The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there has been increased interest in real-world event identification using data collected from social media, where theWeb enables the general public to post real-time reactions to terrestrial events - thereby acting as social sensors of terrestrial activity. Automatically extracting and categorizing activity from streamed data is a non-trivial task. To address this task, we present...
The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of "multi-Clouds"...
Virtual Machines hosted in cloud systems are susceptible to migration usually without notifying the cloud consumer. This is generally undertaken to load balance user requests across multiple data centres, often without direct awareness of the user. Migration could be to a regional site or to a data centre in another geographical area, i.e. to a country which has non-conforming laws with regards to...
Inherent vulnerabilities in software applications running in a computer network, bringing in personal devices to the network on an ad-hoc basis, a growing trend of network users accessing Web and utilise Cloud services remotely, and increasingly mature and stealthy techniques used by cybercriminals have left the whole network vulnerable to cyberattacks. This requires a network administrator to better...
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computing infrastructure of an organization requires appropriate response mechanism on the part of the organization. Government agencies and regulatory bodies are imposing the requirements of risk assessments on a continuous basis. One important aspect of continuous risk monitoring is using a suitable risk...
Cloud computing continues to increase in complexity due to a number of factors: (i) increasing availability of configuration options from public Cloud providers (Amazon, for instance, offers over 4000 different configuration options), and (ii) increasing variability and types of application instances that can be deployed on such platforms, such as tuning options in hyper visors that enable different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.