scispace - formally typeset
Search or ask a question

Showing papers on "Internet appliance published in 2009"


Book
21 Dec 2009
TL;DR: 6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems, and Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful.
Abstract: "It is stunningly thorough and takes readers meticulously through the design, conguration and operation of IPv6-based, low-power, potentially mobile radio-based networking" Vint Cerf, Vice President and Chief Internet Evangelist, Google This book provides a complete overview of IPv6 over Low Power Wireless Area Network (6LoWPAN) technology In this book, the authors provide an overview of the 6LoWPAN family of standards, architecture, and related wireless and Internet technology Starting with an overview of the IPv6 Internet of Things, readers are offered an insight into how these technologies fit together into a complete architecture The 6LoWPAN format and related standards are then covered in detail In addition, the authors discuss the building and operation of 6LoWPAN networks, including bootstrapping, routing, security, Internet ingration, mobility and application protocols Furthermore, implementation aspects of 6LoWPAN are covered Key Features: Demonstrates how the 6LoWPAN standard makes the latest Internet protocols available to even the most minimal embedded devices over low-rate wireless networks Provides an overview of the 6LoWPAN standard, architecture and related wireless and Internet technology, and explains the 6LoWPAN protocol format in detail Details operational topics such as bootstrapping, routing, security, Internet integration, mobility and application protocols Written by expert authors with vast experience in the field (industrial and academic) Includes an accompanying website containing tutorial slides, course material and open-source code with examples (http://6lowpannet ) 6LoWPAN: The Wireless Embedded Internet is an invaluable reference for professionals working in fields such as telecommunications, control, and embedded systems Advanced students and teachers in electrical engineering, information technology and computer science will also find this book useful

689 citations


Proceedings ArticleDOI
04 Apr 2009
TL;DR: In more that 50% of the cases, participants chose a phone even though they had access to a computer, and the most frequent location for cell phone Internet access was the home.
Abstract: We conducted a diary and interview study to investigate where and why people use cell phones to access the Internet. In more that 50% of the cases, our participants chose a phone even though they had access to a computer, and the most frequent location for cell phone Internet access was the home.

76 citations


Journal ArticleDOI
TL;DR: Taking the viewpoint of an Internet user who is interested in using Internet services and not so much in the protocols that move data around, some possible future Internet services are described.
Abstract: While the term future Internet has gained a lot of interest recently, there is little agreement on what this term means or what the future Internet looks like. By taking the viewpoint of an Internet user who is interested in using Internet services and not so much in the protocols that move data around, we first describe some possible future Internet services. In a second step we derive some network and service management requirements, and discuss some of them in more detail.

