The emergence of P2P Inference Engines and domain-specific ontologies in Web 3.0 (aka Semantic Web) will present a major threat to the central “search” engine model. In Web 3.0 (aka Semantic Web) P2P Inference Engines running on millions of users’ P
We need solutions that can help the many people whose terms and vocabulary are left out of the taxonomy... The simple idea that people’s actions model meaning better than a directory (even a flexible directory) is a critical step forward in thinking ab
Hillis has bigger fish to fry than self-programming gadgets. In the past, he's expressed a desire to create machines that transcend what he sees as the limitations of human beings. "I guess I'm not overly perturbed by the prospect that there might be some
The Decentralized Information Group explores technical, institutional, and public policy questions necessary to advance the development of global, decentralized information environments. The Tabulator project is a generic Semantic Web data browser. Using
Diaspora lässt dich deine Kontakte in Gruppen einordnen. Deine Fotos, Geschichten und Witze werden durch diese Aspekte nur mit den Menschen geteilt, für die sie gedacht sind – einzigartig bei Diaspora.
Archive.org is testing a decentralized version, or DWeb version, of their web site that allows their content to be delivered over peer-to-peer connections with different hosts sharing portions of or the same content.
OpenID is a lightweight, decentralized identity system that has been gaining prominence. I expect this upcoming year to be a big year for OpenID -- and not just because of the Google trend chart with the recent uptake in search query share.
Here we explore social action. By social action we mean organized activity that seeks to improve human welfare, deepen civic culture and develop group life and commitment to others. Such a definition entails looking at the cultivation of a just and caring
The Decentralized Information Group explores technical, institutional, and public policy questions necessary to advance the development of global, decentralized information environments. The Tabulator project is a generic Semantic Web data browser. Using
Emergent structure vs. intelligent design: This all reflects a fundamental if still incoherent debate. There's one school of thought that says that if you just collect enough data and throw enough algorithms at it, the inherent structure - and the underst
What information will be deemed Proprietary? What information is part of the Information Commons? Who decides? How is it decided? Centralized? Decentralized? Opaque? Transparent?
The World Wide Database is a globally distributed network of data records that reside on millions of nodes around the network which collectively behaves as a giant virtual, decentralized database system...we need a new kind of server for hosting WWDB node
Web architecture from 50,000 feet up... decentralization and tolerance are the life and breath of Internet...If an engine of the future combines a reasoning engine with a search engine...able to construct proofs in a certain number of cases of very real i
The emergence of P2P Inference Engines and domain-specific ontologies in Web 3.0 (aka Semantic Web) will present a major threat to the central “search” engine model. In Web 3.0 (aka Semantic Web) P2P Inference Engines running on millions of users’ P
The past decade has seen a convergence of social and technological networks, with systems such as the World Wide Web characterized by the interplay between rich information content, the millions of individuals and organizations who create it, and the technology that supports it. This course covers recent research on the structure and analysis of such networks, and on models that abstract their basic properties. Topics include combinatorial and probabilistic techniques for link analysis, centralized and decentralized search algorithms, network models based on random graphs, and connections with work in the social sciences.
F. Hermann, A. Schuller, S. Thiel, C. Knecht, and S. Scerri. Human-Computer Interaction. Users and Contexts of Use, volume 8006 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
C. Trattner, P. Singer, D. Helic, and M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, page 14:1--14:8. New York, NY, USA, ACM, (2012)
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
M. Heupel, S. Scerri, M. Bourimi, and D. Kesdogan. Proceedings of the 4th International Workshop on Modeling Social Media, page 3:1--3:4. New York, NY, USA, ACM, (2013)