The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The operation and maintenance of large distributed systems that are subject to high QoS conditions has led to the need of designing and developing advanced monitoring tools that facilitate the administration of the critical services required by the user communities. RASSMon is a portable, reliable, secure software platform able to collect monitoring data from multiple sources in heterogeneous environments...
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often...
Data exchange is a critical issue within the multi-disciplinary engineering process of cyber physical production systems (CPPS). AutomationML (AML) is an emerging standard in the this field to represent and exchange artifacts between heterogeneous engineering tools used in mechanical, electrical, and software engineering domains. However, the interoperability of different exchange standards may be...
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints. This is not merely a problem of vendors lagging behind the state-of-the-art. The theoretical foundations for database security lack adequate security definitions and a realistic attacker model,...
In the next few years the Internet of Things (IoT) is expected to bring together billions of devices, denoted as "smart objects," thus creating an extremely large-scale network of heterogeneous devices, which will provide an unprecedented opportunity to build new applications and forms of interactions that will shape the world. The heterogeneous and dynamic nature of smart objects that will...
The Web of Things is an active research field which aims at promoting Web standards and technologies adoption for handling smart things digital representations. In this context, many studies acknowledge that REST paradigm plays a decisive role, and this has prompted the emergence of systems for Web representation and management of real-world objects. However, objects exposure is only a first step...
Scientific simulations are moving away from using centralized persistent storage for intermediate data between workflow steps towards an all online model. This shift is motivated by the relatively slow IO bandwidth growth compared with compute speed increases. The challenges presented by this shift to Integrated Application Workflows are motivated by the loss of persistent storage semantics for node-to-node...
We present a simple approach to handle recursive SPARQL queries, that is, nested queries that may contain references to the query itself. This powerful feature is obtained by implementing a custom SPARQL function that takes a SPARQL query as a parameter and executes it over a specified endpoint. The behaviour is similar to the SPARQL 1.1 SERVICE clause, with a few fundamental differences: (1) the...
Remote code execution (RCE) attacks are one of the most prominent security threats for web applications. It is a special kind of cross-site-scripting (XSS) attack that allows client inputs to be stored and executed as server side scripts. RCE attacks often require coordination of multiple requests and manipulation of string and non-string inputs from the client side to nullify the access control protocol...
Innovation is a crucial process for enterprizes and pushes for strict requirements towards semantic technologies. Large scale and timely search processes on the Web are here often involved in different business analytics tasks. In the European project INSEARCH, an advanced information retrieval system has been developed integrating robust semantic technologies and industry-standard software architectures...
Web portals are a major class of web-based content management systems. They can provide users with a single point of access to a multitude of content sources and applications. However, further analysis of content brokered through a portal is not supported by current portal systems, leaving it to their users to deal with information overload. We present the first work examining the integration of natural...
We describe Meds tract Plus, a resource for mining relations from the Medline bibliographic database that is currently under construction. It was built on the remains of Meds tract, a previously created resource that included a bio-relation server and an acronym database. Meds tract Plus uses simple and scalable natural language processing modules to structure text, is designed with reusability and...
Service Oriented Architecture (SOA) is more popular than ever in a lot of different application domains. Initially used only at the enterprise level this approach is now spreading to the other layers down to the device level. In this context, the interoperability between the systems and the devices communicating across all domains and layers has to be particularly well defined. This interoperability...
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the server. The multimedia models MPEG-21 and MPEG-7 are used to describe...
Discovery is the task of locating (Web) Services by means of their semantic annotation. Semantic Web Services (SWS) annotate semantic information about their functionality through capability descriptions (e.g. WSMO, OWL-S). Many approaches of automatic discovery and composition of business services take advantage from SWS. However, discovery and composition of general services or discovery based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.