74 citations



01 Jan 2009
TL;DR: Joubert et al. as mentioned in this paper report on ongoing qualitative/exploratory research in low-income communities in urban South Africa and draw on a domestication approach to move beyond an adoption or diffusion paradigm and to complement aggregate statistical perspectives.
Abstract: The title of this workshop, ‘beyond voice’, is illustrative of one of the central questions currently surrounding mobile communication in the developing world. Put simply, there is a great deal of enthusiasm around the notion that a large group of users will access the internet for the first time via data enabled mobile handsets. Recent estimates from India, for example (Telecom Regulatory Authority of India, 2007), suggest there may be more mobile Internet connections than traditional PC Internet connections operational in the country. Concurrently, high-end smart phones promise browsing experiences which are steadily closing the gaps in speed and ease of use which have hampered earlier incarnations of the mobile internet, such as WAP. But the raw enthusiasm, the aggregate statistics, and the glossy marketing images from the top-end of handset markets fail to capture the reality of mobile internet use in the developing world. The crux of this paper’s argument is that the research community knows comparatively little about this supposed community of users who access and use the Internet exclusively via mobile phones. We know little about who they are, how they discover and access the mobile internet, and how the mobile internet fits into their lives. This paper reports on ongoing qualitative/exploratory research in low income communities in urban South Africa. Through convenience and snowball sampling, the researchers have sought out ‘early adopters’ among mobile-only internet users. The analysis of the interviews will delineate and describe distinctive new “paths” to Internet use that largely bypass PCs. We draw on a domestication approach (Haddon, 2003; Hahn & Kibora, 2008; Silverstone & Hirsch, 1992) to move beyond an ‘adoption’ or ‘diffusion’ paradigm and to complement aggregate statistical perspectives. As exploratory research, this project cannot definitively identify all the new paths to the internet, nor the relative frequency with which individuals choose these paths. However, early findings will illustrate current and emerging practices in mobile-only internet use, as well as opportunities and constraints for policymakers interested in promoting or leveraging internet use among a much broader community of the world’s inhabitants Introduction "Dear customer, to open or log into your Facebook account where you can share information go to wap.safaricom.com and click 'Facebook'". SMS advertisement in Kenya There is a great deal of enthusiasm around the notion that hundreds of millions of people will access the internet for the first time via data-enabled mobile handsets. Estimates from India (Telecom Regulatory Authority of India, 2007), and South Africa (Joubert, 2008) suggest there are significantly more mobile internet connections than traditional PC internet connections operational in each country. Concurrently, high-end smart phones promise browsing experiences that are closing the gaps in speed and ease of use that have hampered earlier incarnations of the mobile internet, such as WAP. However, the enthusiasm, the aggregate statistics, and the glossy marketing images fail to capture the reality of mobile internet use in the developing world. The crux of this paper’s argument is that the research community knows comparatively little about this supposed community of users who access and use the internet primarily via mobile phones. We know little about who they are, how they discover and access the mobile internet, and how the mobile internet fits into their lives. This paper draws on ongoing qualitative/exploratory research in low income communities in urban South Africa. We ground our work in a domestication approach (Haddon, 2003; Hahn & Kibora, 2008; Silverstone & Hirsch, 1992) to move beyond an “adoption” or “diffusion” paradigm and to complement aggregate statistical perspectives. Our analysis delineates and describes emerging and distinctive “paths” to internet use. We explore the importance of selfexpression and communication and the role of trusted influencers in shaping and encouraging mobile internet use. Although our overall focus is on users of the mobile internet, the PC-based internet experience looms large, as both a baseline from which to draw contrasts, and as an important determinant of the behaviors and approaches of this community of users. By design, everyone we spoke to was a mobile internet user and not a PC owner. Nevertheless, more than half of our respondents reported some kind of PC exposure. Thus in the final section we distinguish between mobile-only and mobile-primary internet users. As we will show, the PC and the mobile handset are neither exclusively substitutes nor complements; indeed, they might not lead to the same “internet”. A look towards use, rather than adoption Like many innovations before it, the