Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936638
T. Yamakami
Business model engineering has recently witnessed a turning point in the history of the Internet. It is a real-time Web, which is different from the Internet of yesterday. This real-time Web is characterized by a network of real-time human responses. This has significant implications for mobile business ecosystems. The author presents a three-stage view of the Internet business models that lead to the real-time Web business model engineering of today. The author highlights some consequences of this turning point of the Internet from the perspective of business model engineering. The author discusses the implications for mobile business model engineering from this staged transition.
{"title":"Real-time human response network with its implications for mobile business model engineering","authors":"T. Yamakami","doi":"10.1109/DEST.2011.5936638","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936638","url":null,"abstract":"Business model engineering has recently witnessed a turning point in the history of the Internet. It is a real-time Web, which is different from the Internet of yesterday. This real-time Web is characterized by a network of real-time human responses. This has significant implications for mobile business ecosystems. The author presents a three-stage view of the Internet business models that lead to the real-time Web business model engineering of today. The author highlights some consequences of this turning point of the Internet from the perspective of business model engineering. The author discusses the implications for mobile business model engineering from this staged transition.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122844202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936608
Michael Brenner, J. Wiebelitz, Gabriele von Voigt, Matthew Smith
A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be sure where a particular job is physically executed and thus cannot rely on the security and confidentiality of the remote resource. A solution for this problem is operating on encrypted functions and encrypted data. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. This helps securing applications and data in a distributed digital ecosystem. We present a method to compute a secret program on an untrusted resource using fully homomorphic encrypted circuits. We sketch an algebraic homomorphism as a cryptographic foundation and define a sample system architecture for which we provide a software implementation. Our concept solves the problems of encrypted storage access with encrypted addresses and encrypted branching: in contrast to other approaches, like static one-pass circuit simulations, our system supports dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code.
{"title":"Secret program execution in the cloud applying homomorphic encryption","authors":"Michael Brenner, J. Wiebelitz, Gabriele von Voigt, Matthew Smith","doi":"10.1109/DEST.2011.5936608","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936608","url":null,"abstract":"A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be sure where a particular job is physically executed and thus cannot rely on the security and confidentiality of the remote resource. A solution for this problem is operating on encrypted functions and encrypted data. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. This helps securing applications and data in a distributed digital ecosystem. We present a method to compute a secret program on an untrusted resource using fully homomorphic encrypted circuits. We sketch an algebraic homomorphism as a cryptographic foundation and define a sample system architecture for which we provide a software implementation. Our concept solves the problems of encrypted storage access with encrypted addresses and encrypted branching: in contrast to other approaches, like static one-pass circuit simulations, our system supports dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936589
Girish Venkatachaliah
The digital ecosystem and information management are being hit by the perfect storm — the exponential growth of both structured and unstructured information, the astoundingly varied digital sources from social networks to the cars we drive, and the rising expectation and need for speedy decision making. Paradoxically, as the information grows, the ability to harness it intelligently is diminishing. It is further compounded by our difficulty in actually discovering the relevant piece of information needed to drive the decision in the context within the systemic constraints. The paper presentation will explore the challenges in the digital information management space with specific focus on analyzing, securing and harnessing the information, what needs to be done to foster the ecosystem, the challenges/gaps that exist, and the progress that is crying to be made in the coming decade. The paper will expound on the spectrum of complexities starting from the fundamental information extraction from data, and then discuss the approaches for synthesizing, standardizing and harmonizing noisy data to derive a holistic view. The paper will then elaborate ways of discovering information, and touch upon industry challenges in the space. The conclusion will highlight the emerging trends of gaining insights and intelligence, and being able to model and predict competitive behavior.
