The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dramatic success and scaling of the Internet was made possible by the core principle of keeping it simple in the middle and smart at the edge (or the end-to-end principle). However, new applications bring new demands, and for many emerging applications, the Internet paradigm presents limitations. For applications in this new generation of Internet services, structured overlay networks offer a...
Development and implementation of appropriate e-services as well as revenue generation are key to deploying and sustaining ICT installations in poor areas in developing countries. The area of e-Health is a promising area for e-Services that are important to populations in poor areas and health service organisations that are already spending money on different health initiatives in these areas. This...
In the Internet of Things (IoT) vision, all our everyday objects will be equipped with processing, sensing and actuating capabilities and need to be connected to the Internet to provide their full potential benefits. Our life will be surrounded by an ecosystem of smart "things" that need to be found, accessed, managed and interconnected to other things. For that purpose, we introduce an...
For humans it is no problem to determine if two words have a high or low semantic similarity in a given context. But is it possible to support a software developer or architect by using semantic data extracted from source code in the same way other relations like typical source code relations do? To answer this question we developed an approach to compute the semantic similarity by using Wikipedia...
Rural digital connectivity in developing nations have failed to sustain themselves after subsidy is removed. The demography of users does not demand Internet connectivity for majority of their communication needs. This work proposes an extensible platform for rural communication utilizing delay tolerant networks. The platform allows quick development of localized applications for day to day communication...
The rapidly growing smart mobile phone market introduces new opportunities for the Internet of Things field such as sharing the capabilities of the smart mobile phone (e.g., storage or sensing) among different sensing physical objects (i.e., Things). This possibility may add additional benefits to the IoT developed systems, such as decreasing hardware costs or weight of Things among others. However,...
Unlike traditional networked embedded systems, the Internet of Things interconnects heterogeneous devices from various manufacturers with diverse functionalities. To foster the emergence of novel applications, this vast infrastructure requires a common application layer. As a single global standard for all device types and application domains is impracticable, we propose an architecture where the...
Product Line Architecture is the key success of Software Product Line Engineering. Product Line Architecture prepares the design of architectures for members of product line. Architecture design is the most essential activities of a Product Line Architecture development. It prepares the corner stone of variability decision. The architecture design need to produce specific architecture from product...
To facilitate the usage of software architecture documents (ADs), we claim the architectural information in the ADs needs to be structured into or presented as chunks. A chunk allows related information to be retrieved collectively as a unit and simplifies information location tasks. We propose a new semi-automated approach based on the actual usage of ADs by previous users, i.e. by capturing users'...
This paper presents the development of an e-learning system for language learning and teaching. This system is characterized by its interactivity and socialization, constant support and immediate assessment of learners' linguistic performance. These distinguishing pedagogical features played an important role in the system development process. Aspects concerning the choice of the methodology, the...
Web services are increasingly used to integrate and build business application on the internet. Failure of web services is not acceptable in many situations such as online banking, so fault tolerance is a key challenge of web services. Web service architecture still lacks facilities to support fault tolerance. This paper proposes a fault tolerant architecture for web services by increasing the reliability...
Cloud computing is one of the emerging technologies that will lead to the next generation of Internet. It provides optimized and efficient computing through enhanced collaboration, agility, scalability, and availability. In this paper, the evolution of the Cloud is discussed, the cloud computing model is explained, a set of cloud computing infrastructure metrics is listed, the cloud service model...
In order to render WebGIS vector map with better effects, build a client-side multi-level structural vector map rendering engine, which is built upon Microsoft's Silver light-based RIA and SQL Server 2008 spatial database. Implement a marine management system for Nan tong City (MMSNT) based on this engine. build the architecture of the system used Windows Communication Foundation(WCF) data com-munication...
Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can satisfy their clients' requests when their clients need them is a real challenge. In this paper we suppose to introduce various offered solutions about dependability of Web Services. Offered Solutions, are divided into Fault...
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is inefficient because hackers bypass these checks and directly send malicious data to the server. User input validation thus has to be duplicated from the client-side (HTML pages) to the server-side (PHP or JSP etc.). We present...
This paper proposes an IPv6-based hierarchical middleware architecture for an efficient control of home devices on a global network from anywhere. This architecture can be adopted by mobile and home devices for smart home control.
The following topics are dealt with: Internet security; middleware support for networking; cryptography; data privacy; data security; software architecture; broadband access technologies; and future Internet design.
In Internet networks, monitoring is necessary to guarantee the performance of the services. In this paper, we review the state-of-the-art monitoring architectures proposed for multi-domain networks. We note that these architectures do not support measurement configuration that enables the providers to perform flexible multi-domain measurements. Therefore, we present our proposal for the configuration...
A number of mobile devices such as smart phones, smart TV's, portable media players, etc. are introduced these days. They are implemented on their own operating systems so that they cannot provide compatibility of application services. To solve the problem among application services we suggest an architecture that uses a web browser as a basic application platform. The proposed architecture uses Java...
The following topics are dealt with: distributed/parallel software system; human/computer interaction; Internet and information systems development; knowledge-based software engineering; reverse engineering; and software architecture.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.