{"title":"Reduced Complexity Decoder for Orthogonal Space-Time Codes When Using QAM Constellations","authors":"A. Enescu, S. Ciochină, C. Paleologu","doi":"10.1109/ICDT.2010.34","DOIUrl":"https://doi.org/10.1109/ICDT.2010.34","url":null,"abstract":"Space-time block coding represents a practical and pragmatic method to mitigate the fading effects and to increase the channel capacity, by using spatial diversity. The space-time coding techniques are still preferred in communication systems because of the very simple transmit coding rule and of the relative reduced complexity of the maximum likelihood (ML) receivers with respect to other coding methods (e.g. space-time trellis codes) or other MIMO (Multiple Input Multiple Output) algorithms (e.g., spatial multiplexing). One of the drawbacks when using space-time block codes is the increase in complexity at the ML receiver when increasing the number of transmit antennas and the number of constellation points. This paper deals with this issue and introduces a decoding algorithm applicable only for orthogonal space-time block codes. We show that this decoding algorithm reduces the search space dimension of a regular ML receiver, leading to significant complexity reduction for QAM (quadrature amplitude modulation) constellations.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring Flexicurity Labour Market Policies in the European Union","authors":"A. Tangian","doi":"10.1109/ICDS.2008.25","DOIUrl":"https://doi.org/10.1109/ICDS.2008.25","url":null,"abstract":"One of central policy monitoring problems is operationally describing and visually representing the policy development. It relates to the EU flexicurity policy (= flexibilization of employment relations compensated by advantages in employment security and social security). To the end of policy monitoring, two indices, of flexible work and of precarious work, are derived from the Fourth European Survey of Working Conditions 2005. They reveal a statistical dependence between flexibility and precariousness of work, showing that employment flexibility has the strongest negative effect on employ ability. It implies that flexicurity cannot be consistently implemented as proposed by the European Commission.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129803955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Password-Based Grid Security Infrastructure","authors":"Zhun Cai","doi":"10.1109/ICDS.2008.39","DOIUrl":"https://doi.org/10.1109/ICDS.2008.39","url":null,"abstract":"The globus security infrastructure (GSI) is one of the most famous security architecture. GSI is based on public key infrastructure (PKI), which performs mutual authentication via X.509 certificates. We present a password-based grid security infrastructure (PBGSI), which authenticates clients by authenticated key exchange (AuthA) methods and uses improved chaffing and winnowing protocol for secure data transfer. By using password-based methods in authentication, authorization and delegation, PBGSI provides convenient interface for the user. At the same time, encryption-less secure data transfer improves the performance; and mechanisms used in our scheme (time-stamp etc.) enhance the security of the whole grid.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Server Pooling – A Novel IETF Architecture for Availability-Sensitive Services","authors":"T. Dreibholz, E. Rathgeb","doi":"10.1109/ICDS.2008.11","DOIUrl":"https://doi.org/10.1109/ICDS.2008.11","url":null,"abstract":"Reliable Server Pooling (RSerPool) is a light-weight protocol framework for server redundancy and session failover, currently still under standardization by the IETF RSerPool WG. While the basic ideas of RSerPool are not new, their combination into a single, resource-efficient and unified architecture is. Server redundancy directly leads to the issues of load distribution and load balancing, which are both important for the performance of RSerPool systems. Therefore, it is crucial to evaluate the performance of such systems with respect to the load balancing strategy required by the application. The goal of our paper is - after presenting a short overview of the RSerPool architecture and its application cases - to provide a quantitative, application-independent performance analysis ofRSerPool's server failure handling capabilities with respect to important adaptive and non- adaptive load balancing strategies. We will also analyse the impact of RSerPool protocol parameters on the performance of the server failure handling functionalities and the network overhead.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114841211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preliminary Based Service Evaluation for Elderly People and Healthcare Professionals in Residential Home Care Units","authors":"J. Reerink, Boulanger C Deroussent","doi":"10.1109/ICDS.2008.36","DOIUrl":"https://doi.org/10.1109/ICDS.2008.36","url":null,"abstract":"This article reports the first step of a human factor evaluation process based on user needs analysis. Our goal is to design assistive services dedicate to elderly people living along with healthcare professionals in residential home care units in France. After introducing MEDETIC non profit organization and its research in healthcare and wellbeing design services, we will report the qualitative evaluation that we performed to retrieve user needs and organizational attitudes toward ICT expressed by this population. A total of 24 elderly dependent people experiencing several types of limitations (sensory, physical, cognitive or none) and leaving in 3 different residential home care units in France and 13 healthcare professionals (4 managers, 4 nurses and 5 caregivers) were interviewed in order to measure user needs and technology acceptance. Results of this study provide qualitative support to healthcare service definition in community living ambient assisted living domain.