The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Goal models help elicit, specify, analyze, and validate requirements as they capture hierarchical representations of system requirements, possible solutions, stakeholder objectives, and their relationships. In the early requirements phase, goal models aid requirements engineers in understanding the goals of stakeholders and exploring solution alternatives based on their impact on these goals. Despite...
The design of recommendation method is the core of personalized recommendation, and the implementation of recommendation depends on the matching relation between user preference and resource object. This paper proposes a hybrid personalized recommendation method based on context-based collaborative filtering and knowledge recommendation, which is based on personalized recommendation knowledge model,...
Intelligent personalization systems are becoming increasingly reliant on contextually-relevant devices and services, such as those available within modern IoT deployments. An IoT context may emerge---or become pervasive---when the intelligent system generates knowledge from dialogue-based interactions with the end-user; the context is strengthened even further by incorporating state representations...
The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effective decision making. In this paper, we propose a model that highlights areas contributing to the perception of risk in a socio-technical environment...
Due to the number of cloud providers, as well as the extensive collection of services, cloud computing provides very flexible environments, where resources and services can be provisioned and released on demand. However, reconfiguration and adaptation mechanisms in cloud environments are very heterogeneous and often exhibit complex constraints. For example, when reconfiguring a cloud system, a set...
Software testing plays a major role for engineering future systems that become more and more ubiquitous and also more critical for every days life. In order to fulfill the high demand, test automation is needed as a keystone. However, test automation, as it is used today, is counting on scripting and capture-and-replay and is not able to keep up with autonomous and intelligent systems. Therefore,...
Cognitive Radio (CR) was designed to support flexible spectrum usage by adding spectrum sensing facilities and decision making logic to the radio devices. Cognitive Radio Network (CRN) is an extension of the CR concept to enable holistic end-to-end optimization of the network operation and services. We discuss CRN management issues in the context of military and tactical operation environments, where...
Complex user's needs often require heterogeneous services to be combined together. In this paper, we explore a novel approach to enable flexible and dynamic composition of heterogeneous services for end users who are usually not familiar with technical process models. End-users are only required to model their goals and semantic reasoning is used for the composition itself. The possible service compositions...
Nowadays, more and more people possess mobile devices (laptops, tablets, smart-phones, etc), capable of creating and sharing documents (which generally are multimedia oriented) via internet anytime and anywhere (home, office, hospital, etc). People should have full control on how they receive a multimedia content, depending on their current condition: when in a meeting, displaying a text instead of...
In order to understand information transmission, it is highly important to find a hidden structure of a social network such as rumors in daily life, and leaders of the underground organizations. The information above is difficult to be forecasted because such information can only be obtained in fragments and cannot be achieved through observation itself based on the data. This research aims to clarify...
While efforts to develop cognitive abilities for robots have made progress from the perspective of goal-directed task performance, research has shown that additional cognitive capabilities are needed to enable robots to interact, cooperate, and act as teammates with humans. In particular, robots need additional teamwork and coordination knowledge and an ability to apply this knowledge to a model of...
The Internet of Things (IoT) has brought increased sensing, monitoring and actuation capabilities to several domains including residential buildings. Residential energy management methods can leverage these capabilities and devise smarter solutions. This requires processing and reasoning data constantly generated by various IoT devices. In this paper, we use a hierarchical system model for IoT-based...
The current research trend is about intelligent devices. There is a need to interconnect these intelligent embedded devices using the Internet and hence IoT devices have become more essential. Web of Things and Wisdom Web of Things are two technologies in their growing stages. This paper is a study on integration of IoT devices with WoT and W2T. An architecture has been designed to implement the interaction...
Current studies on software development either focus on the change history of source code from version-control systems or on an analysis of simplistic in-IDE events without context information. Each of these approaches contains valuable information that is unavailable in the other case. Our work proposes enriched event streams, a solution that combines the best of both worlds and provides a holistic...
Mobile devices continue to push the limits of contextually aware application intelligence. However, due to the complexity of contextual processing and programming, a centralized system that handles all mobile context processing is difficult to realize. The problem of defining such a contextual reasoning unit that uses an all-encompassing contextual ontology for all possible uses of context is not...
We observed that safety arguments are prone tostay too abstract, e.g. solutions refer to large packages, argumentstrategies to complex reasoning steps, contexts and assumptionslack traceability. These issues can reduce the confidence werequire of such arguments. In this paper, we investigate theconstruction of confident arguments from (i) hazard analysis(HA) results and (ii) the design of safety measures,...
In blended learning, learners' interest is closely related to whether they can successfully finish their studies. In order to study on learners' interest, we adopt situated cognition theory as the theoretical basis, and carried out data mining for learners' online behaviors, as well as the analysis of brain cognitive experiment data. Then brain mechanism for context learning interest and online operation...
This paper presents a classroom research study that studied the effect of giving the students of a Digital Logic course the chance to retake all exams except the final. Each exam is designed to match a single learning outcome of the course. The theoretical background that the study is based upon is the Metacognitive Awareness Framework. We are reporting that the effort that the Faculty and teaching...
This paper concerns an experiment that attempts to understand the impact the physical and virtual environment can have on human emotions. To do this four blended learning workshops are held covering different amounts of technology enhanced learning based on the blended learning continuum. In each workshop there are two of the same participants – one who is autistic and one who is empathic – and then...
Although Information Centric Networking (ICN) has been identified as promising candidate for the Internet of Things (IoT) architecture, the emerging of various IoT use cases poses great challenges to the ICN architecture. The new characteristics of IoT data and clients' IoT data retrieval require the ICN infrastructure to be more intelligent and advanced capabilities. This paper proposes enhanced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.