{"title":"Emerging challenges in information management: A perpective from the industry","authors":"Girish Venkatachaliah","doi":"10.1109/DEST.2011.5936589","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936589","url":null,"abstract":"The digital ecosystem and information management are being hit by the perfect storm — the exponential growth of both structured and unstructured information, the astoundingly varied digital sources from social networks to the cars we drive, and the rising expectation and need for speedy decision making. Paradoxically, as the information grows, the ability to harness it intelligently is diminishing. It is further compounded by our difficulty in actually discovering the relevant piece of information needed to drive the decision in the context within the systemic constraints. The paper presentation will explore the challenges in the digital information management space with specific focus on analyzing, securing and harnessing the information, what needs to be done to foster the ecosystem, the challenges/gaps that exist, and the progress that is crying to be made in the coming decade. The paper will expound on the spectrum of complexities starting from the fundamental information extraction from data, and then discuss the approaches for synthesizing, standardizing and harmonizing noisy data to derive a holistic view. The paper will then elaborate ways of discovering information, and touch upon industry challenges in the space. The conclusion will highlight the emerging trends of gaining insights and intelligence, and being able to model and predict competitive behavior.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936596
Jongseok Shin, Sangeun Lee, Heekyung Park
This study aims to improve how environmental infrastructure is evaluated to achieve urban sustainability. To do this, it focuses on evaluation criteria from an ecological perspective. Given that urban areas are similar with ecosystems, the authors examine the characteristics of ecosystems in terms of survival, i.e., evolution, adaption, ecological network, maximum power principle, dispersal and ecological hierarchy. From these characteristics of ecosystem survival, the authors consider how environmental infrastructure should be evaluated for the purpose of contributing to urban sustainability. Thus, evaluation criteria are derived from the characteristics of ecosystems as they relate to survival. These include inherent innovation, interconnectivity, maximizing efficiency, compactness, decentralization, conservation of the natural ecosystem, convenience with historical and cultural coupling and stepwise greenization. Finally, these criteria are applied to evaluate a Korean case. As a result, the evaluation criteria are regarded to be useful to incorporate urban sustainability into the evaluation process for environmental infrastructure.
{"title":"An ecological consideration for environmental infrastructure evaluation to achieve urban sustainability","authors":"Jongseok Shin, Sangeun Lee, Heekyung Park","doi":"10.1109/DEST.2011.5936596","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936596","url":null,"abstract":"This study aims to improve how environmental infrastructure is evaluated to achieve urban sustainability. To do this, it focuses on evaluation criteria from an ecological perspective. Given that urban areas are similar with ecosystems, the authors examine the characteristics of ecosystems in terms of survival, i.e., evolution, adaption, ecological network, maximum power principle, dispersal and ecological hierarchy. From these characteristics of ecosystem survival, the authors consider how environmental infrastructure should be evaluated for the purpose of contributing to urban sustainability. Thus, evaluation criteria are derived from the characteristics of ecosystems as they relate to survival. These include inherent innovation, interconnectivity, maximizing efficiency, compactness, decentralization, conservation of the natural ecosystem, convenience with historical and cultural coupling and stepwise greenization. Finally, these criteria are applied to evaluate a Korean case. As a result, the evaluation criteria are regarded to be useful to incorporate urban sustainability into the evaluation process for environmental infrastructure.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122465570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936633
K. Park, Doo Hyeong Kim, Chang Don Lee, H. Kim
This paper presents the power assistance system of working habiliment type for painting worker in ship-building. The painting worker carrying several tools such as spray gun, brush and roller should be stayed to do painting job in closed working space or inside internal wall of ship large block and in long time. Specially, the power habiliment system is realized by developing the mechanism and control technology to reduce the working load to be transferred to the muscular system of worker. And also it is developed to realize the human friendly optimal working motion. This paper shows the design of multi-axis link mechanism to do painting job of a variety of motion. It shows the control technology of painting work system to reduce the effect of the weight of painting tool and wearable painting system and the working load of painting process such as the reaction force of spray gun.
{"title":"Power assistance system of working habiliments type for painting worker in ship building","authors":"K. Park, Doo Hyeong Kim, Chang Don Lee, H. Kim","doi":"10.1109/DEST.2011.5936633","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936633","url":null,"abstract":"This paper presents the power assistance system of working habiliment type for painting worker in ship-building. The painting worker carrying several tools such as spray gun, brush and roller should be stayed to do painting job in closed working space or inside internal wall of ship large block and in long time. Specially, the power habiliment system is realized by developing the mechanism and control technology to reduce the working load to be transferred to the muscular system of worker. And also it is developed to realize the human friendly optimal working motion. This paper shows the design of multi-axis link mechanism to do painting job of a variety of motion. It shows the control technology of painting work system to reduce the effect of the weight of painting tool and wearable painting system and the working load of painting process such as the reaction force of spray gun.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123771985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936600
Asif Sangrasi, K. Djemame
The current approaches to manage risk in Grid computing are a major step towards the provision of Quality of Service (QoS) to the end-user. However these approaches are based on node or machine level Assessment. As a node may contain CPU(s), storage devices, connections for communication and software resource, a node failure may actually be a failure of any of these components. This paper proposes a probabilistic risk model at the component level; the probabilistic risk model encompasses series and parallel model(s). Our approach towards risk assessment is aimed at a granularity level of individual components as compared to previous efforts at node level. The benefits of this probabilistic approach is the provision of a detailed risk assessment to the Grid resource provider leading to risk aware scheduling and an efficient usage of resources. Grid failure data was analyzed and experimentation was conducted based the proposed risk model. The results of the experiments provide detailed risk information at component level for the nodes required in the SLA (Service Level Agreement).
