A Scalable Microblogs Data Management System

Total Page:16

File Type:pdf, Size:1020Kb

A Scalable Microblogs Data Management System View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Minnesota Digital Conservancy Kite: A Scalable Microblogs Data Management System A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Amr Magdy Ahmed IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Doctor of Philosophy Mohamed F. Mokbel June, 2017 c Amr Magdy Ahmed 2017 ALL RIGHTS RESERVED Acknowledgements There are many people that have earned my gratitude for their contribution to my time in graduate school. I am extremely thankful to my parents for supporting me over the years. Without their support, it was very hard to reach this stage in my graduate studies and career. My doctoral adviser Mohamed Mokbel is the main contributor to all accomplishments I have achieved during the last six years. His guidance, efforts, spirit, time, and commitment were key elements that significantly contributed positively to my graduate school experience. I am also grateful to my collaborators Sameh Elnikety, Yuxiong He, Suman Nath, Ahmed Aly, Walid Aref, Sohaib Ghani, and Thanaa Ghanem. Their efforts and collabo- rative work turned my research into reality. I also thank my lab mates for collaborating with me on exciting research ideas that greatly enriched my research and mentoring experience. In particular, Mohamed Sarwat, Jie Bao, Ahmed Eldawy, Mashaal Musleh, Louai Alarabi, Rami Alghamdi, Saif Al-Harthi and Christopher Jonathan. Finally, I thank my close social circle that supported me throughout my PhD journey. In particular, my wife, Reem, my son, Yousof, and my family friends, Hesham, Eman, Ibrahim, Ahmed, Sara, Jana, Heba, Eyad, and Sara. i Dedication To my lord, adviser, parents, wife, and kids. ii Abstract Developers, researchers, and practitioners have been building a myriad of appli- cations to analyze microblogs data, e.g., tweets, online reviews, and user comments. Examples of such applications include citizen journalism, events detection and analysis, geo-targeted advertising, medical research, and studying social influences in social sci- ences. Building such applications require data management infrastructure to deal with microblogs, including data digestion, indexing, and main-memory management. The lack of such infrastructure hinders the scalability and the widespread of such applica- tions especially among users who are not computer scientists. This thesis proposes Kite; an end-to-end system that is able to manage microblogs data at a large scale. Using Kite, developers and practitioners can simply write SQL- like queries without worrying about the internal data management issues. Internally, Kite is equipped with scalable indexing and main-memory management techniques to support top-k temporal, spatial, keyword, and trending queries on both very recent data and historical data. Kite indexer supports scalable digestion and retrieval for incoming fast data in real time. Recent data are digested in efficient main-memory index structures. Kite in-memory index structure are able to scale up a single machine indexing capabilities to handle the overwhelming amount of data in real time. Mean- while, Kite memory manager is monitoring the memory contents and smartly decides on which data is regularly moved to disk. This is accomplished through effective mem- ory flushing policies that are designed for top-k query workloads, which are popular on microblogs data. Both in-memory and in-disk data are queried seamlessly through efficient retrieval techniques that are encapsulated in Kite query processor. The query processor exploits the top-k ranking function to early prune the search space and reduce the query latency significantly. Kite is open-sourced and available to the community to build on (http://kite.cs.umn.edu). Extensive experimentation on different Kite compo- nents show the efficiency and the effectiveness of the proposed techniques to manage microblogs data at scale. iii Contents Acknowledgements i Dedication ii Abstract iii List of Figures vii 1 Introduction 1 1.1 KiteSystemOverview ............................ 8 1.1.1 MemoryIndexer ........................... 8 1.1.2 DiskIndexer ............................. 9 1.1.3 QueryProcessor ........................... 9 1.2 SupportedQueries .............................. 10 1.3 QueryLanguage ............................... 