Academic literature on the topic 'Content download services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Content download services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Content download services"

1

Stockhammer, Thomas, Jürgen Heiles, and Joachim Lüken. "DVB-IPTV content download services—overview and use cases." Multimedia Tools and Applications 53, no. 3 (March 30, 2010): 533–55. http://dx.doi.org/10.1007/s11042-010-0505-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Horák, Jiří, Jan Růžička, and Jiří Ardielli. "Performance Testing of Download Services of COSMC." Geoinformatics FCE CTU 10 (November 30, 2013): 5–14. http://dx.doi.org/10.14311/gi.10.1.

Full text
Abstract:
The paper presents results of performance tests of download services of Czech Office of Surveying, Mapping and Cadastre according to INSPIRE requirements. Methodology of testing is explained, including monitoring performance of reference servers. 26 millions of random requests were generated for each monitored operation, layer and coordinate system. The temporal development of performance indicators are analyzed and discussed. Results of performance tests approve the compliance with INSPIRE qualitative requirements for download services. All monitored services satisfy requirements of latency, capacity and availability. The latency and availability requirements are fulfilled with an abundant reserve. No problems in structure and content of responses were detected.
APA, Harvard, Vancouver, ISO, and other styles
3

OBrien, Patrick, Kenning Arlitsch, Jeff Mixter, Jonathan Wheeler, and Leila Belle Sterman. "RAMP – the Repository Analytics and Metrics Portal." Library Hi Tech 35, no. 1 (March 20, 2017): 144–58. http://dx.doi.org/10.1108/lht-11-2016-0122.

Full text
Abstract:
Purpose The purpose of this paper is to present data that begin to detail the deficiencies of log file analytics reporting methods that are commonly built into institutional repository (IR) platforms. The authors propose a new method for collecting and reporting IR item download metrics. This paper introduces a web service prototype that captures activity that current analytics methods are likely to either miss or over-report. Design/methodology/approach Data were extracted from DSpace Solr logs of an IR and were cross-referenced with Google Analytics and Google Search Console data to directly compare Citable Content Downloads recorded by each method. Findings This study provides evidence that log file analytics data appear to grossly over-report due to traffic from robots that are difficult to identify and screen. The study also introduces a proof-of-concept prototype that makes the research method easily accessible to IR managers who seek accurate counts of Citable Content Downloads. Research limitations/implications The method described in this paper does not account for direct access to Citable Content Downloads that originate outside Google Search properties. Originality/value This paper proposes that IR managers adopt a new reporting framework that classifies IR page views and download activity into three categories that communicate metrics about user activity related to the research process. It also proposes that IR managers rely on a hybrid of existing Google Services to improve reporting of Citable Content Downloads and offers a prototype web service where IR managers can test results for their repositories.
APA, Harvard, Vancouver, ISO, and other styles
4

Baua'a, Mustapha Mohammed. "Parallelizing Web Service Upload \ Download files." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 3 (March 30, 2018): 15. http://dx.doi.org/10.23956/ijarcsse.v8i3.563.

Full text
Abstract:
The I\O file system Read\Write operations are considered the most significant characteristics. Where, many researchers focus on their works on how to decrease the response time of I\O file system read\write operations. However, most articles concentrate on how to read\write content of the file in parallelism manner. Here in this paper, the author considers the parallelizing Read\Write whole file bytes not only its contents. A case study has been applied in order to make the idea more clear. It talks about two techniques of uploading\downloading files via Web Service. The first one is a traditional way where the files uploaded and downloaded serially. While the second one is uploaded\ downloaded files using Java thread in order to simulate parallelism technique. Java Netbeans 8.0.2 have been used as a programming environment to implement the Download\Upload files through Web Services. Validation results are also presented via using Mat-lab platform as benchmarks. The visualized figures of validation results are clearly clarifying that the second technique shows better response time in comparison to the traditional way.
APA, Harvard, Vancouver, ISO, and other styles
5

Fraile, Francisco, Ismael de Fez, and Juan Carlos Guerri. "Evaluation of Background Push Content Download Services to Mobile Devices Over DVB Networks." IEEE Transactions on Broadcasting 60, no. 1 (March 2014): 1–15. http://dx.doi.org/10.1109/tbc.2013.2289639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

de Fez, I., F. Fraile, R. Belda, and J. C. Guerri. "Analysis and Evaluation of Adaptive LDPC AL-FEC Codes for Content Download Services." IEEE Transactions on Multimedia 14, no. 3 (June 2012): 641–50. http://dx.doi.org/10.1109/tmm.2012.2190392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schrimpsher, Dan, and Letha Etzkorn. "A model to predict quality of a reduced ontology for Web service discovery on mobile devices." Knowledge Engineering Review 29, no. 2 (March 2014): 201–16. http://dx.doi.org/10.1017/s0269888914000071.