mobile internet is enjoying a moment in the sun when technologists, policymakers, marketers, and development practitioners are excited about the numbers of people adopting it. There is nothing inherently problematic about this enthusiasm, and it is important to know who is adopting, who is not, and what distinguishes the two (e.g., (Gilham & Belle, 2005). Yet adoption is not the end of the story. The actual use of mobile internet in daily life demands our attention. Without an understanding of how the mobile internet is used in resource-constrained environments in the developing world, it will remain difficult to identify its socioeconomic impacts or how to best promote its utility. Domestication and its variants (Haddon, 2006; Silverstone & Hirsch, 1992) provide particularly potent theoretical frames to explore use. Predating mobiles by a decade or more, domestication has been used recently to explore how mobiles are “tamed” and “appropriated” – made normal, comfortable, useful, and part of everyday life in settings ranging from British suburbs (Haddon, 2003) to Indian cities (Kavoori & Chadha, 2006) to villages in Burkina Faso (Hahn & Kibora, 2008). Other projects exploring mobile use in the developing world do not use domestication as a core lens, but share a similar sprit, exploring the complexities of use in varied contexts. Horst & Miller (2006), offer one such in-depth treatment of mobile use among low-income Jamaicans. It is only in the past few years that data-enabled mobile phones and prepaid data plans have made the mobile internet broadly accessible. Thus, research on the users of mobile internet among resource-constrained communities in the developing world remains understandably rare. That said, researchers in South Africa have begun to explore mobile internet use (W. Chigona, Beukes, Vally, & Tanner, 2009; W. Chigona, Kamkwenda, & Saffia Manjoo, 2008; Kreutzer, 2009), as well as the specific use of a popular mobile instant messaging application called MXit (Bosch, 2008; Butgereit, 2007; A. Chigona & Chigona, 2009; W. Chigona, Chigona, Ngqokelela, & Mpofu, 2009) Kreutzer, (2009), finds evidences of considerable mobile internet use among low-income schoolchildren in Cape Town. In a large (but not nationally representative) survey of 11 grade students in low-income schools in Cape Town, 77% of respondents reported owning a handset; and a remarkable 68% reported using a mobile phone on the previous day to access the internet. Chigona and his colleagues (W. Chigona, Beukes et al., 2009) also find early indications of mobile internet use among low-income urban south Africans, but little evidence of impact on economic well being or social inclusion, beyond the cultivation of social networks for discussion. More research will surely follow, but the time is right to continue to study mobile internet use in natural settings, rather than as “pilots” or NGO-led interventions, and to augment important quantitative overviews with thicker descriptions of mobile use in daily life. Domestication studies of the mobile internet, currently restricted to developed-world settings (e.g., (Edirisingha, 2008; Pedersen & Ling, 2003)), can provide insight into these new forms of internet access and use. As an added advantage, domestication studies of mobile internet use may help bridge the gap between the research frames of the “information and communication technologies for development” (ICT4D) community (and its subgroup, mobiles for development (M4D) (Donner, Verclas, & Toyama, 2008) and the “technology and society” community. While a focus on actual use may reveal beneficial, instrumental uses of the mobile internet—just as studies of voice telephony have indentified important productivity gains (Jensen, 2007)—the domestication lens does not presume such developmental impacts, nor does it exclude a whole range of other more supposedly frivolous uses, from self-expression and family connections to flirting, chatting, and entertainment. If these are part of the draw—and early indicators suggest they are—the ICT4D community should see this part of the picture. Methods This study draws on first-stage data from an ongoing project in Cape Town, in which the authors are working with a range of relatively low-income mobile internet users. An initial batch of 17 interviews were brief and explicitly exploratory, during which we uncovered themes for deeper inquiry. The second set of 22 interviews had more structure, were recorded and transcribed, and followed a standardized interview protocol. Respondents were recruited though a mix of sources. In some cases, individuals were approached via intercepts, in malls, taxi/bus stations, etc. throughout the Cape Town area. Others were introduced to us by and at Learn to Earn, an NGO focused on livelihoods and training in Cape Town’s Khayelitsha, one of the largest townships in South Africa. To qualify, respondents had to own an internet-enabled mobile phone (or have family access to one), and report doing some sort of GRPS or data-based activity on the phone, meaning news, chat, browsing, email, social networking, or visiting the premium c

