Default Location

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 72 Experts worldwide ranked by ideXlab platform

M. Tsukamoto - One of the best experts on this subject based on the ideXlab platform.

  • ICNP - A CLNP-based protocol for mobile end systems within an area
    1993 International Conference on Network Protocols, 1993
    Co-Authors: R. Tanaka, M. Tsukamoto
    Abstract:

    A protocol for supporting mobile end systems (ESs) that move within an area in a connectionless-mode network protocol (CLNP) environment is proposed. Traffic caused by control protocol data units under frequent ES migration can be reduced by separating the roles of intermediate systems (ISs) into two roles: (1) generating and propagating the information of the Default Location of an ES, and (2) communicating directly to the ES and notifying the IS performing the role (1) of the current Location of the ES. In addition, ISs may use a new caching mechanism for efficiency. This protocol has the following advantages: First, there is no need for mobile ESs to be changed. Second, ISs implementing this protocol can coexist with the conventional ISs. Third, it does not require any change to the areas which do not have mobile ESs, so it is easy to apply to the existing networks. >

  • A CLNP-based protocol for mobile end systems within an area
    1993 International Conference on Network Protocols, 1993
    Co-Authors: R. Tanaka, M. Tsukamoto
    Abstract:

    A protocol for supporting mobile end systems (ESs) that move within an area in a connectionless-mode network protocol (CLNP) environment is proposed. Traffic caused by control protocol data units under frequent ES migration can be reduced by separating the roles of intermediate systems (ISs) into two roles: (1) generating and propagating the information of the Default Location of an ES, and (2) communicating directly to the ES and notifying the IS performing the role (1) of the current Location of the ES. In addition, ISs may use a new caching mechanism for efficiency. This protocol has the following advantages: First, there is no need for mobile ESs to be changed. Second, ISs implementing this protocol can coexist with the conventional ISs. Third, it does not require any change to the areas which do not have mobile ESs, so it is easy to apply to the existing networks.

R. Tanaka - One of the best experts on this subject based on the ideXlab platform.

  • ICNP - A CLNP-based protocol for mobile end systems within an area
    1993 International Conference on Network Protocols, 1993
    Co-Authors: R. Tanaka, M. Tsukamoto
    Abstract:

    A protocol for supporting mobile end systems (ESs) that move within an area in a connectionless-mode network protocol (CLNP) environment is proposed. Traffic caused by control protocol data units under frequent ES migration can be reduced by separating the roles of intermediate systems (ISs) into two roles: (1) generating and propagating the information of the Default Location of an ES, and (2) communicating directly to the ES and notifying the IS performing the role (1) of the current Location of the ES. In addition, ISs may use a new caching mechanism for efficiency. This protocol has the following advantages: First, there is no need for mobile ESs to be changed. Second, ISs implementing this protocol can coexist with the conventional ISs. Third, it does not require any change to the areas which do not have mobile ESs, so it is easy to apply to the existing networks. >

  • A CLNP-based protocol for mobile end systems within an area
    1993 International Conference on Network Protocols, 1993
    Co-Authors: R. Tanaka, M. Tsukamoto
    Abstract:

    A protocol for supporting mobile end systems (ESs) that move within an area in a connectionless-mode network protocol (CLNP) environment is proposed. Traffic caused by control protocol data units under frequent ES migration can be reduced by separating the roles of intermediate systems (ISs) into two roles: (1) generating and propagating the information of the Default Location of an ES, and (2) communicating directly to the ES and notifying the IS performing the role (1) of the current Location of the ES. In addition, ISs may use a new caching mechanism for efficiency. This protocol has the following advantages: First, there is no need for mobile ESs to be changed. Second, ISs implementing this protocol can coexist with the conventional ISs. Third, it does not require any change to the areas which do not have mobile ESs, so it is easy to apply to the existing networks.

Awais Rashid - One of the best experts on this subject based on the ideXlab platform.

  • Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy
    Proceedings on Privacy Enhancing Technologies, 2019
    Co-Authors: Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid
    Abstract:

    Abstract Smartphone manufacturer provided Default features (e.g., Default Location services, iCloud, Google Assistant, ad tracking) enhance the usability and extend the functionality of these devices. Prior studies have highlighted smartphone vulnerabilities and how users’ data can be harvested without their knowledge. However, little is known about manufacturer provided Default features in this regard—their usability concerning configuring them during usage, and how users perceive them with regards to privacy. To bridge this gap, we conducted a task-based study with 27 Android and iOS smart-phone users in order to learn about their perceptions, concerns and practices, and to understand the usability of these features with regards to privacy. We explored the following: users’ awareness of these features, why and when do they change the settings of these features, the challenges they face while configuring these features, and finally the mitigation strategies they adopt. Our findings reveal that users of both platforms have limited awareness of these features and their privacy implications. Awareness of these features does not imply that a user can easily locate and adjust them when needed. Furthermore, users attribute their failure to configure Default features to hidden controls and insufficient knowledge on how to configure them. To cope with difficulties of finding controls, users employ various coping strategies, some of which are platform specific but most often applicable to both platforms. However, some of these coping strategies leave users vulnerable.

Matt Beckett - One of the best experts on this subject based on the ideXlab platform.

Kopo M. Ramokapane - One of the best experts on this subject based on the ideXlab platform.

  • Skip, Skip, Skip, Accept!!!: A Study on the Usability of Smartphone Manufacturer Provided Default Features and User Privacy
    Proceedings on Privacy Enhancing Technologies, 2019
    Co-Authors: Kopo M. Ramokapane, Anthony C. Mazeli, Awais Rashid
    Abstract:

    Abstract Smartphone manufacturer provided Default features (e.g., Default Location services, iCloud, Google Assistant, ad tracking) enhance the usability and extend the functionality of these devices. Prior studies have highlighted smartphone vulnerabilities and how users’ data can be harvested without their knowledge. However, little is known about manufacturer provided Default features in this regard—their usability concerning configuring them during usage, and how users perceive them with regards to privacy. To bridge this gap, we conducted a task-based study with 27 Android and iOS smart-phone users in order to learn about their perceptions, concerns and practices, and to understand the usability of these features with regards to privacy. We explored the following: users’ awareness of these features, why and when do they change the settings of these features, the challenges they face while configuring these features, and finally the mitigation strategies they adopt. Our findings reveal that users of both platforms have limited awareness of these features and their privacy implications. Awareness of these features does not imply that a user can easily locate and adjust them when needed. Furthermore, users attribute their failure to configure Default features to hidden controls and insufficient knowledge on how to configure them. To cope with difficulties of finding controls, users employ various coping strategies, some of which are platform specific but most often applicable to both platforms. However, some of these coping strategies leave users vulnerable.