Full text
Abstract:
AbstractAs Web Services and the Semantic Web become more important, enabling technologies such as Web service ontologies will grow larger. At the same time, use of mobile devices to access Web services has doubled in the last year. The ability of these resource-constrained devices to download and reason across ontologies to support service discovery are severely limited. Since concrete agents typically only needs a subset of what is described in a Web service ontology to complete their task, a reduced ontology can be created. Measuring the quality of a reduced ontology, in both knowledge content and performance, is a nontrivial task. Expert analysis of the ontologies is time-consuming and unreliable. We propose two measures of knowledge content and performance. Mean average recall (MAR) with respect to the original ontology compares the data returned from a series of queries related to a particular concept of interest. Mean average performance (MAP) compares the download and reasoning speedup of the reduced ontology with respect to the original ontology. Neither of these values can be computed easily, therefore we propose a set of ontology metrics to predict these values. In this paper, we develop two prediction models for MAR and MAP based on these metrics. These models are based on analysis of 23 ontologies from five domains. To compute MAR, a specific set of queries for each domain was applied to each candidate reduced ontology along with the original ontology. To compute MAP, a simulated mobile device will download and process of each ontology along with the original ontology. We believe this model allows a speedy selection of a reduced ontology that contains the knowledge content and performance speedup needed by a mobile device for service discovery.
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Ya Jun, Yan Quan Liu, and Arlene Bielefield. "The Provision of Mobile Services in US Urban Libraries." Information Technology and Libraries 37, no. 2 (June 18, 2018): 78–93. http://dx.doi.org/10.6017/ital.v37i2.10170.

Full text
Abstract:
To determine the present situation regarding services provided to mobile users in US urban libraries, the authors surveyed 138 Urban Libraries Council members utilizing a combination of mobile visits, content analysis, and librarian interviews. The results show that nearly 95% of these libraries have at least one mobile website, mobile catalog, or mobile app. The libraries actively applied new approaches to meet each local community’s remote-access needs via new technologies, including app download links, mobile reference services, scan ISBN, location navigation, and mobile printing. Mobile services that libraries provide today are timely, convenient, and universally applicable.
APA, Harvard, Vancouver, ISO, and other styles
9

Gessa, Ana, Amor Jiménez, and Pilar Sancha. "Open Innovation in Digital Healthcare: Users’ Discrimination between Certified and Non-Certified mHealth Applications." Journal of Open Innovation: Technology, Market, and Complexity 6, no. 4 (November 1, 2020): 130. http://dx.doi.org/10.3390/joitmc6040130.

Full text
Abstract:
Mobile applications users consider it especially important to have quality certification, and particularly in an e-health context. However, if the app is certified, will user satisfaction be greater? This paper is intended to help answer that question. Therefore, with user satisfaction as a determinant of the quality of services, the purpose of the paper is to understand the extent to which certified and non-certified mHealth apps influence user experience. This was measured by online reviews and downloads. An empirical study was carried out with 50 mHealth apps (21 certified, 29 non-certified), which is a convenient sampling procedure. The Mahalanobis matching technique was used to test for significant differences between the groups. A comparative content analysis was performed on 6188 user comments and on app downloads. Non-parametric tests were preferred because the variables analyzed had a categorical structure. A log-linear model and advanced contingency tables were used to examine the more than two-way relationships of variables. The results show differences between the two samples (certified and non-certified mHealth apps). However, quality certification labels as a guarantee of the quality of apps do not have a modulating effect on the online reviews and downloads relationship. The model showed a statistically significant partial association between “certification” and “online user reviews” (Z = 2.174; sig = 0.042)] and between “download” and “online user reviews” (Z = 2.387; sig = 0.017).
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Yunjin, Mingyu Lim, and Yangchan Moon. "Application-level Communication Services for Development of Social Networking Systems." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 3 (June 1, 2015): 586. http://dx.doi.org/10.11591/ijece.v5i3.pp586-598.

Full text
Abstract:
In this paper, we present our communication middleware (CM), which is designed to reduce the effort of developing common communication functionalities for social networking services (SNSs) in the client-server model. SNS developers can apply the application-level communication services of CM both to an SNS server and to client applications simply by calling application programming interfaces (APIs) and configuring various options related to communication services. CM was developed to enable SNS developers to easily build fundamental services such as transmission of a user-defined event, user membership and authentication management, friend management, content upload and download with different numbers of attachments, chat management, and direct file transfer. All of the communication services also provide options that a developer can customize according to his or her SNS requirements.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Content download services"

1

Fraile, Gil Francisco. "Evaluation of unidirectional background push content download services for the delivery of television programs." Doctoral thesis, Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/31656.

