The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of Information and Communication Technology (ICT) has touched various aspects in the domain of transport engineering and logistics (TEL). As the development of TEL tends to be more complex in operation and large in scale, recent practices start to pay more attentions on improving system robustness and reliability. In addition, current ICT innovations (such as WSN and IOT) could record and...
Situation identification is a complex task that is usually employed in order to sustain the work of Decision Support Systems in several and heterogeneous application scenarios like, for instance, Emergency Management, Safety and Security. Typically, situation awareness systems gather and process raw sensor data by means of different techniques. In this context, it is fundamental to exploit qualitative...
With the fast adoption of Services Computing, even more driven by the emergence of the Cloud, the need to ensure accountability for quality of service (QoS) for servicebased systems/services has reached a critical level. This need has triggered numerous researches in the fields of trust, reputation and provenance. Most of the researches on trust and reputation have focused on their evaluation or computation...
With the rapid development of information technology, it is inevitable that the distributed mobile computing will evolve to pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. However, most of WSN contexts coming from may be more and more unstructed, widespread and massive. Therefore,...
Enterprise Service Bus (ESB) allows the integration of pervasive, distributed and networked systems more and more designed as a composition of atomic and heterogeneous services. Offered services have various types of Quality of Service (QoS) that can be unpredictable and may lead to undesirable situations such as service unavailability, high response time, decrease of reliability, etc. These kinds...
The use of ontologies, as tools to guide the generation, organization and personalization of e-learning content including e-assessment has drawn attention since they can represent the knowledge of a given domain and have the capability of reasoning about it. Although the use of these semantic technologies tend to enhance technology based educational process, the lack of validation to improve the quality...
In ubiquitous computing system, the increasing mobile and dynamic of software and hardware resources and frequentative interaction among function components make fault-tolerant design very challenging. In this paper, we propose a context and policy based self-adaptive fault-tolerant mechanism for a mobile ubiquitous computing environment such as a mobile ad hoc network. In our approach, the fault-tolerant...
Sensor-rich ubiquitous computing systems could face many inconsistent decisions while selecting context data from redundant sources to compose the context, since low-quality sensor data can be selected to accordingly adapt the environment and services based on context changes. These systems need mechanisms to verify the quality of collected sensor data in order to select reliable context information...
In Web2.0, users become the adaptive agents of knowledge architecture. As a result, knowledge architectu??re and services get restored to their original state of human-oriented and furthermore, personal knowledge architecture becomes a process of self-organization. This provides a favorable condition under which we can expect to develop a self-adaptive personalized knowledge service system based on...
We say that a computer program augments the analyst if it can infer facts that are implicit in existing information, but that may be relatively difficult for a human to infer. Among a multitude of reasons, the analyst's task is difficult because (1) reported information to be analyzed and reasoned about often cannot be completely trusted (requiring verification attempts via further collection of information,...
Designing fusion systems for decision support in complex dynamic situations calls for an integrated human-machine information environment, in which some processes are best executed automatically while for others the judgment and guidance of human experts and end-users are critical. Thus decision making in such environment requires constant information exchange between human and automated agents that...
General purpose search engines provide users with lists of retrieved documents in response to their queries. The common structure of list elements includes the title of a document, its URL, and small snippet from the text. Snippets are evidence of occurrences of query's keywords in the document. The length of each snippet is just a couple of lines. They cannot play a role of summaries of retrieved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.