{"title":"Component level risk assessment in Grids: A probablistic risk model and experimentation","authors":"Asif Sangrasi, K. Djemame","doi":"10.1109/DEST.2011.5936600","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936600","url":null,"abstract":"The current approaches to manage risk in Grid computing are a major step towards the provision of Quality of Service (QoS) to the end-user. However these approaches are based on node or machine level Assessment. As a node may contain CPU(s), storage devices, connections for communication and software resource, a node failure may actually be a failure of any of these components. This paper proposes a probabilistic risk model at the component level; the probabilistic risk model encompasses series and parallel model(s). Our approach towards risk assessment is aimed at a granularity level of individual components as compared to previous efforts at node level. The benefits of this probabilistic approach is the provision of a detailed risk assessment to the Grid resource provider leading to risk aware scheduling and an efficient usage of resources. Grid failure data was analyzed and experimentation was conducted based the proposed risk model. The results of the experiments provide detailed risk information at component level for the nodes required in the SLA (Service Level Agreement).","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936598
M. Huhn, J. Muller, Jana Gormer, Gianina Homoceanu, N. Le, Lukas Martin, Christopher Mumme, Christian Schulz, Niels Pinkwart, C. Muller-Schloer
This paper proposes a new metaphor for constructing systems of systems: Autonomous Agents in Organized Localities (AAOL). An agent-based approach is used for modeling structure and behavior of complex systems that consist of (semi-)autonomous systems, where goals, resources, capabilities are described locally while a need for superordinated ”global” regulation exists. The notion of organized localities is used to describe spatially or logically constrained spheres of influence of regulation bodies. Agents inhabit — and can move across — localities; regulation rules are modeled via computational norms and enforced by electronic institutions. A key objective of our work is to explore and advance applicability of AAOL to constructing mechatronic systems with (at least soft) real-time constraints. We describe requirements for modeling systems of systems, and outline the key pillars of AAOL: a conceptual architecture and a metamodel providing the basic constructs for describing AAOL-type systems. A case study of a decentrally organized airport transportation infrastructure illustrates the concepts and the feasibility of AAOL-based systems of systems design.
{"title":"Autonomous agents in organized localities regulated by institutions","authors":"M. Huhn, J. Muller, Jana Gormer, Gianina Homoceanu, N. Le, Lukas Martin, Christopher Mumme, Christian Schulz, Niels Pinkwart, C. Muller-Schloer","doi":"10.1109/DEST.2011.5936598","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936598","url":null,"abstract":"This paper proposes a new metaphor for constructing systems of systems: Autonomous Agents in Organized Localities (AAOL). An agent-based approach is used for modeling structure and behavior of complex systems that consist of (semi-)autonomous systems, where goals, resources, capabilities are described locally while a need for superordinated ”global” regulation exists. The notion of organized localities is used to describe spatially or logically constrained spheres of influence of regulation bodies. Agents inhabit — and can move across — localities; regulation rules are modeled via computational norms and enforced by electronic institutions. A key objective of our work is to explore and advance applicability of AAOL to constructing mechatronic systems with (at least soft) real-time constraints. We describe requirements for modeling systems of systems, and outline the key pillars of AAOL: a conceptual architecture and a metamodel providing the basic constructs for describing AAOL-type systems. A case study of a decentrally organized airport transportation infrastructure illustrates the concepts and the feasibility of AAOL-based systems of systems design.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936606
M. Harbach, Matthew Smith
Research ecosystems and the interactions of the participating entities can be complex. It has been shown that visualisation and network analysis can be used to provide insights into the system and the results can be utilised to facilitate management activities. Taking this approach in digital ecosystem research a step further, we propose to instrument the visualisations of a system's structure to operationalise this information for securing access to resources in research ecosystems. To this end, we present the concept of a visual approach to manage access control for distributed research ecosystems, based on a multi-purpose collaborative graph structure. Individuals are enabled to visually interact with the graph and contribute to access control decisions by jointly modelling the environment's structures and policies. Additionally, other administrative tasks can be instrumented to benefit from the explicit information contained in the structure. Using our approach, the burden of project management can be lightened by facilitating an integrated view of an inherently intricate environment.