Full text
Abstract:
Este trabajo de tesis presenta los servicios de descarga de contenido en modo push como un mecanismo eficiente para el envío de contenido de televisión pre-producido sobre redes de difusión. Hoy en día, los operadores de red dedican una cantidad considerable de recursos de red a la entrega en vivo de contenido televisivo, tanto sobre redes de difusión como sobre conexiones unidireccionales. Esta oferta de servicios responde únicamente a requisitos comerciales: disponer de los contenidos televisivos en cualquier momento y lugar. Sin embargo, desde un punto de vista estrictamente académico, el envío en vivo es únicamente un requerimiento para el contenido en vivo, no para contenidos que ya han sido producidos con anterioridad a su emisión. Más aún, la difusión es solo eficiente cuando el contenido es suficientemente popular. Los servicios bajo estudio en esta tesis utilizan capacidad residual en redes de difusión para enviar contenido pre-producido para que se almacene en los equipos de usuario. La propuesta se justifica únicamente por su eficiencia. Por un lado, genera valor de recursos de red que no se aprovecharían de otra manera. Por otro lado, realiza la entrega de contenidos pre-producidos y populares de la manera más eficiente: sobre servicios de descarga de contenidos en difusión. Los resultados incluyen modelos para la popularidad y la duración de contenidos, valiosos para cualquier trabajo de investigación basados en la entrega de contenidos televisivos. Además, la tesis evalúa la capacidad residual disponible en redes de difusión, por medio de estudios empíricos. Después, estos resultados son utilizados en simulaciones que evalúan las prestaciones de los servicios propuestos en escenarios diferentes y para aplicaciones diferentes. La evaluación demuestra que este tipo de servicios son un recurso muy útil para la entrega de contenido televisivo.
This thesis dissertation presents background push Content Download Services as an efficient mechanism to deliver pre-produced television content through existing broadcast networks. Nowadays, network operators dedicate a considerable amount of network resources to live streaming live, through both broadcast and unicast connections. This service offering responds solely to commercial requirements: Content must be available anytime and anywhere. However, from a strictly academic point of view, live streaming is only a requirement for live content and not for pre-produced content. Moreover, broadcasting is only efficient when the content is sufficiently popular. The services under study in this thesis use residual capacity in broadcast networks to push popular, pre-produced content to storage capacity in customer premises equipment. The proposal responds only to efficiency requirements. On one hand, it creates value from network resources otherwise unused. On the other hand, it delivers popular pre-produced content in the most efficient way: through broadcast download services. The results include models for the popularity and the duration of television content, valuable for any research work dealing with file-based delivery of television content. Later, the thesis evaluates the residual capacity available in broadcast networks through empirical studies. These results are used in simulations to evaluate the performance of background push content download services in different scenarios and for different applications. The evaluation proves that this kind of services can become a great asset for the delivery of television content
Fraile Gil, F. (2013). Evaluation of unidirectional background push content download services for the delivery of television programs [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/31656
TESIS
APA, Harvard, Vancouver, ISO, and other styles
2

De, Fez Lava Ismael. "Evaluation of a content download service based on FLUTE and LDPC for improving the Quality of Experience over multicast wireless networks." Doctoral thesis, Editorial Universitat Politècnica de València, 2014. http://hdl.handle.net/10251/37051.

