Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The current research trend is about intelligent devices. There is a need to interconnect these intelligent embedded devices using the Internet and hence IoT devices have become more essential. Web of Things and Wisdom Web of Things are two technologies in their growing stages. This paper is a study on integration of IoT devices with WoT and W2T. An architecture has been designed to implement the interaction...
Tracking semantic relations among spatial objects is an essential issue in project-camera based interactive environments in order to find the most suitable surface to display projected screen. This paper presents a design and implementation of a spatial context management system that continuously tracks semantic relation among spatial objects for providing situation-aware services in project-camera...
Today more, more Web services are exposed to developers through public APIs (API-fication), enabling the spread of new services which create value for end users. The number of these services is expected to grow in the coming years. This will complicate the user experience due to the complexity required to figure out which of the available services are the most relevant and, also, the need for a user...
An original architecture for production and usage of modal linguistic summaries in IoT contexts and domains is presented. The underlying research takes into account basic features of real IoT contexts and tries to map them effectively into a set of functional requirements. The architecture is strongly influenced and supported by original models of natural language processing, developed interactive...
Sentiment lexicons are useful to automatically extract sentiment from text. In this paper, we generate several Norwegian sentiment lexicons by extracting sentiment information from two different types of Norwegian text corpus, namely, news corpus and discussions forums. The methodology is based on the Point wise Mutual Information (PMI). We introduce a modification of the PMI that considers small...
This article aims at evaluating the interest of the Wicri network, a network of semantic wikis, both as a reservoir of curation rules allowing to enrich corpora metadata and as a tool for parameterizing and supporting of instructions for the creation of corpora exploration servers. Starting, from the analysis of a bibliographic corpus extracted from different documentary databases, the experiments...
In this paper two alternative architectures for service management in IoT and sensor networks are discussed. The first one is based on Open Service Gateway (OSGi) framework and Remote Services for OSGi (R-OSGi) bundle. The second architecture extends the notion of REST (Representational State Transfer) paradigm. There were few purposes of the extension. First, efficient, dynamic searching for devices...
Context aware systems are able to adapt their operation to the current context information without explicit user intervention, in order to derive high-level context information from low-level context information that may be spread over multiple domains, context reasoning method is necessary. Most existing reasoning methods in context aware systems rely on centralized approach that combines local ontology...
Remote code execution (RCE) attacks are one of the most prominent security threats for web applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to be stored and executed as server side scripts. RCE attacks often require coordination of multiple requests and manipulation of string and non-string inputs from the client side to nullify the access control protocol...
In network level forensics, Domain Name Service (DNS) is a rich source of information. This paper describes a new approach to mine DNS data for forensic purposes. We propose a new technique that leverages semantic and natural language processing tools in order to analyze large volumes of DNS data. The main research novelty consists in detecting malicious and dangerous domain names by evaluating the...
This paper presents an algorithm that generalizes big sets of contextual situations. Apart from giving details on its mechanisms and implementation, we discuss its employment in a context experience sharing system, KRAMER, and simulate its performance in function of several parameters modelling the expected real data experiment.
In this paper, we present an approach to adapt and reuse learning annotations and contexts by describing the process to capitalization and reuse of learning annotations and associated learning contexts. This is to provide to the actor, an appropriate learning which is reviewed or validated previously by others, with similar learning contexts. The modeling and the formalization of learning annotations...
Starting from a context-aware phonebook application, which allows users to see their contacts' situation, we introduce a collaborative context experience system. Users independently create notification rules, describing phonebook-based contextual situations for which they wish to receive notifications. The collaborative system gathers such rules from all users, and identifies important ones, that...
Context awareness plays an important role in Ubiquitous applications based on the context information to provide services adapting to users' needs. The advantages of some context-aware smart phone systems, including iCAM[1], contextPhone[2], Live Contact Project [3], Enhanced Telephony[4] and Ubiquitous phone System Ubiphone [5] show themselves to be typical examples of Ubiquitous service ones. Using...
Pervasive applications want to describe in simple ways which context information they need about users, and be notified when low level context matches specified constraints defined by semantic expressions. In this paper we report our experience while implementing our Context Query Language and using it in a real context framework to support mobile context-aware applications in two European-funded...
LDAP Multi-Master Technique is a replication approach using Syncrepl to replicate data to multiple servers. As the specialized database optimized for read access, the directory is used to represent heterogeneous entities in directory information tree (DIT). Compared with existing Sync replication models, the directory template replication model based on query templates proposed in this paper only...
Nowadays, we are assisting to a paradigmatic shift for the development of web applications due to the pervasive distribution of their components among a lot of servers, which are dynamically interconnected by web links. As a consequence, the application logic is often defined by exploiting workflow languages since they are more suitable to address the complexity of these new running environments....
A challenge in the convergence of heterogeneous networks is how to combine the ubiquitous resources and provide the diversified individual services. By this, the vision of adaptive and context-aware service provision becomes possible and offers new opportunities for pervasive computing. In this paper, we describe an approach that addresses the convergence of wireless personal area and wide area networks...
In order to circumvent the problem of state-space explosion of large-scale Markovian models, the stochastic process algebra PEPA has been given a fluid semantics based on ordinary differential equations, treating all entities as continuous. However, low numbers of instances and/or relatively slow dynamics may make such approximation too coarse for some parts of the system. To deal with such situations,...
An intelligent content adaptation system taking semantic adaptation method is built to provide good personalized service for user. Compared with some website using web mining and collaborative Filtering technology, in this system, the intelligence comes from the knowledge service providing by CBKMF(ontology-Cloud based knowledge manage framework), in which knowledge modeling, managing, data-mining...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.