Synopsis: Ict: User: User:


social-innovation-mega-trends-to-answer-society-challenges-whitepaper.pdf.txt

-ment from the society (users, patients, citizens etc. in the process of co-development which needs to be considered

Communities/users /patients/citizens: increased ownership, engagement and interest Corporations Looking at long-run corporate performance


Southeast-economic-development-strategy.docx.txt

Passenger user experience at the Port †There is concern that Rosslare has become one of the shoddiest and least attractive entry/exit points on this island.

some small scale works could be undertaken at the terminal building to improve visitor facilities for tourism and freight users.

Around one third of airport users are business travellers, which is considerably above that of other regional airports

and is underlined by the high frequency of trips made by around 50%of all airport users. â€


Special Report-Eskills for growth-entrepreneurial culture.pdf.txt

network administration and user support, †Schaart told Euractiv No image problem Higgins said that employers face a big

to the final user and the authors properly remunerated. †But open educational resources are not just a recommendation from the


Standford_ Understanding Digital TechnologyGÇÖs Evolution_2000.pdf.txt

development of technological artifacts and improvements in productivity for the users of those tools has indeed

The widespread acceptance of Moore's Law shapes user expectations and technological planning, not only in the integrated circuit industry,

features so that the diverse needs of an ever-growing user community can be fulfilled. It need not follow that

any particular user will experience performance improvement as the result of component improvement. As has

even if the user adopts the new technology, the learning time in mastering new software, the

however, it is apparent to most sophisticated users of computers that the extension of these capabilities also creates a vast new array of problems that must be solved to achieve desired

and new demands for"user support"to make the general purpose technology deliver its potential

30 For an historical account of a potential alternative path of user-driven technological development, one that entailed the

hardware and software in combination did"empower"users to think of"insanely great"new applications--to

permit them to make a difference to the performance of a large number of users. But the ubiquity and

engaged, is ultimately for the benefit of the user. From their perspective, the key to future success lies in

whereas among users, these developments may be welcomed by some while loathed by others. What can be predicted reliably, however, is

users will continue to severely constrain their contributions to productivity 5. Dark Journey Towards the Brighter Future?

Caminer, D. T.,J. B b. Aris, P m. R. Hermon and F. F. Land, User-Driven Innovation:


Survey on ICT and Electronic Commerce Use in Companies (SPAIN-Year 2013-First quarter 2014).pdf.txt

Website customisation for regular users 8. 4 Possibility of customers customising or designing products 7. 38

management (72.1%)and as a user information channel (56.8 %Out of the total number of companies, 87.3%stated that social media was useful, to a higher


Tepsie_A-guide_for_researchers_06.01.15_WEB.pdf.txt

enabled new forms of collaboration between users and firms. The concept and practice of †open

the participation, co-operation and †buy in†of users Legitimacy of projects And fourth, citizen engagement can have the

users and communities †but equally, some innovation developed by these sectors does not qualify as social innovation


The future internet.pdf.txt

and nonprofessional users Future Internet research is an important cornerstone for a competitive Europe. We

Lack of inherited user and data privacy: In case data protection/encryption meth -ods are employed (even using asymmetric encryption and public key methods

violates the user and data privacy. More investigations into the larger privacy and data protection ecosystem are required to overcome current limits of how current

information systems deal with privacy and protection of information of users, and develop ways to better respect the needs and expectations 30,31, 32

•Accountability of resource usage and security without impeding user privacy utility and self-arbitration:

number of users with increasing heterogeneity in applicative communication needs •Robustness/stability, resiliency, and survivability:

and dependability demanded by users. Internet use is expected to grow massively over the next few years with an order of magnitude more Internet

-working resources being used, from its applications and users. This paper uses system virtualisation to provide virtual services and resources.

resources in response to changing user needs, business requirements, and environ -mental conditions. The low-level configuration (i e.,

user-facing services or network management services, which make use of or/and adapt themselves to context information.

Mobile Internet has started recently to become a reality for both users and operators thanks to the success of novel, extremely practical smartphones, portable computers

customers by balancing user traffic between a large variety of access networks. Scal -ability of traffic, network and mobility management functions has become one of the

The growing number of mobile users, the increasing traffic volume, the complexity of mobility scenarios,

a limited part of users is attracted or open to pay for the Wireless internet services meaning that voice communication will remain the dominant mobile application also

users will choose from a growing scale of services to communicate (e g.,, e-mail, Instant Mes

On one hand user plane scalability issues are foreseen for anchor-based mobile Internet architectures, where mechanisms of IP ADDRESS allocation and tunnel estab

and route user traffic by the anchor point (s) towards the end terminals and vice versa. However, network ele

operator policy and user subscription. Due to the number of standardized interfaces e g.,, towards IP Multimedia Subsystem for delivering IP multimedia services), the

domain, including the main user plane anchors in the RAN and the CN In Phase 1 (1995) the basic elements of the GSM architecture have been defined

main user plane anchors in the RAN and the CN 40 L. Bokor, Z. Faigl, and S. Imre

Direct Tunnel allows to offload user traffic from SGSN by bypassing it. The Direct Tunnel enabled SGSNS can initiate the reactivation of the PDP context to tun

-nel user traffic directly from the RNC to the GGSN or to the Serving GW introduced

in Release 8. This mechanism tries to reduce the number of user-plane traffic anchors

entities in the same residential/enterprise IP network without the user plane traversing the core network entities.

LTE-A architectures concerns only the control plane but not the user plane: LTE is

-ized, keeping user IP traffic anchored. There are several schemes to eliminate the residual centralization and further extend 3gpp

Back User Agents (B2buas) in UFA GWS can prepare for fast handovers by com -municating the necessary contexts, e g.,

and user traffic forward -ing. In 3g UMTS architectures centralized and hierarchical mobility anchors are

both signaling and user plane traffic†administers mobile terminals†location informa -tion, and tunnels user traffic towards the mobile†s current locations and vice versa

Several enhancements and extensions such as Fast Handoffs for Mobile IPV6 (FMIP 22, Hierarchical Mobile IPV6 (HMIP) 23, Multiple Care-of Addresses Registration

mechanisms in current wireless and mobile networks anchor the user traffic relatively far from users†location.

case of motionless users, centralized context maintenance and single point of failures Anchor-based traffic forwarding

-ployment issues for caching contents near the user To solve all these problems and questions novel, distributed and dynamic mobility

the access network side and terminals on the user side. Core network nodes are mainly simple IP routers.