Full text
Abstract:
Esta tesis estudia la distribución de ficheros en redes inalámbricas, analizando diferentes mecanismos que permiten optimizar la transmisión en términos de ancho de banda y calidad de experiencia. Concretamente, la tesis se centra en la transmisión de ficheros en canales multicast. Dicha transmisión resulta adecuada en ciertos entornos y tiene múltiples aplicaciones, algunas de las cuales se presentan en este trabajo. La tesis analiza en profundidad FLUTE (File Delivery over Unidirectional Transport), un protocolo para el envío fiable de ficheros en canales unidireccionales, y presenta algunas propuestas para mejorar la transmisión a través de dicho protocolo. En este sentido, una de las bases de este protocolo es el uso de un mecanismo llamado Tabla de Envío de Ficheros (FDT), que se utiliza para describir los contenidos transmitidos. Este trabajo analiza cómo la transmisión de la FDT afecta al funcionamiento del protocolo FLUTE, y proporciona una metodología para optimizar el envío de contenido mediante FLUTE. Por otro lado, en la transmisión de ficheros por multicast resulta esencial ofrecer un servicio fiable. Entre los distintos mecanismos utilizados por FLUTE para ofrecer fiabilidad, este trabajo analiza principalmente los códigos de corrección AL-FEC (Application Layer ¿ Forward Error Correction), los cuales añaden redundancia a la transmisión para minimizar los efectos de las pérdidas en el canal. Al respecto, esta tesis evalúa los códigos LDPC Staircase y LDPC Triangle, comparando su funcionamiento bajo diferentes condiciones de transmisión. Además, en el caso de tener un canal de retorno, una de las principales contribuciones de esta tesis es la propuesta de códigos LDPC adaptativos para servicios de descarga de ficheros. En esta clase de códigos, el servidor de contenidos cambia dinámicamente la cantidad de protección FEC proporcionada en función de las pérdidas que detectan los usuarios. La evaluación demuestra el buen funcionamiento de estos códigos en distintos entornos.
De Fez Lava, I. (2014). Evaluation of a content download service based on FLUTE and LDPC for improving the Quality of Experience over multicast wireless networks [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/37051
Alfresco
Premiado
APA, Harvard, Vancouver, ISO, and other styles
3

von, Wenckstern Michael. "Web applications using the Google Web Toolkit." Master's thesis, Technische Universitaet Bergakademie Freiberg Universitaetsbibliothek "Georgius Agricola", 2013. http://nbn-resolving.de/urn:nbn:de:bsz:105-qucosa-115009.

Full text
Abstract:
This diploma thesis describes how to create or convert traditional Java programs to desktop-like rich internet applications with the Google Web Toolkit. The Google Web Toolkit is an open source development environment, which translates Java code to browser and device independent HTML and JavaScript. Most of the GWT framework parts, including the Java to JavaScript compiler as well as important security issues of websites will be introduced. The famous Agricola board game will be implemented in the Model-View-Presenter pattern to show that complex user interfaces can be created with the Google Web Toolkit. The Google Web Toolkit framework will be compared with the JavaServer Faces one to find out which toolkit is the right one for the next web project
Diese Diplomarbeit beschreibt die Erzeugung desktopähnlicher Anwendungen mit dem Google Web Toolkit und die Umwandlung klassischer Java-Programme in diese. Das Google Web Toolkit ist eine Open-Source-Entwicklungsumgebung, die Java-Code in browserunabhängiges als auch in geräteübergreifendes HTML und JavaScript übersetzt. Vorgestellt wird der Großteil des GWT Frameworks inklusive des Java zu JavaScript-Compilers sowie wichtige Sicherheitsaspekte von Internetseiten. Um zu zeigen, dass auch komplizierte graphische Oberflächen mit dem Google Web Toolkit erzeugt werden können, wird das bekannte Brettspiel Agricola mittels Model-View-Presenter Designmuster implementiert. Zur Ermittlung der richtigen Technologie für das nächste Webprojekt findet ein Vergleich zwischen dem Google Web Toolkit und JavaServer Faces statt
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Content download services"

1

Ubfal, Diego, Irani Arráiz, Diether Beuermann, Michael Frese, Alessandro Maffioli, and Daniel Verch. Implementation and Impact Evaluation of Entrepreneurship Support Services in Jamaica. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003182.

Full text
Abstract:
AUTHORUbfal, Diego; Arráiz, Irani; Beuermann, Diether; Frese, Michael; Maffioli, Alessandro; Verch, DanielDATEMar 2021DOWNLOAD:English (0 downloads)DOIhttp://dx.doi.org/10.18235/0003182There has been growing interest in approaches to business training that incorporate insights from psychology to develop soft skills associated with successful entrepreneurship. The empirical evidence on their success, however, is still inconclusive. This study designs and evaluates two training programs focusing on soft skills, which are adapted to the Jamaican context. The first program provides soft-skills training on personal initiative, including the development of a proactive mindset and perseverance after setbacks. The second program combines soft-skills training on personal initiative with traditional training on hard skills aimed at changing business practices. Both programs are evaluated using a randomized controlled trial design involving 945 entrepreneurs in Jamaica. Findings indicate positive effects of the intensive soft-skills training, but not of the training combining soft and hard skills, on business outcomes (i.e., sales and profits) in the short-term (i.e., three months after the implementation of the trainings). The positive short-term effects of the soft-skills training are concentrated among men and are not significant for women. These effects, however, vanish when measured 12 months after the trainings. Nonetheless, the soft-skills training show persistent positive effects on some targeted soft skills, which are measured with both self-reported and incentivized measures.
APA, Harvard, Vancouver, ISO, and other styles
2

Hörnle, Julia. Internet Jurisdiction Law and Practice. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198806929.001.0001.

