The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Integrated Development Environments (IDEs) provide a convenient standalone solution that supports developers during various phases of software development. In order to provide better support for developers within such IDEs, we need to understand how developers use them. To infer useful conclusions, such information should be gathered for different types of IDEs, for different programming languages,...
In this paper, we introduce a method for synchronization of multiple devices based on context sharing and system design for multimodal contents service. A main advantage we can expect from our system environment is eliciting abundant function features of each device and exploiting them for rendering multimodal information in more efficient ways. To make it feasible, context s haring takes a significant...
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest...
In many enterprises the number of deployed applications is constantly increasing. Those applications - often several hundreds - form large software landscapes. The comprehension of such landscapes is frequently impeded due to, for instance, architectural erosion, personnel turnover, or changing requirements. Therefore, an efficient and effective way to comprehend such software landscapes is required...
As the number of IoT devices explodes, we observe numerous IoT platforms which enables us to build applications, manage, and integrate things connected to the Internet. We identify key technologies embedded in contemporary IoT platforms as follows: virtualization, restful API, database for history, visualization, and mash up. Most IoT platforms are heavy-weight in terms of software or hardware and...
In recent years, with growing demands towards big data application, various research on context-awareness has once again become active. This paper proposes a new type of context-aware user authentication that controls the authentication level of users, using the context of “physical trust relationship” that is built between users by visual contact. In our proposal, the authentication control is carried...
Avatar embodiment within the World Wide Web has gained a lot of popularity in recent years thanks to the introduction of networked virtual environments created for socialization and entertainment purposes. As each of these virtual worlds generates a unique set of user requirements concerning representation preferences based on the environment's context, it becomes clear that every attempt at creating...
People affected by the loss of short term memory and cognitive impairment have serious difficulties in communication. This may lead to social isolation and lack of community access, a fundamental key barrier to independence for people suffering from Alzheimer's Disease, the most common form of memory and cognitive impairment. We propose Automated Memory Support for Social Interaction (AMSSI), a system...
Remote access to large meshes is the subject of studies since several years. We propose in this paper a contribution to the problem of remote mesh viewing. We work on triangular meshes. After a study of existing methods of remote viewing, we propose a visualization approach based on a client-server architecture, in which almost all operations are performed on the server. Our approach includes three...
Today's mobile networks run on full capacity 24/7 even though they are not always fully utilized. The resulting power consumption can be reduced by dynamically applying a less energy-consuming configuration to the mobile network. Decisions regarding these optimizations are based on contextual information acquired from the network elements as well as external sources. We propose a test environment,...
The broad adoption of diagnostic and analytical techniques in the field of archaeology, presents a unique opportunity for e-Science in the form of scientific explanation, drawing from methodologies aimed at recording, archiving, analyzing, and disseminating, rich data collections. This paper presents a needed stepping stone towards cyber-archaeology, creating synergy between information technology...
Much larger flexibility of software adaptability is necessary to the destination platform and the user requirement in distributed systems. Component-based models are becoming increasingly ubiquitous as enabling technology for modern distributed system applications. Software modules and components have always played a key role in the systems. The fundamental contribution of component-based models lies...
We present a visualization framework integrated in a context-aware system that uses a common underlying stream processing middleware for tight integration of data accessing, processing, and visualization. Context-aware systems are often realized on mobile devices that do not have the computational power to perform complex tasks. Therefore, a dedicated hardware infrastructure might be required for...
In the context of multi-developer projects, where several people are contributing code, developers must deal with concurrent development. Collaboration among developers assumes a fundamental role, and failing to address it can result, for example, in shipping delays. We argue that tool support for collaborative software development augments the level of awareness of developers, and consequently, help...
Many network visualizations make the assumption that an administrator has previously determined the subset of data that should be visualized. Yet the problem remains that if the visualization provides no insight into the network events that warrant further consideration, then the administrator must go back to the data to determine what should be visualized next. This is a critical issue given the...
Context-awareness is increasingly becoming an important capability in devices for ubiquitous computing environments. These devices use on-board sensors and history of user interaction to collect data that are used to adapt their behavior to suit with the current environment. There is a need to support real-time software in ubiquitous computing environments, especially in reactive systems, such as...
A common goal in graph visualization research is the design of novel techniques for displaying an overview of an entire graph. However, there are many situations where such an overview is not relevant or practical for users, as analyzing the global structure may not be related to the main task of the users that have semi-specific information needs. Furthermore, users accessing large graph databases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.