MIPV6 which is able to bypass the user plane anchor (i e.,, Home Agent) due to its

-ing and user planes based on their differences in traffic volume or end-host behavior i e.,

, only the user plane is distributed), or by granting mobility support only to nodes that actually need it (i e.,

Mobile IP without route optimization) do not separate signaling and user planes which means that all control

Since the volume of user plane traffic is compared much higher to the signaling traffic, the separation of signaling and user planes together with the

distribution of the user plane but without eliminating signaling anchors can still result in effective and scalable mobility management.

This is exploited by the HIP based UFA scheme 18†20 where a relatively simple inter-UFA GW protocol can be used

but the user plane is still fully distrib -uted. Mobile IP based DMM solutions also rely on the advantages of this partial dis

additional delay that user and signaling plane messages perceive over a hierarchical and multi-element access

-flect cost reduction and increase systems flexibility to react to user demands, by re -placing a plethora of proprietary hardware and software platforms with generic solu

that meet the rapidly changing needs of the communities of users for which the hour

support and sustain interactions between various communities of users in straight rela -tion with communication infrastructure mechanisms.

communities of users (heterogeneous data & infrastructure The federated architecture must be enabled for ensuring the information is avail

-to end delivery of services to end-users. Furthermore, there are challenges relating to securing the delivery of services across (possible multiple) wireless mesh infrastruc

The complex nature of user requests can result in numer -ous traffic flows within the networks that can not be correlated with each other, thus

Particularly as users have been empowered to mix and match applications to create customised functionality (e g. mash-ups). Similarly

) Value networks share with Web 2. 0 application users a concern with value of interacting effectively with rest of the network community (federation

Autonomic Networking and Communication, Birkhã¤user, Basel (2008 8. Raymer, D.,van der Meer, S.,Strassner, J.:

c) Resource Users which represent the physical people or application software that intends to interact with Resources and Eoi

physical and the digital world by allowing users/applications to interact with the Re -sources and Eoi is the main contribution of the RWI reference architecture towards a

On the resource level, resource users directly interact with resources. Such interac -tions are suitable for certain types of RWI applications where the provided informa

3. Resource Users who are the main users of the resources or architectural services 3. 1 Functional Coverage of RWI Architectures

resource users and the corresponding business roles inside the RWI ecosystem Resource discovery is one of the basic services RWI architectures provide for re

It allows resource users to lookup and find resources that are made available by resource providers in an RWI community.

Resource users specify characteristics of a resource, e g.,, the identifier or type they are interested in, and

It allows resource users to directly access context information in the RWI concerning Eois or find resources from which such

It allows resource users to declaratively specify simple or complex actuation requests or expected outcomes of actuations on an Eoi

The respective functions ensure that resource users are provided with an adequate set of resources able to achieve the specified objectives

between resources and resource users, in particular if these interactions span multiple resources. Longer lasting interactions may require adaptation of the interactions to

complexity from the resource user Access control functionality is essential to ensure that only authorized resource us

users at request time and subsequent authorization of resource usage. Another aspect of resource access is access arbitration,

-thorized users. This requires mechanisms to resolve contention if multiple conflicting requests are made including preemption and prioritization

Based on the accounting model, resource users can be charged for the access to resources or provided information and actuation services

same way as a web user interacts with a web resource, e g.,, retrieve a web page, the

user can interact with the real-world resources, e g.,, retrieve sensor data from a sen -sor.

the user perspective (Resource End point †REP). Furthermore, the model distin -guishes between the devices hosting the resources (Resource Host) and the network

users or applications. A resource in the Smart Object model thus provides (context information or interaction capabilities concerning associated real-world entities

Interactions among resources and resource users can be 1: 1, 1: n or m: n

User and RWI Entities of Interest (Entities of Interest) are analogous to the contextual information provided by AAL contextual manager.

supporting nomadic users and remote collaboration among objects in different smart spaces in a seamless and automatic way.

It includes various useful services for both providers and users of real world resources to form a global market space for real world information and interaction.

services is a rendezvous mechanism that allows resource users to discover and query resources that fulfill their interaction requirements.

allowing resource users to declara -tively express context information or actuation tasks. Using a semantic query resolver

-tecture supports both onetime and longer lasting interactions between resource users and resource providers, that can be streaming

a security token service for resource users and AAA (Authentication, Authorization and Accounting) service to enforce access at the access controlled entities covering

a user-centric perspective, a service-centric perspective and a content -centric perspective. The user-centric perspective emphasizes the end-user experience as

the driving force for all technological innovation; the service-centric perspective is currently influenced in enterprise IT environment and in the Web2. 0 mashup culture

-tent, Services and User perspectives, a rough schema in Table 1 can provide highlights the main, original, driving forces of such approaches

Content-centric Service-centric Users-centric Approaches Web of Data /Linked Data REST Internet of

As a consequence of merging the three views (user, content, service-oriented the Future Internet Architecture herewith described essentially proposes a Virtual

-velopment of Applications fulfilling the user-centric needs and perspectives. Among the different paths to the Web of Data the one most explored is adding explicit data to

users to â€oeact†on pieces of information and documents. The IDN-SA implements the reference functionalities defining subsystems, protocols and interfaces for IDN docu

platforms available to the research and user communities In Europe, Future Internet research has been included as one of the topics in FP6

, users, contents, services, network re -sources, computing resources, device characteristics) via virtualization and data min

-alities in order to maximize the user Quality of Experience with the available re -sources The Chapter is organized as follows:

for instance, Actors include users, developers, network providers, service providers, content providers, etc A Cognitive Future Internet Architecture 93

reliable connection, satisfy the user perceived quality of experience and so on The control and management decisions taken by the Cognitive Enablers are han

Users Network Providers Prosumer Developers Content Providers Service Providers A pplications Semantic Virtualization Enablers Cognitive Enablers

AAA) at user and device level, Service Security, Intrusion Detection, etc..Another key role of this module is to dynamically decide, consistently with the application

content, host, user, cloud computing and sensor networks. The notion of entity in the Title Model diï €ers from the notion of resources in some relevant litera

For example, one user, that demands resources, is one communication entity in the Title Model. Also, applications

host, user. Also can be created other kinds of classiï cation, such as hardware software and network, among others.