Full text
Abstract:
Jurisdiction is the foundational concept for both national laws and international law as it provides the link between the sovereign government and its territory, and ultimately its people. The internet challenges this concept at its root: data travels across the internet without respecting political borders or territory. This book is about this Jurisdictional Challenge created by internet technologies. The Jurisdictional Challenge arises as civil disputes, criminal cases, and regulatory action span different countries, rising questions as to the international competence of courts, law enforcement, and regulators. From a technological standpoint, geography is largely irrelevant for online data flows and this raises the question of who governs “YouTubistan.” Services, communication, and interaction occur online between persons who may be located in different countries. Data is stored and processed online in data centres remote from the actual user, with cloud computing provided as a utility. Illegal acts such as hacking, identity theft and fraud, cyberespionage, propagation of terrorist propaganda, hate speech, defamation, revenge porn, and illegal marketplaces (such as Silkroad) may all be remotely targeted at a country, or simply create effects in many countries. Software applications (“apps”) developed by a software developer in one country are seamlessly downloaded by users on their mobile devices worldwide, without regard to applicable consumer protection, data protection, intellectual property, or media law. Therefore, the internet has created multi-facetted and complex challenges for the concept of jurisdiction and conflicts of law. Traditionally, jurisdiction in private law and jurisdiction in public law have belonged to different areas of law, namely private international law and (public) international law. The unique feature of this book is that it explores the notion of jurisdiction in different branches of “the” law. It analyses legislation and jurisprudence to extract how the concept of jurisdiction is applied in internet cases, taking a comparative law approach, focusing on EU, English, German, and US law. This synthesis and comparison of approaches across the board has produced new insights on how we should tackle the Jurisdictional Challenge. The first three chapters explain the Jurisdictional Challenge created by the internet and place this in the context of technology, sovereignty, territory, and media regulation. The following four chapters focus on public law aspects, namely criminal law and data protection jurisdiction. The next five chapters are about private law disputes, including cross-border B2C e-commerce, online privacy and defamation disputes, and internet intellectual property disputes. The final chapter harnesses the insights from the different areas of law examined.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Content download services"

1

Fernandez, Pablo, Asier Perallos, Nekane Sainz, and Roberto Carballedo. "A Location-Based Transactional Download Service of Contextualized Multimedia Content for Mobile Clients." In Advances in Intelligent and Soft Computing, 205–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14883-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balusamy, Balamurugan, Malathi Velu, Saranya Nandagopal, and Shirley Jothi Mano. "Achieving Security to Overcome Attacks and Vulnerabilities in Mobile Banking Security." In Online Banking Security Measures and Data Protection, 237–62. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch014.

Full text
Abstract:
Mobile Banking is a means of connectivity between bank and its customers. It would be impractical to expect customers to regularly visit banks or connect to a web site for regular upgrade of their mobile banking application. Mobile Banking is a provision and availability of both banking and financial services with the help of mobile telecommunication devices as an Application. It would be expected that the mobile application itself check the upgrades and updates and download necessary patches. Mobile banking has brought the advantage to have an alternate to debit and credit card usage. Mobile banking has the below three inter-related concepts: Mobile accounting, Mobile brokerage, Mobile financial information services. Mobile banking services are Account information provision, Monetary Transaction, Investment facilitation, Support and Content services. The threats involved in Mobile Banking are categorized as, Threats against end user and end user device, Threats against communication network, Threats against remote banking service. The impact of various threats is discussed below.
APA, Harvard, Vancouver, ISO, and other styles
3

Costa, Carolina, Helena Alvelos, and Leonor Teixeira. "The Moodle Platform." In Advances in Business Information Systems and Analytics, 13–30. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8368-6.ch002.

Full text
Abstract:
This chapter analyzes Learning Management Systems (LMSs) and their main features and compares the most popular LMSs platforms considering their utilization and the services they offer. Additionally, it presents a study carried out at the University of Aveiro (UA) that analyses the functionalities and tools of the Moodle platform and their use by students. The data was collected based on content analysis, one non-structured interview with the responsible of the Moodle from the UA and a questionnaire applied to 278 students. The results show that the most mentioned purposes of the Moodle@UA were ‘Download materials', ‘News' and ‘Deliver assignments' and that the most used information materials are ‘Texts' and ‘Slides', showing that despite Moodle has a great potential, it is mainly used as a repository of materials. The results also highlighted the existence of two groups of students distinguished by the degree of importance given to the Moodle tools.
APA, Harvard, Vancouver, ISO, and other styles
4

Kwok, Sai Ho. "DRM Technology for Mobile Multimedia." In Encyclopedia of Information Science and Technology, First Edition, 918–23. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch161.

