The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rise of data mining technologies, group profiling -i.e. ascribing characteristics to groups of people- has increasingly become a useful tool for policy-making, direct marketing, etc. However, group profiles usually contain statistics and therefore the characteristics of group profiles may be valid for the group and for individuals as members of that group, though not for individuals as such...
Quality of Service (QoS) play very important role in web service recommendation system. The precision of service recommendation depends on the credible QoS. So people begin to find better method for calculating the credibility of QoS. We can count the execution result and user comment to calculate the QoS credibility of single web service. But how to calculate the QoS credibility of web service composition...
Machine to machine (M2M) communication has been gaining momentum in recent years as a key enabling technology for a wide range of applications including smart grid, e-health, home/industrial automation, and smart cities. However, with the current communication systems mainly optimized for human to human communications, there are important capabilities that need to be developed in M2M systems in order...
Nowadays, many influential security-related facts are reported multiple times by different sources and in different languages. Therefore, in the recent years, the research on advancing event extraction technology shifted from classical single-document extraction toward cross-document information aggregation and fact validation. However, relatively little work has been reported on cross-lingual information...
Adopt XBRL in Net Finance consultation criteria will provide major benefits in some aspects: the convenience and reliability of finance information search, transmission and exchange cross-platform financial information data, mining and tracing data. The network and associated infrastructure and a huge database system support are essential to achieve a net financial consultation supported by XBRL....
Based on the diversity of exhibitors’ needs and complexity of exhibition services, this research used SPSS 15.0 and IPA method to analyze the importance and performance of 22 factors that might influence the perceived satisfaction of exhibitors to an exhibition, so as to identify the various needs of exhibitors encounter at an exhibition, to rank their relative importance and measure what extent these...
In order to confirm the influencing factors of customer satisfaction to individual Internet banking in China, customer satisfaction was introduced into this industry. Based on previous studies, series of factors related were extracted and summarized, and a research model was designed, with its hypothesis tested. The data were collected by surveys through a professional research site. With KOM and...
Nowadays, using Service-Oriented Architectures (SOA) is spreading as a flexible architecture for developing dynamic enterprise systems. Due to the increasing need of high quality services in SOA, it is desirable to consider different Quality of Service (QoS) aspects in this architecture as security, availability, reliability, fault tolerance, etc. In this paper we investigate fault tolerance mechanisms...
Software architecture has become essential in the struggle to manage today's increasingly large and complex systems. Software architecture views are created to capture important system characteristics on an abstract and, thus, comprehensible level. As the system is implemented and later maintained, it often deviates from the original design specification. Such deviations can have implication for the...
Even though trust plays a significant role during decision-making in open collaborative environments, still end-user trust mechanisms have not be deployed in the EGEE grid computing setting. In this paper, we conduct a preliminary investigation on the integration of the trust paradigm in that environment, with a special focus on achieving end-user trust in an intuitive and practical manner.
In this paper we deal with the optimization of the future smart grid structure. The technical development allows investment in different solutions: smart gauges, line breakers, redundant secondary network or the total old network could be replaced. We maximized the availability of the network at fixed investment /maintenance level. We found that the new type of smart gauges and the automatic reconfigurability...
When multiple users access a network storage system for cloud computing, security becomes a key factor in the service, as well as performance and reliability. The "encrypt-on-disk'' scheme effectively protects transmitted and stored data in network storage. However, this scheme has the problem of revocation for shared files. Active revocation is safe but has denial periods to allow immediate...
Information quality (IQ), is a multi-dimensional concept, and needs recognition by adopting and choosing suitable IQ dimension and setting-up standard. However, of all the IQ dimensions, which one is really influencing the IQ of agricultural science and technology information in many IQ dimension indicators? Which one plays an important role in influencing IQ in many processes of agricultural science...
To evaluate security in the context of software reliability engineering, it is necessary to analyse security problems, actual exploits, and their relationship with an understanding of the operational behaviour of the system. That can be done in terms of the effort involved in security exploits, through classic reliability factors such as calendar and inservice time, etc. Existing studies focus primarily...
This paper illustrated the characteristics of UTP-5 and Hub-spoken topology, and presented the concept of margin motion coefficient and reliability coefficient based on graph theory and relation matrix and made thorough analysis and comparison. Suggestions are made on resolution of topology problems on cabling infrastructure of intelligent buildings.
Network security situational awareness(NSSA) has been a hot research spot in the network security domain. In this paper, a quantification method for NSSA based on conditional random fields(CRFs) was proposed. The data of network attacks from intrusion detection system (IDS), the hosts' vulnerabilities and the hosts' states were firstly combined as the network security factors. And then the network...
Based on trustworthiness, defines a couple of concepts associated with trusted path, the most trusted path and the least trusted path. In order to look for the most trusted path and the least trusted path we propose two trusted path algorithms, which are proved to be really the most credible and the least credible; quantify the trustworthiness of the most trusted path and the least trusted path; and...
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its integration to the Italica Project. We also describe the architecture of that module and explain the design decisions taken for its construction. The integration to the preexisting system...
This paper proposes a new image based CAPTCHA test, activity recognition CAPTCHA. In this test the user is presented with a set of distorted images depicting a randomly chosen activity. The user has to recognize the common activity associated with the images and annotate it from a given list of activities to pass the test. The user studies indicate that this CAPTCHA can be solved with 99.04% average...
An increasing number of extramural applications in the personal healthcare domain pose new challenges regarding the security of medical data. In this paper, we focus on remote patient monitoring systems and the issues around information reliability. In these systems medical data is not collected by healthcare providers in a controlled medical environment using certified medical devices, but by patients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.