The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
CH-AVATAR is a context-aware platform for tourists and visitors of Cultural Heritage sites. Cultural Heritage objects (CH objects) become “alive” within the platform. They tell their stories and interact with tourists. The platform employs BLE beacons and the visitor's smartphone or tablet to create an interactive and adaptive Cultural Heritage experience for its end users. The paper makes a generic...
Three forms of contextual search have been proposed in the literature. The first one is to scan the full text of a query to figure out user needs and based on that scan, HTML pages for content will return an index of the relevant content. In this case, the user has no control over the context of the query. The second form of contextual search is used by meta-search engines and requires the user to...
Model-based simulation and monitoring are becoming part of advanced learning environments. In this paper, we propose a model-based simulation and monitoring framework for management of learning assessment and we describe its architecture and main functionalities. The proposed framework allows user-friendly learning simulation with a strong support for collaboration and social interactions. Moreover,...
Intelligent personalization systems are becoming increasingly reliant on contextually-relevant devices and services, such as those available within modern IoT deployments. An IoT context may emerge---or become pervasive---when the intelligent system generates knowledge from dialogue-based interactions with the end-user; the context is strengthened even further by incorporating state representations...
The application of Information Retrieval (IR) techniquesto software traceability link recovery has been the focusof many studies. These studies have formulated the task ofestablishing valid trace links between two types of softwareartifacts as a retrieval problem, where one type of artifacts isselected as the set of queries and the other as the corpus. Previouswork selected the sets of queries and...
The new challenges in the smart city context are mainly related to the stimulation of the city users towards taking more sustainable behaviors, in mobility and energy. The state of the art in this case is mainly focused on classical smart city solution for informing the city users and or for engaging them with specific wired rules toward virtuous models. And not using flexible languages and predictive...
In this paper, we present a platform we have designed and built in order to generate data and scenario traces that can serve as inputs and references when evaluating our algorithms for detecting cyber security intrusions. Our context is related to civilian and military ships and our research is performed within a strong partnership with industry and academy. As obtaining actual and accurate data sets...
Cognitive Radio (CR) was designed to support flexible spectrum usage by adding spectrum sensing facilities and decision making logic to the radio devices. Cognitive Radio Network (CRN) is an extension of the CR concept to enable holistic end-to-end optimization of the network operation and services. We discuss CRN management issues in the context of military and tactical operation environments, where...
Distributed process execution is a scalable solution for implementing workflows that deal with many devices in the Internet of Things (IoT). In hierarchical network structures the execution of activities and subprocesses can be moved closer to the computing edge onto specialized devices while still preserving data security. However mobility, resource constraints and varying connectivity of devices...
Authentication is one of the essential mechanism of a typical security model. It identifies the user legitimacy accessing any service over the network. Authentication can usually be done by a simple single-factor authentication method such as a password. Unfortunately, it is inadequate to ensure security when accessing variant resources and services across the Internet. Therefore, for users to authenticate...
Enterprise integration is one of the crucial challenges faced by modern organizations. Existing effort to define Enterprise Integration Patterns (EIPs) helps organizations to build their integration processes. An EIP represents a regularity in mobile agent behavior designs. In a complex distributed environment, such as mobile context, EIPs are a large number of patterns that describes the interactions...
We consider in this demonstration the analysis of complex data-intensive applications. We focus on three classes of analytical questions that are important for application owners and users alike: Why was a result obtained? What would be the result if the application logic or database is modified in a particular way? How can one interact with the application to achieve a particular goal? Answering...
Nowadays more and more organisations use the collaborative environments, such as the social networks, to identify profiles of competencies, which are usually declared by the users themselves. We postulate that the analysis of the computer-supported collaborative activities may provide information about the users' competencies in specific domains. In this research work, we present a trace-based approach...
Transform coefficient coding is a key module in modern video compression systems. Typically, a block of the quantized coefficients are processed in a pre-defined zig-zag order, starting from DC and sweeping through low frequency positions to high frequency ones. Correlation between magnitudes of adjacent coefficients is exploited via context based probability models to improve compression efficiency...
The Internet of Things (IoT) has brought increased sensing, monitoring and actuation capabilities to several domains including residential buildings. Residential energy management methods can leverage these capabilities and devise smarter solutions. This requires processing and reasoning data constantly generated by various IoT devices. In this paper, we use a hierarchical system model for IoT-based...
In this paper we investigate the general problem of controlling a scientic workflow service in termsof data management. We focus on the data managementproblem for the RedisDG scientific workflow engine.RedisDG is based on the Publish/Subscribe paradigmfor the interaction between the different componentsof the system, hence new issues appear for scheduling. Indeed, the Publish/Subscribe paradigm utilization...
Pervasive computing offers environments in which user needs or tasks are fulfilled without demanding their attention. Context-aware service composition is a central aspect to achieving this, in which services are discovered and composed in response to context to meet user needs. Since pervasive computing environments are inherently dynamic and heterogeneous, context-aware service composition is a...
We present an end-to-end visual analytics framework that aims to facilitate prediction and decision making about honey bee health based on micro sensing data. The framework is particularly tailored to cope with heterogeneous data from micro sensors and environmental sensors that are deployed to collect information about bees and their environment. The framework design allows for a wide range of end...
With the growing interest in Software Defined Networking (SDN) and thanks to the programmability provided by SDN protocols like OpenFlow, network application developers have started implementing solutions to fit corporate needs, like firewalls, load balancers and security services. In this paper, we present a novel solution to answer those needs with usage control policies. We design a policy based...
Nowadays organizations are becoming even more focused on their business processes (BP) and in addition increasing interest in goal-oriented BP. Traditional BP simulation approaches consider BP as a pre-defined sequence of activities, limiting possibilities to adapt a process model to changes occurring in the business environment. To be able to use dynamic BP in simulation we need an approach, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.