Full text
Abstract:
Mobile multimedia has been promoted as a promising service and application in mobile e-commerce (m-commerce) by many mobile operators and mobile service providers, when high-speed mobile networks are expected to take off in the near future. However, at present, mobile multimedia is still in its infancy, accessed by relatively low-end mobile devices with limited bandwidth and resources. A typical example is Orange in Hong Kong which launched a low-grade multimedia service in 2000 to test the market with current mobile technologies. Due to the physical constraints of a 2.5G mobile network, audio broadcast is the best service that the network can offer up to date. However, in the near future, when advanced mobile networks and technologies become available, higher demands will be placed on the quality of mobile multimedia services. Such services support both audio and video data, for example, video conferencing, music video, video-on-demand and so on. Rights management deserves more serious concern because intellectual property of distributed multimedia content is as valuable as a company’s physical assets (Doherty, 2002). This will become even more important when mobile multimedia services become marketable and an essential part of the business. The purpose of a digital rights management (DRM) system is to allow owners of digital assets (movies, songs) to distribute their products/services/contents electronically in a controlled way (Peinado, 2002). DRM technology makes various online payment schemes possible, such as pay-per-view, pay-per-download, pay-per-game and so on. Hence, mobile service providers are able to control end users’ use of, and accessibility to, their products, and stand to gain huge profits from this capability with the DRM technology (Foroughi, Albin, & Gillard, 2002). A successful DRM system should address both business and technical issues (Grab, 2002), but this chapter only addresses and presents issues in the technical side due to the nature of this book. We present some critical issues of mobile DRM for mobile multimedia. A proposal of mobile DRM framework is presented to meet the urgent DRM needs with the existing 2.5G mobile technology. This chapter is concluded by presenting future directions of mobile DRM for mobile multimedia.
APA, Harvard, Vancouver, ISO, and other styles
5

Kangu, Maureen Adhiambo, Alexander Katuta Kyule, and Adrian Bosire Mosoti. "Reaching Consumers Through Video Marketing in Africa by Enhancing Industrial Growth and the Realization of SDGs and African Agenda 2063." In Advances in Electronic Government, Digital Divide, and Regional Development, 151–68. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6471-4.ch008.

Full text
Abstract:
This study sought to find out the effect of video marketing as a strategy to create awareness on industrial goods and services in order to promote trade in Africa and alleviate poverty in line with the SDGs and the African Agenda 2063. Video marketing involves the use of product content in the form of videos so as to promote a brand, product, or service. An online survey used Google Forms to collect primary data. The respondents answered the questions from web browsers of their choice. Descriptive statistics were used to analyze the data. The study found that most internet users preferred to access the internet via their smartphones and that they usually downloaded entire videos and other advertisements. In addition, a majority preferred You Tube and Instagram. The study recommends the use of you tube and Instagram to advertise goods within the East African market.
APA, Harvard, Vancouver, ISO, and other styles
6

Maso, Joan, Alaitz Zabala Torres, and Peter Baumann. "New Model for Geospatial Coverages in JSON." In Advances in Data Mining and Database Management, 316–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8446-9.ch015.

Full text
Abstract:
Map browsers currently in place present maps and geospatial information using common image formats such as JPEG or PNG, usually created from a service on demand. This is a clear approach for a simple visualization map browser but prevents the browser from modifying the visualization since the content of the image file represents the intensity of colors of each pixel. In a desktop GIS, a coverage dataset is an array of values quantifying a certain property in each pixel of a subdomain of the space. The standard used to describe and distribute coverages is called web coverage service (WCS). Traditionally, encoding of coverages was too complex for map browsers implemented in JavaScript, relegating the WCS to a data download, a process that creates a file that will be later used in a desktop GIS. The combination of a coverage implementation schema in JSON, binary arrays, and HTML5 canvas makes it possible that web map browsers can be directly implemented in JavaScript.
APA, Harvard, Vancouver, ISO, and other styles
7

Perzanowski, Aaron, and Jason Schultz. "Copies, Clouds, and Streams." In The End of Ownership. The MIT Press, 2016. http://dx.doi.org/10.7551/mitpress/9780262035019.003.0003.