14 1.4 ThesisOrganization ............................. 15 2 Indexing 17 2.1 Main-memoryIndexing ........................... 19 2.1.1 In-memoryKeywordIndex . 20 2.1.2 In-memorySpatialIndex . 20 2.2 Disk-basedIndexing ............................. 26 2.3 FlushingManagement ............................ 28 2.4 ExperimentalEvaluation. 28 2.4.1 ExperimentalSetup . .. .. .. .. .. .. 28 iv 2.4.2 Real-timeIndexingPerformance . 29 3 Main-memory Management 31 3.1 FlushingPoliciesOverview . 32 3.2 ManagingKiteSpatialIndexMemory . 34 3.2.1 SpatialIndexSizeTuning . 35 3.2.2 SpatialIndexLoadShedding . 40 3.2.3 SpatialIndexAdaptiveLoadShedding . 42 3.3 ManagingKiteKeywordIndexMemory . 47 3.3.1 kFlushingPolicy ........................... 51 3.3.2 ExtensibilityofkFlushing . 58 3.4 ExperimentalEvaluation. 63 3.4.1 ExperimentalSetup . .. .. .. .. .. .. 63 3.4.2 Evaluating Managing Spatial Index Memory . 65 3.4.3 Evaluating Managing Keyword Index Memory . 73 4 Query Processing 83 4.1 QueryProcessorOverview. 83 4.2 ProcessingSpatialQueries. 85 4.2.1 QueryDataStructure . 86 4.2.2 TheInitializationPhase . 86 4.2.3 ThePruningPhase.......................... 87 4.3 ProcessingKeywordQueries. 88 4.4 ProcessingSpatial-KeywordQueries . 89 4.5 Processing Queries on Arbitrary Attributes . ...... 90 4.6 ExperimentalEvaluation. 90 5 Trend Discovery 95 5.1 TrendingMeasures .............................. 97 5.1.1 RateofIncreaseMeasure . 98 5.1.2 WeightedCountMeasure . 100 5.2 TrendingIndexing .............................. 101 5.2.1 IndexStructure............................ 102 v 5.2.2 IndexInsertion ............................ 103 5.2.3 DataExpiration ........................... 105 5.3 MemoryOptimization ............................ 107 5.3.1 TrendMem KeyIdeas....................... 108 5.3.2 TrendMem Technique....................... 109 5.4 TrendingQueryProcessing . 111 5.5 ExperimentalEvaluation. 112 5.5.1 Evaluation of TrendMem ...................... 113 5.5.2 Evaluation of Trending Query Processing . 115 6 Related Work 119 6.1 MicroblogsDataAnalysis . 120 6.2 MicroblogsDataManagement. 122 6.3 MicroblogsDataVisualization. 124 6.4 MicroblogsSystems.............................. 124 7 Conclusions 127 References 129 vi List of Figures 1.1 Kite SystemOverview............................. 8 2.1 Kite In-memorySegmentedIndex. 19 2.2 Main-memoryspatialindexsegment. 21 2.3 Kite DiskSpatialIndex. ........................... 25 2.4 Spatialindexinsertiontime.. 29 3.1 kFlushingmainidea ............................. 50 3.2 FlushingExample .............................. 52 3.3 Memoryconsumptionbehavior . 55 3.4 Example of Multiple-Keyword Extension of kFlushing .......... 61 3.5 Spatial index insertion time - reduced index sizes. ......... 66 3.6 Effect of T onindexstoragevs. queryaccuracy . 67 3.7 Effect of α onindexstoragevs. queryaccuracy . 68 3.8 Effect of β onindexstoragevs. queryaccuracy . 69 3.9 Effect of α on index storage vs. query accuracy - adaptive . 70 3.10 Effect of adaptive load shedding on query latency . ....... 71 3.11 Ranking effect on storage vs. accuracy varying T ............. 72 3.12 Ranking effect on storage vs. accuracy varying α ............. 72 3.13 Ranking effect on storage vs. accuracy varying β ............. 73 3.14 NumberofMemory-hitKeywords. 75 3.15 HitRatioonCorrelatedQueryLoad . 77 3.16 HitRatioonUniformQueryLoad . 78 3.17 Flushing Overhead vs. k ........................... 79 3.18 kFlushing PerformanceonSpatialAttribute . 80 3.19 kFlushing PerformanceonUserAttribute . 81 vii 4.1 Microblogsqueryingenvironment . 84 4.2 QueryProcessingOverview . 85 4.3 Averagequerylatency.. 91 4.4 Rankingeffectonquerypruning . 93 5.1 GeoTrend indexstructureandcellcontents. 102 5.2 Example of GeoTrend index insertion and expiration. 104 5.3 Zipf distribution of Twitter keywords at different spatiallevels. 108 5.4 Impact of GeoTrend memoryoptimizationmodule. 114 5.5 Impact of keyword replication across GeoTrend indexlevels. 115 5.6 Impact of maintaining top-k lists....................... 117 6.1 MicroblogsResearchTimeline. 