-cation element, based on â€oeservice concept†presented by Vissers, where users communicate with each other through a â€oeservice Providerâ€,

Internet, as 4ward, Content-Centric, User-Centric, Service-Centric and Autoi Title Model Ontology for Future Internet Networks 109

User DTS NE1 NE2 NE NE3 Destination Service Content User Network Elements (NE Fig. 2. Entities Communication Orchestrated by the DTS

4 28. This ontology also supports the proposal of Horizontal Addressing by Entity Title, presented in 26,

support to approaches like the Content, Service and User Centric. In addition it permits semantic communication cross layers to contribute with, for example

one user may need the Content directly from Services or from other Users (thoughts. In this

perspective, the Entity Title Model and its ontology can contribute to converge some Future Internet projects,

as the Content, Service and User Centric works monitored and managed by the OSKMV planes using semantics cross layers

In this example for the contribution with the Content, Service and User Centric works, in the Title Model it is possible the uniï cation of the diï €erent

host and user can have supported its needs and can be located by its title By this possibilities, this work aims to contribute with the discussions for

User-Centric, Service-Centric, 4ward and others. Also, is a possibility for the collaborative discussions about the reference model related to these, and others

-communication as well as application-based services) and the social life of user (here mainly addressing private customers of such services

which effect the user/customer-to-provider relation;(6 The investigation of (European) regulation for e-services markets and security regula

This metric is used in an ongoing external trial with real users As a measure of â€oewin†for end users Qoe metrics are used.

Users will use a given mechanism if this improves or, at least, preserves their download time.

Ideally, this should be guaranteed on a per individual user basis However, it is analyzed most often by comparing the average values of the metrics

coexistence of users employing ETM and ones declining support, even within a single swarm •Different swarm sizes;

-awareness on each of the different user groups separately. This is a new methodology in contrast to related work, where average results or a cumulative density function for

the overlay performance from the user's point of view. Here, download times of all peers are averaged in one AS in one simulation Run for each parameter setting 20

-spective, it is given not that users would accept such a mechanism, since they cannot be sure not to lose from it.

no reduction in the performance for the user, even if considering a more realistic sce -nario than typically used in related studies

links, and to improve performance experienced by the users of peer-to-peer applica -tions. Two approaches, the insertion of ISP-owned Peers (Iops),

verified (by running couples simulations) that users benefit with respect to perform -ance not just on the average but 95%of them on an individual basis too

Due to the additional upload capacity in the swarm, users benefit from this ETM mechanism, while the inter-AS traffic of the ISP employing the Iop is

users with a limited supply of addresses, and has some security benefit. As a counter

and users will complain if they adopt it and it breaks something Note that it is not possible to prove that the framework is necessary or sufficient to

-put of its â€oelegacy†users •It is designed to be application-friendly: it just uses TCP€ s API

user can still communicate with legacy TCP users and can still communicate if the signalling is corrupted by a middlebox

Another potential initial scenario would be a mobile user using MPTCP over multiple interfaces. The scenario reveals a potential distinction between deployment (which

The main intention of Congestion Exposure (Conex) is to make users and network nodes accountable for any congestion that is caused by the traffic they send or forward

Secondly, a policer to enforce policy specifically related to the user being served. A user pays, as part of its contract, to be allowed to cause a certain

amount of congestion. The policer checks the user is within its allowance by counting the Conex-Re-echo signals.

Similarly, a policer at a network†s border gateway checks that a neighbouring ISP is within its contractual allowance

volume caps and maybe deep packet inspection, to provide all users with a â€oefair shareâ€.

-effectively it can choose different Qos classes for different users Another way this scenario could develop is that the operator offers the service to

users use a virtualised instance of the new application. Although our adoption frame -work is still valid,

Every user can immediately use the new (virtualised) software, so effectively a large number of users can be enabled simultaneously

•These factors reduce the deployment risk, especially as it should also be easier to

access to the Internet via mobile devices, an ever-growing number of broadband users worldwide, lower entry barriers for nontechnical users to become content and ser

-vice providers, and trends like the Internet-of-Things or the success of Cloud services

a competitive marketplace with a growing number of both users and service provid -ers, tussle analysis becomes an important approach to assess the impact of stakeholder

In the first iteration, congestion control mainly affects heavy users (HUS), interac -tive users (IUS) and ISPS.

Two tussles have been identified, which are related closely a) contention among HUS and IUS for bandwidth on congested links and (b) conten

shared between users and wireless devices. In the former case, modern transport con -trol protocols perform congestion control without considering the utility of the sender

with the prevalence of flat pricing schemes, has led to a contention tussle among user types, which economists identify as a â€oetragedy of the commonsâ€.

allocated across users and services The remaining tussle patterns are seen mostly in bilateral or multilateral transac

for example ISPS selecting the next hop of user traffic while users selecting the traffic source in their requests.

Repurposing tussles occur in regards to the privacy of user communication data be -tween users, ISPS, service providers and regulators.