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"637 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116476419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"View-Point Oriented Manipulation of Concepts: A Matching Perspective","authors":"K. Badie, M. Mahmoudi","doi":"10.1109/ICDS.2008.7","DOIUrl":"https://doi.org/10.1109/ICDS.2008.7","url":null,"abstract":"In this paper, we discuss the application of a method called concept composition in manipulating a concept from the view-point of other concepts. In this regard, a matching procedure is presented which is capable of justifying the way the items derived from a concept can be observed within the framework of those derived from another concept. The proposed approach is expected to be successfully applicable in research & innovation environments where the final objective is to create new chunks of knowledge based on the existing concepts.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124767984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Who's Afraid of High Def?' Institutional Factors Influencing HDTV Diffusion in the Netherlands","authors":"E. Baaren, L. Wijngaert, Erik Huizer","doi":"10.1109/ICDS.2008.33","DOIUrl":"https://doi.org/10.1109/ICDS.2008.33","url":null,"abstract":"Since digital HDTV has made an entrance in the Netherlands, HD ready' TV sets are sold and HDTV cable subscription services are available. In contrast, no Dutch TV channel offers HD content and publicity is mostly negative. This paper analyses the economical, organizational, historical and cultural background of HD diffusion in the Netherlands. Results show that the diffusion of HDTV is influenced by international standardization of peripheral equipment, competing TV uses and a deadlock in content broadcasting.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125655342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal Approach","authors":"M. Atzori, F. Aymerich, G. Fenu, S. Surcis","doi":"10.1109/ICDS.2008.26","DOIUrl":"https://doi.org/10.1109/ICDS.2008.26","url":null,"abstract":"This work will be consider the relationship between state authority, Internet policies and civil rights in three countries: Italy (EU), Serbia (Europe) and Burma-Myanmar1 (Asia). It will provide an overview about the debate existing in these countries, where it is possible to point out a common trend of restrictions of civil rights due to surveillance and control actions of the authorities on the ICTs. If, in the extreme case of Burma-Myanmar, these actions consist in a ban on using the Internet freely for the citizens, in the other countries they create legal contradictions not easily solved, which may prefigure increasing restrictive measures for the future and risks for the e-democracy.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123330208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Filgueiras, D. O. Correa, J. S. O. Neto, Renato P. Facis
{"title":"X-Gov Planning: How to Apply Cross Media to Government Services","authors":"L. Filgueiras, D. O. Correa, J. S. O. Neto, Renato P. Facis","doi":"10.1109/ICDS.2008.29","DOIUrl":"https://doi.org/10.1109/ICDS.2008.29","url":null,"abstract":"This paper presents a process to plan for application of cross media concepts to a government service. X-gov is defined as the orchestration of several media to deliver an e-government service. X-gov has the potential to increase access and enhance interactivity between citizens and government institutions. In order to keep government applications consistent, we propose in this paper a process to map media support to government services. The paper also reports on a case study of x-gov in an affordable housing program.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordination of a Multi-commodity Supply Chain with Multiple Members Using Flow Networks","authors":"S. K. Fayaz, M. Razzazi","doi":"10.1109/ICDS.2008.21","DOIUrl":"https://doi.org/10.1109/ICDS.2008.21","url":null,"abstract":"A successful supply chain responds to customer's requirements with minimum cost. In general, organizations which are members of a supply chain are independent of each other and try to maximize their own benefits. Appropriate behavior of each member is necessary but does not suffice to have a competitive supply chain. A supply chain coordination mechanism leads members to behave such that the entire supply chain satisfies customer demand with minimum costs. Previous research works which provided formally analyzed coordination mechanisms have made assumptions about restrictions on the number of supply chain stages and members in each stage. Moreover, multi-commodity case has not been investigated in the context of supply chain coordination yet. This paper exploits flow networks concept to propose a coordination mechanism which is applicable to supply chains with multiple members, multiple stages and presence of multi-commodity case while each commodity is composed of several basic components. In the proposed solution an entity named supply chain optimizer (SCO) which is actually an e-hub, gathers supply chain state information and after necessary computations, informs members of supply chain of optimal decisions about orders. The goal is to minimize operational costs of the whole supply chain while satisfying customer demand.","PeriodicalId":422080,"journal":{"name":"Second International Conference on the Digital Society","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114490625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}