The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data stored in the database mostly represent current valid state. Nowadays, complex information systems require data evolution management, state monitoring over the time. Temporal definition has been proposed, which is, however, still based on conventional paradigm. Therefore, non-current values are difficult to obtain, manage and evaluate. In this paper, several temporal evolution streams are proposed...
Using solely the information retrieved by audio finger-printing techniques, we propose methods to treat a possibly large dataset of user-generated audio content, that (1) enable the grouping of several audio files that contain a common audio excerpt (i.e. are relative to the same event), and (2) give information about how those files are correlated in terms of time and quality inside each event. Furthermore,...
This paper proposes a novel hybrid transactional memory scheme based on both abort prediction and an adaptive retry policy. First, the proposed scheme can predict not only conflicts between transactions running concurrently, but also the capacity and other aborts of transactions by collecting the information of previously executed transactions. Second, the proposed scheme can provide an adaptive retry...
There is an increasing demand for applications in which users can easily browse different events organized by different institutions or organizations in a single place. Among these events are the following: theater or movie shows, cultural programs, presentations, meetups, etc. Most of the institutions (e.g. theaters) have their own web pages, where the programs along with the related news and pieces...
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
With its ability to detect, identify and, if applicable, recover from occurred faults, online-diagnosis can help achieving fault-tolerant systems. A sound decision on an occurred fault is the foundation for fault-specific recovery actions. For this, typically a large amount of data has to be analyzed and evaluated. A diagnostic process implemented on a distributed system needs to communicate all those...
The increase of the quantity of user-generated content experienced in social media has boosted the importance of analysing and organising the content by its quality. Here, we propose a method that uses audio fingerprinting to organise and infer the quality of user-generated audio content. The proposed method detects the overlapping segments between different audio clips to organise and cluster the...
The GrowMeUp project builds an assisted living environment based on a service robotics platform. The platform is able to learn the needs and habits of elderly persons; its functionalities evolve to help them to stay active, independent and socially involved longer. Following the recent interest in cloud-enhanced robotics, we present a general framework used to learn models by sharing and distributing...
Database management requires fast and reliable access to the data stored in the database for complex evaluating in intelligent information systems. Significant data amount must be handled, stored and consequently retrieved for analysis. Each data tuple is delimited by the time of occurrence or reflected by the validity. Temporal database approach uses various architectures based on data structure...
Many emerging IoT approaches depend on cloud services to facilitate interoperation of devices and services within them, even when all the communicating entities reside in the same local environment, as in many "smart home" applications. While such designs offer a straightforward way to implement IoT applications using today's TCP/IP protocol stack, they also introduce dependencies on external...
The advanced use and the evolution of technologies regarding autonomous Unmanned Aerial Vehicle (UAV) have increased the availability of information and resources to perceive the environment, allowing its application in various activities, such as inspection and military. However, the intelligence level of these kind of systems needs to be improved in order to fit them in modern tasks. In this sense,...
In order to take a consistent snapshot of a distributed system, it is necessary to collate and align local logs from each node to construct a pairwise concurrent cut. By leveraging NTP synchronized clocks, and augmenting them with logical clock causality information, Retroscope provides a lightweight solution for taking unplanned retrospective snapshots of past distributed system states. Instead of...
Caching plays an important role in many domains, as it can lead to important performance improvements. A key-value based caching system typically stores the results of popular queries in efficient storage locations. While caching enjoys widespread usage in the context of dynamic web applications, most mainstream caching systems store static binary items, which makes them impractical for many real-world...
Network signatures are used in network intrusion detection systems that try to detect an Internet worm by monitoring network packets. There are many ways to make polymorphic worms. One technique depends on encrypting the body, which erases both signatures and statistical characteristics of the worm byte string. Currently, intrusion detection system reads all the incoming packets and tries to find...
Kaleido is a novel data system for multi-device synchronization. According to the theories of conflict-free replicated data types, Kaleido enables clients to synchronize replicated data types with operations, and gurantees high availability and eventual consistency. Implemented as a back-end as a service, Kaleido server is scalable so as to deal with a huge amount of requests from massive clients...
Network Functions Visualization (NFV) replaces physical middleboxes with software instances running network functions in cloud environments. To support this new paradigm, it is necessary to port the code basis from highly specialized hardware devices to virtual machines running on COTS hardware. In order to fully exploit the inherent capabilities of cloud environments it is further necessary to redesign...
The problem of collecting, processing, and learning from high-volume mobile device data has become an active research area in recent years. Time series data on application usage, in particular promises to provide fine-grained information on individual activity patterns, but currently poses collection and analysis challenges. In this paper we demonstrate an integrated system which can cheaply and easily...
In this paper, we introduce a synchronization method of music and video, where the music is arranged with the video using emotion similarity. The music segments are matched with the video segments so that the music best follows the video's narrative. The temporal order of video segments are unchanged. Due to the disparity of structural musical content between segment boundaries, we design a cost function...
This work is dedicated to study the IO characteristics of SQLite transaction in Android platform. We collect the block level IO trace from for six months. We develop an elaborate pattern matching algorithm. It allows us to identify the individual SQLite transactions from the raw IO trace, which is essentially an interleaved mixture of IO requests from concurrently running smartphone applications....
In this paper the technique of data synchronization between a smartphone and smart watch is presented. As the example the mobile applications for sports are shown. The development and research were made using the operating system macOS 10.11.6. The development of the program was carried out in an environment Xcode, using the programming language Swift.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.