120 viii Chapter 1 Introduction The last decade has witnessed an explosive growth in the user-generated contents on the web, including discussion forums, blogs, wikis, videos, and more recently Microblogs. Microblogs is a comprehensive title that describes the micro-length chunks of user- generated data that are posted on the web every second. This includes tweets, online user reviews, user comments, and user check-ins. This data easy-to-produce by a user, who can produce a tweet or a comment in just few seconds, and thus it comes liter- ally in thousands of records every second. Everyday, 288+ Million active Twitter users generate 500+ Million tweets [1], while 1.39+ Billion Facebook users post 3.2+ Billion comments [2]. The vast majority of microblogging activity comes from mobile users, specifically, 80+% of Twitter users and 85+% of Facebook users are mobile. Such large number of data records carry very rich user-generated contents such as news, opinions, discussions, as well as meta data including location information, language information, and personal information. The rich content and the popularity of microblogging plat- forms results
Recommended publications
  • Mobile + Cloud Apps What Does Hawaii Offer?
    cloud in the palm of your hands Victor Bahl 7.28.2011 mobile phone market IDC FY12 forecast 518 million SmartPhones sold world-wide • More smartphones shipped than PCs in FY11 Q2 (101M vs. 92M) WW Mobile Phone Device Shipments Billions 1.8 1.7 1.6 1.6 1.5 1.4 40% 1.4 1.3 37% 1.2 1.2 33% 29% 1.0 26% 0.8 24% 0.6 0.4 0.2 0.0 2009 2010 2011 2012 2013 2014 Other Mobile Phones Smartphones Source: IDC, iSuppli, Gartner, Accenture analysis. sad reality of mobile computing hardware limitations . vs. static elements of same era (desktops, servers) . weight, power, size constraints . CPU, memory, display, keyboard wireless communication uncertainty . bandwidth / latency variation . intermittent connectivity . may cost real money, require service agreements finite energy source . actions may be slowed or deferred . wireless communication costs energy why resource poverty hurts . No “Moore’s Law” for human attention . Being mobile consumes human attention . Already scarce resource is further taxed by resource poverty Human Attention Human Adam & Eve 2000 AD Reduce demand on human attention • Software computing demands not rigidly constrained • Many “expensive” techniques become a lot more useable when mobile Some examples • machine learning, activity inferencing, context awareness • natural language translation, speech recognition, Vastly superior mobile • computer vision, context awareness, augmented reality user experience • reuse of familiar (non-mobile) software environments Clever exploitation needed to deliver these benefits Courtesy. M. Satya, CMU battery trends Li-Ion Energy Density • Lagged behind o Higher voltage batteries (4.35 250 V vs. 4.2V) – 8% improvement o Silicon anode adoption (vs.
    [Show full text]
  • Artificial Intelligence, Big Data and Cloud Computing 144
    Digital Business and Electronic Digital Business Models StrategyCommerceProcess Instruments Strategy, Business Models and Technology Lecture Material Lecture Material Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] Prof. Dr. Bernd W. Wirtz Chair for Information & Communication Management German University of Administrative Sciences Speyer Freiherr-vom-Stein-Straße 2 DE - 67346 Speyer- Email: [email protected] © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 1 Table of Contents I Page Part I - Introduction 4 Chapter 1: Foundations of Digital Business 5 Chapter 2: Mobile Business 29 Chapter 3: Social Media Business 46 Chapter 4: Digital Government 68 Part II – Technology, Digital Markets and Digital Business Models 96 Chapter 5: Digital Business Technology and Regulation 97 Chapter 6: Internet of Things 127 Chapter 7: Artificial Intelligence, Big Data and Cloud Computing 144 Chapter 8: Digital Platforms, Sharing Economy and Crowd Strategies 170 Chapter 9: Digital Ecosystem, Disintermediation and Disruption 184 Chapter 10: Digital B2C Business Models 197 © Bernd W. Wirtz | Digital Business and Electronic Commerce | May 2021 – Page 2 Table of Contents II Page Chapter 11: Digital B2B Business Models 224 Part III – Digital Strategy, Digital Organization and E-commerce 239 Chapter 12: Digital Business Strategy 241 Chapter 13: Digital Transformation and Digital Organization 277 Chapter 14: Digital Marketing and Electronic Commerce 296 Chapter 15: Digital Procurement 342 Chapter 16: Digital Business Implementation 368 Part IV – Digital Case Studies 376 Chapter 17: Google/Alphabet Case Study 377 Chapter 18: Selected Digital Case Studies 392 Chapter 19: The Digital Future: A Brief Outlook 405 © Bernd W.
