The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
This paper presents an incremental formal modeling of the Simple Text Oriented Messaging Protocol (STOMP) using Event-B method. STOMP is a simple text-oriented protocol, similar to HTTP. It provides an interoperable wire format so that STOMP clients can communicate with any STOMP message broker to provide easy and widespread messaging interoperability among many languages and platforms. In this paper...
Machine Reassignment is a challenging problem for constraint programming (CP) and mixed integer linear programming (MILP) approaches, especially given the size of data centres. The multi-objective version of the Machine Reassignment Problem is even more challenging and it seems unlikely for CP or MILP to obtain good results in this context. As a result, the first approaches to address this problem...
The cost of a change is high, but changes are an inevitable part of software development lifecycle, which comes to be recognized under a more general term: software evolution. To mitigate this problem, an approach to aspect-oriented change realization has been proposed earlier based on the idea of representing change by aspect. In many cases, software development relies on graphical modeling, mainly...
The increasing demand for highly sophisticated cloud services and the consequent worldwide increase in the number of data centers (DC), make the need for energy efficient operation of DCs more actual than ever. Additionally, in the context of smart city and smart grid integration, flexible DCs can play a key role toward acting as grid-stabilization factors. In this paper, a review of the available...
This paper focuses on designing an online feedback management system that collects data in the form of suggestions, ratings and comments, and applies machine learning capabilities to automatically extract relevant summaries of the suggestions posted in this automated suggestion system. We have analyzed two key requirements, anonymous feedback and credible feedback, to gain insight on the submitted...
In participatory sensing applications, the inaccuracy and conflict of the reported data, commonly caused by the error rate of participants or the differences of observation context, have received more and more attention. Estimating the real status of facilities according to observations becomes a big challenge for participatory sensing. Towards this end, we propose a context-aware estimation approach...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
This work demonstrates the benefit brought by COPSS for an efficient notification service, including the convenience of hierarchical group management, network efficiency and timeliness in delivering the notification. The work will also demonstrate a simple first-step authorization. Future work will include a more complete authorization, authentication, encryption and mobility support for a scalable...
There is an increasing penetration of smart phones within enterprises. Most smart phone users now run both enterprise as well as personal applications simultaneously on their phones. However, most of the personal apps that are downloaded from public market places are hardly tested for enterprise grade security, and there have been instances of malware appearing in public markets that steal sensitive...
Many network services such as email services and online social networking applications offer enhanced capabilities to standard communication services by mining user data. Examples of such services are friend suggestions, marketing recommendations, etc. In this paper, we look at enhancing related people or a simple contacts application by inferring a dynamic set of relevant people for users at any...
This paper describes how members of a community can collaboratively protect the privacy of the information they share via email. An extension of email tagging is used to represent communities and establish privacy protection boundaries. The approach is illustrated informally by scenarios and the key concepts are defined formally. The contributions of this paper are: (1) extending the idea of boundary...
Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake...
Sharing knowledge in a timely fashion is important in distributed software development. However, because experts are difficult to locate, developers tend to broadcast information to find the right people, which leads to overload and to communication breakdowns. We study the context in which experts are included in an email discussion so that team members can identify experts sooner. In this paper,...
Content usage statistics from superdistribution users have great commercial values since they can be used for any number of purposes including marketing, accounting, and/or fraud prevention. However tracking content usage under the superdistribution model poses a great challenge since most content users have no explicit pre-established relationship with the content provider. In this paper, we present...
The SECE (Sense Everything, Control Everything) system allows users to create services that combine communication, calendaring, location and devices in the physical world. SECE is an event-driven system that uses a natural-English-like language to trigger action scripts. Presence updates, incoming calls, email, calendar and time events, sensor inputs and location updates can trigger rules. SECE retrieves...
In this paper we study the problem of network exchange in trust based social networks. Network exchange is of two types: Specialized Exchange and Generalized Exchange, this can be characterized in terms of reciprocity, triads, graph motifs across these networks. Given the lack of standard metrics for Generalized Exchange, we propose a metric to quantify generalized exchange. We observe that the phenomenon...
Systematic and practical approaches to risk-driven operational security evidence help ensure the effectiveness and efficiency of security controls in business-critical applications and services. This paper introduces an enhanced methodology to develop security effectiveness metrics that can be used in connection with correctness assurance of security controls. This methodology is then applied to an...
In this paper, we present a novel method for image annotation and retrieval on mobile device by using contextual information. Image annotation is an effective way for content based image retrieval. However, manual annotation is an expensive and time consuming work, especially for mobile device. Here, we propose a semi-automatic way to give image annotation on mobile device. There are rich contexts...
As the technology advances the human needs do grow towards comfort. VMAIL-Voice Enabled Mail Reader, system developed for person who requires comfort and is essential for a person with disability. The speech synthesis embedded in VMAIL system can read aloud any written text, avoiding eye strain and save time, reading on the computer. This is a web based system developed using HTML and java. It can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.