The users are social actors who have a desire, generally speaking, that networks are trustworthy and private 2. The

privacy of communications is based on democratic ideals, that persons should be secure from unwarranted surveillance.

may be warranted in ways that individual users are willing to forego their privacy concerns in the interest of broader societal concerns.

have increasingly been able to monetize their user transaction data and personal data Google is feed able to advertisements based on past searching

These applications of user data as marketing tools are largely unregulated. And in many cases, users have proved willing to give up some of their privacy in exchange

for the economic benefit of better deals that can come from targeted advertising However, for users who wish to opt out of such systems,

the mechanisms for doing so are often less than clear, since the owners of the system prefer to keep people in

monitoring and monetizing the communication of their users, and the demands of gov -ernment bodies to be able to monitor the networks for illegal or unwanted activities

The Trilogy project 16 studied extensively the contention tussle among users as well as among an ISP and its customers, due to the aggressive behavior of popular

gestion control algorithm that gives the right incentives to users of bandwidth inten -sive applications.

are shared between users in a fairer manner. This is achieved by configuring MPTCP so that it acts less aggressively than TCP when the latter flows experience congestion

The MOBITHIN project 13 is related to a responsibility tussle between users of wireless services, mobile operators and regulators that has arisen from the social in

-tween wireless network operators and users of dual-band devices (e g. Wifi and UMTS) on the technology used to communicate.

-less users in an area. In this case, the spectrum is the resource in contention and the

-gies, applications and users to the next level of evolution, it also raises security and privacy concerns and introduces additional protection needs.

addressing one of the major obstacles preventing businesses and users to fully exploit the Future Internet opportunities today

seamless access to end users, as if they were working within a single cloud environ -ment. This advanced level of distribution offers increased economic benefits, but also

obligation engines allows for the evaluation of user-defined policies and their execu -tion, leaving control to the user

With the three groups of chapters, this section of the book provides directions on how security and trust risks emerging from the increased level of sharing and collabo

in a hostile environment, where a large number of users are assumed to collude against the network and other users.

In this paper we present a security design through the network stack for a data-centric pub/sub architecture that achieves

where PN is the public key of the user's own namespace. The contents of this publication point to another â€oemovie frame dataâ€

controlled by the local user. On the other hand, the movie frame publication on the right is stored inside movies studio's localized scope,

used to hide the location of the service from its users. We refer to our work in 2 for

user's e-mail address to be used as user's public key, simplifying the key distribution

PKG), which knows all private keys of its users 6 Conclusion and Future Work In this paper we introduced a data-centric inter-domain pub/sub architecture addressing

In addition, the user community of such FI services evolves and widens rapidly, including masses of typical end users in the role

In addition, this induces users at several levels to lose conï dence in the adoption of ICT-services

Some of these transactions might even happen transparently to the user; for example, a person†s identity could be communicated seamlessly by a personal

the user but with their manufacturers, are examples of such devices. Such de -ployments inherit security risks from the classical Internet and, at the same time

-neous users and a high level of composition and adaptation is required. These factors increase the complexity of applications

-ple users, devices, third-party components interact continuously and seamlessly so security enforcement mechanisms are indispensable.

users to deviate from rigid best-practices while still maintaining security 4. 3 Platform Support for Security Enforcement

Ubiquitous Knowledge Discovery for Users at ECML/PKDD, pp. 51†64 (2006 15. Hamlen, K. W.,Morrisett, G.,Schneider, F. B.:

in the release of ï awed products to end-users. This issue can be sig -niï cantly mitigated by empowering designers and developers with tools

9 The AVANTSSAR Platform allows users also to input their services by specifying them using the high-level formal speciï cation language ASLAN,

-sider the policies that a user U has access to a ï le F if U belongs to a group G

or U is the deputy of a user that has access to F access (U, F) â member (U, G) â§owner (G, F

For instance, if user Alice changes to another group within the organization, she will immediately obtain all access

except for those that she maintains due to her being a deputy for other users We consider transition systems in which a state is a set of facts like member

the example of Section 2, we may consider the set Ug of users that are currently

members of a group g. We can then identify all users that belong to the same set

, if a user changes from one group to another. Here, the set-abstraction method deï nes a mechanism to reason about

user would not delete any information that he has learned in the old group, but he

user on Google Apps, granting unauthorized access to private data and services email, docs, etc..

server to impersonate a user on any Google application. In 2, solutions that can be used to mitigate

to perform the same security-critical operations as the legitimate token user Formal validation of trust and security will become a reality in the Internet

-complished by means of the Need-to-Know principle (giving to the users enough rights to perform their job,

gives the user †programmatic control†over a part of the data center†1, pp. 8-9

user, Microsoft oï €ers dedicated private cloud hosting and supports third-party or customer-site hosting. This allows tailor made solutions to speciï c security

and the user, cloud services for more sensitive markets (such as Microsoft Health Vault) use SSL encryption by default

Since cloud computing often means outsourcing data processing, the user as well as the data subject might face risks of data loss, corruption or wiretap

According to European law, the user who processes PID in the cloud or else -where remains responsible for the compliance with the aforementioned principles

Outsourcing data processing does not absolve the user from his responsibilities and liabilities concerning the data.

This means that the user must be able to control and comprehend what happens to the data in the cloud

regarding the processes within the cloud is required to enable the user to carry out his legal obligations.

informative event and access logs which enable the user to retrace in detail what happens to his data,

Why not cloudsourcing for enterprise app user adoption/train -ing?( (2009), http://velocitymg. com/explorations/why-not-cloudsourcing

-for-enterprise-app-user-adoptiontraining /16. Organization for Economic Co-Operation and Development (OECD: Guidelines

a new perspective on how the users can control and visualize the use of their data stored in a remote server or in the cloud.

and informs the user on the compliance with a previously agreed privacy policy Keywords: Privacy, Usage control, Privacy Policy

The vision of the Future Internet heralds a new environment where users, services and devices transparently and seamlessly exchange

