and deliver his own audiovisual content dynamically, seamlessly, and
transparently to other users. Towards this goal, the proposed concept provides content-awareness to the network environment, network-and user context
-awareness to the service environment, and adapted services/content to the end user for his best service experience possible,
taking the role of a consumer and/or producer Keywords: Future Internet, Multimedia Distribution, Content Awareness, Net
and react to the Qoe level at user ter -minals, offer to the EU a wide range of potential choices,
nodes, can be a foundation for an user-centric approach (i e. satisfying the different Media Ecosystems:
needs of individual users) or service-centric approach (i e. satisfying the different needs of various service types), that is required for the future services and applica
network-and user context-awareness to the service environment, and adapted ser -vices/content to the end userâ s Environment
The CAN/NAA approach can naturally lead to a user-centric infrastructure and telecommunication services as described in 3. The strong orientation of user-centric
awareness to services and content is emphasized in 4. The works 5-6 consider that CAN/NAA can offer a way for evolution of networks beyond IP, while Qoe issues
â¢User Environment (UE), to which the end users belong â¢Service Environment (SE), to which the service and content providers belong
The User Environment (UE) includes all functions related to the discovery, sub -scription, consumption of the services by the EUS. At the Service Environment (SE
User and service mobility is targeted also Below the SE there is a new Home-Box (HB) layer to coordinate the actual content
users with advanced context-aware multimedia services in a consistent and interoper -able way. It enables uniform access for heterogeneous terminals and supports en
At the HB layer, the advanced user context management and monitoring functions provides real-time information on user context
and network conditions, allowing better control over multimedia delivery and intelli -gent adaptation. The assembly of HBS is called layer
user preferences, terminal capabilities Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks 373
dedicated user profile management and/or monitoring entities/subsystems The adaptation deployed at the CAN layer will be performed in the Media-Aware
At the border to the user, i e.,, the Home-Box, adaptation modules are deployed enabling device-independent access to the SVC-encoded content by providing X-to
The evaluation algorithm considers the user flow characteristics CAN policies and present network conditions. In order to attain the required flexibil
User context is taken not into consideration by the Service or Content Provider (SP/CP) delivering the service (content),
Also, users may influence service delivery options by requesting specific content on specific priority conditions for a specific period of time (context-awareness
On the user side, it increases choice and reduces switching costs between content providers (network
user privacy is a major concern since it directly relates to the consolidation of infor -mation sources where user preferences and habits may be retrieved
and exploited by third parties 5 Conclusions This chapter has presented a novel Media-Ecosystem architecture, which introduces
User-Centric Future Internet and Telecommunication Services. In: Tselentis G.,et al. eds.)) Towards the Future Internet, pp. 217â 226.
application due to users'growing demand of multimedia content and extraordinary growth of network technologies. A broad assortment of such applications can be
architecture severely limits the number of simultaneous users for bandwidth intensive video streaming, due to a bandwidth bottleneck at the server side from which all users
request the content. In contrast, Peer-to-peer (P2p) media streaming protocols, moti -vated by the great success of file sharing applications, have attracted a lot of interest
-taneously to different users according to their capabilities and limitations In order to handle such obscurity, scalability emerged in the field of video coding
user adaptation without using intricate error protection methods. The objective of MDC is to generate numerous independent descriptions that can bestow to one or
-ferent users, as shown in Figure 2 Fig. 2. An example of the proposed system for scalable video coding in P2p network
Quality of Experience (Qoe) of the users. At last, we persuade Future Internet initia -tives to take into contemplation these techniques when defining new protocols for
fully understandable by users; while high-level features contains a high degree of semantic reasoning about the meaning or purpose of the content itself.
-holders such as researchers, businesses, government actors and user communities are brought together to interact and engage in networked and collaborative innovation
emerge, fine-tuned to the needs of enterprise users by leveraging a basic infrastructure of utility-like software services
on the human user, and encompasses the combination of technologies in areas such as smart content, personal networks and ubiquitous services, to provide the user a simpler
easier and enriched life across many domains including home life, education and learn -ing, working,
âoeliving labsâ approach which comprises open and user driven innovation in large-scale real-life settings opens up a promising opportunity to enrich the experimentally-driven
dynamically transport user services to be processed in data centers built in proximity to green energy sources, thereby reducing greenhouse gas emissions of ICT equip
of open and user driven innovation for experimenting and validating Future Internet -enabled services. The chapter describes how the living labs concept has started to
need to clarify the way how living lab innovation methods, user communities and Fu -ture Internet experimentation approaches and testbed facilities constitute a common set
and advanced graphical user 1 http://cordis. europa. eu/fp7/ict/enet/documents/task-forces/research-roadmap
services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.
and directly manipulated by the user while they reside in the Cloud and are reached through the Internet.
