The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sophisticated attacks on Energy Delivery Systems (EDS) are no longer theoretical, and instead pose a serious threat to American economies. The EDS community has worked collaboratively to develop security requirements to protect EDS against such attacks, but the documents that contain these requirements are often dense, ambiguous and difficult for humans to understand, resulting in highly subjective...
This study examines e-Collaboration processes within temporary and ongoing virtual team by analyzing the level gaps of these processes according to the virtual team type. A quantitative test was carried out to compare the means gaps between the two virtual team types in five common collaboration processes. Then, employing a qualitative analysis, we constructed a conceptual model to understand the...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
The process of software development is a collaborative effort that may consist of various geographically dispersed teams. It involves extensive communication over emails, intra-company forums, blogs, surveys and code reviews. The high level of message and opinion exchange evokes positive and negative emotions regarding the software project delivery. This paper proposed techniques to identify the underlying...
There is a strong focus on the use of Web Real-Time Communication (WebRTC) for many-to-many video conferencing, while the IETF working group has left the signalling issue on the application layer. The main aim of this paper is to create a novel scalable WebRTC signalling mechanism called WebNSM for many-to-many (bi-directional) video conferencing. WebNSM was designed for unlimited users over the mesh...
Provides an abstract of the tutorial presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
Collaborative document authoring between geographically distributed users is increasingly common in our professional and personal lives. Corresponding systems aim to allow for the involvement of locally unavailable specialists while connecting familiar single-user functionality with an accessible, distributed multi-user environment. However, considering the highly dynamic processing loads on modern...
In this work we discuss how useful Kalman Temporal Difference (KTD) is for the purpose of improvement of multiple model learning. By KTD we mean a learning framework by combining Kalman Filters and Temporal Difference (TD) to enhance multi-agent environment. In this approach, we have to attack dependency issues against initialization parameters: the results (quality and efficiency) heavily depend...
The web plays a crucial role in our daily life. Its openness allows users to access data around the clock. Recently, data has become more exploitable by machines due to the newly introduced mechanism of linked data, which improves the quality of published data on the web dramatically. Therefore, we have attempted to benefit from the investment, regarding data, which already exist on the web, particularly...
Technological advances in digitization with a variety of image manipulation techniques enable the creation of printed documents illegally. Correspondingly, many researchers conduct studies in determining whether the document printed counterfeit or original. This study examines the several statistical feature sets from Gray Level Co-occurrence Matrix (GLCM), Discrete Wavelet Transform (DWT), Spatial...
Version control systems (VCSs) have almost become the de facto standard for the management of open-source projects and the development of their source code. In VCSs, source code which can potentially be vulnerable is introduced to a system through what are so called commits. Vulnerable commits force the system into an insecure state. The farreaching impact of vulnerabilities attests to the importance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.