The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the number of IoT devices explodes, we observe numerous IoT platforms which enables us to build applications, manage, and integrate things connected to the Internet. We identify key technologies embedded in contemporary IoT platforms as follows: virtualization, restful API, database for history, visualization, and mash up. Most IoT platforms are heavy-weight in terms of software or hardware and...
Provenance awareness adds a new dimension to the engineering of service-based systems, enabling them to increase their accountability through answering questions about the provenance of any data produced. Provenance awareness can be achieved by recording provenance data during system execution. In our previous work we have proposed an overall research agenda towards a design and analysis framework...
This paper describes a ubiquitous learning log system called SCROLL (System for Capturing and Reminding of Ubiquitous Learning Log). The aim of SCROLL is to aid users to simply capture the learning logs they have learned, review and reflect their old learning logs, reuse the knowledge when in need, be reminded at right time at right place and be recommended others' learning logs properly. Both its...
Nowadays, advertisers and content publishers are constantly struggling to find the best advertising strategies to promote their services. They need to be able to reach the target population that is potentially interested in their products or services, without being too tiresome, and to deliver the content properly in order to capture users' attention. In this paper we describe a system that uses pervasive...
As business processes continue to gain relevance in different domains, dynamicity is becoming a great concern. Static processes no longer cover the actual needs of constantly changing environments, and process adaptation is a must in order to maintain competitive levels. While creating dynamically adaptable business processes can be a challenging task, undoing these adaptations is a natural functionality...
We propose a system for the acquisition, maintenance, and communication of Real-World Achievements. The concept is based on online entertainment systems like Microsoft's XBox Live or virtual worlds like World of Warcraft. The system design is centered around a global database of achievement definitions and individual progress. Focus is put on flexibility to track achievement-related actions and instantaneous...
Non-functional requirements (NFRs), such as security and cost, are generally subjective and oftentimes synergistic or conflicting with each other. Properly dealing with such NFRs requires a large body of knowledge-goals to be achieved, problems or obstacles to be avoided, alternative solutions to mitigate the problems, and the best compromising alternative solution to be selected. However, few patterns...
With the emergence of pervasive environment, mobile recommender needs to make use of user in-time contextual information to provide personalized recommendation. In this paper, a proactive context-aware news recommender in mobile hybrid P2P network is designed and implemented. We develop a general Analytic Hierarchy Process (AHP) model through empirical studies. We discuss how the relative weight of...
Correct navigational behavior of a web application is essential to its reliability. An effective means to improve our confidence in the correct behavior of a web application is to test it by exploring the possible navigation among the webpages at client side: The tester carries out the testing by consecutively clicking the hyperlinks along with some possible search parameters and checking whether...
When software repositories are mined, two distinct sources of information are usually explored: the history log and snapshots of the system. Results of analyses derived from these two sources are biased by the frequency with which developers commit their changes. We argue that the usage of mainstream SCM systems influences the way that developers work. For example, since it is tedious to resolve conflicts...
The dynamic nature of service-oriented architectures challenges traditional systems management practices which tend to be static in nature. We propose a goal-oriented, agent-based approach to management using autonomic computing. In this paper we define a services management model that consists of a number of constructs including managed resources, agents, events, event streams and management goal...
To provide consumers with the right information at the time of need, we developed a SmartSearch application that is able to extract a user's situational interests from usage data. It automatically constructs search queries based on situational interests. We extract the situational interests automatically without prior training and user involvement. In addition, SmartSearch is a client-side solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.