, a Virtual Enteprise Reality) where the user can navigate and manage changes. At a lower level, simpler FINERS will be aggregated to
made available to the users during business operations to navigate in the enterprise and see how the operations evolve
user services to be processed in data centers built in proximity to green energy sources, reducing GHG (Greenhouse Gas) emissions of ICT equipments.
from new services and users, resulting in an increase in GHG emissions. Based on the cooperation between Mantychore FP7 and the GSN, our approach is
can transport user service applications to be processed in data centers built in prox -imity to green energy sources,
to user requirements; hence high utilization and optimization levels can be achieved During the service, the user monitors and controls resources as if he was the owner
allowing the user to run their application in a virtual infrastructure powered by green energy sources
2 Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy In the European NREN community connectivity services are provisioned on a manual
so that users can change some of the service characteristics without having to renegotiate with the service provider
Users will be able to get access control over optical de -vices like optical switches, to configure important properties of its cards and ports
Users will be able to get control over Ethernet and MPLS (Layer 2. 5) switches to configure different services.
User applications are running on multiple Dell Poweredge R710 systems, hosted by a rack mount structure in an
The VMS are used to run user applications, particu -larly heavy-computing services. Based on this testbed network, experiments and re
and transparently to service users. The proposed web -based cloud management solution is based on the Iaas concept,
The Cloud Middleware plane corresponds to the User-level Middleware, providing Platform as a service capabilities based on Iaas Framework
components 5. The top Management plane or User level focuses on application services by making use of services provided by the lower layer services
The engines allow GSN users to quantify the power consumption of their service. Engines notify upper layers by triggering
Through a Web interface, users may determine GHG emission boundaries based on information providing VM power and their energy sources,
federate clouds across domains, coordinate user registration, resource allocation stitching, launch, monitoring, and adaptation for multi-domain cloud applications
which is responsible for establishing connection among domains, and forwarding user requests to appropriate data centers. The big picture of the GSN network management
which accepts connections from service users through Internet. This point is powered by green sustainable energy, i e.,
It links user re -quests to appropriate services provided by data centers distributed across the network
User requests will be forwarded by the Federation Stitcher to the appropriate domain controller. When a VM or a data center
is migrated, the new location will be registered with the Federation Stitcher then user requests are tunneled to the new domain controller
Providing users with a Logical IP Network Ser -vice. TERENA Networking Conference (5/2008 9. Grasa, E.,et al.:
and user-driven innovation for experimenting and validat -ing Future Internet-enabled services. Based on an analysis of the current land
-tems, User Co-Creation, Living Labs, Resource Sharing 1 Introduction The concept of âoesmart citiesâ has attracted considerable attention in the context of
user-driven innovation ecosystems to boost Future Internet research and experimenta -tion for user-driven services and how they can accelerate the cycle of research, inno
-432 H. Schaffers et al vation and adoption in real-life environments. This paper pays particular attention to
experimentation into the smart cities concept as piloting user-driven open innovation environments. The implicit aim of such initiatives is to mobilise cities and urban areas
collective intelligence and co-creation capabilities of user/citizen communities for designing innovative living and working scenarios
platforms, emerging ICT tools, methodologies and know-how, and user communities Table 1. Three perspectives shaping the landscape of Future Internet and City Development
User-Driven Innovation Ecosystems Actors Researchers ICT companies National and EU actors City policy actors
User-driven open innovation Engagement of citizens Resources Experimental facilities Pilot environments Technologies Urban policy framework
User-driven innovation projects Open, collaborative innovation Smart Cities and the Future Internet 433 for experimentation on Future Internet technologies and e-service applications
third perspective is the concept of open and user-driven innovation ecosystems, which are close to the interests
-ages between Future internet research, urban development policies and open user -driven innovation. Elements of such frameworks include sharing of and access to
open and user-driven innovation looks well positioned to serve as a mediating, ex -ploratory and participative playground combining Future Internet push and urban
content dependent on user location and context, augmented reality applications, open and federated platforms for content storage and distribution, provide the ground for
-ies, linking smart cities with user-driven innovation, future Internet technologies, and experimental facilities for exploring new applications and innovative services
and open public data up to developers as well as user communities. As the major challenge facing European cities is to secure high living
-tial exists to support new classes of users and experiments combining heterogeneous technologies that represent key aspects of the Future Internet.
of new applications that bring future users the increasing power of the Future Internet have not yet been overcome.
The portfolio of FIRE experimentation projects shows that users in such FIRE pro -jects are mostly academic and industry researchers.
user experimentation is beyond the current scope of FIRE, although some interesting initiatives in that respect have started such as the Smart Santander project (services
A comparison of the role of users in FIRE facilities projects compared to Living Labs is presented in Table 3. Importantly,
FIRE projects typically involve users in assessing the impacts of technologies in socioeconomic terms, whereas Living Labs
projects aim to engage users in the innovation process itself. Also, the predominant approach of FIRE facilities is controlled experimentation,
-gage users in the actual innovation process (co-creation. The European commission has voiced its support for stronger user orientation in the future Internet facilities
projects; not only users in terms of academic and industry researchers who will use these facilities for their research projects, but also end-users.