61 citations


Proceedings Article
01 Jan 2009
TL;DR: The IoS provides the business and technical base for advanced business models where service providers and consumers form business networks for service provision and tradable entities.
Abstract: The vision of the Internet of Services (IoS) can be seen as a new business model that can radically change the way we discover, select, invoke and interact with services. In the same way that the Internet can be viewed as a Web of Information, it can also be configured to support an Internet of Services. The IoS describes an approach that uses the Internet as a medium for selling and purchasing services. As a result, services become tradable entities. Service marketplaces, a logical location where providers and consumers are brought together to trade services and to engage in business interaction, are enabling the creation of platforms for the IoS vision. Thus, the IoS provides the business and technical base for advanced business models where service providers and consumers form business networks for service provision and

37 citations



Book ChapterDOI
11 May 2009
TL;DR: Diary study of how experienced users accessed the Internet from cell phones shows that participants often chose the cell phone to access the Internet even though they had access to a computer, and the most common location for Internet access being the home.
Abstract: We conducted a diary study of how 19 experienced users accessed the Internet from cell phones. Our data show that participants often chose the cell phone to access the Internet even though they had access to a computer, and the most common location for Internet access being the home. Reasons for choosing the phone over the computer were speed, convenience and a desire to use the phone for fun. Additionally, the phone is kept close and is always on which makes it convenient to use. The traditional motivation for mobile services "finding out something about where you are" only accounts for 15% of the user activity.

