The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber infrastructure remains vulnerable. Communications systems lack resiliency, a characteristic common to many natural systems. In this work, we present an interdisciplinary neurotechnological approach to considering resilience in cyber communications systems. A model for communications systems security is reconciled with corresponding models of physiological situational awareness and cognitive...
In this paper we present aspect composition using model transformation language - ATL. The aspects are represented as UML sequence diagrams. We propose and implement complete composition algorithm using three ATL transformation models - JoinPointsCount, Instantiate, and Compose. The JoinPointsCount transformation determines the number of join points in the primary (core system) model. The Instantiate...
Model-driven development is gaining importance in software engineering practice. This increasing usage asks for a new generation of testing tools to verify correctness and suitability of model transformations. This paper presents a novel approach to unit testing QVT Operational (QVTO) transformations, which overcomes limitations of currently available tools. Our proposal, called MANTra (Model transformation...
In this article we illustrate and discuss a techno-centric aspect of re-engineering realized on an existent TEL system: the Apprenticeship Electronic Booklet. Although this system has been designed with end-users following a participatory process, the first version had also been found too rigid in regard to the roles management and to the underlying academic structures. In order to improve this TEL...
Next Generation Ambient Intelligent Environments (NGAIEs) will offer intelligent and trustworthy services (although probably not for free), will be populated with Ambient Ecologies of smart objects, and will support the Activity Spheres of their multiple occupants. Ubiquitous computing applications will be composed from heterogeneous services offered by objects connected via the web and NGAIEs. These...
Distributed collaboration in a shared workspace involves flexible switching between emerging collaboration situations demanding appropriate technology support thus requiring modification of the shared workspace. We argue that manual tailoring creates large overhead for team members that can be reduced by employing our context-based adaptation approach. Six requirements for team-based adaptation of...
Recommendation technologies are considered a major technological trend in both industrial and academic environments. This growing interest was highlighted by, e.g., the Netflix prize which generated an intense competition. Recommender systems are crucial to support users and help them by suggesting resources relevant at a given instant. On the other hand, these systems are a core piece of e-commerce...
Simulation is a ??simple?? method to experimentally evaluate the behavior of algorithms designed for parallel and distributed platforms. Moreover, the reliability of the evaluation strongly depends on the models used inside the simulator. This paper is devoted to the study and the evaluation of the behavior of the SimGrid simulator through a comparison between a simulated and a real execution of the...
Since software systems become more and more complex, the efforts for developing, documenting and executing meaningful test cases increases. Testing is a vital, but time- and resource-consuming activity. To avoid running out of time or budget, new test methodologies had to be established in order to increase reliable, yet maintainable test scenarios. In the last years the Model-Driven idea matures...
Reconfiguration and self-management are important properties for systems that operate in hazardous and uncontrolled environments, such as inter-planetary space. These systems need a reconfiguration mechanism that provides recovery from individual component failures as well as the ability to dynamically adapt to evolving mission goals. One way to provide this functionality is to define a model of alternative...
This paper identifies and discusses a set of conceptual issues relating to institutional strategies for enabling the embedding of learner-centric hybrid learning processes within educational institutions. Starting with the Ecology of Resources model of learning, we identify "filters" that limit the adoption of new and hybrid learning processes in formal contexts. The related "boundary"...
Model-Driven Development (MDD) facilitates the synthesis of application programs from models using customized, domain-specific model processors. MDD appears in many, different areas including telecommunication services, communication protocols, enterprise networking and multimedia systems. Model compilers can be realized by graph rewriting-based model transformations, where constraints ensuring the...
The business model concept has only recently been discussed in the research literature. Some authors have pointed out that it is a second-order construct and have examined its theoretical underpinnings as a cognitive mechanism for opportunity perception and identification, using it as a tool to systematically approach the analysis of the beliefs and decisions that entrepreneurs use in building their...
This study uses Protection Motivation Theory (PMT) as a theoretical framework to empirically test why people back up data on their personal computers. The theory was tested using 112 surveys collected using both paper and online data sources. The findings show that computer self-efficacy and response efficacy both positively affect the backing up of data, while perceived security vulnerability and...
Creating a universal conceptual modelling method, which can be used without modification in all situations, is not feasible. Appropriate methods for problem solving must be chosen, adapted or designed depending on the characteristics of the (pre )supposed application. However, analyses reveal that the situativeness of documented adaptations is not as situational as method engineering theory tends...
Service Oriented Architecture (SOA) is an emerging architectural style for the development of interoperable, agile, large scale and distributed software systems. Such systems are based mainly on services as core building blocks which may interact with several types of service clients. Hence, the central problem is how to deal with the challenge of adaptability of such services. The present paper proposes...
We propose the development of a framework for the dynamic interpretation of trust models, defined via a domain specific language. A trust model usually defines abstractions, the interpretation of which change in conjunction with changes in the domain or changes in the context in which the program executes. In a scenario where trust model assumptions encoded in the DSL change, programmers must still...
Digital systems have been rapidly evolving within highly dynamic and unstructured environments, where the lack of a central authority forces entities to interact with each other through collaboration and negotiation. Digital agents often use Trust models in order to compute the level of trustworthiness of the partner they want to collaborate with. Unfortunately, due to the evolution speed of open...
Air travel is becoming increasingly more accessible to people both through the availability of cheap flights and because the airlines are now able to cater for individuals of all ages and disabilities. Air travels, especially for long haul, may cause both physiological and psychological discomfort to passenger. Passenger comfort is clearly a main factor in user's acceptance of transportation systems...
For the realization of language-independent, effective, and user-friendly model versioning systems, generic and efficient conflict detection is essential for correct and complete identification of conflicts caused by parallel modifications on one artifact. Usually, the genericity of the conflict detection costs a high price: language-specific operations and refactorings often remain undetected. Consequently,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.