    [Show full text]
  • US 'To Cut Immigrant Detention'
    Internet News Record 06/10/09 - 06/10/09 LibertyNewsprint.com U.S. Edition The First Draft: David Letterman and US 'to cut immigrant the Dalai Lama detention' By Deborah Zabarenko (Front Serious subjects, all of them. (BBC News | Americas | World violent crimes, the New York Row Washington) And what was the top story on the Edition) Times reported. Submitted at 10/6/2009 6:11:02 AM morning network newscasts? Ten Submitted at 10/6/2009 7:41:54 AM "Serious felons deserve to be in points if you guessed the natural the prison model," Ms Napolitano This is one of those Washington choice: David Letterman’s sex US officials are expected to told the newspaper. days that seems to defy a theme. life. announce plans that would allow "But there are others. There are Consider: What does this say about illegal immigrants not considered women. There are children." Iran is the topic at the Senate Washington? The U.S. media? a threat to be taken out of jails, Proposals for using alternatives Banking Committee, where The public appetite for scandal? reports say. to prison detention are expected to officials from the State and Let us know what you think. The new policy would list be submitted to Congress in the Treasury departments are set to Click here for more Reuters immigrants according to the risk coming weeks. testify on economic sanctions political coverage they may pose, the Wall Street The Wall Street Journal cited against Tehran. Photo credits: Journal reports. officials as saying the Afghanistan is expected to be REUTERS/Christinne Muschi Detainees who are not criminals administration would ask the front and center when President (exiled Tibetan spiritual leader the could be kept in hotels and private sector for ideas, including Barack Obama briefs Dalai Lama, Montreal, Canada, nursing homes, according to leaks for the construction of model congressional leaders about his October 3, 2009) of the plans.
    [Show full text]
  • Understanding User Satisfaction with Intelligent Assistants
    Understanding User Satisfaction with Intelligent Assistants Julia Kiseleva1;∗ Kyle Williams2;∗ Ahmed Hassan Awadallah3 Aidan C. Crook3 Imed Zitouni3 Tasos Anastasakos3 1Eindhoven University of Technology, [email protected] 2Pennsylvania State University, [email protected] 3Microsoft, {hassanam, aidan.crook, izitouni, tasos.anastasakos}@microsoft.com ABSTRACT Q1: how is the weather in Chicago User’s dialog Voice-controlled intelligent personal assistants, such as Cortana, Q2: how is it this weekend with Cortana: (A) Task is “Finding a Google Now, Siri and Alexa, are increasingly becoming a part of Q3: find me hotels in Chicago hotel in Chicago” users’ daily lives, especially on mobile devices. They allow for a Q4: which one of these is the cheapest radical change in information access, not only in voice control and Q5: which one of these has at least 4 stars touch gestures but also in longer sessions and dialogues preserving context, necessitating to evaluate their effectiveness at the task or Q6: find me direc>ons from the Chicago airport to number one session level. However, in order to understand which type of user User’s dialog Q1: find me a pharmacy nearby interactions reflect different degrees of user satisfaction we need with Cortana: (B) explicit judgements. In this paper, we describe a user study that Q2: which of these is highly rated Task is “Finding a pharmacy” was designed to measure user satisfaction over a range of typical Q3: show more informa>on about number 2 scenario’s of use: controlling a device, web search, and structured Q4: how long will it take me to get there search dialog.