In the cloud users and businesses can buy computing resources (e g.,, servers services, applications) provided by the cloud,

for the user However, this ideal cloud world raises concerns about privacy for individu -als, organizations,

and, as a consequence, users cannot control their per -sonal information any more, as well as, honest businesses may lose conï dence in

the user when data are transfered to a third party. The sticky policy is prop -agated with the information throughout its lifetime, and data processors along

as setting and comparing user preferences with server privacy policies, ex -pressing conditions on complex secondary usage cases, specifying obligations

In many web applications, users are asked to provide various kinds of personal in -formation, starting from basic contact information (addresses, telephone, email

or less explicitly, presented to users during the data collection phase. Privacy policies are composed typically of a long text written in legal terms that are

or even read, by the users. As a result, most of the users creating accounts on web 2. 0 applications are not aware of the conditions under

which their data are handled Therefore, there is need to support the user in this process, providing an

as-automatic-as-possible means to handle privacy policies. In this context, the European FP7 project Primelife1 developed a novel privacy policy framework

policy with user privacy preferences The Primelife project introduced the Primelife Policy Language (PPL, herein

or by a user to specify his preferences about the use of his data (who can use it

-ing his personal information, the user can automatically match his preferences with the privacy policy of the website and the result of the matching generates

user whenever his data are shared with a third party, or deleting the credit card number after the payment transaction is ï nished, etc

In more detail, on the data provider side (user) the modules invoked are †The access control engine:

where a user can clearly understand how the information is handled if he accepts to continue the transaction with

user, is transformed into a sticky policy On the data collector side, after recovering the personal information with its

provider and acts as a user-side engine invoking access control and matching modules, and the third party plays the role of data collector invoking the obli

On the user side, a related question is, are the data owners ready to pay for privacy 9?

In fact, in a typical web 2. 0 application the user is disclosing his own data, balancing the value of his personal data with the services obtained.

a matter of fact, users have diï culties to monetize the value of their personal information, and they tend to disclose their data quite easily.

the user control on the released data. The main idea is to introduce tamper -proof 6 obligation engine and event handler, certiï ed by a trusted third party

also be accessed (partly by the users to monitor the handling of their personal information. Lastly, the trusted-third party can ensure the auditing of the whole

It also allows the user to detect any improper usage of his data, and, in this case, notify the host or the trusted

geographies, businesses and transparently from the user point of view. However these new capabilities may entail privacy risks.

From the user perspective, the risk is that of losing control of his personal information once they are released in

The final user needs to provide the algorithm under test. He will just login to the

The user will not have access to the RUBIS resources (i e. cannot login) so there is a need to encapsulate the monitoring

The user can configure the re -source through some Configuration Parameters. The RA â€oewraps†the parameters and

user. The Binding Parameters are used for internal purposes of the local testbed con -figuration. The On Update section describes what the rubis app RA does when it

This allows the User -Application/SUT to access the testbed resources during execution of the experiment

typically customized to particular user groups and oï €er diï €erent capabilities and interfaces. The federation of them still requires research on how these facilities

Free T-REX 2 provides a platform for testbed users, testbed op -erators and developers to oï €er their measurement results and software tools to

of available tools in future Internet experimental facilities and, based on user feedback, the tools†feasibility for experiment requirements can be assessed.

flows with user-defined parameters that can be analyzed from the receiver to extract traffic Qos features (e g. packet loss, delay, jitter.

The user traffic from the Self-NET experimenta -tion is tunneled by using two IP tunnels over the Internet

the user premises †one for sending data to the uplink and receiving the downlink

-fault values are stored in each RA and the user of the VCT tool needs to input only

public IP ADDRESSES and user credentials for the two external tunneling machines in order to setup the IP tunnels and routes

-lishment of the tunnels between the wireless link and the remote user of the link and a

benefits to end users. For Congestion Exposure (Conex), a reasonable initial deploy -ment scenario is combined a CDN-ISP that offers a premium service using Conex, as

Future related facilities will â€oeattract†more users to innovative services requiring greater mobility and bandwidth, higher speeds and

and with the existent protocol pool targeting user and control plane operations with less emphasis on management tasks 18.

that characterizes the daily operation of FI users 21. Among the main Self-NET€ s

benefits for all relevant â€oeactors†(i e. for both operators and users), as follows Automatic network planning and reduction of management time of complex net

-ers the desired services to its users. In many cases, the network operator is obliged to

failures and to ensure continuity of service delivery is a critical matter for the user and

Station User Manual (2008 35. C.:open-source multimedia framework, player and server http://www. videolan. org/vlc

secure, remote access to users of e g. an office network. Also, Virtual LANS (VLANS which are another type of VNS are logical networks

the user profiles, the outcome of this phase will be to decide whether it is suitable to

lifetime to changing environment conditions (e g. context, operator†s policies, user profiles). ) In order to achieve this, after the successful completion of the creation

and enable service provisioning to end-users it is needed to gain awareness of the status of candidate,

cashflow as more users are being supported Another indicative scenario would comprise the notion of the opportunistic capac

Access providers are benefited from the fact that more users can be supported since new incoming users that otherwise would be blocked can now be served, while end

users experience improved Qos since congestion situations can be resolved as illus -trated in Fig. 4

ZÄ Å Ä Ç ï Å Ä Ä ae Å ae aeoeä Ä ï Å Ä Ä

or home/residential users. The Internet†s architecture assumes that routers are stateless and the entire network is neutral.

and the network resources consumed by each user. It is assumed that users are well-behaving and have homogeneous requirements and consumption

After having dramatically enhanced our interpersonal and business commu -nications as well as general information exchange†thanks to emails, the web

even conventional Internet†s users will be aï €ected by the uncontrolled traï c or business activity over it

As of today, the users /applications that require bandwidth beyond 1 Gbps are rather common

resilience) can be oï €ered economically and eï ciently to users and applications 4 Virtual Infrastructures in Action

by users. Cloud services can be divided into three target audiences: service providers software developers and users as follows6

⠀ Infrastructure as a service †offering resources such as a virtual machine or storage services ⠀ Platform as a service †providing services for software vendors such as a soft

email to end-users Within this section we have three chapters which cover several of the issues outlined