Full text
Abstract:
This chapter outlines three major transformations in how consumers acquire copyrighted content, and the gradual erosion of ownership rights that accompanied them. Historically, copyrighted works were distributed through tangible copies. In the early 2000s, the first transformation took place through the rise of digital downloads. Second, remote cloud storage allowed consumers to access remote copies through high-speed data connections. The third major shift, to subscription streaming services, is now underway. With each step in this progression, consumers have sacrificed permanence and stability for lower prices and convenience. More importantly, copyright law has failed to keep up with the development of these new technologies. Copyright law has focused on the copy/work distinction to delineate the rights of copyright holders and consumers, but the traditional tangible copy is disappearing from the marketplace.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Content download services"

1

Kodama, Mei. "A Video Content Management System for Contents Download Services." In 2006 IEEE International Conference on Electro/Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/eit.2006.252197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

de Fez, Ismael, Francisco Fraile, Roman Belda, and Juan Carlos Guerri. "Evaluation of adaptive LDPC AL-FEC codes for content download services." In 2011 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 2011. http://dx.doi.org/10.1109/icme.2011.6011980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei, Dengwen, Zaobin Gan, and Xiongbo Xia. "A Unified Framework for Digital Content Management Business Model-Ring-Tone Download as Case Study." In 2008 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2008. http://dx.doi.org/10.1109/apscc.2008.176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lavender, John, and Courtney McAllister. "Comparison and Review of 17 E-Book Platforms." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317162.

Full text
Abstract:
The University of Michigan Press, with support from the Mellon Foundation, asked John Lavender, of Lavender Consulting, to conduct a review of the American Council of Learned Societies (ACLS) Humanities E-Book collection (HEB) following its launch on Michigan’s new Fulcrum platform. ACLS-HEB is an online collection of over 5,400 high-quality humanities books from over 100 publishers. Now that the market for e-books has matured, part of the review was a comparative study of e-book platforms run by publishers, university presses and e-book vendors; 17 platforms were selected. The review looked at the key features offered by each platform, how they handled searching, content delivery, displaying results, ability to view and download and other key features, there was no attempt to judge the value of the content. Following this review, Michigan Press felt that it would be beneficial to share the results with the wider community. As well as being of interest to publishers, the review will also be relevant for librarians making purchasing decisions and vendors selling e-book services. In addition to synthesizing the results of the e-book platform review, this paper presents a librarian’s perspectives on e-book assessment criteria. Courtney McAllister, Electronic Resources Librarian at Yale University’s Law Library, describes the importance of attributes such as accessibility compliance, library branding, and metadata. Library collections are shaped by a plethora of concerns and criteria. This paper seeks to outline some key elements to consider as part of e-book platform decision-making.
APA, Harvard, Vancouver, ISO, and other styles
5

Resende, Júlio, Igor Moraes, Nícollas Silva, Vinícius Durelli, Diego Dias, and Leonardo Rocha. "A Survey and a Preliminary Evaluation of Low-quality Content Detection Strategies: Which Attributes Are Still Relevant, Which Are Not?" In VII Symposium on Knowledge Discovery, Mining and Learning. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/kdmile.2019.8784.

Full text
Abstract:
Online social networks have gone mainstream: millions of users have come to rely on the wide range of services provided by social networks. However, the ease use of social networks for communicating information also makes them particularly vulnerable to social spammers, i.e., ill-intentioned users whose main purpose is to degrade the information quality of social networks through the proliferation of different types of malicious data (e.g., social spam, malware downloads, and phishing) that are collectively called low-quality content or spams. Since Twitter is also rife with low-quality content, several researchers have devised various low-quality detection strategies that inspect tweets for the existence of spam contents. We carried out a literature survey of these low-quality detection strategies, examining which strategies are still applicable in the current scenario – taken into account that Twitter has undergone a lot of changes in the last few years. To gather some evidence of the usefulness of the attributes used by the low-quality detection strategies, we carried out a preliminary evaluation of these attributes.
APA, Harvard, Vancouver, ISO, and other styles
6

"Changing Paradigms of Technical Skills for Data Engineers." In InSITE 2018: Informing Science + IT Education Conferences: La Verne California. Informing Science Institute, 2018. http://dx.doi.org/10.28945/4001.

