The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article distinguishes two aims: (1) to showcase an approach to identify clusters of users of mobile devices on the basis of shared common attributes, and (2) to investigate a social network-based awareness campaign which shows significant promise to reduce the individual's as well as the group's energy consumption. One possible way of progressively driving down the power consumption of individuals...
Cloud computing is a model for the delivery of IT resources as a service than a product. One of the essential characteristics in the cloud computing is on-demand computing. It can be explained that users can reserve and utilize IT capabilities, such as computing or network resources, at a certain time they want. As a part of HERO project, we developed HERO web portal which has on-demand capabilities...
In this short paper, we introduce the new French Cloud management software called Compatible One. The intent of this project is to build an innovative Cloud framework based on well known standards, existing software and technologies. Given our approach it allows us to exploit original solutions and moreover include at design level some new paradigms like energy efficiency. This paper focuses on the...
Automatic text summarization is a data reduction process to exclude unnecessary details and present important information in a shorter version. One way to summarize document is by extracting important sentences in the document. To select suitable sentences, a numerical rank is assigned to each sentence based on a sentence scoring approach. Highly ranked sentences are used for the summary. This paper...
Twitter as one of the most important microblogging online social networks has attracted more than 200 million users in recent years. Although there have been several attempts on characterizing the Twitter by using incomplete sampled data, they have not been very successful to estimate the characteristics of the whole network. In this paper, we characterize Twitter by sampling from its social graph...
Social tagging systems have become as a popular application with the advance of Web 2.0 technologies. By tagging, users annotate and index the resources freely and subjectively, based on their senses of interests, which can improve the performance of the current personalized recommendation systems. In this paper, we propose a sentiment enhanced tag-based recommendation approach by incorporating sentiment...
Today, thanks to a variety of electronic media, our cognitive world has been expanded to a practically unlimited degree. Since 1960s, with the rapid growth of the automated evaluation system (AES), many benefits, such as frequent writing practice, immediate scoring, objective reporting, instructional tools, form-focused feedback, context-focused feedback, formative feedback, and diagnostic feedback,...
We start with the premise that incorporating knowledge into web software can make the web wiser due to the knowledge-is-power hypothesis. This paper explores to incorporate knowledge with web engineering, in the process proposing a multiplicity-based methodology to create wise web systems more effectively. The paper examines the nature of knowledge, linking to artificial intelligence hypotheses and...
With the development of the information techniques, Internet of Things has caused extensive concern. The burden of Internet of Things increases as the number of users rises. In order to ease the burden on Internet of Things and improve efficiency of user accessing the Internet of Things, this paper proposed a control strategy of group behavior. We count resources user interested in, and do cluster...
Recently, product review sites that contain user ratings and trust statements such as Epinions.com have become popular, and many attempts have been made to analyze user behavior on those sites. In this paper, we first define three different user groups for each user, i.e. Trustee, Trust or, and Irrelevance which describe different kinds of trust statements. Then we investigate the relationship between...
Commonly, DW development methodologies, paying little attention to the problem of data quality and completeness. One of the common mistakes made during the planning of a data warehousing project is to assume that data quality will be addressed during testing. In addition to the data warehouse development methodologies, we will introduce in this paper a new approach to data warehouse development. This...
Cloud computing provides an efficient way to expose computing capabilities as sophisticated services that can be accessed remotely. It eliminates the need for organizations to maintain extensive infrastructures. Parallel and distributed simulation over cloud will bring us not only the increased productivity and efficiency but also the lower barrier for usage. This paper introduces a private cloud...
Web Service classification becomes more essential with the increasing number of Web Services. The current practical approach for management and discovery is based on keyword search techniques. In this paper, we present an approach based on semantic reasoning and ontology techniques in order to organize web services automatically and accurately. And we will verify our approach by comparing with METEOR-S's...
We presented the author's SMCCSE (Social Media Cloud Computing Service Environment) that supports the development and construction of Social Networking Service (SNS) based on large amounts of social media including audio, video and image in earlier publication. The main contributions of this paper are to present how to design and implement Map Reduce-based image conversion module for social media...
Software security patterns are a proven solution for recurring security problems. Security pattern catalogs are increasing rapidly. This creates difficulty in selecting appropriate software security patterns for a particular recurring security problem. There are several classification schemes to organize software security patterns. Every classification scheme has unique selection criteria for choosing...
Control Flow Errors (CFEs) are major impairments of software system correctness. These CFEs can be caused by operational faults with respect to the execution environment of a software system. Several techniques are proposed to monitor the control flow using signature-based approaches. These techniques partition a software program into branch-free blocks and assign a unique signature for each block...
Real time monitoring of broadband performance parameters is critical for estimating the user experience of new broadband services like VoIP, IPTV, Gaming and Video. This information is of interest to service providers themselves for efficient network design and maintenance and government regulatory bodies for analyzing ISPs, regions and national benchmarking. A web-based system TRUEE (Tool for Real-time...
This paper properties of a single cycle implementation of MCS-51 compatible microcontroller and a four cycle implementation one in the way of instruction timing, circuit implementation and synthesis result. And the part of circuit implementation focuses on system architecture, instruction execution details acquired from RTL level and the ports. In addition to the contrast, the paper discusses the...
Modern high end mobile devices employ multi-core platforms and support diverse distributed applications due to increased computational power. A brisk performance evaluation phase is required after the application modelling to evaluate feasibility of new distributed applications on the multi-core mobile platforms. GENESYS modelling methodology which employs service-oriented and component based distributed...
Last-level caches (LLC) grow large with significant power consumption. As LLC's capacity increases, it becomes quite inefficient. As recent studies show, a large percent of cache blocks are dead during the cache time. There is a growing need for LLC management to reduce the number of dead block in the LLC. However, there is a significant power requirement for the dead block's in-placement and replacement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.