The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article describes approaches to building a set of nodes and blocks that are sufficient to create the matching processor for the parallel dataflow computing system. Investigations of various sets of nodes and blocks of the matching processor have been carried out. As a result, some regularities were revealed characteristic for hardware-software solutions that implement the dataflow computing model...
A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing...
In mobile computing developers will need to develop applications that will interact with the end user. Context-aware applications notify or ask users what they want based on what they have sensed or on a user profile. Event-driven mobile computing detects conditions of interest to users and notifies them accordingly. In this paper we discuss the importance and challenges in designing event-driven...
In this paper, the fundamental idea of Incremental Granular Models (IGM) introduced by Pedrycz and Kwak (2007) is followed and their comprehensive design framework is developed. In contrast to typical rule-based systems encountered in fuzzy modeling, the underlying principle of IGM is to consider a two-phase development. First, we build a Linear Regression (LR) model which could be treated as a global...
Deep learning subsumes algorithms that automatically learn compositional representations. The ability of these models to generalize well has ushered in tremendous advances in many fields such as natural language processing (NLP). Recent research in the software engineering (SE) community has demonstrated the usefulness of applying NLP techniques to software corpora. Hence, we motivate deep learning...
With the explosion of the usage and capabilities of mobile devices, software deployment is getting more and more complicated. In order to tackle the difficulty of achieving adaptive and distributed deployment, a deployment-oriented development process is presented in this paper. While existing deployment methodologies are lack of variability concern, the approach takes advantage of a variability model...
To stay competitive, enterprises must respond to changes as effectively and efficiently as possible and ensure the employed courses of action, whether in response to change or even to optimize business as usual, fall within the purview of internal and external directives. Often, the traceability from change drivers that led to specific directives being applied to actual business rules implementing...
The competence-based formation model has oriented educational policies in different countries during the last decades. From this model, the socio-formative approach has its basis and works as a referent in Latin America to orient the formation and competence assessment. The socio-formative approach uses the methodology of the formative projects by means of an articulated set of pedagogical strategies...
Large-scale context-aware pervasive environments are dealing with context information of every user for every domain supported. They have to represent every user's personal situation that typically consists of overlapping contexts while caring for the privacy of their users. The contexts are not necessarily all the same for different users that are part of a specific situation. Furthermore, they are...
Due to the increasing complexity of communication infrastructures in the automotive domain, reliable models of embedded system architectures are necessary in order to assist designers in the development process. In this context, transaction level modeling, supported by languages as SystemC, is a promising solution to allow performances of networked architectures to be assessed with different compromise...
Hardware accelerators such as GPGPUs and FPGAs have been used as an alternative to the conventional CPU in scientific computing applications and have shown significant performance improvements. In this context, this work presents an FPGA-based solution that explores efficiently the reuse of data and parallelization in both space and time domains for the first computational stage of the RTM (Reverse...
Test automation is a challenging activity. The design of test architectures for enabling the automatic execution of test cases is a hard task to be executed. For Real-Time Systems (RTS) the difficulties of developing good test architecture are increased because of their inherent characteristics (e.g. concurrence, timing constraints and reactivity). To support the test architecture design, the OMG...
Software development processes have become highly complex with the increase in the complexity of software systems and their architectures. It is widely recognized that requirements engineering (RE) is a critical part of this process, along with the design of a system's software architecture with which to satisfy requirements. In this paper, we aim to provide a methodological approach for Architecture-oriented...
In this paper we present an hybrid architecture for a computer supported collaborative work in pervasive computing environment simulator. This architecture supports pure simulation mode where all agents are simulated, real deployment where it seamlessly integrates pervasive computing to the computer supported collaborative work and finally an hybrid mode where real devices can interact with simulated...
Varied context reasoning approaches are used across a variety of applications in the pervasive computing domain including: health monitoring, intrusion detection, airport security and military target tracking. The same types of context are being inferred in diverse ways across a number of platforms. For example, human activity has been inferred using a number of statistical, ontological, and logical...
Context awareness is one of the most fundamental issues in pervasive computing. In this paper, an ontology based context model is proposed, which defines "high-level" context ontology to provide basic concepts for sharing and managing context information. Our context model takes QoS and Security supporting into account. In addition, a context aware architecture based on semantic web service...
With the growing number of mobile devices connected to the network, demand for appropriate services according to the situational contexts of users is increasing. However, building such context-aware applications is costly because both the environments of users in the real world and available services on the network are dynamically changing. In this paper, we propose a Context Sharing Message Broker...
Wireless sensor networks offer significant improvement over traditional sensor networks. Wireless sensor network (WSNs) consists of small sensor nodes, which are capable of sensing, processing and wireless communication capabilities. Recently Context-aware computing is an area of interest in WSN's. Context aware computing (CAC) is a paradigm in which applications make use of contextual information...
MDA is a current trend that shifts the focus and effort from implementation during the development process to models, metamodels and transformations. The four-layer MDA architecture still suffers from the lack of formalization of its artifacts and processes leading to ambiguity and low reliability problems. For instance, currently there is no way for ensuring that MDA transformations are semantic-preserving...
One most important character which makes it hard for pervasive computing is that the environment contexts of the running program vary with the continuous migrating of user, and even the context in a geographical fixed space changes all the time. It makes the services which include software utilities, devices functionalities, etc. not always available. This requires the program behavior to be able...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.