32 citations


01 Sep 2009
TL;DR: Internet use has escaped from the laboratory into the classroom and their daily lives – the ubiquity of Internet access has implications for students and staff – the challenge is how to work and learn effectively in the changed environment in which the authors find ourselves.
Abstract: Connecting to people and resources online is no longer something that takes place mainly in our place of study or work: we are also ‘connected’ in our homes and even on our journey on the way to and from university. In 1998, 9% of UK homes had access to the Internet, compared with 61% in 2007 (84% of which had broadband access) . In higher education, we have moved in little more than 10 years from a situation where most students and staff gained Internet access through their institution to one where it is commonplace at home, at work and on the move. In 2007, 40 % of recent Internet users had used mobile access to the Internet, 22% of them using handheld devices or mobile phones . Sales of the iPhone alone generated over 1 million mobile Internet users by February 2009 . The implications of this for learning and teaching are that Internet devices are becoming on hand during teaching and learning activities giving students and teachers access to global resources and online tools and services. Web 2.0 is often seen as a hype term but can most simply be thought of a read/write web where users produce web content ( in the form of text, images, sound and video) as well as consume it, through online services. An example of such a service is a Wordle, see Figure 1, created by the online service at http://www.wordle.net/ where text input is visualized with word size being related to its prominence within the text. Although composed of words, this gives a visual representation of the ideas within the text of this article. Figure 1 - Wordle of text of this article http://www.wordle.net/gallery/wrdl/752365/Connectivism_article Genres of media tools such as blogs and wikis are freely available as online services, enabling individuals and groups to share and publish media, connected by links and ‘feeds’ that allow us to monitor sources that interest us rather than rely solely on Internet searches. If we watch out for the orange buttons (that signify RSS feeds) on pages that interest us we can follow the content as it changes. A good way to start is to experiment with news feeds from the BBC web site The video “A Vision of Students Today” that Mike Wesch created in collaboration with 200 of his students gives us an insight into the role that Internet connection plays in the work and social lives of students . Internet use has escaped from the laboratory into the classroom and our daily lives. The ubiquity of Internet access has implications for students and staff – our challenge is how to work and learn effectively in the changed environment in which we find ourselves.

29 citations



Journal ArticleDOI
Anne Kaikkonen1
TL;DR: The Mobile Internet is no longer a new phenomenon; the first mobile devices supporting Web access were introduced over 10 years ago and the focus of the studies has switched from the user interface to user experiences.
Abstract: The Mobile Internet is no longer a new phenomenon; the first mobile devices supporting Web access were introduced over 10 years ago. During the past 10 years many user studies have been conducted that have generated insights into mobile Internet use. The number of mobile Internet users has increased and the focus of the studies has switched from the user interface to user experiences. Mobile phones are regarded as personal devices: the current possibility of gathering more contextual information and linking that to the Internet creates totally new challenges for user experience and design.

Patent
02 Dec 2009
TL;DR: In this article, a set-top box for an Internet protocol television (IPTV) network includes a radio interface module, a remote control interface module and a display interface module.
Abstract: A set-top box for an Internet protocol television (IPTV) network includes a radio interface module, a remote control interface module, and a display interface module. The radio interface module accesses an Internet radio service on the IPTV network and outputs a list of Internet radio stations received from the Internet radio service to a particular IPTV channel on the display interface module, receives a selection of an Internet radio station from the remote control interface module, retrieves an Internet radio stream associated with the selected Internet radio station from the Internet radio service in response to receiving the first selection, and outputs the Internet radio steam on the particular IPTV channel of the display interface module.

Patent
01 Oct 2009
TL;DR: In this article, the authors present an application execution server and a method for managing a background process associated with a Rich Internet Application which is accessible via a Web Browser of an Internet Enabled User Device.
Abstract: An Application Execution Server and a method for managing a Background Process which is associated with a Rich Internet Application which is accessible via a Web Browser of an Internet Enabled User Device. The Application Execution Server comprises a Background Process Manager which is adapted to create a Background Process, in response to receiving a request for such a process from the Rich Internet Application, the Background Process being adapted to recognize a triggered event associated with said associated rich Internet application and to invoke the Rich Internet Application, irrespective of whether the Web Browser and/or the Rich Internet Application is presently running or not.

