The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Public Transportation systems, accurate representation of information has been key for users to take the more advantages of the services and fulfil their travel needs. The Spider Map is a particular schematic representation to illustrate all travel possibilities from a given geographical location. Recently the Spider Map interaction and generation process automation have been studied, although...
With the prevalence of JavaScript, Cross-site Scripting based on Document Object Model (DOM-based XSS) has become one of critical threats to client-side Web applications. To detect DOM-based XSS vulnerabilities, a variety of tools have been developed, providing different features and abilities. Both for developers and tool users, the benchmark plays an important role in evaluating the effectiveness...
Transport companies are probably one of the greatest sources of pollution nowadays. Perhaps because these companies would like to improve this situation, or perhaps because they simply would like to reduce the petrol they consume, they are more than ever deploying plans in order to increase the efficiency of their fleets. One of the easiest and cheapest ways to achieve this is to teach their drivers...
The widespread use of the HTTP and hypertext makes it possible to freely publish new information and expose it in the context of its description. Unfortunately, this is a human-centric environment that cannot easily be adapted to an application-centric approach, which is required to provide distributed enterprise management and real-time process control. In this article new architecture is presented...
With the growth of the Internet, web applications are becoming very popular in the user communities. However, the presence of security vulnerabilities in the source code of these applications is raising cyber crime rate rapidly. It is required to detect and mitigate these vulnerabilities before their exploitation in the execution environment. Recently, Open Web Application Security Project (OWASP)...
Several mobile-enabled solutions for education transformation have been deployed in Africa. Drawbacks of these systems include, a predominant focus on disseminating bulk learning content, student outcomes are measured solely on quantitative performance metrics, a lack of instrumentation to capture fine-grained user interaction data, and finally none of them seem to focus on capturing the contextual...
This paper proposes a general optimization framework to allocate computing resources to the compression of massive and heterogeneous data sets incident upon a communication or storage system. The framework is formulated using abstract parameters, and builds on rigorous tools from optimization theory. The outcome is a set of algorithms that together can reach optimal compression allocation in a realistic...
The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework...
Currently, dependence on web applications is increasing rapidly for social communication, health services, financial transactions and many other purposes. Unfortunately, the presence of cross-site scripting vulnerabilities in these applications allows malicious user to steals sensitive information, install malware, and performs various malicious operations. Researchers proposed various approaches...
One of the key strengths of service oriented architectures, the concept of service composition to reuse and combine existing services in order to achieve new and superior functionality, promises similar advantages when applied to resources oriented architectures. The challenge in this context is how to realize service composition in compliance with the constraints defined by the REST architectural...
We propose a reusable and extensible hub architecture, Ubiquitous Box Architecture (UBA), which can be used in scenarios where various devices and sensors need to communicate with each other. It includes four main components, namely (1) Ubiquitous Box, (2) Plug in Server, (3) Authorization Server and (4) client applications. To show the robustness of the architecture, we present how UBA can be applied...
When a user accesses a resource, the accounting process at the server side does the job of keeping track of the resource usage so as to charge the user. In cloud computing, a user may use more than one service provider and need two independent service providers to work together. In this user-centric context, the user is the owner of the information and has the right to authorize to a third party application...
We propose a novel Bloom filter variant for time windowed systems, where elements of an event stream need to be differentiated according to the time slots they first arrived in. In our analysis we derive lower bounds on the false positive probability and the filter length. We show that our new Round-Robin Bloom Filter scheme significantly outperforms a comparable Decaying Bloom Filter setup.
Remote code execution (RCE) attacks are one of the most prominent security threats for web applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to be stored and executed as server side scripts. RCE attacks often require coordination of multiple requests and manipulation of string and non-string inputs from the client side to nullify the access control protocol...
Continuing advances and reduced costs in computational power, graphics processors and network bandwidth have led to 3D immersive multi-user virtual worlds becoming increasingly accessible while offering an improved and engaging Quality of Experience. At the same time the functionality of the World Wide Web continues to expand alongside the computing infrastructure it runs on and pages can now routinely...
Smart devices have deeply modified the user consumption expectations getting used to rich interactive experiences around new media services. In this emerging landscape, TV rises as the central media device integrating the home network ecosystem. In the race to create more dynamic and customizable content, computer generated 3D graphics get a prominent position combined with video and audio to provide...
Modern computer systems are becoming increasingly heterogeneous by comprising multi-core CPUs, GPUs, and other accelerators. Current programming approaches for such systems usually require the application developer to use a combination of several programming models (e.g., MPI with OpenCL or CUDA) in order to exploit the full compute capability of a system. In this paper, we presentd OpenCL (Distributed...
Modern mobile devices are equipped with input and sensor options that allow for user generated content, which can be used to create examples of real life learning situations, or authentic learning examples. However, existing research shows a gap between the creation of authentic learning examples and their subsequent reuse as learning objects. Therefore, the goal of this research is to design a mechanism...
With the convergence between phone and data networks in LTE and 4G, cellular signaling traffic is increasingly carried over IP. Control plane functions, once performed by dedicated machinery, are evolving into large-scale network applications with strict requirements on delay, availability, and processing throughput as mandated by 3GPP standards. In this paper we present dMME, a distributed architecture...
This paper, the third in a series of four papers, describes a subsystem with integrative function named Geographic Intelligence (GI), from SNIRH, The National Water Resource Information System, a computational tool from the Brazilian National Water Agency (ANA), the methodological, architectural and technological aspects involved in its design and engineering - items of Software Engineering that demonstrate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.