The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
How the brain maintains the stability of visual perception across saccade is a central question in systems neuroscience; accurately characterizing visual responses in the perisaccadic period is an important step towards understanding how the visual world is represented during saccades. Here, we develop a probabilistic model in the Generalized Linear Model framework to characterize and predict the...
In the last years, the Cloud services market experienced an extremely rapid growth, which may lead to severe scalability problems. Therefore, in order to cope with the resource capacity limits of a single Cloud provider, as well as to address the vendor lock-in problem associated to the choice of a single proprietary Cloud solution, the concept of federating multiple heterogeneous organizations is...
Wireless Sensor Networks are attracting during last decades more interest in both civil and military fields. This interest combined with recent advanced in microelectronics drive the Wireless Sensor Networks in the front of the stage. They are emerging as a key solution to monitor remote and/or hostile environments. However, they still faced various challenges among which, power management is one...
Self-diagnosis is a fundamental capability of self-adaptive systems. In order to recover from faults, systems need to know which part is responsible for the incorrect behavior. In previous work we showed how to apply a design-time diagnosis technique at run time to identify faults at the architectural level of a system. Our contributions address three major shortcomings of our previous work: 1) we...
Effective use of monitoring tools demands an understanding of monitoring requirements which system administrators most often lack. In this paper, we propose to replace today's ad-hoc, manual, intuition-based approach with a more systematic, automated, and analytics-based approach for system monitoring. We propose an adaptive monitoring framework where end-to-end probing-based solutions are used to...
Cloud computing provides an efficient way to expose computing capabilities as sophisticated services that can be accessed remotely. It eliminates the need for organizations to maintain extensive infrastructures. Parallel and distributed simulation over cloud will bring us not only the increased productivity and efficiency but also the lower barrier for usage. This paper introduces a private cloud...
Intrusion detection (ID) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. Internet services, and the number of Internet users increases every day this makes networks as a window for...
Top-k monitoring queries are useful in many wireless sensor network applications. There is a well-known approach called FILA to process this kind of queries. Its basic idea is to install a filter at each sensor node to avoid unnecessary transmissions of sensor readings. FILA uses two algorithms to ensure the correctness and efficiency of the approach: a query reevaluation algorithm and a filter setting...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Cryoablation is a minimally invasive ablation technique for primary and metastatic hepatic tumors. Inadequate freezing around large blood vessels due to the warm blood flow can lead to local recurrence, and thus, necessitates close application of a cryoprobe to the large blood vessels. In this study, we constructed a perfusion model with an exvivo bovine liver and ablated the tissue around a large...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.