scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2014"


Book
16 Jun 2014
TL;DR: This book introduces teachers to the Internet and provides a collection of activities for classroom use and gives clear guidance on the practicalities of using the Internet as a resource and classroom tool.
Abstract: From the Publisher: "Are you interested in using the Internet in your classroom but don't know where to start? This book introduces teachers to the Internet and provides a collection of activities for classroom use." "The first part of the book discusses different facets of the Internet (software, modes of communication, finding and classifying resources) and gives clear guidance on the practicalities of using the Internet as a resource and classroom tool. The second part provides a range of practical activities grouped by theme and level. The final part of the book looks at how to create simple web pages and offers guidelines on how to set up and run global projects such as email and cultural exchanges."--BOOK JACKET.

4,397 citations


Posted Content
TL;DR: A series of experiments conducted for different recognition tasks using the publicly available code and model of the OverFeat network which was trained to perform object classification on ILSVRC13 suggest that features obtained from deep learning with convolutional nets should be the primary candidate in most visual recognition tasks.
Abstract: Recent results indicate that the generic descriptors extracted from the convolutional neural networks are very powerful. This paper adds to the mounting evidence that this is indeed the case. We report on a series of experiments conducted for different recognition tasks using the publicly available code and model of the \overfeat network which was trained to perform object classification on ILSVRC13. We use features extracted from the \overfeat network as a generic image representation to tackle the diverse range of recognition tasks of object image classification, scene recognition, fine grained recognition, attribute detection and image retrieval applied to a diverse set of datasets. We selected these tasks and datasets as they gradually move further away from the original task and data the \overfeat network was trained to solve. Astonishingly, we report consistent superior results compared to the highly tuned state-of-the-art systems in all the visual classification tasks on various datasets. For instance retrieval it consistently outperforms low memory footprint methods except for sculptures dataset. The results are achieved using a linear SVM classifier (or $L2$ distance in case of retrieval) applied to a feature representation of size 4096 extracted from a layer in the net. The representations are further modified using simple augmentation techniques e.g. jittering. The results strongly suggest that features obtained from deep learning with convolutional nets should be the primary candidate in most visual recognition tasks.

4,033 citations


01 Jun 2014
TL;DR: A collection of more than 50 large network datasets from tens of thousands of node and edges to tens of millions of nodes and edges that includes social networks, web graphs, road networks, internet networks, citation networks, collaboration networks, and communication networks.
Abstract: A collection of more than 50 large network datasets from tens of thousands of nodes and edges to tens of millions of nodes and edges. In includes social networks, web graphs, road networks, internet networks, citation networks, collaboration networks, and communication networks.

3,135 citations


ReportDOI
01 Jun 2014
TL;DR: The Constrained Application Protocol is a specialized web transfer protocol for use with constrained nodes and constrained networks, designed for machine- to-machine (M2M) applications such as smart energy and building automation.
Abstract: The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation. CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.

2,412 citations


Journal ArticleDOI
Russell W. Belk1
TL;DR: In this article, the authors compare sharing and collaborative consumption and find that both are growing in popularity today and make an assessment of the reasons for the current growth in these practices and their implications for businesses still using traditional models of sales and ownership.

2,154 citations


Journal ArticleDOI
TL;DR: A Galaxy based web server for processing and visualizing deeply sequenced data, called deepTools, that enables users with little bioinformatic background to explore the results of their sequencing experiments in a standardized setting and can be used without registration.
Abstract: We present a Galaxy based web server for processing and visualizing deeply sequenced data. The web server’s core functionality consists of a suite of newly developed tools, called deepTools, that enable users with little bioinformatic background to explore the results of their sequencing experiments in a standardized setting. Users can upload pre-processed files with continuous data in standard formats and generate heatmaps and summary plots in a straightforward, yet highly customizable manner. In addition, we offer several tools for the analysis of files containing aligned reads and enable efficient and reproducible generation of normalized coverage files. As a modular and open-source platform, deepTools can easily be expanded and customized to future demands and developments. The deepTools webserver is freely available at http://deeptools.ie-freiburg.mpg. de and is accompanied by extensive documentation and tutorials aimed at conveying the principles of deep-sequencing data analysis. The web server can be used without registration. deepTools can be installed locally either stand-alone or as part of Galaxy.