    [Show full text]
  • Keith Drummond (561) 846­0337 [email protected] Drummond [email protected]
    Keith Drummond (561) 846­0337 www.Keith­Drummond.com [email protected] [email protected] OBJECTIVE ​ Result Driven Application Developer with end to end experience ​ seeking a position as a Web, Data services developer. Specialties ● Programming ­ C#, JAVASCRIPT, Reactjs, ANGULARJS, ASP.NET MVC, WebApi ● Database Management ­ Microsoft SQL Server, MYSQL, NoSql ● Database Programming ­ T­SQL, SSIS, PL­SQL ● OS Administration ­ Windows 3.1 ­ Windows 8.1, Windows Server 2000­2012 ● PC and Network Hardware ­ New systems and upgrades / repairs ● Skillful Debugger/Trouble shooter ● Test Driven Development, and Unit Testing SUMMARY ● 7 Years’ experience in Software Development and QA Testing ● Comfortable in Agile development with scrum environment ● Strong knowledge of relational databases and IT Systems. ● In Depth hands on experienced with Server Management Studio 2005­2014. ● Expert Knowledge in upgrading custom software and defect management ● Worked as group member in all parts of the software development lifecycle including requirements, analysis, work breakdown, estimating, design, coding, bug fixes, and release management. EXPERIENCE DETAIL Senior Application Developer Consultant AAA Auto Club South September 2015 ­ Present Tampa, Fl ● 4 month Contract to hire, Moved to permanent role Jan 2016 ● Lead Developer on Insurance Lead Retrieval Web Application ● Migrated .Net3.5 Web Form Insurance application to ReactJS/MVC5/Entity Framework 6 web Application. ● Started automated unit testing environment used during post deployment
    [Show full text]
  • Text 5 Software
    Text 5 Software Software, consisting of programs, enables a computer to perform specific tasks, as opposed to its physical components (hardware) which can only do the tasks they are mechanically designed for. 5.1 Categories of Software Two general categories of software are showed in Figure I-5-1. Figure I-5-1 Categories of Software Other examples of software include: • Programming languages define the syntax and semantics of computer programs. For example, Pascal, C, C++, VB/VB.NET, C#, Java, etc. • Middleware controls and co-ordinates distributed systems. Middleware is computer software that connects software components or some people and their applications. The software consists of a set of services that allows multiple processes running on one or more machines to interact. This technology evolved to provide for interoperability in support of the move to coherent distributed architectures, which are most often used to 51 Part I Knowledge Points(第一部分 知识点) support and simplify complex distributed applications. It includes web servers, application servers, and similar tools that support application development and delivery. Middleware is especially integral to modern information technology based on XML, SOAP, Web services, and service-oriented architecture. • Testware is software for testing hardware or a software package. Generally speaking, Testware is a sub-set of software with a special purpose, that is, for software testing, especially for software testing automation. Testware is produced by both verification and validation testing methods. • Firmware is low-level software often stored on electrically programmable memory devices. Firmware is given its name because it is treated like hardware and run (“executed”) by other software programs.
    [Show full text]
  • February 12, 2010 Electronic Filing Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12Th Street, SW 12Th
    February 12, 2010 Electronic Filing Ms. Marlene H. Dortch, Secretary Federal Communications Commission 445 12th Street, SW 12th Street Lobby, TW-A325 Washington, D.C. 20554 Re: Written Ex Parte Communication WT Docket No. 09-66, GN Docket No. 09-157, GN Docket No. 09-51 Dear Ms. Dortch: Much has happened over the last five months since CTIA and other industry members provided extensive evidence to the Commission on the status of competition, investment, and innovation in the wireless ecosystem. As an update to those filings and as the Commission works on completion of the 14th annual CMRS Competition Report, CTIA takes this opportunity to highlight numerous changes and upgrades to networks, handsets, applications, and even service offerings that benefit consumers. As detailed in our filings, the “virtuous cycle” of the wireless ecosystem is based on the evolution of each of these areas. Developments over the last six months demonstrate that the virtuous cycle is alive and healthy, driven by the intense competition of the industry. If you have any questions, please do not hesitate to contact me. Sincerely, /s/ Christopher Guttman-McCabe Christopher Guttman-McCabe Vice President, Regulatory Affairs CTIA – The Wireless Association® Wireless Industry Competition Update: Recent Wireless Industry Developments Regarding Innovation and Investment February 2010 Much has happened over the last five months since CTIA and other industry members provided extensive evidence to the Commission on the status of competition, investment, and innovation in the wireless ecosystem.1 As an update to those filings and as the Commission works on completion of the 14th annual CMRS Competition Report, CTIA takes this opportunity to highlight numerous changes and upgrades to networks, handsets, applications, and even service offerings that benefit consumers.
