The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent intensive research in the fields of obesity and eating disorders has proved most traditional interventions inadequate: The obesity-targeting interventions have either failed or are strongly social context dependent, while the interventions for eating disorders have poor results and high levels of relapse. On the contrary, recent randomized control trials have illustrated that supervised training...
SWAN-iCare is an ambitious project which will provide a major leap forward in the management of chronic wounds, mainly diabetic foot ulcers (DFU) and venous leg ulcers (VLU). It aims at a next generation integrated solution for remote monitoring and personalized therapy of foot and leg ulcers, as well as providing an objective continuous evaluation of the wound condition, in contrast to the current...
Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. In this paper, we present a new paradigm that leverages software attack graph for dynamic remote attestation. The major contributions of this paper are two-folds: (1) From the angle of attack, we propose a method to reduce the number of objects...
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-oriented monitoring research. In this paper, we release a fine-grained user request-centric open trace data set, called Trace Bench, collected on a real world cloud storage system deployed...
A sensor node is termed as “dumb” [1], if at a certain time instant it can sense its surroundings, but is unable to communicate with any of its neighbors due to the shrinkage in communication range. Such isolation occurs because of the presence of adverse environmental effects. However, the node starts its normal operation with the resumption of favorable environmental conditions. Thus, the detection...
Emergence of honeynet, which is a network of honeypots, has changed the phase of internet security and information gathering about intruders. In improving deception of the honeynet which in turn increases the workload of attackers, most honeynet deployments are geared towards improving on the deception deal by using MAC addresses, IP addresses and protocols on host machine. Attackers gain access to...
This article describes the outsourcing of e-learning projects in museums. Because most museums do not have a dedicated unit to develop the e-learning system, they outsource the e-learning project to outside firms. In public museums, the administration usually manage the outsourced e-learning projects as a traditional transaction under standard procedures. In this study, the author pointed out the...
Application launch time is an important performance metric to user experience in desktop environment. The launch time mostly depends on the performance of secondary storage. There is a cost-performance trade-off in using hard disk drive (HDD) or solid-state drive (SSD). Thus, application launch times can be reduced by utilizing SSDs as caches for slow HDDs. We propose a new SSD caching scheme which...
Civilian or military operational centers are typical for their specific set of activities according to solved problems. Operational personnel have to perform procedural as well as positive kind of control of its controlled entities. To help these personnel with their decisions, we propose to build an automated system based on knowledge structure. This paper deals with procedural reasoning multi agent...
In this paper, we propose a Performance Enhancement Guaranteed Cache (PEG-C) to ensure performance benefit in the worst case while achieving as good average-case performance as a regular hardware-controlled cache. Our experiments indicate that with a small number of preloaded data and a simple hardware extension, the PEG-C can guarantee performance enhancement in the worst case while achieving the...
Synchronous online learning environment is becoming increasingly popular because of its ability to promote emergent interactions through real-time feedback. This study examined the role of co-regulation in synchronous online learning environment to capture the dynamics of social interaction in learning. A study was conducted to examine the relationships between co-regulation strategies and group performance...
In this paper a novel reputation-based trust framework in federated testbeds is presented, termed as Federated Trust and User Experience (FTUE) Framework. Our aim is to assist peer experimenters in properly selecting resources from the federated community by constructing a quantitative view of the trustworthiness of each testbed. The FTUE framework combines the perceived user experience, as provided...
Orchestrating service-oriented workflows is typically based on a design model that routes both data and control through a single point -- the centralised workflow engine. This causes scalability problems that include the unnecessary consumption of the network bandwidth, high latency in transmitting data between the services, and performance bottlenecks. These problems are highly prominent when orchestrating...
We propose a Cloud Advisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking into account evidence support and to measure transparency based on the Cloud Controls Matrix (CCM) framework. The selection process is based on a set of assurance requirements that...
The Pacific Northwest Geodesic Array at Central Washington University collects telemetered streaming data from 450 GPS stations. These real-time data are used to monitor and mitigate natural hazards arising from earthquakes, volcanic eruptions, landslides, and coastal sea-level hazards in the Pacific Northwest. Recent improvements in both accuracy of positioning measurements and latency of terrestrial...
A commonly recognised and significant problem faced by those suffering from addiction to drugs and alcohol and other substances (or repetitive patterns of behaviour) is the lack of easily accessed, educational technologies currently available to them. Recovery based material exists but there is no cohesive option which is able to offer a fully multi-media opportunity for: self-reflection, communication...
An ever increasing impact and amount of network attacks have driven many organizations to deploy various network monitoring and analysis systems such as honeypots, intrusion detection systems, log analyzers and flow monitors. Besides improving these systems a logical next step is to collect and correlate alerts from multiple systems distributed across organizations. The idea is to leverage a joint...
The Underwater Acoustic Sensor Networks (UWASN) consists of sensors that are deployed underwater for gathering information for the unexplored parts of oceans or rivers. UWASN consists of variable number of floating and anchored sensors, sink and vehicles that are deployed over an area to be explored. The characteristics of UWASN are mainly node mobility for floating, capacity for data collection and...
Dynamic provisioning of computing resources to fulfill the application requirement based on its current demand is one of the key challenges in cloud environment. However, availability of a resource to the application is not possible just by launching the VMs, but by the subsequent reconfiguration of the provisioned VMs, which is time-consuming and application dependent. In order to solve the instant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.