2,084 citations


Journal ArticleDOI
TL;DR: The SDN architecture and the OpenFlow standard in particular are presented, current alternatives for implementation and testing of SDN-based protocols and services are discussed, current and future SDN applications are examined, and promising research directions based on the SDN paradigm are explored.
Abstract: The idea of programmable networks has recently re-gained considerable momentum due to the emergence of the Software-Defined Networking (SDN) paradigm. SDN, often referred to as a ''radical new idea in networking'', promises to dramatically simplify network management and enable innovation through network programmability. This paper surveys the state-of-the-art in programmable networks with an emphasis on SDN. We provide a historic perspective of programmable networks from early ideas to recent developments. Then we present the SDN architecture and the OpenFlow standard in particular, discuss current alternatives for implementation and testing of SDN-based protocols and services, examine current and future SDN applications, and explore promising research directions based on the SDN paradigm.

2,013 citations


Journal ArticleDOI
TL;DR: The characteristics of Mechanical Turk as a participant pool for psychology and other social sciences, highlighting the traits of the MTurk samples, why people become Mechanical Turk workers and research participants, and how data quality on Mechanical Turk compares to that from other pools and depends on controllable and uncontrollable factors as mentioned in this paper.
Abstract: Mechanical Turk (MTurk), an online labor market created by Amazon, has recently become popular among social scientists as a source of survey and experimental data. The workers who populate this market have been assessed on dimensions that are universally relevant to understanding whether, why, and when they should be recruited as research participants. We discuss the characteristics of MTurk as a participant pool for psychology and other social sciences, highlighting the traits of the MTurk samples, why people become MTurk workers and research participants, and how data quality on MTurk compares to that from other pools and depends on controllable and uncontrollable factors.

1,926 citations


Journal ArticleDOI
TL;DR: This article found that personal networks and underlying project quality are associated with the success of crowdfunding efforts, and that geography is related to both the type of projects proposed and successful fundraising, while the vast majority of founders seem to fulfill their obligations to funders, but that over 75% deliver products later than expected, with the degree of delay predicted by the level and amount of funding a project receives.

1,822 citations


Journal ArticleDOI
TL;DR: A survey of the core functionalities of Information-Centric Networking (ICN) architectures to identify the key weaknesses of ICN proposals and to outline the main unresolved research challenges in this area of networking research.
Abstract: The current Internet architecture was founded upon a host-centric communication model, which was appropriate for coping with the needs of the early Internet users. Internet usage has evolved however, with most users mainly interested in accessing (vast amounts of) information, irrespective of its physical location. This paradigm shift in the usage model of the Internet, along with the pressing needs for, among others, better security and mobility support, has led researchers into considering a radical change to the Internet architecture. In this direction, we have witnessed many research efforts investigating Information-Centric Networking (ICN) as a foundation upon which the Future Internet can be built. Our main aims in this survey are: (a) to identify the core functionalities of ICN architectures, (b) to describe the key ICN proposals in a tutorial manner, highlighting the similarities and differences among them with respect to those core functionalities, and (c) to identify the key weaknesses of ICN proposals and to outline the main unresolved research challenges in this area of networking research.

1,408 citations


Book
01 Jan 2014
TL;DR: Crossing the Chasm as discussed by the authors provides new insights into the realities of high-tech marketing, with special emphasis on the Internet, and is essential reading for anyone with a stake in the world's most exciting marketplace.
Abstract: Here is the bestselling guide that created a new game plan for marketing in high-tech industries. "Crossing the Chasm" has become the bible for brining cutting-edge products to progressively larger markets. This revised and updated edition provides new insights into the realities of high-tech marketing, with special emphasis on the Internet. It's essential reading for anyone with a stake in the world's most exciting marketplace.

Journal ArticleDOI
TL;DR: This paper presents the key features and the driver technologies of IoT, and identifies the application scenarios and the correspondent potential applications, and focuses on research challenges and open issues to be faced for the IoT realization in the real world.

Journal ArticleDOI
TL;DR: A novel edge caching scheme based on the concept of content-centric networking or information-centric networks is proposed and evaluated, using trace-driven simulations to evaluate the performance of the proposed scheme and validate the various advantages of the utilization of caching content in 5G mobile networks.
Abstract: The demand for rich multimedia services over mobile networks has been soaring at a tremendous pace over recent years. However, due to the centralized architecture of current cellular networks, the wireless link capacity as well as the bandwidth of the radio access networks and the backhaul network cannot practically cope with the explosive growth in mobile traffic. Recently, we have observed the emergence of promising mobile content caching and delivery techniques, by which popular contents are cached in the intermediate servers (or middleboxes, gateways, or routers) so that demands from users for the same content can be accommodated easily without duplicate transmissions from remote servers; hence, redundant traffic can be significantly eliminated. In this article, we first study techniques related to caching in current mobile networks, and discuss potential techniques for caching in 5G mobile networks, including evolved packet core network caching and radio access network caching. A novel edge caching scheme based on the concept of content-centric networking or information-centric networking is proposed. Using trace-driven simulations, we evaluate the performance of the proposed scheme and validate the various advantages of the utilization of caching content in 5G mobile networks. Furthermore, we conclude the article by exploring new relevant opportunities and challenges.