From an implementation perspective, user interaction is via a web based UI, used by both IT customers and administrators.

system from the users, effectiveness of monitoring and adjustment functionalities The results obtained from this evaluation is integrated further

-siderations about contributions can be done at the Service, Content and User Centric approaches, when using the current TCP IP layers 3 and 4, and not

represented in OWL, the OSKMV planes and the Service, Content and User Centric works can have the beneï t to inform their needs to the Net-Ontology

>2. 3 Collaboration to the Complexity Reduction for {User, Service Content}- Centric Approaches This work can collaborate to reduce the complexity of the network use by the

user, service and content centric projects, as the ontology can oï €er better com -prehension for the networks.

making the {user, service, content -centric approaches simpler, as shown in the sample code below

of network layers and, consequently, through the decreasing of users, services and content complexity is a possible way to achieve ï exibility in future networks

language nor does it provide any specific vocabulary that users should adopt WSMO-Lite builds upon SAWSDL by extending it with a model specifying the

The former is based a web tool that assists users in the creation of semantic annotations of Web APIS,

Similarly, the second tool, SOWER, assists users in the annotation of WSDL services and is based in this case on SAWSDL for adding links to semantic descriptions as

for instance LUF (Linked User Feedback) 16, which links service descriptions with users ratings, tags and comments about services in a separate server.

On the basis of these ratings and comments, service recommendation facilities have also been imple

with services and the invocation process itself, via the generation of appropriate user interfaces. Based on the annotations the user is presented with a set of fields, which

must be completed to allow the service to execute, and these fields cover input pa -rameters as well as authentication credentials.

whereas a user-encoded input may use variable decimal places for latitude and longi -tude.

-guage to formulate user goals, and to define the pre-and post-conditions of SAWSDL-based service descriptions,

On the one hand, atomic user desires can be encoded as a CONSTRUCT query and, under certain restrictions24, query processing techniques can be used to

whose results can be combined to satisfy the initial user request. On the other hand, where more sophisticated control flow is needed, a proc

by new multimedia authoring tools will significantly increase the user generated con -tent. On the other hand, new media sensor networks and tele-immersion applications

The Media Internet is evolving to support novel user experiences such as immer -sive environments including sensorial experiences beyond video and audio (engaging

taste and haptics) that are adaptable to the user the networks and the provisioned services

of the user beyond the classical DIGITAL TV interactivity Second, enhancing media encoding technologies is required for the Internet with

delivery device and user, and also optimize the quality of experience over the Internet Third, one of the areas where high investment in research has taken place in recent

for the users, and social media including personalization and recommendation, is one of the key orientations of future media technologies.

whether multimedia or text is generated collaboratively user content, of which the quality is not always controllable

enabling every user †first †to access the offered multimedia services in various con

and transparently to other users. The architecture also relies on autonomous systems to supply users with the necessary infrastructure and a security

framework Concerning the second point, media encoding technologies for the Internet, the ob -jective of the chapter â€oescalable and Adaptable Media Coding Techniques for Future

user first to access the offered multimedia services in various contexts, and second to share and deliver his own audiovisual content dynamically, seamlessly, and

transparently to other users. Towards this goal, the proposed concept provides content-awareness to the network environment, network-and user context

-awareness to the service environment, and adapted services/content to the end user for his best service experience possible,

taking the role of a consumer and/or producer Keywords: Future Internet, Multimedia Distribution, Content Awareness, Net

and react to the Qoe level at user ter -minals, offer to the EU a wide range of potential choices,

nodes, can be a foundation for an user-centric approach (i e. satisfying the different Media Ecosystems:

needs of individual users) or service-centric approach (i e. satisfying the different needs of various service types), that is required for the future services and applica

network-and user context-awareness to the service environment, and adapted ser -vices/content to the end user†s Environment

The CAN/NAA approach can naturally lead to a user-centric infrastructure and telecommunication services as described in 3. The strong orientation of user-centric

awareness to services and content is emphasized in 4. The works 5-6 consider that CAN/NAA can offer a way for evolution of networks beyond IP, while Qoe issues

•User Environment (UE), to which the end users belong •Service Environment (SE), to which the service and content providers belong

The User Environment (UE) includes all functions related to the discovery, sub -scription, consumption of the services by the EUS. At the Service Environment (SE

User and service mobility is targeted also Below the SE there is a new Home-Box (HB) layer to coordinate the actual content

users with advanced context-aware multimedia services in a consistent and interoper -able way. It enables uniform access for heterogeneous terminals and supports en

At the HB layer, the advanced user context management and monitoring functions provides real-time information on user context

and network conditions, allowing better control over multimedia delivery and intelli -gent adaptation. The assembly of HBS is called layer

user preferences, terminal capabilities Media Ecosystems: A Novel Approach for Content-Awareness in Future Networks 373

dedicated user profile management and/or monitoring entities/subsystems The adaptation deployed at the CAN layer will be performed in the Media-Aware

At the border to the user, i e.,, the Home-Box, adaptation modules are deployed enabling device-independent access to the SVC-encoded content by providing X-to

The evaluation algorithm considers the user flow characteristics CAN policies and present network conditions. In order to attain the required flexibil

User context is taken not into consideration by the Service or Content Provider (SP/CP) delivering the service (content),

Also, users may influence service delivery options by requesting specific content on specific priority conditions for a specific period of time (context-awareness

On the user side, it increases choice and reduces switching costs between content providers (network

user privacy is a major concern since it directly relates to the consolidation of infor -mation sources where user preferences and habits may be retrieved

and exploited by third parties 5 Conclusions This chapter has presented a novel Media-Ecosystem architecture, which introduces

User-Centric Future Internet and Telecommunication Services. In: Tselentis G.,et al. eds.)) Towards the Future Internet, pp. 217†226.

application due to users'growing demand of multimedia content and extraordinary growth of network technologies. A broad assortment of such applications can be

architecture severely limits the number of simultaneous users for bandwidth intensive video streaming, due to a bandwidth bottleneck at the server side from which all users

request the content. In contrast, Peer-to-peer (P2p) media streaming protocols, moti -vated by the great success of file sharing applications, have attracted a lot of interest

-taneously to different users according to their capabilities and limitations In order to handle such obscurity, scalability emerged in the field of video coding

user adaptation without using intricate error protection methods. The objective of MDC is to generate numerous independent descriptions that can bestow to one or

-ferent users, as shown in Figure 2 Fig. 2. An example of the proposed system for scalable video coding in P2p network

Quality of Experience (Qoe) of the users. At last, we persuade Future Internet initia -tives to take into contemplation these techniques when defining new protocols for

fully understandable by users; while high-level features contains a high degree of semantic reasoning about the meaning or purpose of the content itself.

