The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current Internet does not enable easy introduction and deployment of new network technologies and services. This paper aims to progress the Future Internet (FI) by introduction of a service composition and execution environment that re-use existing components of access and core networks. This paper presents essential service-centric platforms and software systems that have been developed with...
The intelligent interaction is an important supporting technique for achieving the merging of the information space and physical space in the internet of things. For now there isn 't a general architecture of the intelligent interaction in the environment of the internet of things. In this paper, we propose an intelligent interaction architecture based on the context merging in the internet of things...
The programmable network envisioned in the late 1990s within standardization and research for the Intelligent Network is taking another attempt to come into reality using IP-based Next Generation Networks (NGN) and Application Programming Interfaces (API) for open developer access. Adopting technical concepts of providing high-level APIs for open service access from the Internet and World Wide Web...
A Cyber-Physical System (CPS) is defined as integrations of computation and physical processes. In CPS, downsized embedded devices monitor and manage the physical process. Mobile Internet Device (MID), as a portable handheld device designed for mobility providing a down-graded computing capability, can be used as a strong candidate for client-side devices in CPS. Since these physical devices have...
Methodology of automatic generation of test cases based on Model Driven Architecture is proposed, and its design and implementation have be done. The process of generating test cases is that a platform-independent model is converted into a platform-independent test model through level conversion, and the platform-independent test model is converted into the corresponding test cases through vertical...
Document processing has the characteristics of MVC. By using MVC pattern, a document processing system can be divided into the roles of model, view and controller. This article proposes a framework of office document processing based on MVC and XForms and discusses the key technologies of on-line office document processing system, as well as how to recognize and separate model, view and controller...
Due to technological advances of handheld computing and communication devices, Mobile commerce (M-commerce) has emerged and attracted a growing number of research efforts. M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. In this paper, we discuss some...
Today's e-learning environments are still far from being accessible for people with disability. Furthermore, the availability of accessibility guidelines, the diversity of the e-learning platforms and evolution of assistive technologies do represent just a partial solution. In fact, adopting the accessibility since the design phases could provide a rational solution. Therefore, the application of...
Cloud Computing raises numerous questions about the implementation and deployment of Service-Oriented Architecture (SOA) and virtualization. It also raises questions related to services contracts, their management and verification, independently of services migration within the Cloud(s). Issues and solutions related to the verification of contracts compliance are referred as Service Level Checking...
The modern Web architecture basically follows the Representational State Transfer (REST) style. This style offers the architectural properties necessary to implement the Internet-scale Web. However, most authentication and delegation technologies that rely on session state actually deviate from the REST style. It must be noted, however, that the diversity of these technologies is imperative for the...
CUBIQ is a common and shared platform which mediates diversified sensor systems and ubiquitous applications. The platform enhances ubiquitous applications through diversified federations among sensors, services and applications. The platform offer transparent context data access, real-time and scalable data dissemination and processing and intelligent service collaborations.
The DynaSOAr framework presents a wholly service-oriented approach to grid and Internet-based computing that makes a clear and explicit separation of concerns between service-provision and resource-provision for each service invocation. The separation allows the dynamic deployment of code at runtime, in the form of a service implementation, between a service provider and an explicit resource provider...
We describe an access control model that has been implemented in the web content management framework “Deme” (which rhymes with “team”). Access control in Deme is an example of what we call “bivalent relation object access control” (BROAC). This model builds on recent work by Giunchiglia et al. on relation-based access control (RelBAC), as well as other work on relational, flexible, fine-grained,...
Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based interaction models. Due to the dynamics in such systems, networks are in a state of constant flux and change. Several fundamental concepts, including discovery, interactions, task delegations and executions are no longer based on static...
Distance learning has developed greatly in recent years, and several major technological approaches have been defined. One of these is t-learning, that is, the provision of educational services over Interactive Digital TV. In this paper, we present a Java-based software architecture for the development of distributed t-learning applications and services, based on freely available technologies. The...
The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented Architecture (SOA) approaches traditionally used to couple functionality...
Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented...
Many failures associated with software development in particular Web-based applications are due to poor awareness of risks involved and the weak management of these risks. Hence, effective risk management has become the essential factor in ensuring the success of the Web project management. We propose RIAP (Risk Identification Architecture Pattern) model to manage risks in Web projects. It has been...
Change impact analysis (CIA) approaches are mostly developed based on the understanding of both system development process and system architecture. It is thus reasonable to assume that if the development process or system architecture is fundamentally different, then CIA approaches must address these differences accordingly. This is particularly relevant in the context of Web systems, given that these...
As telecom carriers migrate their networks to a common IP multimedia subsystem (IMS) based infrastructure, they face a challenge of providing services to their customers based on the current need or situation of the customer. We have seen how Web 2.0 allows a user to build situational applications or mashups. We have used the concept of context to provide a framework to service providers for providing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.