The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This demo presents a Security Service Level Agreement (SSLA) management solution for the cloud. In this work we aim to bind security in the Service Level Agreement (SLA) as a measurable and agreeable parameter between cloud service provider (CSP) and the customer. To achieve this, we allow cloud customer to choose between different security levels when negotiating the SLA and then our automated SLA...
We propose a unified framework called Collaborative Harmonized Open Radio Ubiquitous System (CHORUS) that can jointly optimize heterogeneous wireless networks. To support large-scale collaboration, cognitive synergy is exploited to collect the status of multiple radios and layers, namely the network state information (NSI). Based on cognition results, resource virtualization and harmonious collaboration...
Contextual information are used to describe situations of entities (users and devices) and their interactions. Applications need such information in order to adapt their behaviour in response to changes in the entities context. In certain scenarios and in particular machine to machine, the integration of a large number of components makes the management of the generated contextual information a very...
The goal of the CBDP project is to create a platform for the Digital Personality management. The concept of Digital Personality refers to the capacity to capture the user's personality in a digital way. The digital personality depends on the context of its application. This means that the user's preferences, sensors, actuators are different from application domain to application domain. The CBDP project...
Policing a wireless network is an evolving and exciting paradigm, specially emphasized with the emergence of cognitive radio networks. The possibility to manage radio resources efficiently and achieve different goals imposed by different stakeholders with dynamically changing policies in a wireless network is the main advantage of the policy based cognitive system. Moreover, the ability to express...
This paper describes the design and implementation of backward chained clustered RDFS reasoning in 4store. The system presented, called “4s-reasoner”, adds no overhead to the import phase and yet performs reasonably well at the query phase. We also demonstrate that our solution scales over clusters of commodity servers providing an optimal solution that balances infrastructure cost and performance...
Cognitive radio networking is a technology aiming to improve wireless spectrum utilization. The classical concept of spectrum owning license by different stakeholders is not valid in cognitive environments, where radios can dynamically access the spectrum. The dynamic spectrum access by cognitive radio devices requires abandoning the current concept of preprogrammed policies. Rather than that, it...
In order for Semantic Web applications to be successful a key component should be their ability to take advantage of rich content descriptions in meaningful ways. Reasoning consists a key part in this process and it consequently appears at the core of the Semantic Web architecture stack. From a practical point of view however, it is not always clear how applications may take advantage of the knowledge...
We will describe a dynamic federated autonomic networking system for the testing of netcentric systems across organizations. Using a suite of policy-based management software tools, our system can provide netcentric missions with self-configuring, self-debugging, self-healing, and self-protecting capabilities across end-to-end coalition networks. The novelty of our system originates from: (1) A multi-party...
Uncertainty is an innate feature of intrusion analysis due to the limited views provided by system monitoring tools, intrusion detection systems (IDS), and various types of logs. Attackers are essentially invisible in cyber space and monitoring tools can only observe the symptoms or effects of malicious activities. When mingled with similar effects from normal or non-malicious activities they lead...
With the deep prevalence of the wireless network and sensor technology, the real time monitoring system with some application environment comes true gradually. This article designs a feasible intelligent home-hospital system (IHHS) to a certain extent through the pivotal context-aware technology which plays an important role in the area of the pervasive computing and the wireless sensor network (WSN)...
Applications in context-aware computing continuously change their operations based on sensor data or services provided by various physical spaces in the real world, such as persons, shops and homes. We propose a gateway framework for physical spaces in this paper, which serves as a middleware platform for context-aware applications to access data from sensor networks deployed in these spaces. The...
In a pervasive computing environment, the personalized recommender system incorporates contexts into recommendation and becomes a multiple dimensional decision expert system. In this paper, we present DFre, a distributed fuzzy reasoning engine for personalization recommendation. With difference from those existing rule-based systems, the DFre puts an emphasis on the distribution of the recommendation...
This paper deals with the current techniques most efficient for the detection of incidents in Critical Systems. Here it is explained how detection is implemented through rules and algorithms and how correlation can be done in the most powerful way.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.