Journal ArticleDOI
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Abstract: Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.

Journal ArticleDOI
TL;DR: A conceptual model that combines unified theory of acceptance and use of technology (UTAUT) with perceived risk with respect to usage behaviour of Internet banking is developed and some relationships of UTAUT are supported.

Journal ArticleDOI
TL;DR: The results indicate that a number of core symptoms of Internet addiction appear relevant for diagnosis, which assimilates Internet addiction and other addictive disorders and also differentiates them, implying a conceptualisation as syndrome with similar etiology and components, but different expressions of addictions.
Abstract: In the last decade, Internet usage has grown tremendously on a global scale. The increasing popularity and frequency of Internet use has led to an increasing number of reports highlighting the potential negative consequences of overuse. Over the last decade, research into Internet addiction has proliferated. This paper reviews the existing 68 epidemiological studies of Internet addiction that (i) contain quantitative empirical data, (ii) have been published after 2000, (iii) include an analysis relating to Internet addiction, (iv) include a minimum of 1000 participants, and (v) provide a full-text article published in English using the database Web of Science. Assessment tools and conceptualisations, prevalence, and associated factors in adolescents and adults are scrutinised. The results reveal the following. First, no gold standard of Internet addiction classification exists as 21 different assessment instruments have been identified. They adopt official criteria for substance use disorders or pathological gambling, no or few criteria relevant for an addiction diagnosis, time spent online, or resulting problems. Second, reported prevalence rates differ as a consequence of different assessment tools and cut-offs, ranging from 0.8% in Italy to 26.7% in Hong Kong. Third, Internet addiction is associated with a number of sociodemographic, Internet use, and psychosocial factors, as well as comorbid symptoms and disorder in adolescents and adults. The results indicate that a number of core symptoms (i.e., compulsive use, negative outcomes and salience) appear relevant for diagnosis, which assimilates Internet addiction and other addictive disorders and also differentiates them, implying a conceptualisation as syndrome with similar etiology and components, but different expressions of addictions. Limitations include the exclusion of studies with smaller sample sizes and studies focusing on specific online behaviours. Conclusively, there is a need for nosological precision so that ultimately those in need can be helped by translating the scientific evidence established in the context of Internet addiction into actual clinical practice.

Journal ArticleDOI
TL;DR: There are significant roots generally and particularly in the CIRP community -which point towards CPPSs, and Expectations and the related new R&D challenges will be outlined.

Journal ArticleDOI
Ning Lu1, Nan Cheng1, Ning Zhang1, Xuemin Shen1, Jon W. Mark1 
TL;DR: The challenges and potential challenges to provide vehicle-to-x connectivity are discussed and the state-of-the-art wireless solutions for vehicle-To-sensor, vehicle- to-vehicle, motorway infrastructure connectivities are reviewed.
Abstract: Providing various wireless connectivities for vehicles enables the communication between vehicles and their internal and external environments. Such a connected vehicle solution is expected to be the next frontier for automotive revolution and the key to the evolution to next generation intelligent transportation systems (ITSs). Moreover, connected vehicles are also the building blocks of emerging Internet of Vehicles (IoV). Extensive research activities and numerous industrial initiatives have paved the way for the coming era of connected vehicles. In this paper, we focus on wireless technologies and potential challenges to provide vehicle-to-x connectivity. In particular, we discuss the challenges and review the state-of-the-art wireless solutions for vehicle-to-sensor, vehicle-to-vehicle, vehicle-to-Internet, and vehicle-to-road infrastructure connectivities. We also identify future research issues for building connected vehicles.

Journal ArticleDOI
TL;DR: It is argued that conceptual issues and methodological shortcomings surrounding internet addiction research have made theoretical development difficult and an alternative model termed compensatory internet use is presented in an attempt to properly theorize the frequent assumption that people go online to escape real life issues or alleviate dysphoric moods.