    [Show full text]
  • Bing - Webmaster Tools
    Bing - Webmaster Tools Bing webmaster tools Sign In Want more users for your site? Sign In New to Webmaster? Sign Up Sign up now and receive a 100 USD search advertising credit from Microsoft Advertising. Terms and Conditions apply Get insights into your site Dashboard Reporting Tools Leverage your dashboard for the sites you Understanding what leads people to your site can manage. Get a summary view of how well your site help you understand what to focus on to increase is performing and identify what needs emphasis traffic. Our detailed reports help you with this Diagnostic Tools Notifications https://www.bing.com/toolbox/webmaster/[27.08.2019 12:41:45] Bing - Webmaster Tools Our diagnostic and research tools give you Stay on top of messages and alerts for your sites. information on what people are searching for and Subscribe for notifications or use the notifications what areas to expand on next console to manage your site notifications Do more with your site Bing Webmaster provides easy-to-use public tools to help you do more with your site. No sign in required. Mobile Friendly Verify Bing Bot Check if your site is mobile friendly with the Check if requests to your site are from genuine Bing Mobile Friendliness tool BingBot IPs New to Webmaster? Sign up now and receive a 100 USD search advertising credit from Microsoft Advertising. Terms and Conditions apply Sign Up https://www.bing.com/toolbox/webmaster/[27.08.2019 12:41:45] Bing - Webmaster Tools Know more about Webmaster Guidelines API The Bing Webmaster guidelines cover a broad
    [Show full text]
  • Microsoft from Wikipedia, the Free Encyclopedia Jump To: Navigation, Search
    Microsoft From Wikipedia, the free encyclopedia Jump to: navigation, search Coordinates: 47°38′22.55″N 122°7′42.42″W / 47.6395972°N 122.12845°W / 47.6395972; -122.12845 Microsoft Corporation Public (NASDAQ: MSFT) Dow Jones Industrial Average Type Component S&P 500 Component Computer software Consumer electronics Digital distribution Computer hardware Industry Video games IT consulting Online advertising Retail stores Automotive software Albuquerque, New Mexico Founded April 4, 1975 Bill Gates Founder(s) Paul Allen One Microsoft Way Headquarters Redmond, Washington, United States Area served Worldwide Key people Steve Ballmer (CEO) Brian Kevin Turner (COO) Bill Gates (Chairman) Ray Ozzie (CSA) Craig Mundie (CRSO) Products See products listing Services See services listing Revenue $62.484 billion (2010) Operating income $24.098 billion (2010) Profit $18.760 billion (2010) Total assets $86.113 billion (2010) Total equity $46.175 billion (2010) Employees 89,000 (2010) Subsidiaries List of acquisitions Website microsoft.com Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions. Established on April 4, 1975 to develop and sell BASIC interpreters for the Altair 8800, Microsoft rose to dominate the home computer operating system (OS) market with MS-DOS in the mid-1980s, followed by the Microsoft Windows line of OSes. Microsoft would also come to dominate the office suite market with Microsoft Office. The company has diversified in recent years into the video game industry with the Xbox and its successor, the Xbox 360 as well as into the consumer electronics market with Zune and the Windows Phone OS.