Journal ArticleDOI
Joo-Young Jung1
TL;DR: The result indicates that people engage in a wider variety of activities via their computers than via mobile phones, while the number of e-mails sent was similar between the two media.
Abstract: The ways in which people use the internet via Personal Computers (PCs) and mobile phones are examined in the unique context of Japan where the majority of people use the internet via mobile phones. Applying the concept of internet connectedness, people's PC internet connectedness and mobile internet connectedness are compared. The result indicates that people engage in a wider variety of activities via their computers than via mobile phones. Also, PC connectedness showed a significantly higher number of e-mails received per day than mobile connectedness, while the number of e-mails sent was similar between the two media.

BookDOI
TL;DR: Performance Evaluation of VoIP QoE Monitoring Using RTCP XR.- Research on Service Abstract and Integration Method in Heterogeneous Broadband Access Platform.
Abstract: Network Monitoring and Measurement.- Traffic Trace Engineering.- Understanding Web Hosting Utility of Chinese ISPs.- Internet Application Traffic Classification Using Fixed IP-Port.- Accuracy Improvement of CoMPACT Monitor by Using New Probing Method.- Configuration and Fault Management.- Proposal and Evaluation of Data Reduction Method for Tracing Based Pre-patch Impact Analysis.- High-Speed Traceroute Method for Large Scale Network.- Fault Diagnosis for High-Level Applications Based on Dynamic Bayesian Network.- Novel Optical-Fiber Network Management System in Central Office Using RFID and LED Navigation Technologies.- Management of IP-Based Networks.- Mobility Management Using Virtual Multi-parent Tree in Infrastructure Incorporated Mobile Ad Hoc Networks.- Lightweight Traffic Monitoring and Analysis Using Video Compression Techniques.- NETCONF-Based Network Management System Collaborating with Aggregated Flow Mining.- Policy-Based Monitoring and High Precision Control for Converged Multi-gigabit IP Networks.- Autonomous and Distributed Control.- The Design of an Autonomic Communication Element to Manage Future Internet Services.- Adaptive Grid Resource Selection Based on Job History Analysis Using Plackett-Burman Designs.- Automated and Distributed Network Service Monitoring.- Network Partitioning and Self-sizing Methods for QoS Management with Autonomic Characteristics.- Sensor Network and P2P Management.- A Scheme for Supporting Optimal Path in 6LoWPAN Based MANEMO Networks.- Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding.- Analysis of Time-Dependent Query Trends in P2P File Sharing Systems.- An Implementation of P2P System for Sharing Sensory Information.- Converged Networks and Traffic Engineering.- The Proposal of Service Delivery Platform Built on Distributed Data Driven Architecture.- LCGT: A Low-Cost Continuous Ground Truth Generation Method for Traffic Classification.- Adaptive Coverage Adjustment for Femtocell Management in a Residential Scenario.- New Modeling for Traffic Engineering in FMC Environment.- SLA and QoS Management.- Experience in Developing a Prototype for WiBro Service Quality Management System.- BDIM-Based Optimal Design of Videoconferencing Service Infrastructure in Multi-SLA Environments.- Contention Window Size Control for QoS Support in Multi-hop Wireless Ad Hoc Networks.- Tackling the Delay-Cost and Time-Cost Trade-Offs in Computation of Node-Protected Multicast Tree Pairs.- Active and Security Management.- An Algorithm for the Measure Station Selection and Measure Assignment in the Active IP Network Measurement.- Volume Traffic Anomaly Detection Using Hierarchical Clustering.- Memory-Efficient IP Filtering for Countering DDoS Attacks.- Framework Design and Performance Analysis on Pairwise Key Establishment.- Wireless and Mobile Network Management.- MIH-Assisted PFMIPv6 Predictive Handover with Selective Channel Scanning, Fast Re-association and Efficient Tunneling Management.- Forecasting WiMAX System Earnings: A Case Study on Mass Rapid Transit System.- Triangular Tiling-Based Efficient Flooding Scheme in Wireless Ad Hoc Networks.- Modeling Directional Communication in IEEE 802.15.3c WPAN Based on Hybrid Multiple Access of CSMA/CA and TDMA.- Management of Upstreaming Profiles for WiMAX.- Security Management.- Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems.- Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points.- IP Prefix Hijacking Detection Using Idle Scan.- A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network.- Short Papers.- A Personalization Service in the IMS Networks.- Dimensioning of IPTV VoD Service in Heterogeneous Broadband Access Networks.- Remote Configuration Mechanism for IP Based Ubiquitous Sensor Networks.- Asymmetric DHT Based on Performance of Peers.- Load Balance Based on Path Energy and Self-maintenance Routing Protocol in Wireless Sensor Networks.- Performance Evaluation of VoIP QoE Monitoring Using RTCP XR.- Research on Service Abstract and Integration Method in Heterogeneous Network Platform.- Security and Reliability Design of Olympic Games Network.- An Implementation of the SDP Using Common Service Enablers.- Decreasing Access Control List Processed in Hardware.- A Novel DNS Accelerator Design and Implementation.- Service Fault Localization Using Functional Events Separation and Modeling of Service Resources.- Towards Fault Isolation in WDM Mesh Networks.- Factors Influencing Adoption for Activating Mobile VoIP.- A Study on SDH/OTN Integrated Network Management Method.- Group P2P Network Organization in Mobile Ad-Hoc Network.- Dynamic Reconstruction of Multiple Overlay Network for Next Generation Network Services with Distributed Components.- EECHE: An Energy-Efficient Cluster Head Election Algorithm in Sensor Networks.- Boundary-Aware Topology Discovery for Distributed Management of Large Enterprise Networks.- Channel Management Protocol for Wireless Body Area Networks.- Experimental Evaluation of End-to-End Available Bandwidth Measurement Tools.- A Routing Management among CSCFs Using Management Technology.- The Network Management Scheme for Effective Consolidation of RFID-Tag Standards.- ROA Based Web Service Provisioning Methodology for Telco and Its Implementation.- Attack Model and Detection Scheme for Botnet on 6LoWPAN.- An Efficient Strategy for Achieving Concurrency Control in Mobile Environments.- Design of Intersection Switches for the Vehicular Network.- Exploiting Network Distance Based Euclidean Coordinates for the One Hop Relay Selection.- Architecture of IP Based Future Heterogeneous Mobile Network Using Network Discovery for Seamless Handoff.- Analytical Model of the Iub Interface Carrying HSDPA Traffic in the UMTS Network.- Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism.- A QoS Based Migration Scheme for Virtual Machines in Data Center Environments.

