The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Insider threats are a growing problem in today's organizations. Detecting such attacks is especially challenging because most system owners and system administrators use networks to remotely manage the systems they are responsible for. In previous work, we introduced the Autonomic Violation Prevention System (AVPS) that has a scalable architecture to deal with such threats. This system uses low level...
Recent developments in the field of Information & Communication Technology (ICT) have led to a large scale installation of computing devices connected to each other via different networking technologies. But the scale, complexity, dynamism and heterogeneity of these devices have rendered networks, systems & applications insecure, unmanageable & brittle. Soon the number of these devices...
In this work, we explore context-aware application scenarios that become possible utilizing semantically-rich information derived from real-world mobility and presence traces. Traces produced by people carrying personal mobile devices, capturing social and contextual interactions, serve as enables for Future Internet applications. We discuss the fundamental concepts, technical issues and related research...
In this paper, we propose an area-based communication detection system. We aim to detect conversations with their attributes, such as communication length, communication members, relationship among members, and subjects. We think extracting correlations between conversations' attributes and office worker productivity is important for office worker productivity improvement. To evaluate our proposed...
With the penetration of smart-devices and intelligent home-appliances, M2M (machine to machine) communication has opened the door of new prospects for us. The success of such M2M networks depends on its human involvements at the least possible level. In this context, policy based management has huge potentials to be used for M2M communication. This paper presents such a policy based management framework...
With the rapid expansion of information in the network environment, it brings many challenges for information retrieval staff. It seems to be a pair of contradictions between the searchers' retrieval skill and the rapid expansion of information. On the one hand, the website developers must carefully consider arranging the retrieval key words in order to ensure the users to be able to meet their needs...
Bid sniping is a dubious practice used in online auctions whereby a bidder makes a bid in the closing moments in an attempt to deny other bidders time to react. The primary goal for a bid sniper is to win the auction for the lowest price possible, without the risk of being forced into submitting any higher bids if there is competition for the item. This paper investigates the phenomenon of bid sniping...
At a recent meeting of monitoring experts from nine large supercomputing centers, there was a broad divergence of opinion on what monitoring in our environment actually is, what ought to be monitored, what technology should be used, etc. Broad consensus can be summarized in a couple of key points: • Data management is increasingly a problem. As a result, historical information is rarely kept, or,...
Nowadays, we are assisting to a paradigmatic shift for the development of web applications due to the pervasive distribution of their components among a lot of servers, which are dynamically interconnected by web links. As a consequence, the application logic is often defined by exploiting workflow languages since they are more suitable to address the complexity of these new running environments....
Botnets are emerging as the most significant threat facing online ecosystems and computing assets due to their enormous volume and sheer power. It is a major challenge for cyber-security research community to combat the emerging threat of botnets. Most of useful approaches for botnet traffic detection are based on passive network traffic monitoring and analysis. Nevertheless, typical network traffic...
Much recent research is concerned with overcoming limitations of existing video surveillance systems, particularly for use in automatic human tracking systems. This paper presents detection methods which detect a lost target person during track in automatic human tracking system. The detection methods utilize an algorithm which determines the position of neighbors in a system of video cameras. By...
The growing complexity of applications, huge data volume and the data structures to process massive data are becoming challenging issue. Query optimizer is a major component of a Database Management System (DBMS) that executes queries through different strategies and techniques efficiently. These techniques select the best optimal execution plan from the candidate plans according to the available...
The evolution of computer is started from human dependent to self-management. With the development of technology, people want to manage the complex systems in an efficient and reliable manner. Database Management Systems (DBMSs) started from the single user with limited operations; and with the passage of time more functionality is added to meet the need of the users. Maximum number of operations,...
Human world is becoming more and more dependent on computers and information technology (IT). The autonomic capabilities in computers and IT have become the need of the day. These capabilities in software and systems increase performance, accuracy, availability and reliability with less or no human intervention (HI). Database has become the integral part of information system in most of the organizations...
We consider the problem of identifying obscure chat-like botnet command and control (C & C) communications, which are indistinguishable from human-human communication using traditional signature-based techniques. Existing passive-behavior-based anomaly detection techniques are limited because they either require monitoring multiple bot-infected machines that belong to the same botnet or require...
Autonomous robots that operate in real-world domains face multiple challenges that make planning and goal selection difficult. Not only must planning and execution occur in real time, newly acquired knowledge can invalidate previous plans, and goals and their utilities can change during plan execution. However, these events can also provide opportunities, if the architecture is designed to react appropriately...
The determination algorithm of neighbor video cameras by deployed position and view distance of video camera is introduced in this paper. This algorithm is utilized to determine the neighbor video cameras in the automatic human tracking system. The automatic human tracking system is enhanced video monitoring system utilizing the mobile agent technologies. Information of the neighbor video cameras...
An ideal engineering computational environment for solving design problems should be flexible, which is characterized by helping designers to establish solution strategy conveniently and integrating design resources effectively. In this paper, a flexible engineering computational system called engineering computational service grid (ECSG) based on grid portal technology and workflow technology is...
Stakeholders of smart home development often request personalized requirements based on existing services. Requirements under the environment may change at any time even when services are provided correctly, since the stakeholders eventually change their intentions. Evolvability is essential to adapting to the dynamic and ever-changing requirements in response to contextual feedback. To support software...
In a telecom, field workers visit many customer sites to provide services and repair faults. Scheduling the workers is hard because there are many tasks and the number of the workers is not sufficient. To tackle this problem, KT had transformed the field workers into ubiquitous workers and used work team based scheduling system. However, this approach was not sufficient to reduce frequent worker's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.