Social Networking for Pervasive Adaptation (SOCIALNETS)

Slides:



Advertisements
Similar presentations
-Grids and the OptIPuter Software Architecture Andrew A. Chien Director, Center for Networked Systems SAIC Chair Professor, Computer Science and Engineering.
Advertisements

Towards a GRID Operating System: from GLinux to a Pervasive GVM Domenico TALIA DEIS University of Calabria ITALY CoreGRID Workshop.
“Challenges and Methodologies
Information Society Technologies programme 1 IST Programme - 8th Call Area IV.2 : Computing Communications and Networks Area.
EGov-Bus 1st year review Advanced eGovernment Information Service Bus eGov-Bus, FP6-IST STP 1st Formal Review Meeting , Brussels eGov-Bus.
D SEA Group Software Engineering and Architecture Group i On Exploiting DIVERSITY e-professionals scenario Paola Inverardi Dipartimento di Informatica.
FP7 ICT Work Programme A short overview Michele Missikoff LEKS, IASI-CNR (Thanks to K. Rouhana, DG INFSO, C2)
0 DOD/DT/CEDCV – 20 th & 21 st January Paris meeting SAGEM RTD Activities C2-Sense project Paris – 20 & 21 January 2015.
End-to-End Efficiency (E 3 ) Integrated Project of the EC 7 th Framework Programme E 3 WP5 Objectives E 3 WP5 Structure and Research Challenges
MIT Project Oxygen. Vision  “…computation has centered about machines, not people”.  “In the future, computation will be human-centered. It will be.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
4th June 2010IASSIST 2010 conference 1 APPLICATIONS OF SOCIAL NETWORKING IN INTERNATIONAL COLLABORATION, MULTISITE-RESEARCH, KNOWLEDGE RE-USE AND DATA.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Multilevel Security in Location Aware Applications Alexander Ng Monash University Masters of Computing (Research) Supervisor: A/P Arkady Zaslavsky.
Smart Space & Oxygen CIS 640 Project By Usa Sammpun
Fair Coalitions for Power- Aware Routing ARO Review April 2004 Carl A. Gunter University of Pennsylvania Joint with Ratul Guha and Saswati Sarkar.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Key Action II - Objectives Support the development and adoption of novel IST solutions for eCommerce & eWork aimed at enhancing: Support the development.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
Indicator 3.06 Acquire product knowledge to communicate product benefits and to ensure appropriateness of product for the customer.
INFORMATION SYSTEMS Overview
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute Executive board meeting 2nd MobileMAN Workshop.
Introduction to Mobile Computing -CSE 535 Fall 2007 Sandeep K. S. Gupta School of Computing and Informatics Arizona State University.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Leonardo Flores Añover Ramón.
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
Ubiquitous learning. What is ubiquitous learning? Computing and communication technologies Characteristics of ubiquitous learning Context and ubiquitous.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
“You can’t lead where you won’t go…
MOBILE AGENTS What is a software agent ? Definition of an Agent (End-User point of view): An agent is a program that assists people and acts on their behalf.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Engineering Essential Characteristics Security Engineering Process Overview.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Mobile Communication Middleware By:Lekometsa Mokhesi Anisa Ragalo Supervisor: Ken Macgregor.
Standpoint Theory. Standpoint theory provides a framework for understanding systems of power and how they shape our communication. 1. Constructed on the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
The Relationship Between Participant & Investigator Many investigations create a social situation involving both researcher and participant Many investigations.
IHE PCD Analysis Committee Meeting October 26, 2009.
Copyright © 2006, UCD Dublin Systems Research Group School of Computer Science and Informatics UCD Dublin, Belfield, Dublin 4, Ireland
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Session 2a, 10th June June 2008 ICT-MobileSummit 2008 Copyright E3 project, BUPT An Autonomic Protocol Graph Management Architecture for Reconfigurable.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Ambient Networks Update Date Submitted: January 17 th 2007 Presented.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
MobileMAN Meeting Helsinki (8 June 2004) Marco Conti Computer Networks Dept., IIT CNR
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
1:1 Learning Scott Drossos :1 Learning2.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Introduction to Mobile Computing -CSE 535 Fall 2010 Sandeep K. S. Gupta School of Computing, Informatics and Decision Systems Engineering Arizona State.
MIcro-NanOSystems ECAD Laboratory AMICOM: Advanced MEMS for RF and Millimeterwave Communications The European Network of Excellence on RF MEMS.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 The evidence on using evidence Dr Jonathan Sharples.
Opportunistic P2P Interactions in Mobile Pervasive Environments Olga Ratsimor Ph.D. Candidate Olga Ratsimor Ph.D. Candidate.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 Adaptive Workflow to Support Knowledge Intensive Tasks Ann Macintosh AIAI The University of Edinburgh
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
UNC American Indian Center Mission Bridging the richness of North Carolina’s American Indian cultures with the strengths of Carolina in research, education,
Presented by Edith Ngai MPhil Term 3 Presentation
Pervasive Computing and Future
Why? Huge amount of information and knowledge available in:
Wireless Epidemic The wireless epidemic (Nature 449, ; 2007) by Jon Kleinberg ‘Digital traffic flows not only over the wired backbone of the Internet,
Pervasive Computing Happening?
Units with – James tedder
Presentation transcript:

Social Networking for Pervasive Adaptation (SOCIALNETS)

Abstract In this project we are looking at how to exploit the structures defined by human social relationships to develop and entirely new paradigm for adaptability in technology-rich pervasive information and communication systems. The behaviour of the human can be used to define and adapt a unique social structure between the mobile electronic devices. Social anthropology results merged with models of social networks’ structure will be exploited to design trustable and adaptive networking protocols and data management systems for pervasive information and communication environments.

Abstract “Social Networking for Pervasive Adaptation” will: 1.Investigate and understand dynamics of human social relationships and structures. 2.Develop the mechanisms and protocols for the electronic social networking paradigm and validate it from the technological standpoint, that is, its technical feasibility, effectiveness and scalability. 3.Develop and validate the social mechanisms and protocols to assert & reinforce appropriate trust and security in dynamic situated environments 4.Develop and validate the social mechanisms and protocols to acquire and provide user-relevant data & situated knowledge in pervasive technology rich environments using social networks.

The Work-packages 1.Characteristics of Social Networks UAVR, UCAM, OXF 2.Electronic Communication in Social Networks CNR, UCAM, NKUA, UAVR, EUR 3.Data & knowledge management for applications NKUA, CU, CNR, OXF, EUR 4.Integration and performance CU, CNR, UCAM, OXF, UAVR, EUR 5.Dissemination, collaboration and exploitation UCAM, CU, CNR, NKUA, OXF, UAVR, EUR