The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new methodology for quality assessment of interaction techniques in immersive virtual environments, based on the study of the relationships between physiological measures and usability metrics using multivariate data analysis. Our methodology defines a testing protocol, a normalization procedure and statistical techniques, considering the use of physiological measures during...
In this paper, an agent framework for solving multidisciplinary decisions is proposed, including a conceptual decision model coupled with an agent scheme, and a set of functional signatures that drive the inference. The framework is specially designed to support decision-making in organisational structuring among care specialists towards complex problems, individual planning and argumentation, and...
One of the most common causes of bugs is overlooking changes. To prevent bugs and improve the quality of the products, numerous studies have been undertaken on change guides based on logical couplings extracted from developers' past process histories, such as change history. While valuable change rules based on logical couplings can be gleaned found from the change history, these rules often fail...
For modelling hybrid systems, we have extended Event B based on its framework with the differential event. The differential event describes continuous behaviors of hybrid systems by differential equations and evolution constraint, whose proof obligations provide dynamical properties of a model. In order to ensure the safety and reliability of a model, proof obligations should be proved. It is difficult...
Configuration management tools, CMTs for short, are a set of indispensable software for DevOps (Development and Operations). CMTs automate system deployment and configuration through CMT modules, which are reusable, shareable units of configuration code. Therefore, thousands of CMT modules have been developed for various systems, and are still growing fast. Although CMT repositories usually provide...
Developers often address multiple development issues to make composite code changes, as opposed to atomic changes that address one single issue. Investigating and testing such code changes is a tedious and error-prone process for developers. To address the problem, this paper presents a technique, called CHGCUTTER, for (1) interactively decomposing composite changes into atomic changes, (2) building...
Context: Open Government Data (OGD) represent an invaluable resource for enabling active citizenship. A significant example is represented by the mandatory data that Italian public administrations (PAs) are required to publish concerning their contracts. Nevertheless, a low quality of data provided by PAs could hamper the prospect of citizen involvement. Goal: Our objective is to define a set of basic...
To validate whether RESTful Web service systemscould provide available services, it is indispensable to perform efficient and effective functional testing before their large-scale deployment, where the pivotal and first step is to automatically generate valid test data. In this paper, we develop a parallelized and automated test data generation tool based on the Hadoop, where mutation testing and...
The recovery of traceability links to requirements from a functional model created through analysis/design is crucial to understand existing systems for reuse, improvement or maintenance. Functional and non-functional requirements generally are implicitly interpreted and non-systematically woven into a functional model by analysts/designers. Traditional traceability link recovery methods focusing...
This paper provides an overview of some state-ofthe- art proposals in the context of querying encrypted OLAP data, along with critical discussion on open challenges and future research directions in the investigated topics.
Machine learning is an increasingly important form of cognitive computing, making progress in several application areas. Machine learning often involves big data sets and is computationally challenging, requiring efficient use of resources. The use of cloud computing as the platform for machine learning offers advantages of scalability and efficient use of hardware. It may, however, be difficult to...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
We introduce a tool that facilitates the reuse of test models for a family of systems. Test models are defined as hierarchical Markov chains for specifying possible usage of features for these systems. Variability among these features is documented with a feature model. Optional and alternative features in the feature model are mapped to a set of states in test models. Transition probabilities for...
Following the Service-Oriented Architecture, a large number of diversified Cloud services are exposed as Web APIs (Application Program Interface), which serve as the contracts between the service providers and service consumers. Due to their massive and broad applications, any flaw in the cloud APIs may lead to serious consequences. API testing is thus necessary to ensure the availability, reliability,...
As Cyber-Physical Systems (CPS) operate in open, dynamic and diverse environments, they need to be self-adaptive to address the uncertainty challenges. And it is urgent to study self-adaptive software intensive Cyber-Physical Systems (self-adaptive CPS). As self-adaptive CPS interact closely with the environments and users, their requirements analysis is particularly challenging. General requirement...
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the job of choosing the suitable resource to be a very difficult one for the common users. Then the technology of service broker came out which is designed to choose the appropriate services among different providers to meet the user's...
Massively Multiplayer Online Games (MMOG), on which many users play simultaneously in a large scale virtual space on the Internet, have long been popular services. Most of MMOGs work based on Client / Server (C/S) model. Although C/S model is easy to manage games, it lacks scalability since the capacity of storages and the performance of servers that needs to be maintained by administrators increases...
Emerging technology on mobile and wearable market, smartwatches have embedded movement sensors whose potential is yet to be fully explored. This paper proposes an interaction method with smart TVs via gestures performed by person's wrist using a smartwatch. Detailed architecture and implementation for a complete prototype, named Wrist Player, is presented. A user study is also conducted, in order...
Oral squamous cell carcinomas (OSCC) is the most common head and neck cancer worldwide, with more than 300,000 new cases being diagnosed annually. Studies have shown that miRNAs are involved in the process of growth, differentiation, apoptosis, invasion and metastasis of OSCC tumor cells. How miRNAs work together to contribute to this process is still largely unknown. The goal of our study was to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.