The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we describe a new e-service provisioning model based on digital TV as the most familiar way to favor digital inclusion (e-inclusion) and social inclusion and to reduce the digital gap between elderly and disabled people and the information society. Different D-TV platforms are considered and several input and output interfaces for user interaction are analyzed and tested. Finally, a...
This article describes a systems and networks monitoring system that is based on the Nagios tool and can easily be supervised by its user. The system is Web-managed and equipped with advanced 3D visualization features in Flash format that improve its interaction and allow it to reproduce the real management environment in multiple browsers with acceptable load and response times. Also, anomalies in...
Uniform Resource Locator (URL) ordering algorithms are used by Web crawlers to determine the order in which to download pages from the Web. The current approaches for URL ordering based on link structure are expensive and/or miss many good pages, particularly in social network environments. In this paper, we present a novel URL ordering algorithm that exploits the access count information present...
People can only enjoy the full benefits of Cloud computing if we can address the very real privacy and security concerns that come along with storing sensitive personal information in databases and software scattered around the Internet. There are many service provider in the internet, we can call each service as a cloud, each cloud service will exchange data with other cloud, so when the data is...
This paper introduces a novel vision for further enhanced Internet of Things services. Based on a variety of data - such as location data, ontology-backed search queries, in- and outdoor conditions - the Prometheus framework is intended to support users with helpful recommendations and information preceding a search for context-aware data. Adapted from artificial intelligence concepts, Prometheus...
With the dramatic increase of network bandwidth and decrease of network latency and because of development of new network programming technologies, the dynamic websites provide dynamic interaction to the end user and at the same time implement asynchronous client-server communication in the background. Many applications are being deployed through the computer and are becoming more popular and are...
This paper discusses a modality to access and to organize unstructured contents related to a particular topic coming from the access to Wikipedia pages. The proposed approach is focused on the acquisition of new knowledge from Wikipedia pages and is based on the definition of useful patterns able to extract and identify novel concepts and relations to be added in the knowledge base. We proposes a...
This article presents the tryout of increasing computer and internet security by means of complementing the authentication procedure with the gaze tracking. The eyes of the person who is being identified follow the point on the computer screen and eye movement tracking system is used to collect information about eye movements during the experiment. We based on the Yarbus experiment who showed that...
The development of computer networks is followed by a rapid evolution of threats to the security of their use. The phenomenon, though observed for years, has increased in the last period of time causing a growing problem to sustain an adequate level of security. New Internet threats utilize the latest techniques and Internet technologies. Computer crimes constitute a true challenge for software engineers...
Social tagging is an innovative and powerful mechanism introduced with Web 2.0: it shifts the task of classifying resources from a reduced set of knowledge engineers to the wide set of Web users. Users of social tagging systems define personal classifications which can be used by other peers for browsing available resources. However, due to the absence of rules for managing the tagging process, and...
Article is attempt of formulating of e-engineering definition, relying on a design, construction, modification and maintenance of the cost effective solutions for practical problems in the field of the Information Society development within the Internet, with the use of scientific and technological knowledge. Authors introduce term of e-product, e-service and show e-product life model. They present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.