-holders such as researchers, businesses, government actors and user communities are brought together to interact and engage in networked and collaborative innovation

emerge, fine-tuned to the needs of enterprise users by leveraging a basic infrastructure of utility-like software services

on the human user, and encompasses the combination of technologies in areas such as smart content, personal networks and ubiquitous services, to provide the user a simpler

easier and enriched life across many domains including home life, education and learn -ing, working,

â€oeliving labs†approach which comprises open and user driven innovation in large-scale real-life settings opens up a promising opportunity to enrich the experimentally-driven

dynamically transport user services to be processed in data centers built in proximity to green energy sources, thereby reducing greenhouse gas emissions of ICT equip

of open and user driven innovation for experimenting and validating Future Internet -enabled services. The chapter describes how the living labs concept has started to

need to clarify the way how living lab innovation methods, user communities and Fu -ture Internet experimentation approaches and testbed facilities constitute a common set

and advanced graphical user 1 http://cordis. europa. eu/fp7/ict/enet/documents/task-forces/research-roadmap

services, tools, software packages, interfaces and user interaction solutions that are not available at the present time.

and directly manipulated by the user while they reside in the Cloud and are reached through the Internet.

, a Virtual Enteprise Reality) where the user can navigate and manage changes. At a lower level, simpler FINERS will be aggregated to

made available to the users during business operations to navigate in the enterprise and see how the operations evolve

user services to be processed in data centers built in proximity to green energy sources, reducing GHG (Greenhouse Gas) emissions of ICT equipments.

from new services and users, resulting in an increase in GHG emissions. Based on the cooperation between Mantychore FP7 and the GSN, our approach is

can transport user service applications to be processed in data centers built in prox -imity to green energy sources,

to user requirements; hence high utilization and optimization levels can be achieved During the service, the user monitors and controls resources as if he was the owner

allowing the user to run their application in a virtual infrastructure powered by green energy sources

2 Provisioning of ICT Services over Mantychore FP7 and GSN with Renewable Energy In the European NREN community connectivity services are provisioned on a manual

so that users can change some of the service characteristics without having to renegotiate with the service provider

Users will be able to get access control over optical de -vices like optical switches, to configure important properties of its cards and ports

Users will be able to get control over Ethernet and MPLS (Layer 2. 5) switches to configure different services.

User applications are running on multiple Dell Poweredge R710 systems, hosted by a rack mount structure in an

The VMS are used to run user applications, particu -larly heavy-computing services. Based on this testbed network, experiments and re

and transparently to service users. The proposed web -based cloud management solution is based on the Iaas concept,

The Cloud Middleware plane corresponds to the User-level Middleware, providing Platform as a service capabilities based on Iaas Framework

components 5. The top Management plane or User level focuses on application services by making use of services provided by the lower layer services

The engines allow GSN users to quantify the power consumption of their service. Engines notify upper layers by triggering

Through a Web interface, users may determine GHG emission boundaries based on information providing VM power and their energy sources,

federate clouds across domains, coordinate user registration, resource allocation stitching, launch, monitoring, and adaptation for multi-domain cloud applications

which is responsible for establishing connection among domains, and forwarding user requests to appropriate data centers. The big picture of the GSN network management

which accepts connections from service users through Internet. This point is powered by green sustainable energy, i e.,

It links user re -quests to appropriate services provided by data centers distributed across the network

User requests will be forwarded by the Federation Stitcher to the appropriate domain controller. When a VM or a data center

is migrated, the new location will be registered with the Federation Stitcher then user requests are tunneled to the new domain controller

Providing users with a Logical IP Network Ser -vice. TERENA Networking Conference (5/2008 9. Grasa, E.,et al.:

and user-driven innovation for experimenting and validat -ing Future Internet-enabled services. Based on an analysis of the current land

-tems, User Co-Creation, Living Labs, Resource Sharing 1 Introduction The concept of â€oesmart cities†has attracted considerable attention in the context of

user-driven innovation ecosystems to boost Future Internet research and experimenta -tion for user-driven services and how they can accelerate the cycle of research, inno

-432 H. Schaffers et al vation and adoption in real-life environments. This paper pays particular attention to

experimentation into the smart cities concept as piloting user-driven open innovation environments. The implicit aim of such initiatives is to mobilise cities and urban areas

collective intelligence and co-creation capabilities of user/citizen communities for designing innovative living and working scenarios

platforms, emerging ICT tools, methodologies and know-how, and user communities Table 1. Three perspectives shaping the landscape of Future Internet and City Development

User-Driven Innovation Ecosystems Actors Researchers ICT companies National and EU actors City policy actors

User-driven open innovation Engagement of citizens Resources Experimental facilities Pilot environments Technologies Urban policy framework

User-driven innovation projects Open, collaborative innovation Smart Cities and the Future Internet 433 for experimentation on Future Internet technologies and e-service applications

third perspective is the concept of open and user-driven innovation ecosystems, which are close to the interests

-ages between Future internet research, urban development policies and open user -driven innovation. Elements of such frameworks include sharing of and access to

open and user-driven innovation looks well positioned to serve as a mediating, ex -ploratory and participative playground combining Future Internet push and urban

content dependent on user location and context, augmented reality applications, open and federated platforms for content storage and distribution, provide the ground for

-ies, linking smart cities with user-driven innovation, future Internet technologies, and experimental facilities for exploring new applications and innovative services

and open public data up to developers as well as user communities. As the major challenge facing European cities is to secure high living

-tial exists to support new classes of users and experiments combining heterogeneous technologies that represent key aspects of the Future Internet.

of new applications that bring future users the increasing power of the Future Internet have not yet been overcome.

