The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A polystore system is a database management system composed of integrated heterogeneous database engines and multiple programming languages. By matching data to the storage engine best suited to its needs, complex analytics run faster and flexible storage choices helps improve data organization. BigDAWG (Big Data Working Group) is our prototype implementation of a polystore system. In this paper,...
In this paper we propose a new adaptive learning framework that classifies learner's based on individual preferences in terms of understanding and processing information. This framework generates learner's learning style based on Felder Silverman learning style model and suggest learning content based on learning style. The paper outlines how the system allows instructors to monitor learner's learning...
BigDAWG is a polystore database system designed to work with heterogenous data that may be stored in disparate database and storage engines. A central component of the BigDAWG polystore system is the ability to submit queries that may be executed in different data engines. This paper presents a monitoring framework for the BigDawg federated database system which maintains performance information on...
With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the users'...
Providers (SP) are wishing to increase their Return of Investment (ROI) by utilizing the data assets generated by tracking subscriber behaviors. This results in the ability of applying personalized policies, monitoring and controlling the service traffic to subscribers and gaining more revenues through the usage of subscriber data with ad networks. In this paper, a framework is developed to monitor...
Data loading is a crucial and well standardized procedure of the usage of modern relational database management systems (RDBMS). If data arises highly frequently and intensive real time analyses are required, single rows need to be imported as soon as they are generated, e.g., By monitoring applications, into a columnar table layout. The experiment described and conducted in this paper, evaluates...
Due to a growing number of Host's intrusions and since the Internet have become so ubiquitous, implementing various systems that monitor system security breaches is inevitable. In this way, Host Intrusion Detection Systems (abbreviated as HIDS) have recently gained a noticeable amount of interest. These defensive systems detect malicious activities on host-based applications. This paper reviews types...
Automation of tedious engineering tasks allows for more efficient plant commissioning and reconfiguration. Usage of knowledge-based systems is one possibility to solve this challenge. We present a rule-based system that is based on declarative graph database queries which have the advantage of being comprehensible by both computer scientists and engineering domain experts. The applicability of the...
Testing-as-a-Service (TaaS) in a cloud environment can leverage the computation power provided by the cloud. Specifically, testing can be scaled to large and dynamic workloads, executed in a distributed environment with hundreds of thousands of processors, and these processors may support concurrent and distributed test execution and analysis. TaaS may be implemented as SaaS and used to test SaaS...
Software security has become a very import part of information security in recent years. Fuzzing has proven successful in finding software vulnerabilities which are one major cause of information security incidents. However, the efficiency of traditional fuzz testing tools is usually very poor due to the blindness of test generation. In this paper, we present Sword, an automatic fuzzing system for...
The management of sensor data is challenging for most scientists or engineers. A cloud database service is a novel effective approach to such data management. In this paper, we presented a SaaS service that is based on a variant of the O&M model and implemented on Google App Engine. This system was applied for the management of sensor data from the water quality monitoring of the Soyang Lake.
Process enactment technology provides native tools and add-ons for monitoring, such as APIs and monitoring consoles, which are usually highly entangled with the underlying process enactment logic and not customizable by process users. In such a case, all users access the same set of monitoring data and functions and process management resources may be allocated for monitoring concerns not of interest...
The Fish4Knowledge (F4K) project involves analysing video generated from multiple camera feeds to support environmental and ecological assessment. A workflow engine is utilised in the project which deals with on-demand user queries and batch queries, selection of a suitable computing platform on which to enact the workflow along with a selection of suitable software modules to use to support analysis...
With big data technology and predictive analytics techniques, organizations can now register, combine, process and analyze data to answer questions that were unsolvable a few years ago. This paper introduces a solution reference that gives guidance to organizations that want to innovate using big data technology and predictive analytics techniques for improving their performance. The reference architecture...
Botnet has become one of the most serious threats to Internet security. Compared with network-based bot detection approaches, host-based approaches can discover more insights of unknown bots, and we may completely eliminate bots if we can successfully detect them on end-host. Host-based approaches mainly include signature and behavior-based detection approaches. In this paper we propose a behavior...
Numerical aging-related bugs, which can manifest themselves as the accumulation of floating-point errors and the overflow of integers, represent a known but relatively neglected issue in the field of software aging and rejuvenation. Unfortunately, it is very difficult to avoid and to fix these bugs, since the rules of computer arithmetic and programming languages are often misunderstood or disregarded...
With the development of IoT technologies, more and more medial sensors have been used to monitor people's health. In this paper, we design a kind of semantic medical monitoring system model in the cloud based on the IoT sensors. Lots of IoT sensors will accept the massive sensor data every time. All these massive sensor data will be stored in the HDFS and some information will be stored into the HUADING-S,...
Current maritime traffic monitoring systems are not sufficiently adapted to the identification of maritime accident risk. It is very difficult for operators responsible for monitoring traffic to identify which vessels are at risk among all the shipping traffic displayed on their screen. They are overwhelmed by huge amount of kinematic ship data to be decoded. To improve this situation, this paper...
Web service discovery is a main challenge despite the enhanced proposed methods based on information retrieval techniques (word sense disambiguation, stemming, etc.), domain knowledge and ontology. Unfortunately, the proposed approaches are, however, complex in practice. Despite the addition of extra information to WSDL documents, discovering a required web service looks like finding a needle in a...
Value of software log file analysis has been constantly increasing with the value of information to organizations. Log management tools still have a lot to deliver in order to empower their customers with the true strength of log information. In addition to the traditional uses such as testing software functional conformance, troubleshooting and performance benchmarking, log analysis has proven its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.