The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, software developers often utilize existing third party libraries and make use of Application Programming Interface (API) to develop a software. However, it is not always obvious which library to use or whether the chosen library will play well with other libraries in the system. Furthermore, developers need to spend some time to understand the API to the point that they can freely use the...
In recent years, social networks developed in terms of diversities, capabilities and users. Therefore, researchers in different fields have been attracted to these kind of networks. Trust management between users in these kind of networks is one of the most important research topics. In this article a new model for evaluating trust between users in social networks based on subjective logic is presented...
DBpia is the largest digital-bibliography service provider in Korea. It provides several convenience functions for researchers. DBpia users (i.e., researchers) can search for papers via several search routes such as publications, publishers, authors, and keywords. Although the researchers can exploit the search functions, they may still have a number of search results as candidate papers to read....
Computer based analysis of Electronic Health Records (EHRs) has the potential to provide major novel insights of benefit both to specific individuals in the context of personalized medicine, as well as on the level of population-wide health care and policy. The present paper introduces a novel algorithm that uses machine learning for the discovery of longitudinal patterns in the diagnoses of diseases...
Developers use many software applications to process large amounts of diverse information in their daily work. The information is usually meaningful beyond the context of an application that manages it. However, as different applications function independently, developers have to manually track, correlate and re-find cross-cutting information across separate applications. We refer to this difficulty...
As the number of IoT devices explodes, we observe numerous IoT platforms which enables us to build applications, manage, and integrate things connected to the Internet. We identify key technologies embedded in contemporary IoT platforms as follows: virtualization, restful API, database for history, visualization, and mash up. Most IoT platforms are heavy-weight in terms of software or hardware and...
Today, smart objects in Internet of Things (IOT) are able to detect their state and share it with other objects across the Internet, thus collaboratively making intelligent decisions on their own. Large number of objects is quietly introduced into the web every day. It is impossible for a user to keep a track of all objects available around him. Therefore a search engine that could find smart objects...
The advent of Web 2.0 gave birth to a new kind of application where content is generated through the collaborative contribution of many different users. This form of content generation is believed to generate data of higher quality since the “wisdom of the crowds” makes its way into the data. However, a number of specific data quality issues appear within such collaboratively generated data. Apart...
In risk-driven testing, test cases are generated and/or prioritized based on different risk measures. For example, the most basic risk measure would analyze the history of the software and assigns higher risk to the test cases that used to detect bugs in the past. However, in practice, a test case may not be exactly the same as a previously failed test, but quite similar. In this study, we define...
Over time, data warehouse (DW) schema and instances may undergo several changes reflecting the changes that occur in data sources or the emergence of new user analysis requirements. To deal with these changes and ensure the persistence of historical states of DW, we propose a multiversion DW model that ensures the temporal versioning of DW schema components as well as of its instances. Our model supports...
Nowadays, most browsers are multi tab, where the user activity is segregated in parallel sessions, one on each tab. However, the user data, including history, cookies and cache, while browsing is not similarly segregated and only accessible together. This presents difficulties for the user to access their data separately by the tab. In this paper, we seek to solve the problem by organizing tab specific...
Queries against the large size XML database are often exploratory and users often find their queries return too many answers, this paper proposed a user preference-based top-k ranking approach to deal with this “information overload” problem. We first presented a user preference model which can embody both the partial relations and the interest degree of preferences. And then, the elements orders...
Current search engine performances need to be improved because often the result suggested by search engine are determine the popularity of a given page for its associated keywords but does not match specific user expectations. Previous researches have indicated that only 20% to 45% of the common search results are relevant. The search becomes harder when the keyword used is a homographic word, and...
We propose a new method for audio-visual sensor fusion and apply it to automatic aggression detection. While a variety of definitions of aggression exist, in this paper we see it as any kind of behavior that has a disturbing effect on others. We have collected multi- and unimodal assessments by humans, who have given aggression scores on a 3 point scale. There are no trivial fusion algorithms to predict...
This paper presents a recovery algorithm for service execution failure in the context of concurrent process execution. The recovery algorithm was specifically designed to support a rule-based approach to user-defined correctness in execution environments that support a relaxed form of isolation for service execution. Data dependencies are analyzed from data changes that are extracted from database...
This paper presents an event based functionality integration framework to approach the issue of service personalization and service mashups. In contrast to existing data integration approaches, the proposed framework addresses the mashup issue from a new perspective by extracting and reasoning the context through user generated event, while recommending and aggregating the contextual services dynamically...
The properties of data and activities in business processes can be used to greatly facilitate several relevant tasks performed at design-and run-time, such as fragmentation, compliance checking, or top-down design. Business processes are often described using workflows, and we present an approach to mechanically infer business domain-specific attributes of workflow components, including data items,...
Advancements in technology for the past few decades influenced in all the fields lead to the drastic improvement of smartness and smart systems. This Paper proposes one such smart system for banking environment based on context history. Since it is based on context history the system involves ubiquity and intelligent environment as well. Banking sector is an Industry that shows tremendous growth....
Traditional phone communication is designed on the assumption that caller actively telephones callee without any knowledge of callee's situation. Caller often doesn't make successful calling as callee is not available at that time. Along with the development of pervasive computing and sensor technology, context information of user can be sensed, inferred from pervasive environment. Before starting...
This paper presents an end-to-end framework to manage user-centric services through daily events. In contrast to existing service discovery, selection and composition approaches, the proposed framework addresses the management issue from a new perspective by firstly learning end-user's intent through daily events, while recommending relevant functionalities to the user; and then enabling the user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.