The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Bugs cannot always be avoided and can have various consequences on the reliability of softwares. Techniques for finding and undestanding bugs are therefore needed for developers to be able to fix them. Existing techniques for finding and getting insight on bugs have limitations. Static analysis cannot detect every bugs, Interactive Debugging can be tedious, Runtime Verification usually does not have...
Internet-connected embedded systems have limited capabilities to defend themselves against remote hacking attacks. The potential effects of such attacks, however, can have a significant impact in the context of the Internet of Things, industrial control systems, smart health systems, etc. Embedded systems cannot effectively utilize existing software-based protection mechanisms due to limited processing...
Model-based simulation and monitoring are becoming part of advanced learning environments. In this paper, we propose a model-based simulation and monitoring framework for management of learning assessment and we describe its architecture and main functionalities. The proposed framework allows user-friendly learning simulation with a strong support for collaboration and social interactions. Moreover,...
Existing techniques used for anomaly detection do not fully utilize the intrinsic properties of embedded devices. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal executions...
In order to notify users about potentially unsafe situations and to track mistakes or efficiency performing activities, it is important to monitor the quality of performing an activity and identify the missing/wrong steps. However, the state-of-the-art activity recognition frameworks ignore such details and impose constraints on sensor values, the types of detected activities (no parallel/interleaved/joint...
NFV together with SDN promises to provide more flexible and efficient service provision methods by decoupling the network functions (NFs) from the physical network topology and devices, but requires the real-time and automatic composition and verification for service function chain (SFC). However, most of SFCs today are still typically built through manual configuration processes, which are slow and...
Since Apple introduced the iBeacons in Worldwide Developers Conference (WWDC) 2013, the iBeacon has been rapidly accepted and generalized in the market. For the deployed iBeacons, it is necessary to monitor their status. In this paper, we design a crowd sensing based monitoring framework which combines the moving and static schemas of participants to monitor the real status of iBeacons. In such a...
Aiming to keep under control a particular system or environment or to ensure that it works as expected there is a need to know what-when-why happens there. Various conditions and environmental factors can lead to errors, unexpected behavior or loss of control. To pursue these factors manually is time consuming, error prone, slow and usually quite expensive. Monitoring is quite complex and challenging...
In this paper we propose several novel approaches for incorporating forgetting mechanisms into sequential prediction based machine learning algorithms. The broad premise of our work, supported and motivated in part by recent findings stemming from neurology research on the development of human brains, is that knowledge acquisition and forgetting are complementary processes, and that learning can (perhaps...
In this paper, we introduce the idea of exploiting the emotional information as a key element in providing personalized context-aware software services and consequently enhancing quality of User Experience(UX). We argue that emotional measurements can be integrated in Quality of Service (QoS) assurance frameworks. The idea builds on the strength of technological advances in emotion measurement tools,...
This paper explores how to use Software Defined Networking (SDN) and Network Functions Virtualization (NFV) as two emerging technologies to support Satellite Gateway Diversity (GWD) solution in the forward link to provide next generation satellite system with higher capacity enhancement, failover and resiliency management. In this context, the gateway handover along with efficient traffic steering...
Energy Efficiency is becoming a world-wide concern and attracting increasing interest in both industry and academia. A smart building is at the cornerstone of energy-efficiency as it represents the main constituent in a smart micro-grid. To promote energy-efficiency in buildings, an Energy Management System (EMSs) that controls HVAC appliances is indispensable. Based on the Plan-Do- Check-Act (PDCA)...
The aim of this paper is to propose a robust, accurate and portable system for human body motion measurement. The system includes Inertial Measurement Units (IMU) and a Kinect or vision sensors. Since Kinect sampling rate is low (30 Hz per second) and it suffers from occlusion, it cannot individually measure human body motion accurately and robustly. On the other hand, IMU does not suffer from these...
Self-adaptive systems are able to manage themselves autonomously. A common approach to engineer these systems is to use the MAPE control loop based on these four steps: Monitoring, Analysis, Planning, and Execution. Existing research pays little attention to the modeling of self-adaptive systems with multiple MAPE control loops, and is lacking in considering the formal specification and verification...
The aim of this paper is to propose a framework analysis of urban bus transport service quality in Moroccan context. This framework is based on the principle of combining the user and the service managers, delegating authority and transport operator, vision and consists of three modules. Namely: Definition, evaluation and management of service quality. This paper will be carried out as follows: first,...
This paper describes our experience with extending ExSched, an operating system independent external CPU scheduler framework for real-time systems, with support for mixed criticality. We used the so-called adaptive mixed criticality (AMC) scheme as a starting point for mixed criticality. We extended that scheme from two to more than two criticality levels and complemented it with specified behavior...
Distributed process execution is a scalable solution for implementing workflows that deal with many devices in the Internet of Things (IoT). In hierarchical network structures the execution of activities and subprocesses can be moved closer to the computing edge onto specialized devices while still preserving data security. However mobility, resource constraints and varying connectivity of devices...
This paper introduces SmartCare, a project revolving around a smart environment especially built to enable aging in place. The paper describes the vision behind SmartCare as well as its translation into a deployed system. The physical incarnation of SmartCare is the SmartCare apartment, an actual apartment in a retirement community. We provide a description the technologies that are deployed in the...
Behavior-based analysis of dynamically executed binaries has become a widely used technique for the identification of suspected malware. Most solutions rely on function call patterns to determine whether a sample is exhibiting malicious behavior. These system and API calls are usually regarded individually and do not consider contextual information or process inter-dependencies. In addition, the patterns...
Spectrum policy in the US (and throughout most of the world) consists generally of a set of nationally determined policies that apply uniformly to all localities. However, it is also true that there is considerable variation in the features (e.g., traffic demand or population density), requirements and constraints of spectrum use on a local basis. Global spectrum policies designed to resolve a situation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.