The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Internet applications, Web object prefetching is a commonly used and quite effective algorithmic approach to reduce user perceived delays. While a separate concept, prefetching is closely related to caching and they are often blended together in Web algorithms. In this paper, we give a review of Web prefetching models and algorithms, categorize them into groups based on their design principles,...
Similar to many technological developments, wireless sensor networks have emerged from military needs and found its way into civil applications. Today wireless sensor networks have become a key technology for different kinds of smart environments and an intense research effort is currently underway to enable the application of wireless sensor networks for a wide range of industrial problems. Wireless...
To facilitate the mobile users on ships for communication effectively in the offshore areas at sea, this paper proposes an integrated wireless networking system that is composed of mobile ad hoc network, cellular mobile communication network, and satellite mobile network. The overall system architecture and relevant network elements of the proposed system are described. The proposed system can help...
This paper proposes a new model checking-based test generation approach for Web applications. The Kripke structure is reconstructed to model the Web application from the end users' perspective. Test coverage criterion is expressed as trap properties in CTL so that counterexamples can be instantiated to construct test cases. But a counterexample for each trap property is generated will result in too...
This paper presents a review and comparison of the software project cost estimation methods that have emerged with more impact in recent years; Expertise and Machine Learning methods. These methods and models have been selected according to an own criteria focusing onto Analogy estimation models and Case Based Reasoning approaches, assuming that they are widely utilized by researchers and with good...
Software architecture design plays a crucial role for both the software and business success. Most of the existing methods conduct software architecture design driven by the key software requirements, facing the challenges of creating architectures from scratch and aligning with the high-level business goals. In this paper we propose the BASAD (Business And Software Architecture co-Design) method...
Based on the comparison of advantage and disadvantage between Google and digital library, a method for service chain of digital library based on service-oriented architecture (SOA) is presented. Then an integrated framework for service chain of digital library is put forward, and the information exchange approach and software system architecture layers based on SOA are discussed. Finally, based on...
The effect of the harmony of the audio clip and the video clip in an audiovisual material on the estimation of its scores is experimentally clarified for the cross-media retrieval. In the experiment, four patterns of audiovisual materials are used. These are the statically matched or mismatched, and the dynamically matched or mismatched audiovisual clips. This experiment clarifies the degree of the...
Flooding is one type of Denial of Service (DoS) attacks which can cause significant financial losses. This paper presents a new security approach which prevents flooding in the government critical systems and focuses in preventing flooding in non-authenticated client area. A new cooperation with local service providers has been suggested to make the prevention of flooding attacks easier. In addition,...
The development in mobile devices and wireless technologies opens up unlimited choices of mobile services such as mobile commerce. These advances make access services available and convenient everywhere at any time. Since mobile users usually move, accessing services becomes unavailable especially in some locations that are not covered by their home networks. Therefore, it becomes necessary to roam...
With the acceptance of service-oriented architecture (SOA) in many application domains and the rapidly growing number of available services, it is now a challenge to effectively discover and compose services to meet user needs. In this paper, we present a novel technique for automatic service discovery and composition based on bounded model checking. Specifically, given (1) a client specification...
The continuous decentralisation and distribution of software, hardware, and human resources depends on a number of fundamental factors including the ability to provide desired Quality of Service (QoS) on resources assembled dynamically from enterprises, service providers and customer systems. Despite recent developments there are still many challenges in efficient information delivery and management...
Cloud computing has become a popular computing paradigm in which virtualized and scalable resources are consolidated to provide services over Internet. However, the resource capability of a single cloud is generally limited, and some applications often require various cloud centers over Internet to deliver services together. Therefore, a Virtual Organization (VO) will be a promising approach to integrate...
In this paper we put forward an unsupervised system WSD-AL for Arabic word disambiguation. We apply some pre-processing steps to texts containing the ambiguous word in the corpus and we extract the most relevant words. Then, we put to use the Context-Matching algorithm that returns a semantic coherence score corresponding to the context of use that is semantically closest to the original sentence...
In recent years, Caching technique (pull-based) in Mobile Ad hoc networks (MANETs) has become a promising technique in solving or mitigating the problems of performance, availability, scalability and resource paucity. MANETs consists of mobile nodes which communicate with each other through wireless medium without any fixed infrastructure. Mobile nodes may change rapidly and unpredictably over time...
Adopting Web 2.0 technologies and techniques in modern e-learning systems guarantees a more interactive e-learning experience. It leverages collaboration among learners and enhances accessibility to various learning resources. Providing such functionalities as web services within an integrated e-learning system achieves interoperability and reduces redundancy. Our aim in this paper is to identify...
A method for explaining results of a regression based classifier is proposed. The data is clustered using a metric extracted from the classifier. This way, clusters found are related to classifier predictions, and each cluster can be considered a possible explanation for classification result. The clusters are described by simple rules, meant to be easy for a human to understand. The key points of...
In the area of device collaboration system, there are a large number of devices which needed to be collaborated with other devices, and the collaboration process is complex. It is significative to reduce the complexity of modeling a device collaboration process. In this paper, a device collaboration process model is proposed, which includes four basic structures. By use of device collaboration net,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.