The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Session hijacking attacks of social network websites are one of the commonly experienced cyber threats in today's Internet especially with the unprecedented proliferation of wireless networks and mobile applications. To address this problem, we propose a cache supported hybrid two-dimensional one-way hash construction to handle social networks' user sessions authentication in collaborative applications...
Mobile users access location services from a location based server. While doing so, the user's privacy is at risk. The server has access to all details about the user. Example the recently visited places, the type of information he accesses. We have presented synergetic technique to safeguard location privacy of users accessing location-based services via mobile devices. Mobile devices have a capability...
Collaborative filtering (CF) over large datasets requires significant computing power. Due to this data owning organizations often outsource the computation of CF (including some abstraction of the data itself) to a public cloud infrastructure. However, this leads to the question of how to verify the integrity of the outsourced computation. In this paper, we develop verification mechanisms for two...
This article focuses on the issue of the use of mobile technologies, especially on online Laboratories, as a support to professional development of adults in the work situation in Senegal. More specifically, how mobile learning can be a solution to access to education for nomadic professionals working specifically in the area of computer networks? This issue is at the heart of a doctoral research...
In this study, a cooperative UAV and UGV platform is proposed to obtain a wide range of visual information. The UAV recognizes a pattern marker on UGV and tracks the UGV without user control. It can provide wide range of visual information for a user in the UGV. The UGV by a user is controlled equipped with an aluminum board. And the UAV can take off and land on the UGV. The UAV uses two cameras;...
In the recent past 3D and immersive technologies were not supported by standard business and educational computers. Yet new generations of Intel and AMD processors and improved networking provide a basis for the spread of immersive technologies, into all aspects of education, business and leisure. Consequently, it is critical that computer science and IT degree programs facilitate the graduation of...
Network connectivity offers the potential for a group of musicians to play together over the network. This paper describes a trans-Atlantic networked musical livecoding performance between Andrew Sorensen in Germany (at the Schloss Daghstuhl conference on Collaboration and Learning through Live Coding) and Ben Swift in San Jose (at YL/HCC) in September 2013. In this paper we describe the infrastructure...
To deal with problems of after-sale maintenance service of belt conveyor manufacturers, the service-oriented belt conveyor remote auxiliary repair system is presented. The system network architecture and functional architecture of service-oriented system based on J2EE is presented here. Under this architecture, Auxiliary Repair service of combination of remote expert services and knowledge services...
To a large extend, collaboration and communication consists of the understanding of extrinsic activity. This task is especially hard to achieve in remote settings or also locally when people cannot take part in meetings. In this paper we are addressing the question, if understanding of the essential decisions, facts, and processes can be achieved by just consuming collaboration data afterwards. Therefore,...
In this paper, we present a computer assisted creativity tool based on natural interfaces that allows the creation of distributed collaborative workspaces by merging the real and digital worlds in a tabletop setting. These workspaces are used to promote the exchange and sharing of graphical information by simulating a physical workbench where designers traditionally work with paper sketches, images,...
Information and communication technologies have influenced our way not only to acquire and share knowledge but also to collaborate and communicate. Consequently, this has strongly influenced the way how communities or learners share knowledge and collaborate in various learning environments and settings. In particular learning and collaborating in immersive environments are proving to be effective...
Healthcare data has stringent security requirements for confidentiality, availability to authorized users, and traceability of access. The focus of this study is to investigate on these requirements and propose a solution for healthcare cloud providers that will help in protecting patient' data they host, which is of high importance. The focus will be on specific cloud computing healthcare security...
This paper introduces a new form of collaboration between school and family through the Electronic Handbook developed in our research work, which makes more effective the communication between both. Today is consensual in education sciences consider that collaboration between school and family is a key component in the process of learning and educational success. With the Electronic Handbook, the...
Formal inclusion of current generation mobile phones has not yet occurred in any education system. Indeed, there are applications on the market that can transform mobile devices into tools that students can use; however, there is no official institutional support for such applications, with price and maintenance as a limiting factor. This paper presents the rationale, the specification and current...
Currently, many E-Learning platforms of different qualities are available. Most of them lack in the direct interactivity between teacher and students and among students. In this paper, a framework of virtual classroom model on the Internet is proposed. It connects the advantages of existing offline approaches, like a white board, with the advantages of live streaming systems with many participants...
We hypothesize that information shared on social media can work for distributed software teams as a surrogate of the social awareness, that is information that a person maintains about others in a social or conversational context, gained during informal face-to-face chats. Hence, we have developed a tool that extends a collaborative development environment by aggregating content from social networks...
Deployment of modern technologies, interest of people have diverted from Computer-Supported learning to mobile-supported learning. Mobile learning is greatly demanded in educational organizations to demonstrate the pedagogical activities. Some of MCL supportive frameworks and applications have been introduced in numerous fields to advance the activities of those organizations but they require more...
In Role-based Access Control (RBAC) model, different roles have different permissions, users are treated as members of the respective roles and get the permissions of this roles. In this paper, we use the credit management system as an example, and make use of use-case diagrams, class diagrams and collaboration diagrams of the visualized UML to describe the visualization modeling of RBAC model; At...
A cyber-physical system is treated with a collaborative self-organizing knowledge network model, called Vijjana. While traditional communication between users of Vijjana forms a loosely coupled system, in cyber-physical system it is tightly-bound forming a policy-driven knowledge grid. If there is a compromised security in a cyber-physical system, the knowledge grid bootstraps to a subset grid, isolated...
Dynamic risk evaluation model provides a new way against to the efficiency of traditional static evaluation model which only focused on the results made at a time. It is a model to transfer the information system into topological and combinational construction, users' operation of the information system into the conception of visiting route, the connection between components into independent and collaborative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.