    [Show full text]
  • RESUMEN Esta Tesis, Enfoca Básicamente Lo Referente Al Valor
    UNIVERSIDAD DE CUENCA RESUMEN Esta tesis, enfoca básicamente lo referente al valor probatorio de los documentos electrónicos en la Legislación Ecuatoriana, pues para que un documento electrónico sea considerado prueba debe cumplir ciertos requisitos como inalterabilidad, autenticidad y no repudio, estos entre los principales. Se aborda además la importancia que tiene el uso de la Firma Electrónica Avanzada, que no hace otra cosa que garantizar la autenticidad de quien suscribe el documento. Analizamos también lo atinente al Contrato Electrónico, que se ha constituido en el resultado del Comercio Electrónico, nueva forma de negociación que apareció décadas a tras pero que empieza a tomar fuerza preponderante en las relaciones mercantiles. Sistematizamos el ordenamiento jurídico con el que cuenta el Ecuador y relacionado con el Documento Electrónico, cuerpos legales tales como la Ley de Comercio Electrónico, Firmas Electrónicas y Mensajes de Datos del Ecuador, con su respectivo reglamento, que observan y dan pautas plenas referentes a los documentos electrónicos, y normas como las contenidas en el Código Orgánico de la Función Judicial, Código de Procedimiento Civil, entre otras citadas consultadas, que colaboran para guiar de manera eficiente el ejercicio procesal del derecho informático. Se incluye también todo lo referente a las consideraciones que la Norma Suprema hace en relación a las TICs (Tecnologías de la Comunicación y la Información). Alumna: Marcia Fernanda Cedillo Díaz 1 UNIVERSIDAD DE CUENCA Para finalizar se hacen algunas sugerencias y conclusiones en referencia con el tema abordado en la presente tesis, recalcando el compromiso permanente de las Universidades para la enseñanza adecuada del Derecho Informático. Palabras Claves: Prueba Electrónica, TICS, Valor Probatorio, Consideraciones Constitucionales, Requisitos, Contrato Electrónico, Documento Público, Documento Privado.
    [Show full text]
  • Mobile Computing
    2/11/18 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Location-based Services: Definition LBS: A certain service that is offered to the users based on their locations. Convergence of Technologies GIS/ Spatial Database Web GIS Mobile GIS LBS Mobile Devices Internet Mobile Internet 1 2/11/18 History • The main origin of Location-Based Services (LBS) was the E911 (Enhanced 911) mandate, which the U.S. government passed in 1996. • The mandate was for mobile-network operators to locate emergency callers with prescribed accuracy, so that the operators could deliver a caller’s location to Public Safety Answering Points. • Cellular technology couldn’t fulfill these accuracy demands back then, so operators started enormous efforts to introduce advanced positioning methods. History • E911 Phase 1: Wireless network operators must identify the phone number and cell phone tower used by callers, within six minutes of a request by a PSAP (public safety answering point). • E911 Phase 2: • 95% of a network operator’s in-service phones must be E911 compliant (“location capable”) by December 31, 2005. • Wireless network operators must provide the latitude and longitude of callers within 300 meters, within six minutes of a request by a PSAP. History • To gain returns on the E911 investments, operators launched a series of commercial LBSs. • In most cases, these consisted of finder services that, on request, delivered to users a list of nearby points of interest, such as restaurants or gas stations. • However, most users weren’t interested in this kind of LBS, so many operators quickly phased out their LBS offerings and stopped related development efforts.
    [Show full text]
  • Towards Measuring Satisfaction with Mobile Proactive Systems
    Large-Scale Analysis of Viewing Behavior: Towards Measuring Satisfaction with Mobile Proactive Systems ∗ Qi Guo , Yang Song∗ Google Inc. 1600 Amphitheater Parkway, Mountain View, CA 94043 {qiguo, yangso}@google.com ABSTRACT Recently, proactive systems such as Google Now and Mi- crosoft Cortana have become increasingly popular in reform- ing the way users access information on mobile devices. In these systems, relevant content is presented to users based on their context without a query in the form of information cards that do not require a click to satisfy the users. As a result, prior approaches based on clicks cannot provide re- liable measurements of user satisfaction with such systems. It is also unclear how much of the previous findings regard- ing good abandonment with reactive Web searches can be applied to these proactive systems due to the intrinsic dif- ference in user intent, the greater variety of content types and their presentations. In this paper, we present the first large-scale analysis of viewing behavior based on the viewport (the visible fraction of a Web page) of the mobile devices, towards measuring Figure 1: This figure shows the variety of informa- user satisfaction with the information cards of the mobile tion cards in two proactive systems: Cortana (left) proactive systems. In particular, we identified and analyzed and Google Now (right). a variety of factors that may influence the viewing behavior, including biases from ranking positions, the types and at- 1. INTRODUCTION tributes of the information cards, and the touch interactions Proactive systems such as Google Now and Microsoft Cor- with the mobile devices.
    [Show full text]