The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is nowadays an increasing pressure to develop complex web applications at a fast pace. The vast majority is built using frameworks based on third-party server-side plugins that allow developers to easily add new features. However, as many plugin developers have limited programming skills, there is a spread of security vulnerabilities related to their use. Best practices advise the use of systematic...
The abundance of educational resources available on the Web leads to information overload for the students and the difficulty in finding useful and relevant resources for a specific learning context. The solution that we propose in this paper is a platform called Edu3R (Educational Resources Retrieval and Recommendation), which relies on community filtering: students enrolled in the same course can...
Mobile software technologies have become increasingly important in building disaster response system to cope with natural and man-caused emergency situations. In this paper we present a context-aware disaster response system that analyzes the contextual information of public users and disaster environment, and then delivers customized instructions in an appropriate format to the mobile handsets of...
Emerging systems such as smart grids or intelligent transportation systems often require end-user applications to continuously send information to external data aggregators performing monitoring or control tasks. This can result in an undesirable loss of privacy for the users in exchange of the benefits provided by the application. Motivated by this trend, this paper introduces privacy concerns in...
Nowadays health concerns are effectively becoming ubiquitous. Most people have the need to effectively control their nutritional consumptions, mostly due to health issues. Personal computational devices may assist this control with a solution that allows an efficient management of each individual nutritional profile.
An automatic system to recognize and disambiguate product name mentions in user generated online content is described. The solution is based on a large number of custom made rules to make it fit for the specific setup used to measure the quality of such system. The system achieved competitive results.
Current search engine performances need to be improved because often the result suggested by search engine are determine the popularity of a given page for its associated keywords but does not match specific user expectations. Previous researches have indicated that only 20% to 45% of the common search results are relevant. The search becomes harder when the keyword used is a homographic word, and...
Regulations such as FFIEC [5] and HIPAA [6] require activities of system administration to be captured and reviewed regularly. In IT service delivery environment, system maintenance activities are usually performed by the service provider whose system administrators access customer environment based on problem and change ticket being assigned.
There is much information available, but the problem is how to find which is relevant. We present a context aware recommendation system, which recommends relevant location-based data. We study its performance within MOPSI service that includes fixed form maintained database and free form user collection.
The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This stored user profile is at risk of being hacked and exploited by the attackers. The Negative Filtering or Negative Authentication (NA) approach utilizes a form of complement profiles which resembles the censoring and maturation process of T-cells...
BBSs (Bulletin Board Systems) and Social Network Services (SNS) have been increasing in recenter years. In such systems, users can easily upload and share their own information via personal computers, and also cellular phones. However some information, such as adult content, is not appropriate for all users, notably children. Many SNS and BBS providing companies have been trying to monitor and check...
Computer-Assisted Translation (CAT) tools help a human translator in his work. Such programs maintain a database with short translated expressions, as a source of suggestions. A major problem is lack of mature applications for handling desktop publishing (DTP) files, which pose a difficulty because of their graphical diversity. In this paper we present functional and technical requirements of a system...
Collaborative filtering technology is the key technology of recommendation system. However, collaborative filtering technology has been suffering from sparsity that it needs mass ratings from users to improve precision. In traditional e-commerce, asking users to rate on their own initiative will degrade experience of users, let alone the mobile business environment. So, both in e-commerce and m-commerce,...
Recent research has shown that including context in a recommender system may improve its performance. The context-based recommendation approaches are classified as pre-filtering, post-filtering and contextual modeling. Moreover, in real e-commerce applications, collecting ratings may be quite difficult. It is possible to use purchasing frequencies instead of ratings, but little research has been done...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.