Proceedings ArticleDOI
14 Dec 2009
TL;DR: This work uses Twitter's real-time lists of popular Internet topics as a basis for predicting which Internet content will become popular in the near future and can be applied to optimize content delivery networks of the Internet via intelligent content pre-fetching and caching.
Abstract: We use Twitter's real-time lists of popular Internet topics as a basis for predicting which Internet content will become popular in the near future. Our methods can be applied to optimize content delivery networks of the Internet via intelligent content pre-fetching and caching.


Journal Article
TL;DR: The paper focuses on the component and principle of the Internet of Things based on the key RFID technique and its safety encryption and data management platform need to be improved urgently.
Abstract: The Internet of Things attracts more and more attention due to its extensive propagation and application.The paper focuses on the component and principle of the Internet of Things based on the key RFID technique.It is demonstarted that the Internet of Things does not have any standard for the application development,and it is very expensive,and its safety encryption and data management platform need to be improved urgently.Future development direction and application of the Internet of Things were also prospected.

Book ChapterDOI
01 Sep 2009
TL;DR: This position paper states four requirements for a Future Internet and sketches an initial concept of higher layers, which consider them to run on top of a basic Future Internet core, and sketches a new user experience to include all user devices.
Abstract: In this position paper we state four requirements for a Future Internet and sketch our initial concept. The requirements: (1) more comfort, (2) integration of home networks, (3) resources like service clouds in the network, and (4) access anywhere on any machine. Future Internet needs future quality and future comfort. There need to be new possiblities for everyone. Our focus is on higher layers and related to the many overlay proposals. We consider them to run on top of a basic Future Internet core. A new user experience means to include all user devices. Home networks and services should be a fundamental part of the Future Internet. Home networks extend access and allow interaction with the environment. Cloud Computing can provide reliable resources beyond local boundaries. For access anywhere, we also need secure storage for data and profiles in the network, in particular for access with non-personal devices (Internet terminal, ticket machine, ...).

Patent
16 Apr 2009
TL;DR: A handheld multimedia device connect to the internet to obtain internet content and transmits formatted content, including internet content, to a display, such as a television as mentioned in this paper, allowing users to watch internet television or movies, listening to internet music, and otherwise experiencing internet content without the need to connect a conventional computer to the television.
Abstract: A handheld multimedia device connect to the internet to obtain internet content and transmits formatted content, including internet content, to a display, such as a television Thus, users of the multimedia device have a platform for watching internet television or movies, listening to internet music, and otherwise experiencing internet content without the need to connect a conventional computer to the television Moreover, in some embodiments, multimedia device allows for seamless interaction with the internet by using the devices as a pointing device—users point the device where they desire a cursor to be on the screen

Journal ArticleDOI
01 Apr 2009
TL;DR: This research proposes to increase the understanding of mobile internet diffusion processes and the use of internet applications to advance the economic productivity of the Kingdom of Jordan, where the new King's recent technology initiative appears to be aimed at leveraging the internet as a means of national competitive advantage.
Abstract: The new and rapidly growing field of mobile internet, which combines laptop computers, wireless fax/modems, mobile phones and pagers will change and have changed the face of communication. Without a doubt, the emergence of standards such as Wireless Application Protocol (WAP), iMode, General Packet Radio Services (GPRS), Third Generation (3G) and Fourth Generation (4G) will drive wireless internet forward. The process through which these technologies are adopted and used in developing nations is important to understand for this reason. This research proposes to increase the understanding of mobile internet diffusion processes and the use of internet applications to advance the economic productivity of the Kingdom of Jordan, where the new King's recent technology initiative appears to be aimed at leveraging the internet as a means of national competitive advantage.



BookDOI
TL;DR: The Metalist Model: A Simple and Extensible Information Model for the Future Internet, and a Model-Driven Approach for Telecommunications Network Services Definition are presented.
Abstract: Technical Session 1: Traffic Engineering for the Internet.- Quantifying the Uncertainty in Measurements for MBAC.- Ring Flushing for Reduced Overload in Spanning Tree Protocol Controlled Ethernet Networks.- A Distributed Exact Solution to Compute Inter-domain Multi-constrained Paths.- Technical Session 2: P2P and Multimedia.- Classification of P2P and HTTP Using Specific Protocol Characteristics.- Network Awareness in P2P-TV Applications.- Enhancing Progressive Encryption for Scalable Video Streams.- Technical Session 3: Advanced Applications for Next Generation Networks.- Characterizing User Groups in Online Social Networks.- Route Prediction on Tracking Data to Location-Based Services.- Context Aware Programmable Trackers for the Next Generation Internet.- Technical Session 4: Future Internet Architectures and Models.- The Metalist Model: A Simple and Extensible Information Model for the Future Internet.- On Designing for Tussle: Future Internet in Retrospect.- NIT: A New Internet Topology Generator.- Technical Session 5: Pervasive Wireless Networks and Protocols.- Resource Allocation in MIMO-OFDMA Wireless Systems Based on Linearly Precoded Orthogonal Space-Time Block Codes.- On the Influence of Packet Scheduling on the Trade-Off between System Spectral Efficiency and User Fairness in OFDMA-Based Networks.- RSSI-Based Forwarding for Multihop Wireless Sensor Networks.- Technical Session 6: Innovative Algorithms for Network-Related Problems.- A Pipelined IP Address Lookup Module for 100 Gbps Line Rates and beyond.- Comparative Study of Multicast Protection Algorithms Using Shared Links in 100GET Transport Network.- Implementation and Evaluation of the Enhanced Header Compression (IPHC) for 6LoWPAN.- Technical Session 7: Disruptive Technologies for Future Services.- Primary Transmitter Discovery Based on Image Processing in Cognitive Radio.- A Flexible Framework for Complete Session Mobility and Its Implementation.- A Model-Driven Approach for Telecommunications Network Services Definition.- Technical Session 8: Traffic Analysis.- Detecting Spam at the Network Level.- Consistency Analysis of Network Traffic Repositories.