Journal ArticleDOI
TL;DR: In this article, a combination of machine learning and social network analysis was used to classify users as Democrats or as Republicans based on the political content shared by them and investigate political homophily both in the network of reciprocated and non-reciprocated ties.
Abstract: This paper investigates political homophily on Twitter. Using a combination of machine learning and social network analysis we classify users as Democrats or as Republicans based on the political content shared. We then investigate political homophily both in the network of reciprocated and nonreciprocated ties. We find that structures of political homophily differ strongly between Democrats and Republicans. In general, Democrats exhibit higher levels of political homophily. But Republicans who follow official Republican accounts exhibit higher levels of homophily than Democrats. In addition, levels of homophily are higher in the network of reciprocated followers than in the nonreciprocated network. We suggest that research on political homophily on the Internet should take the political culture and practices of users seriously.

Journal ArticleDOI
TL;DR: The Tactile Internet will become a driver for economic growth and innovation and will help bring a new level of sophistication to societies.
Abstract: Wireless communications today enables us to connect devices and people for an unprecedented exchange of multimedia and data content. The data rates of wireless communications continue to increase, mainly driven by innovation in electronics. Once the latency of communication systems becomes low enough to enable a round-trip delay from terminals through the network back to terminals of approximately 1 ms, an overlooked breakthrough?human tactile to visual feedback control?will change how humans communicate around the world. Using these controls, wireless communications can be the platform for enabling the control and direction of real and virtual objects in many situations of our life. Almost no area of the economy will be left untouched, as this new technology will change health care, mobility, education, manufacturing, smart grids, and much more. The Tactile Internet will become a driver for economic growth and innovation and will help bring a new level of sophistication to societies.

Journal ArticleDOI
TL;DR: It is found that people with low levels of education and disabled people are using the Internet for more hours a day in their spare time than higher educated and employed populations and what they are doing online is investigated.
Abstract: In a representative survey of the Dutch population we found that people with low levels of education and disabled people are using the Internet for more hours a day in their spare time than higher educated and employed populations. To explain this finding, we investigated what these people are doing online. The first contribution is a theoretically validated cluster of Internet usage types: information, news, personal development, social interaction, leisure, commercial transaction and gaming. The second contribution is that, based on this classification, we were able to identify a number of usage differences, including those demonstrated by people with different gender, age, education and Internet experience, that are often observed in digital divide literature. The general conclusion is that when the Internet matures, it will increasingly reflect known social, economic and cultural relationships of the offline world, including inequalities.

Journal ArticleDOI
TL;DR: The pros and cons of how participants in Internet treatment trials have been recruited are reviewed and the assessment procedures often involved in Internet interventions are commented on, concluding that, while online questionnaires yield robust results, diagnoses cannot be determined without any contact with the patient.

Journal ArticleDOI
01 Jan 2014
TL;DR: In this article, the authors explore the concept of sensing as a service and how it fits with the Internet of Things (IoT) and identify the major open challenges and issues.
Abstract: The world population is growing at a rapid pace. Towns and cities are accommodating half of the world's population thereby creating tremendous pressure on every aspect of urban living. Cities are known to have large concentration of resources and facilities. Such environments attract people from rural areas. However, unprecedented attraction has now become an overwhelming issue for city governance and politics. The enormous pressure towards efficient city management has triggered various Smart City initiatives by both government and private sector businesses to invest in information and communication technologies to find sustainable solutions to the growing issues. The Internet of Things IoT has also gained significant attention over the past decade. IoT envisions to connect billions of sensors to the Internet and expects to use them for efficient and effective resource management in Smart Cities. Today, infrastructure, platforms and software applications are offered as services using cloud technologies. In this paper, we explore the concept of sensing as a service and how it fits with the IoT. Our objective is to investigate the concept of sensing as a service model in technological, economical and social perspectives and identify the major open challenges and issues. Copyright © 2013 John Wiley & Sons, Ltd.

Journal ArticleDOI
TL;DR: This report is the first to achieve an international consensus related to the assessment of internet gaming disorder, and describes the intended meaning behind each of the nine DSM-5 criteria for internetGaming disorder.
Abstract: Aims For the first time, the Diagnostic and Statistical Manual for Mental Disorders (DSM-5) introduces non- substance addictions as psychiatric diagnoses. The aims of this paper are to (i) present the main controversies surrounding the decision to include internet gaming disorder, but not internet addiction more globally, as a non-substance addiction in the research appendix of the DSM-5, and (ii) discuss the meaning behind the DSM-5 criteria for internet gaming disorder. The paper also proposes a common method for assessing internet gaming disorder. Although the need for common diagnostic criteria is not debated, the existence of multiple instruments reflect the divergence of opinions in the field regarding how best to diagnose this condition. Methods We convened international experts from European, North and South American, Asian and Australasian countries to discuss and achieve consensus about assessing internet gaming disorder as defined within DSM-5. Results We describe the intended meaning behind each of the nine DSM-5 criteria for internet gaming disorder and present a single item that best reflects each criterion, translated into the 10 main languages of countries in which research on this condition has been conducted. Conclusions Using results from this cross-cultural collaboration, we outline important research directions for understanding and assessing internet gaming disorder. As this field moves forward, it is critical that researchers and clinicians around the world begin to apply a common methodology; this report is the first to achieve an international consensus related to the assessment of internet gaming disorder.

