The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We report on a case study on model based testingfor a commercially available telecom software system. A mainpurpose is to investigate how different strategies for test suitegeneration affect quality attributes of the generated test suites, in a realistic industrial environment. We develop a functionalmodel in the form of an extended finite state machine, from whichwe generate test suites using several...
The dynamicity of modern communication networks relays on the switching and routing infrastructure. The Cloud, the Internet of Things, the Big Data, the mobile data communications, the 4k video all demand an even more dynamic network provided by high performance switching and routing infrastructure.
The IEEE Engineering Mobile Service Oriented Systems (EMSOS) Workshop aims to bring together researchers from academia and industry, as well as practitioners in the area of engineering services in mobile environments in order to provide a forum where recent research results can be presented and discussed. The objective is to understand open issues in the software engineering area of services applied...
The use of smart phones and similar devices are increasing day by day and mobile devices are moving towards becoming the mainstream computing hardware. In parallel, the number of mobile applications is increasing exponentially. Besides the many advantages of being mobile, in these applications limited battery power is a fundamental constraint. With "Energy Aware" programming techniques,...
Currently, almost all Spanish Universities offer their students access to a virtual campus consisting essentially of one or more e-learning platforms, which contain the educational material of most of the subjects taught at the university. Although the aim of these e-learning platforms is the learning in virtual format, mainly they are used by the teachers to supplement the lectures (b-learning)....
In this paper, we propose a sensor-based interaction for ubiquitous virtual reality (U-VR) systems that users are able to interact implicitly or explicitly with through a sensor. Due to the advances in sensor technology, we can utilize sensory data as a means of user interactions. To show the feasibility of the proposed method, we extend the Composar augmented reality (AR) authoring tool to add support...
Over the past 20 years, a lot of effort has gone into making the vision of ubiquitous computing a reality. A major focus of this effort has been on the understanding of human activity as input to enable the design and implementation of context-aware applications. Context-awareness is a vital enabling technology for ubiquitous virtual reality applications. However, it is only recently that we have...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
In this paper, we propose an intelligent surveillance system which can detect human, recognize certain postures and activities, and send out informing SMS messages when abnormal activities are detected. Nine static postures can be recognized using universal eigenspace technique and projection histogram matching method. After recognizing static postures, Hidden Markov Models are used to recognize human...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Context-sensitive mobile applications require a certain amount of flexibility due to the fact that they have to provide services for many different situations. The limited resources available make resource management a major challenge in such applications. In this paper, we present different techniques for the efficient use of resources of mobile devices. These techniques support the development of...
Privacy helps to establish personal autonomy and create individualism. Privacy is a state or condition of limited access to a person. In particular, information privacy relates to an individual's right to determine how, when, and to what extent information about the self will be released to another person or to an organization. It can be said that privacy is a much broader concept than security; privacy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.