Emphasis is on involv -ing communities of end-users at an early stage of development to assess the impacts
Table 3. User Role in FIRE and Living Labs Future Internet Experiments Living Labs Innovation
User co-creation via Living Labs methodologies, action research Open, cooperative innovation Object of testing Technologies, services, architec
Validation of user ideas, prototype applications and solutions. Testing as joint validation activity Scale of testing Large-scale mainly From small to large scale
Support the process of user-driven innovation as co-creation In order to explore the opportunities and interfaces,
-tivity and the location of their users; transportation networks digitally manage the mobility of people and vehicles as well as products in the city, just to give a few ex
applications and services seem to be emerging from user co-creation processes Recent paradigms, such as open innovation and open business models 16, Web
Mitchell at MIT and currently considered as user-driven open innovation ecosystems promote a more proactive and co-creative role of users in the research and innovation
process. Within the territorial context of cities, rural areas and regions, the main goal of Living Labs is to involve communities of users at an early stage of the innovation
process. The confrontation of technology push and application pull in a Living Lab enables the emergence of breakthrough ideas,
pilots and Living Labs. In 20 a landscape of user engagement approaches is pre -sented.
management integrated with user experiments within an action research setting have been developed and implemented in 21
-opment programmes form an innovation ecosystem consisting of users and citizens ICT companies, research scientists and policy-makers.
provides opportunities to users/citizens to co-create innovative scenarios based on technology platforms such as Future Internet technology environments involving
by users/citizens contributing with their own content or building new applications that would mash-up with the cityâ s open, public data
The project is intended to use user-driven innovation methods for designing and implementing â use casesâ.
by users of green services in the areas of air quality and ambient noise pollution with
-opment facilities with professional users. Its goal is to investigate evidence of the social dynamics of the Living Lab approach for the purpose of ensuring a wide and rapid
-eration (FING) facilitating user workshops, and a local SME providing data access from electric cars equipped with air quality sensors (VULOG)
-related portal services by allowing the user: 1) to participate in the collection of envi
participatory/user -centred design methods; diary studies for Iot experience analysis, and coupling quan -titative and qualitative approaches for portal usage analysis. In this context of an open
to prove its added value to users. Platform and service convergence is promoted by the use of serious games that engage citizens
and users in the process of discovering the potential of Future Internet technologies and the possible sustainable scenarios
This example illustrates the central role of users and citizens in defining the services that make up a Smart City as well as the new sustainable lifestyles and workstyles
as testing facilities, user groups and experimentation methodologies. Two different layers of collaboration can be distinguished.
such as specific testing facilities, tools, data and user groups, can be made accessible and adaptable to specific demands of any research and innovation projects
-sources made available to users and developers 444 H. Schaffers et al 5 Conclusions and Outlook
user driven innovation for experimenting and validating Future Internet-enabled ser -vices. Smart cities are enabled by advanced ICT infrastructure contributed to by cur
The Living Labs concept represents a powerful view of how user-driven open in -novation ecosystems could be organised.
facilities, user communities, technologies and know-how, data, and innovation meth -ods. Such common resources potentially can be shared in open innovation environ
user communities available for joint use with Future Internet facilities (e g. the TEFIS project), and in making accessible Future Internet facilities for developing and vali
Effective, user driven processes of innovation, shaping and application of Smart Cities and the Future Internet 445
and innovation cycles can be made open accessible for users and developers Open Access. This article is distributed under the terms of the Creative Commons Attribution
From User Centred Design and User Experience Towards User Co-creation. Position Paper, First Living
Labs Summer School (http://www-sop. inria. fr/llss2010/),Paris (August. 2010 21. Schaffers, H.,Garcia Guzmã¡
stimulate the development of new services and applications by various types of users and to help gathering a more realistic assessment of usersâ perspective by means of
-work 7 based on the user-driven approach is of main relevance, although in this paper we also advocate the need of large,
IMS User Equipment USN-Gateway SIP Services Web Services Configuration A A A D evice
performing the request a user might be interested In for example, in an architec -ture where several Sensor Description Entities (SDES) exist,
User Developed App Tinyos Contiki Sunspot  Tinyos Contiki Sunspot  Opencom Middleware Mobility support
-vice design phases, applying user-driven innovation methodologies. Furthermore, it will be used also to provide real services to citizens.
-nities of users, other entities that are willing to use the experimental facility for de
the FIRE testbed user, the service provider, the service consumers (citizens), the Smartsantander facility administrators, and individ
that many nontechnical constraints must be considered (users, public administrations vendors, etc..In this sense, what may be evident from a purely technique perspective
Collaboration to the Complexity Reduction for {User, Service, Content}- Centric Approaches Integration between Services and Networks
Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011