Journal ArticleDOI
TL;DR: The perspective of the 5G technologies with two major themes: green and soft is presented, showing that by rethinking the Shannon theorem and traditional cell-centric design, network capacity can be significantly increased while network power consumption is decreased.
Abstract: As the deployment and commercial operation of 4G systems are speeding up, technologists worldwide have begun searching for next generation wireless solutions to meet the anticipated demands in the 2020 era given the explosive growth of mobile Internet. This article presents our perspective of the 5G technologies with two major themes: green and soft. By rethinking the Shannon theorem and traditional cell-centric design, network capacity can be significantly increased while network power consumption is decreased. The feasibility of the combination of green and soft is investigated through five interconnected areas of research: energy efficiency and spectral efficiency co-design, no more cells, rethinking signaling/control, invisible base stations, and full duplex radio.

Proceedings ArticleDOI
27 Aug 2014
TL;DR: This paper discusses the need for integrating Cloud and IoT, the challenges deriving from such integration, and how these issues have been tackled in literature, and identifies open issues, main challenges and future directions in this promising field.
Abstract: Cloud computing and Internet of Things (IoT), two very different technologies, are both already part of our life. Their massive adoption and use is expected to increase further, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and an enabler of a large number of application scenarios. In this paper we focus our attention on the integration of Cloud and IoT, which we call the CloudIoT paradigm. Many works in literature have surveyed Cloud and IoT separately: their main properties, features, underlying technologies, and open issues. However, to the best of our knowledge, these works lack a detailed analysis of the CloudIoT paradigm. To bridge this gap, in this paper we review the literature about the integration of Cloud and IoT. We start analyzing and discussing the need for integrating them, the challenges deriving from such integration, and how these issues have been tackled in literature. We then describe application scenarios that have been presented in literature, as well as platforms--both commercial and open source--and projects implementing the CloudIoT paradigm. Finally, we identify open issues, main challenges and future directions in this promising field.

Journal ArticleDOI
TL;DR: In two online studies as mentioned in this paper, respondents completed personality inventories and a survey of their Internet commenting styles, and strong positive associations emerged among online commenting frequency, trolling enjoyment and troll identity, pointing to a common construct underlying the measures.

Proceedings ArticleDOI
06 Mar 2014
TL;DR: The evolution from Intelligent Vehicle Grid to Autonomous, Internet-connected Vehicles, and Vehicular Cloud is discussed, the equivalent of Internet cloud for vehicles, providing all the services required by the autonomous vehicles.
Abstract: Traditionally, the vehicle has been the extension of the man's ambulatory system, docile to the driver's commands. Recent advances in communications, controls and embedded systems have changed this model, paving the way to the Intelligent Vehicle Grid. The car is now a formidable sensor platform, absorbing information from the environment (and from other cars) and feeding it to drivers and infrastructure to assist in safe navigation, pollution control and traffic management. The next step in this evolution is just around the corner: the Internet of Autonomous Vehicles. Pioneered by the Google car, the Internet of Vehicles will be a distributed transport fabric capable to make its own decisions about driving customers to their destinations. Like other important instantiations of the Internet of Things (e.g., the smart building), the Internet of Vehicles will have communications, storage, intelligence, and learning capabilities to anticipate the customers' intentions. The concept that will help transition to the Internet of Vehicles is the Vehicular Cloud, the equivalent of Internet cloud for vehicles, providing all the services required by the autonomous vehicles. In this article, we discuss the evolution from Intelligent Vehicle Grid to Autonomous, Internet-connected Vehicles, and Vehicular Cloud.

01 Aug 2014
TL;DR: This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants.
Abstract: This document describes Virtual eXtensible Local Area Network (VXLAN), which is used to address the need for overlay networks within virtualized data centers accommodating multiple tenants. The scheme and the related protocols can be used in networks for cloud service providers and enterprise data centers. This memo documents the deployed VXLAN protocol for the benefit of the Internet community.