The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software testing plays a major role for engineering future systems that become more and more ubiquitous and also more critical for every days life. In order to fulfill the high demand, test automation is needed as a keystone. However, test automation, as it is used today, is counting on scripting and capture-and-replay and is not able to keep up with autonomous and intelligent systems. Therefore,...
The current research trend is about intelligent devices. There is a need to interconnect these intelligent embedded devices using the Internet and hence IoT devices have become more essential. Web of Things and Wisdom Web of Things are two technologies in their growing stages. This paper is a study on integration of IoT devices with WoT and W2T. An architecture has been designed to implement the interaction...
Provenance awareness adds a new dimension to the engineering of service-based systems, enabling them to increase their accountability through answering questions about the provenance of any data produced. Provenance awareness can be achieved by recording provenance data during system execution. In our previous work we have proposed an overall research agenda towards a design and analysis framework...
Context aware systems are able to adapt their operation to the current context information without explicit user intervention, in order to derive high-level context information from low-level context information that may be spread over multiple domains, context reasoning method is necessary. Most existing reasoning methods in context aware systems rely on centralized approach that combines local ontology...
In cyber analysis, it is highly desirable to support the analysis of junior analysts by leveraging the experiences of experts. But, there are two major challenges to achieve this goal. First, it is very costly to capture the experience of experts for the complex task of cyber analysis using traditional approaches such as protocol analysis. Second, it is difficult to identify previous experiences of...
Cyber analysis is a difficult task for analysts due to huge amounts of noise-abundant monitoring data and increasing complexity of the reasoning tasks. Therefore, experience from experts can provide guidance for analysts' analytical reasoning and contribute to training. Despite its great potential benefits, experience has not been effectively leveraged in the existing reasoning support systems due...
Remote code execution (RCE) attacks are one of the most prominent security threats for web applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to be stored and executed as server side scripts. RCE attacks often require coordination of multiple requests and manipulation of string and non-string inputs from the client side to nullify the access control protocol...
Contextual information are used to describe situations of entities (users and devices) and their interactions. Applications need such information in order to adapt their behaviour in response to changes in the entities context. In certain scenarios and in particular machine to machine, the integration of a large number of components makes the management of the generated contextual information a very...
In ubiquitous computing environment, smart objects get environmental data from sensors, and combine various sensor data. After processing these data, smart object can provide intelligent service to user. To do this, smart object should be compatible with sensors and service provider. In this paper, we propose a middleware for smart object in ubiquitous computing. A middleware uses metadata for interoperability...
Recent years have seen a confluence of two major trends -- the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms that connect people. Their convergence supports the emergence of a new class of context-aware geosocial networking applications. While existing systems focus mostly on location, our work centers on...
The goal of the CBDP project is to create a platform for the Digital Personality management. The concept of Digital Personality refers to the capacity to capture the user's personality in a digital way. The digital personality depends on the context of its application. This means that the user's preferences, sensors, actuators are different from application domain to application domain. The CBDP project...
We present an ontology-based reasoning approach for saving energy in a smart home setting where a mobile phone can serve as a generic sensor which can collect the inhabitant's contextual data. The paper details an ontology that describes the smart home domain and a prototype to test the system. Finally, we conclude with lessons learned from our work in developing an energy-aware smart home prototype...
Traditional access control solutions, based on preliminary identification and authentication of the access requester, are not adequate for the context of open web service systems, where servers generally do not have prior knowledge of the requesters. The research community has acknowledged such a paradigm shift and several investigations have been carried out for new approaches to regulate access...
The existing reminder system uses limited context information and has limited functions, so it can't meet users ' needs. This paper presents intelligent business assistant based on context-aware computing platform in a grid computing environment. The platform uses the context modeling and reasoning technology and analyzes the system in the grid environment. At last, the intelligent business assistant...
The “Web of Things” vision promotes the integration of smart devices into web, using web technologies and protocols as underlying interaction mechanisms with smart devices. Technically many phones include various sensors and provide a large-scale sensing platform. To make this functionality available to a large number of (web) developers our research aims at easing the creation of applications that...
Context awareness is just beginning to revolutionize the ways we interact with networked devices. In order for context awareness to flourish, especially in a pervasive environment, users must be certain that their privacy is respected. Privacy in pervasive online community depends on the level of granularity of the provided information, user's relation to possible recipients, and the possible usage...
This paper presents an architecture to transform an existent e-learning environment in a situation-aware environment, bringing the concepts of context awareness, situation and scenario to this environment. For a specific scenario, ontologies may be employed to represent the knowledge that the system has on the domain to be studied, on the situation where the study is being performed and also based...
Ambient Intelligence environments consist of various devices that collect, process, change and share the available context information. The imperfect nature of context, the open and dynamic nature of ambient environments, and the special characteristics of the involved devices have introduced new research challenges on how to represent and reason with contextual information. Previous work presented...
Recently, the autonomic communication networks paradigm has been introduced as a solution to the increasing management complexity of communication networks in the Future Internet. In order to encompass the large-scale nature of these networks, a general consensus has been reached that the supporting autonomic management architectures should be distributed for scalability reasons. However, several...
Context aware systems use context information to adapt their behaviour accordingly. In order to derive high level context information from low level context, such as sensor values, context reasoning methods that correlate observable context information, are necessary. Several context reasoning mechanisms have been proposed in the literature. Usually these mechanisms are centralized, leading to suboptimal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.