The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent attentions on video analysis have led to the extensive enhancement of computer vision technologies. However, it is still necessary to closely monitor the results of video analysis by human operators. This paper introduces a trajectory-based scene retrieval system that can help human operators look closely at desired scenes based on a trajectory query. The system includes the index and mapper...
This paper describes the result of the work started in the first Cloud Computing session in WETICE 2009. During the last seven years, collaboration from participants in WETICE has resulted in a new computation model and a commercial product that advances the state of the art in infrastructure agnostic distributed application life-cycle quality of service management. In WETICE 2016, celebrating its...
In wireless ad hoc networks, misbehavior of nodes in computation of backoff value is one of the problems that affects the performance at MAC layer. To overcome this problem, this paper proposes a solution in which Contention Window subrange is specified by the receiver to the sender through CTS/ ACK packet. The advantage of sending the Contention Window subrange is, it is easier to detect the misbehaving...
Reliability of a cooperative decision mechanism is critical for the proper and accurate functioning of a networked decision system. However, adversaries may choose to compromise the inputs from different sets of components that comprise the system. Often times, the monitoring mechanisms fail to accurately detect compromised inputs; hence cannot categorize all inputs into polarized decisions: compromised...
The service delivery model of cloud computing acts as a key enabler for big data analytics applications enhancing productivity, efficiency and reducing costs. The ever increasing flood of data generated from smart phones and sensors such as RFID readers, traffic cams etc require innovative provisioning and QoS monitoring approaches to continuously support big data analytics. To provide essential information...
Subspace clustering is a useful tool for analyzing large complex data, but in many relevant applications missing data are common. Existing theoretical analysis of this problem shows that subspace clustering from incomplete data is possible, but that analysis requires the number of samples (i.e., partially observed vectors) to be super-polynomial in the dimension d. Such huge sample sizes are unnecessary...
One of the obvious challenges in cloud environments is trust crisis and its influence on the development of cloud computing. This paper analyzes the similarities and differences between cloud computing and other distributed environments, proposes the concept of trust and three different directions of trust-oriented research in cloud environments. According to three directions of trust-oriented research,...
Self-healing system attempt to enable computing systems to automatically discover, diagnose, and repair (or at least mitigate) faults without human intervention, thus it is a potential approach to improve the dependability and autonomy of computing system. A model-driven approach for modeling and analyzing the self-healing computing system is proposed in this paper. In our approach, the function part...
Cloud computing and virtualization platforms grant on demand access to resources and services independently of complex underlying infrastructure. Resources can be added or removed on the fly. In this paper we propose a cloud monitoring method based on prediction. The goal of this method is to 1. achieve monitoring state alert prediction 2. forecast virtual resource usage of the cloud system
This position paper explores the possibility of building autonomic systems using super-agents, virtual organizations of one or more agents that seek to govern a complex resource. The paper discusses first a control-loop suitable for building self-governed agents as an attempt to extend the original idea of autonomic managers with self-governance. It then sketches the structure of super-agents and...
In order to obtain full value from Business Process Management (BPM) solutions, small and medium-sized enterprises (SMEs) need to adopt an integrated suite approach that combines the Enterprise Resource Planning (ERP) functionality with the extended process capabilities. In this paper we propose a unified configurable architecture (UCA) to simplify and quicken the implementation of a BPM solution...
Cyber-physical systems denote a new modeling paradigm that promotes a holistic view on complex systems. These systems have been studied before from various particular perspectives using paradigms like ubiquitous and distributed computing or embedded and hybrid systems. In modeling cyber-physical systems one has to consider the interaction between physics, computation and communication (networking),...
UML is the de-facto industry standard to design object-oriented software. UML provides a set of diagrams to model every aspect of an object-oriented application design in sufficient detail, but lacks any mechanism to rigorously check consistency between the models. Today, most of the effort is applied on creating accurate and consistent UML models rather than implementing the design. Automatic code...
Present and future semiconductor technologies are characterized by increasing parameters variations as well as an increasing susceptibility to external disturbances. Transient errors during system operation are no longer restricted to memories but also affect random logic, and a robust design becomes mandatory to ensure a reliable system operation. Self-checking circuits rely on redundancy to detect...
The paper addresses the problem of creating a comprehensive fault injection environment, which integrates and improves various simulation and supplementary functions. This is illustrated with experimental results.
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
In this paper, we aim to construct quantifying trust model based on service level agreements (SLAs) as well as feedbacks from service consumers. The proposed model can aggregate the feedbacks weighted by both trust factor and similarity factor to give quantitative prediction of the target services' trustworthiness. By comparing with traditional prediction algorithm, we show that our methodology gives...
Summary form only given. Invariably, new technologies introduce new vulnerabilities which often enable new attacks by increasingly potent adversaries. Yet new systems are more adept at handling well-known attacks by old adversaries than anticipating new ones. Our adversary models seem to be perpetually out of date: often they do not capture adversary attacks and sometimes they address attacks rendered...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
This paper presents an eye-gaze tracking system based on the image processing. All the computations are performed in software and the system just needs a PC camera attached to the user's computer. We first extract the facial regions form the images using the skin-color model and connected-component analysis. Then the eye regions are detected by employing the rules and area segmentation. After the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.