Full text
Abstract:
Aim/Purpose: [This Proceedings paper was revised and published in the 2018 issue of the journal Issues in Informing Science and Information Technology, Volume 15] This paper investigates the new technical skills that are needed for Data Engineering. Past research is compared to new research which creates a list of the 20 top tech-nical skills required by a Data Engineer. The growing availability of Data Engineering jobs is discussed. The research methodology describes the gathering of sample data and then the use of Pig and MapReduce on AWS (Amazon Web Services) to count occurrences of Data Engineering technical skills from 100 Indeed.com job advertisements in July, 2017. Background: A decade ago, Data Engineering relied heavily on the technology of Relational Database Management Sys-tems (RDBMS). For example, Grisham, P., Krasner, H., and Perry D. (2006) described an Empirical Soft-ware Engineering Lab (ESEL) that introduced Relational Database concepts to students with hands-on learning that they called “Data Engineering Education with Real-World Projects.” However, as seismic im-provements occurred for the processing of large distributed datasets, big data analytics has moved into the forefront of the IT industry. As a result, the definition for Data Engineering has broadened and evolved to include newer technology that supports the distributed processing of very large amounts of data (e.g. Hadoop Ecosystem and NoSQL Databases). This paper examines the technical skills that are needed to work as a Data Engineer in today’s rapidly changing technical environment. Research is presented that re-views 100 job postings for Data Engineers from Indeed (2017) during the month of July, 2017 and then ranks the technical skills in order of importance. The results are compared to earlier research by Stitch (2016) that ranked the top technical skills for Data Engineers in 2016 using LinkedIn to survey 6,500 peo-ple that identified themselves as Data Engineers. Methodology: A sample of 100 Data Engineering job postings were collected and analyzed from Indeed during July, 2017. The job postings were pasted into a text file and then related words were grouped together to make phrases. For example, the word “data” was put into context with other related words to form phrases such as “Big Data”, “Data Architecture” and “Data Engineering”. A text editor was used for this task and the find/replace functionality of the text editor proved to be very useful for this project. After making phrases, the large text file was uploaded to the Amazon cloud (AWS) and a Pig batch job using Map Reduce was leveraged to count the occurrence of phrases and words within the text file. The resulting phrases/words with occurrence counts was download to a Personal Computer (PC) and then was loaded into an Excel spreadsheet. Using a spreadsheet enabled the phrases/words to be sorted by oc-currence count and then facilitated the filtering out of irrelevant words. Another task to prepare the data involved the combination phrases or words that were synonymous. For example, the occurrence count for the acronym ELT and the occurrence count for the acronym ETL were added together to make an overall ELT/ETL occurrence count. ETL is a Data Warehousing acronym for Extracting, Transforming and Loading data. This task required knowledge of the subject area. Also, some words were counted in lower case and then the same word was also counted in mixed or upper case, thus producing two or three occur-rence counts for the same word. These different counts were added together to make an overall occur-rence count for the word (e.g. word occurrence counts for Python and python were added together). Fi-nally, the Indeed occurrence counts were sorted to allow for the identification of a list of the top 20 tech-nical skills needed by a Data Engineer. Contribution: Provides new information about the Technical Skills needed by Data Engineers. Findings: Twelve of the 20 Stitch (2016) report phrases/words that are highlighted in bold above matched the tech-nical skills mentioned in the Indeed research. I considered C, C++ and Java a match to the broader cate-gory of Programing in the Indeed data. Although the ranked order of the two lists did not match, the top five ranked technical skills for both lists are similar. The reader of this paper might consider the skills of SQL, Python, Hadoop/HDFS to be very important technical skills for a Data Engineer. Although the programming language R is very popular with Data Scientists, it did not make the top 20 skills for Data Engineering; it was in the overall list from Indeed. The R programming language is oriented towards ana-lytical processing (e.g. used by Data Scientists), whereas the Python language is a scripting and object-oriented language that facilitates the creation of Data Pipelines (e.g. used by Data Engineers). Because the data was collected one year apart and from very different data sources, the timing of the data collection and the different data sources could account for some of the differences in the ranked lists. It is worth noting that the Indeed research ranked list introduced the technical skills of Design Skills, Spark, AWS (Amazon Web Services), Data Modeling, Kafta, Scala, Cloud Computing, Data Pipelines, APIs and AWS Redshift Data Warehousing to the top 20 ranked technical skills list. The Stitch (2016) report that did not have matches to the Indeed (2017) sample data for Linux, Databases, MySQL, Business Intelligence, Oracle, Microsoft SQL Server, Data Analysis and Unix. Although many of these Stitch top 20 technical skills were on the Indeed list, they did not make the top 20 ranked technical skills. Recommendations for Practitioners: Some of the skills needed for Database Technologies are transferable to Data Engineering. Recommendation for Researchers: None Impact on Society: There is not much peer reviewed literature on the subject of Data Engineering, this paper will add new information to the subject area. Future Research: I'm developing a Specialization in Data Engineering for the MS in Data Science degree at our university.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography