The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Users need trusting in data managed by software applications that are part of Information Systems (IS), which supposes that organizations should assuring adequate levels of quality in data that are managed in their IS. Therefore, the fact that an IS can manage data with an adequate level of quality should be a basic requirement for all organizations. In order to reach this basic requirement some aspects...
The security of Cyber Physical Systems and any digital forensic investigations into them will be highly dependent on data that is stored and processed in the Cloud. This paper looks at a number of the issues that will need to be addressed if this environment is to be trusted to securely hold both system critical and personal information and to enable investigations into incidents to be undertaken.
In P2P video streaming systems, the neighbor selection algorithm is one of the fundamental components that affects performance. Although a few neighbor selection methodologies have been proposed, none of them takes into consideration QoE metrics reported by peers as a parameter for decisions. In this work, we present a new metric that quantifies the QoE as a function of the number of absences of pieces...
Triadic analysis is a convenient way to assess structure and stability of a graph. This paper verifies stability of one triad type that is commonly perceived as transient and unstable, on Instagram subgraph, reconstructed by a specific crawling algorithm. Dynamics of that triad transition has been examined, wrt. degrees of that triad nodes and other basic structural properties of the triad neighborhood...
Telecommunication companies are acknowledging the existing connection between customer satisfaction and company revenues. Customer churn in telecom refers to a customer that ceases his relationship with a company. Churn prediction in telecom has recently gained substantial interest of stakeholders, who noticed that retaining a customer is substantially cheaper that gaining a new one. This research...
Metadata such as bibliographic information about documents are indispensable in the effective use of digital libraries. In particular, the reference fields of academic papers contain much bibliographic information such as authors' names and document titles. We are therefore developing a method for automatically extracting bibliographic information from reference strings using a conditional random...
Recent decades have witnessed a swift development in network structures like Peer-to-Peer (P2P) systems, offering advantages such as significantly reducing the set-up running cost for the content providers and providing end users data access within very short time. However, today's P2P distribution systems are severely abused by illegal re-distributions, which not only result in heavy financial losses...
The use of diverse web services has simplified routine tasks but it has resulted in loss of direct control over the data. This shift from traditional self-controlled databases to heterogeneous, autonomous web services can be increasingly seen among small and medium scale enterprises. Enterprises dependent on web services require a generic approach to integrate with multiple web services. The classical...
Mobile devices equipped with cameras, such as smartphones, have become extremely popular in recent years, and have motivated users to capture an increasing number of digital photos in their daily lives. Users often invoke these photos during in-person interactions or conversations with others. In the context of a conversation between two people related to or involving reference to a photo, one of...
The OSN's (On-line Social Networks) have reached an incredible popularity in modern Internet. Those systems have been present in the daily lives of countless people helping them to share personal experiences, expectations and opinions. So high popularity has made of such networks complex systems. To understand the operation and phenomena that occur in such networks, there are metrics and models that...
Grafeno is a Natural Language Processing library for doing semantics. It represents semantic information with a graph structure, and is able to automatically extract this representation from the dependency analysis of a text. It aims to encompass the different possible approaches to doing graph semantics by being as modular and flexible as possible. It also provides functionality for operating on...
Information technology has become an indispensable unit of an enterprise life in current era. Its inception has changed the ways businesses are done today in a competitive environment. In order to get value from significant investments done on complex IT infrastructure, it should be efficiently governed and managed. IT governance and management is a part of overall corporate governance and management...
Virtual agents are artificial intelligent artifacts that mimic natural conversations with users. The media equation posits that human-agent interaction mirrors the social cues prevalent in human-to-human relationship. As such, personality adaptation-convergence (similarity-attraction) and divergence (complementary-attraction) in human-agent interaction have been explored, particularly in the context...
This paper represents a new technique for building a relevance judgment list for information retrieval test collections without any human intervention. It is based on the number of occurrences of the documents in runs retrieved from several information retrieval systems and a distance based measure between the documents. The effectiveness of the technique is evaluated by computing the correlation...
While large retailers utilize social commerce to increase consumer trust and online sales, a variety of online transactions take place among social networking users. These new forms of e-business models often conceptualized as C2C s-commerce have become one of the most popular methods for consumer online trading. The article proposes four phases of C2C s-commerce (i.e., ad-hoc, empowered, organized,...
Founding proper reading and comprehension abilities of the Arabic written text is of great significance for learners of the language since this is a means for extracting the linguistic and cultural knowledge. This process is complex in Arabic since the script is interwoven and multiple segments can be fused to create a single word which in return complicates identifying word units for new learners...
This paper presents the high-level architecture (HLA) of the research project DEWI (dependable embedded wireless infrastructure). The objective of this HLA is to serve as a reference for the development of industrial wireless sensor and actuator networks (WSANs) based on the concept of the DEWI Bubble. The DEWI Bubble is defined here as a high-level abstraction of an industrial WSAN with enhanced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.