The portfolio of FIRE experimentation projects shows that users in such FIRE pro -jects are mostly academic and industry researchers.

user experimentation is beyond the current scope of FIRE, although some interesting initiatives in that respect have started such as the Smart Santander project (services

A comparison of the role of users in FIRE facilities projects compared to Living Labs is presented in Table 3. Importantly,

FIRE projects typically involve users in assessing the impacts of technologies in socioeconomic terms, whereas Living Labs

projects aim to engage users in the innovation process itself. Also, the predominant approach of FIRE facilities is controlled experimentation,

-gage users in the actual innovation process (co-creation. The European commission has voiced its support for stronger user orientation in the future Internet facilities

projects; not only users in terms of academic and industry researchers who will use these facilities for their research projects, but also end-users.

Emphasis is on involv -ing communities of end-users at an early stage of development to assess the impacts

Table 3. User Role in FIRE and Living Labs Future Internet Experiments Living Labs Innovation

User co-creation via Living Labs methodologies, action research Open, cooperative innovation Object of testing Technologies, services, architec

Validation of user ideas, prototype applications and solutions. Testing as joint validation activity Scale of testing Large-scale mainly From small to large scale

Support the process of user-driven innovation as co-creation In order to explore the opportunities and interfaces,

-tivity and the location of their users; transportation networks digitally manage the mobility of people and vehicles as well as products in the city, just to give a few ex

applications and services seem to be emerging from user co-creation processes Recent paradigms, such as open innovation and open business models 16, Web

Mitchell at MIT and currently considered as user-driven open innovation ecosystems promote a more proactive and co-creative role of users in the research and innovation

process. Within the territorial context of cities, rural areas and regions, the main goal of Living Labs is to involve communities of users at an early stage of the innovation

process. The confrontation of technology push and application pull in a Living Lab enables the emergence of breakthrough ideas,

pilots and Living Labs. In 20 a landscape of user engagement approaches is pre -sented.

management integrated with user experiments within an action research setting have been developed and implemented in 21

-opment programmes form an innovation ecosystem consisting of users and citizens ICT companies, research scientists and policy-makers.

provides opportunities to users/citizens to co-create innovative scenarios based on technology platforms such as Future Internet technology environments involving

by users/citizens contributing with their own content or building new applications that would mash-up with the city†s open, public data

The project is intended to use user-driven innovation methods for designing and implementing †use casesâ€.

by users of green services in the areas of air quality and ambient noise pollution with

-opment facilities with professional users. Its goal is to investigate evidence of the social dynamics of the Living Lab approach for the purpose of ensuring a wide and rapid

-eration (FING) facilitating user workshops, and a local SME providing data access from electric cars equipped with air quality sensors (VULOG)

-related portal services by allowing the user: 1) to participate in the collection of envi

participatory/user -centred design methods; diary studies for Iot experience analysis, and coupling quan -titative and qualitative approaches for portal usage analysis. In this context of an open

to prove its added value to users. Platform and service convergence is promoted by the use of serious games that engage citizens

and users in the process of discovering the potential of Future Internet technologies and the possible sustainable scenarios

This example illustrates the central role of users and citizens in defining the services that make up a Smart City as well as the new sustainable lifestyles and workstyles

as testing facilities, user groups and experimentation methodologies. Two different layers of collaboration can be distinguished.

such as specific testing facilities, tools, data and user groups, can be made accessible and adaptable to specific demands of any research and innovation projects

-sources made available to users and developers 444 H. Schaffers et al 5 Conclusions and Outlook

user driven innovation for experimenting and validating Future Internet-enabled ser -vices. Smart cities are enabled by advanced ICT infrastructure contributed to by cur

The Living Labs concept represents a powerful view of how user-driven open in -novation ecosystems could be organised.

facilities, user communities, technologies and know-how, data, and innovation meth -ods. Such common resources potentially can be shared in open innovation environ

user communities available for joint use with Future Internet facilities (e g. the TEFIS project), and in making accessible Future Internet facilities for developing and vali

Effective, user driven processes of innovation, shaping and application of Smart Cities and the Future Internet 445

and innovation cycles can be made open accessible for users and developers Open Access. This article is distributed under the terms of the Creative Commons Attribution

From User Centred Design and User Experience Towards User Co-creation. Position Paper, First Living

Labs Summer School (http://www-sop. inria. fr/llss2010/),Paris (August. 2010 21. Schaffers, H.,Garcia Guzmã¡

stimulate the development of new services and applications by various types of users and to help gathering a more realistic assessment of users†perspective by means of

-work 7 based on the user-driven approach is of main relevance, although in this paper we also advocate the need of large,

IMS User Equipment USN-Gateway SIP Services Web Services Configuration A A A D evice

performing the request a user might be interested In for example, in an architec -ture where several Sensor Description Entities (SDES) exist,

User Developed App Tinyos Contiki Sunspot  Tinyos Contiki Sunspot  Opencom Middleware Mobility support

-vice design phases, applying user-driven innovation methodologies. Furthermore, it will be used also to provide real services to citizens.

-nities of users, other entities that are willing to use the experimental facility for de

the FIRE testbed user, the service provider, the service consumers (citizens), the Smartsantander facility administrators, and individ

that many nontechnical constraints must be considered (users, public administrations vendors, etc..In this sense, what may be evident from a purely technique perspective

Collaboration to the Complexity Reduction for {User, Service, Content}- Centric Approaches Integration between Services and Networks


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011