The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Rapid growing in urbanization and miles driven in the city will triple urban mobility by 2050. This explosion in demand requires switching to Mobility-as-a-Service models, such as Car-sharing. A critical issue for Car-sharing one-way free floating services is the imbalance problem that requires to solve the conflict between the positioning of vehicles "at the right place and time" and the...
To resist the growth of abnormal traffic such as P2P, DDoS and Internet worms, this paper discusses a circuit design to realize real-time abnormal traffic detection from broadband networks. Real-time counting of cardinality is the key of the circuit. Although our previous study showed the effectiveness of cardinality counting to detect various abnormal traffic, the slowness of DRAM access prevented...
In this paper, we propose a mechanism for autoconfiguration of name-bound virtual networks (NBVNs) for Internet of Things (IoT). Some IoT standardization groups have defined APIs for IoT device communications, in which they indicate the correspondent nodes and resources by names. However, current technologies for the construction of Virtual Networks (VNs) rely on VLANs, IP routing, and OpenFlow control,...
Information centric networking (ICN) is one of the emerging Internet paradigms proposed to overcome the shortcoming of the current host-centric Internet. With ubiquitous in-network caching, ICN can facilitate content delivery and reduce network delay. In this paper, we propose a novel collaborative caching scheme based on routers' position to cache popular videos on the edge routers which are closer...
IEEE 802.16m, aiming at providing secure communication pathways between the base station (BS) and the mobile station (MS), is a broadband wireless MAN (Metropolitan Area Network) standard. Its security sublayer contains a Privacy Key Management (PKM) protocol, which achieves authentication and key management in the communication process. In this paper, we apply Communicating Sequential Processes (CSP)...
A recent development in multicore technology has enabled development of hundreds or thousands core processor. However, on such multicore processor, an efficient hardware cache coherence scheme will become very complex and expensive to develop. This paper proposes a parallelizing compiler directed software coherence scheme for shared memory multicore systems without hardware cache coherence control...
The use of blocks programming languages has skyrocketed in recent years, thanks largely to freely available blocks environments like Scratch, Snap!, and Blockly. These platforms have lowered the barrier to computer science and algorithmic thinking, allowing even very young children to compose programs. Compared to text interfaces, blocks alleviate much of the burden of learning a language's syntax...
In this paper, we present an approach to adapt the e-assessment workflow by considering learner's profiles. We have started by creating a learner profile ontology based on extraction data from e-assessment activities, file log and personal information. Then, we have defined three adaptation actions: Add Activity, Edit Activity and Delete Activity, applied on the workflow assessment and using information...
Dynamic feature location techniques (DFLTs), which use execution profiles of scenarios that trigger a feature, are a promising approach to locating features in the source code. A sufficient set of scenarios is key to obtaining highly accurate results, however, its preparation is laborious and difficult in practice. In most cases, a scenario exercises not only the desired feature but also other features...
Online education is evolving at a fast pace thanks to novel technology-mediated learning environments: Massive Open Online Courses (MOOCs), gamified learning, intelligent tutoring systems, citizen-science communities, informal learning groups are blossoming everywhere as novel opportunities for teachers and learners. However, the educational effectiveness of these solutions has to be proved and technological...
Wikis are widely used collaborative environments as sources of information and knowledge. The facilitate students to engage in collaboration and share information among members and enable collaborative learning. In particular, Wikis play an important role in capstone projects. Wikis aid in various project related tasks and aid to organize information and share. Mining project Wikis is critical to...
The diffusion of learning technologies has fostered the use of mobile and Web-based applications to assess the knowledge level of learners. In parallel, an increasing research interest has been devoted to studying new learning analytics tools able to summarize the content of large sets of learning documents. To bridge the gap between formative assessment tools and document summarization systems, this...
New information and communication technologies offer today many opportunities to improve the quality of educational services in universities and in particular they allow to design and implement innovative learning models. This paper describes and validates our university blended learning model, and specifically the massive educational video service that we offer to our students since 2010. In these...
Human factors have been increasingly recognized as one of the major driving forces of requirement changes. We believe that the requirements elicitation (RE) process should largely embrace human-centered perspectives, and this paper focuses on changing human intentions and desires over time. To support software evolution due to requirement changes, Situ framework has been proposed to model and detect...
Software fault prediction models are employed to optimize testing resource allocation by identifying fault-prone classes before testing phases. We apply three different ensemble methods to develop a model for predicting fault proneness. We propose a framework to validate the source code metrics and select the right set of metrics with the objective to improve the performance of the fault prediction...
Program invariant is formal description of properties that should hold at certain program location in every valid execution. It is very useful for program analysis and verification. In this paper, we introduce an abstraction interpretation approach for generating program invariant efficiently and precisely. A polynomial interval domain is proposed for representing abstract state and precise loop effect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.