Journal ArticleDOI
TL;DR: It is indicated that quality anaesthesia-related information is unlikely to be retrieved by patients using the internet and the majority of websites were rated as either ‘poor’ or fair’ across all scores.
Abstract: The quality and accessibility of anaesthesia-related information available to patients on the internet is a growing concern for the specialty. We sought to evaluate the quality of anaesthesia-relat...


01 Jan 2009
TL;DR: The Internet’s growth in the past few years has been rapid and there are more than 185 million web sites with about 75 million of them active according to Netcraft, an Internet services company based in England.
Abstract: [slide 2] The Internet‘s growth in the past few years has been rapid. For example, the World Wide Web‘ first site was posted in December of 1990. There were only 10 sites by the end of 1991, 50 by the end of 1992, and about 6000 sites worldwide when I initiated my own web site in 1994. Today there are more than 185 million web sites with about 75 million of them active according to Netcraft, an Internet services company based in England (Netcraft, 2009).

01 Dec 2009
TL;DR: This review summarizes high-quality HIV-related Web sites, including sites that provide access to HIV- related guidelines, conferences with Web content, images, case studies, and clinical and scientific databases.
Abstract: The Internet provides easy, widespread access to new developments in the field of medicine. The pace of HIV-related research is rapid and has global relevance, making the Internet a particularly well-suited technology for dissemination of information. The number of sites offering HIV-related information is vast, and the quality is variable. Nevertheless, access to reliable information can be a highly efficient method to acquire up-to-date knowledge about advances in HIV investigation. This review summarizes high-quality HIV-related Web sites, including sites that provide access to HIV-related guidelines, conferences with Web content, images, case studies, and clinical and scientific databases. Also included are HIV-related reference sites, Web sites for journals that publish regularly on HIV- and AIDS-related advances and epidemiology, and policy oriented sites. In addition, Web sites with materials for patient information and advocacy and specialty societies for HIV practitioners are listed.

Book ChapterDOI
01 Jan 2009
TL;DR: It will be shown that the use of a Hardened Browser (or H-Browser) component is critical to force attackers to employ complex and expensive techniques and to reduce the strength and variety of social engineering attacks down to physiological fraud levels.
Abstract: We review the security of e-banking platforms with particular attention to the exploitable attack vectors of three main attack categories: Man-in-the-Middle, Man-in-the-PC and Man-in-the-Browser It will be shown that the most serious threats come from combination attacks capable of hacking any transaction without the need to control the authentication process Using this approach, the security of any authentication system can be bypassed, including those using SecureID Tokens, OTP Tokens, Biometric Sensors and Smart Cards We will describe and compare two recently proposed e-banking platforms, the ZTIC and the USPD, both of which are based on the use of dedicated client devices, but with diverging approaches with respect to the need of hardening the Web client application It will be shown that the use of a Hardened Browser (or H-Browser) component is critical to force attackers to employ complex and expensive techniques and to reduce the strength and variety of social engineering attacks down to physiological fraud levels

Proceedings ArticleDOI
20 Apr 2009
TL;DR: A novel P2P (Peer to Peer) based distributed services network (DSN), which is a next generation operable and manageable distributed core network architecture and functional structure, proposed by China Mobile for telecommunication services and wireless Internet.
Abstract: In this poster, we present a novel P2P (Peer to Peer) based distributed services network (DSN), which is a next generation operable and manageable distributed core network architecture and functional structure, proposed by China Mobile for telecommunication services and wireless Internet. Our preliminary implementations of P2P VoIP (Voice over Internet Protocol) system over DSN platform demonstrate its effectiveness and promising future.