The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Massive multiplayer online games are large-scaled distributed systems to handle a huge amount of simultaneous players. Thus, development costs can be enormous. To deal with this, it is necessary to reduce redundant development steps in such distributed systems, e.g. by using code generators and model analysers to build components from already existing knowledge. Such knowledge could be the unique...
NFV together with SDN promises to provide more flexible and efficient service provision methods by decoupling the network functions (NFs) from the physical network topology and devices, but requires the real-time and automatic composition and verification for service function chain (SFC). However, most of SFCs today are still typically built through manual configuration processes, which are slow and...
Programmable dataplanes are emerging as a disruptive technology to implement network function virtualization in an SDN environment. This technology can be further enhanced by using data plane abstraction with stateful processing. In this paper we focus on real world use cases with stateful forwarding requirements to validate Open Packet Processor data plane abstraction. We first demonstrate the suitability...
The relevance of data created in or about the IoT has a strong reliance on the context, especially spatiotemporal context, of the device and application perceiving it. To ensure that applications perceive data items that are relevant to the current context, it is necessary to restrict when each item is available. To control an application's perceptions of data availability, data items are often put...
Applications based on micro or web services have had significant growth due to the exponential increase in the use of mobile devices. However, using such kind of loosely coupled interfaces provides almost no guarantees to the developer in terms of evolution. Changes to service interfaces can be introduced at any moment, which may cause the system to fail due to mismatches between communicating parts...
Software testing plays a major role for engineering future systems that become more and more ubiquitous and also more critical for every days life. In order to fulfill the high demand, test automation is needed as a keystone. However, test automation, as it is used today, is counting on scripting and capture-and-replay and is not able to keep up with autonomous and intelligent systems. Therefore,...
Security, interoperability, scalability, and mobility support are key challenges for the Internet of Things (IoT). Information Centric Networking (ICN) is an emerging paradigm for the Future Internet design that brings all the potential to face these challenges thanks to name-driven networking primitives. As a matter of fact, ICN natively supports multicast, mobility, content oriented security, and...
We explore a reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and authenticity of every access to every system object. Access decisions are administered by a security logic server implemented as an extension of the peripheral bus. Initial results show a minimal increase in resource...
With the expansion of mobile computing and mobile data services, the number, type, and application of location-based services will continue to expand rapidly in the coming years. These apps have attracted the interest of users from different fields, such as gaming, mobile commerce, navigation systems, emergency services, and various tracking systems. As these apps use large volumes of location data...
We present a novel approach for detecting malicious user activity in databases. Specifically, we propose a new machine learning algorithm for detecting attacks such as a stolen user account or illegal use by a user. Our algorithm relies on two main components that examine the consistency of a user's activity and compare it with activity patterns learned from past access. The first component tests...
ith the wide deployment of various kinds of sensors in fixed infrastructures and in mobile devices, technologies and applications of crowd-sensing has drawn attentions in the fields of mobile computing. This paper studies the design of frameworks for crowd-sensing process in a distributed environment. We discuss the realization of the compatibilities of devices and services, as well as the algorithms...
This paper discusses the design and development efforts made to collect data using an opportunistic crowdsensing mobile application. Relevant issues are underlined, and solutions proposed within the CHIST-ERA Macaco project for the specifics of collecting fine-grained content and context data are highlighted. Global statistics on the data gathered for over a year of collection show its quality: Macaco...
Scalability is an important requirement in the development and the operation of applications in a cloud environment. To handling heavy concurrency in the input load, many design-related and operational factors should be considered. The microservice architecture patterns provide better means to increase the scalability than traditional software architecture patterns. However, certain aspects of applications...
The recent advances in wireless communication techniques have made it possible for fast-moving vehicles to download data from the Internet. For the reliable data upload and download, TCP can be used for vehicular networks. However, TCP requires the connection initialization using three-way handshaking for the data exchange between two end systems over the Internet. Thus, the efficient operation of...
Tourism is one of important resources in Japanese economy. The number of tourists has been increasing year and year. And the divergence and personalization for tourists are required and new tourism function and deployment are expected to attract those tourists. In this paper, we suggest a new tourist information system, by the augmented reality using the information of the beacon which can provide...
One of the main concerns of Cloud storage solutions is to offer the availability to the end user. Thus, addressing the mobility needs and device's variety has emerged as a major challenge. At first, data should be synchronized automatically and continuously when the user moves from one equipment to another. Secondly, the Cloud service should offer to the owner the possibility to share data with specific...
As elderly care is getting more and more important, monitoring of activity of daily living (ADL) has become an active research topic. Both robotic and pervasive computing domains, through smart homes, are creating opportunities to move forward in ADL field. Multiple techniques were proposed to identify activities, each with their features, advantages and limits. However, it is a very challenging issue...
Software engineers primarily use two orthogonal means to reduce susceptibility to faults: software testing and static type checking. While many strategies exist to evaluate the effectiveness of a test suite in catching bugs, there are few that evaluate the effectiveness of type annotations in a program. This problem is most relevant in the context of gradual or optional typing, where programmers are...
The current research trend is about intelligent devices. There is a need to interconnect these intelligent embedded devices using the Internet and hence IoT devices have become more essential. Web of Things and Wisdom Web of Things are two technologies in their growing stages. This paper is a study on integration of IoT devices with WoT and W2T. An architecture has been designed to implement the interaction...
Using password is, perhaps, still the most versatile method of securing secret and confidential information, even though several recent studies have pointed out possibility of breaching it. A general trend of having different passwords for several user accounts of the same user (such as multiple email accounts, multiple social networking accounts, etc.) can barely overcome the possibility as users...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.