{"title":"Visual access control for research ecosystems","authors":"M. Harbach, Matthew Smith","doi":"10.1109/DEST.2011.5936606","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936606","url":null,"abstract":"Research ecosystems and the interactions of the participating entities can be complex. It has been shown that visualisation and network analysis can be used to provide insights into the system and the results can be utilised to facilitate management activities. Taking this approach in digital ecosystem research a step further, we propose to instrument the visualisations of a system's structure to operationalise this information for securing access to resources in research ecosystems. To this end, we present the concept of a visual approach to manage access control for distributed research ecosystems, based on a multi-purpose collaborative graph structure. Individuals are enabled to visually interact with the graph and contribute to access control decisions by jointly modelling the environment's structures and policies. Additionally, other administrative tasks can be instrumented to benefit from the explicit information contained in the structure. Using our approach, the burden of project management can be lightened by facilitating an integrated view of an inherently intricate environment.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936644
Liu Jie, Wu Fuming, Wang Wei
The use and adoption of IT in enterprise are affected by the organization culture, and it attracted considerable empirical studies about the impact of culture on IT adoption in enterprise, but the reverse impact is lack, which means how the culture change with IT usage in enterprise. In the paper, we brought up a new perspective to illustrate the reverse relationship of IT and culture using a case study approach. The results show that IT usage can lead some change in organization structure and resource control, and then cause some little change of organization culture.
{"title":"Impact of IT usage on organizational culture: Evidence from China","authors":"Liu Jie, Wu Fuming, Wang Wei","doi":"10.1109/DEST.2011.5936644","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936644","url":null,"abstract":"The use and adoption of IT in enterprise are affected by the organization culture, and it attracted considerable empirical studies about the impact of culture on IT adoption in enterprise, but the reverse impact is lack, which means how the culture change with IT usage in enterprise. In the paper, we brought up a new perspective to illustrate the reverse relationship of IT and culture using a case study approach. The results show that IT usage can lead some change in organization structure and resource control, and then cause some little change of organization culture.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-06-30DOI: 10.1109/DEST.2011.5936636
Daniel Merino, R. Deters
Delivering TV services via internet protocols over high-speed connections is commonly referred to as IPTV (internet protocol television). Similar to the app-stores of smartphones, IPTV platforms enable the emergence of IPTV service ecologies in which 3rd party developers provide services to consumer that add value to the IPTV experience. A key issue in the IPTV ecosystem is the resilience of its services. This paper focuses on the issues related resilience in digital service ecologies. Starting with a review of resilience research in the area of biological ecologies we focus on differences and solutions for digital ecologies. Within the context of service ecologies we compare SOA and REST as design options and their impact with respect to resilience.
{"title":"Resilient service ecologies for IPTV: Using RESTful services to enable resilience","authors":"Daniel Merino, R. Deters","doi":"10.1109/DEST.2011.5936636","DOIUrl":"https://doi.org/10.1109/DEST.2011.5936636","url":null,"abstract":"Delivering TV services via internet protocols over high-speed connections is commonly referred to as IPTV (internet protocol television). Similar to the app-stores of smartphones, IPTV platforms enable the emergence of IPTV service ecologies in which 3rd party developers provide services to consumer that add value to the IPTV experience. A key issue in the IPTV ecosystem is the resilience of its services. This paper focuses on the issues related resilience in digital service ecologies. Starting with a review of resilience research in the area of biological ecologies we focus on differences and solutions for digital ecologies. Within the context of service ecologies we compare SOA and REST as design options and their impact with respect to resilience.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127504591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}