The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traffic classification allows network operators to gain important insights to better characterize packet flows, enabling fundamental applications such as traffic engineering, network analytics and Quality of Service (QoS) enforcing. A common approach adopted for flow classification is based on Deep Packet Inspection (DPI): all the traffic is processed by a middlebox whose task is the association of...
Information Systems Development faces many recurrent issues that must be addressed in every project. A lot of common requirements and features repeatedly appear on different projects challenging the development team. Exchanging solutions and the expertise gained over the evaluation of such solutions among projects can prevent the development teams from reinventing the wheel. The MDArte framework has...
Urban commons were traditionally defined as commonly owned environmental resources — forests, rivers, fisheries or grazing land that were shared, used and enjoyed by all. Commons were then adapted to include public goods and services, such as public spaces, marketplaces, public education, health and infrastructure that allow societies to function. Today, with the proliferation of technology and in...
Existing techniques used for anomaly detection do not fully utilize the intrinsic properties of embedded devices. In this paper, we propose a lightweight method for detecting anomalous executions using a distribution of system call frequencies. We use a cluster analysis to learn the legitimate execution contexts of embedded applications and then monitor them at run-time to capture abnormal executions...
Context: Agile software processes are more frequently being integrated with aspects of human centered design given the commonalities that the two approaches share, such as user involvement, importance attributed to testing and prototyping practices, iterative design and so on. Goal: tailor a SCRUM-based process by integrating it and adapting it with Human Centered Design (HCD) practices. Method: action...
When manually testing Web sites humans can go with vague, yet general instructions, such as "add the product to shopping cart and proceed to checkout". Can we teach a robot to follow such instructions as well?In this paper I present a novel model, called semantic usage patterns which allows us to capture the general topics behind the individual steps of interactions. These models can be...
Applications based on micro or web services have had significant growth due to the exponential increase in the use of mobile devices. However, using such kind of loosely coupled interfaces provides almost no guarantees to the developer in terms of evolution. Changes to service interfaces can be introduced at any moment, which may cause the system to fail due to mismatches between communicating parts...
Information and Communication Technology (ICT) is one of the key enablers for including underserved communities in economic and societal development across the world. Our research analyzes several banking service projects developing technical solutions for rural India. This poster presents an experience report based on systematic debriefing of involved project leaders and initiators, triangulated...
Label noise-tolerant machine learning techniques address datasets which are affected by mislabelling of the instances. Since labelling quality is a severe issue in particular for large or streaming data sets, this setting becomes more and more relevant in the context of life-long learning, big data and crowd sourcing. In this contribution, we extend a powerful online learning method, soft robust learning...
Measurement-based timing analysis approaches are increasingly making their way into several industrial domains on account of their good cost-benefit ratio. The trustworthiness of those methods, however, suffers from the limitation that their results are only valid for the particular paths and execution conditions that the user is able to explore with the available input vectors. It is generally not...
We present a model-driven approach to the creation of online community web apps that leverages the capabilities of the DIME model-driven development environment for web applications. Thereby we specifically focus the community-specific needs and structural elements and functionality of the online community around the SEcube™ project. Starting with only vague requirements, we applied a double scaffolding...
Big data analysis requires adequate infrastructure and programming paradigms capable of processing large amount of data. Hadoop, the most known open-source implementation of the MapReduce paradigm, is widely employed in big data analysis frameworks. However, in many recent application scenarios data are natively distributed over different geographic regions in data centers which are inter-connected...
In recent years, Intelligent Assistant services have come out to respond to user requests or to perform certain functions. These services get the request input from users with natural ways such as voice or text. However, the biggest hurdle of this approach is that it is very difficult for users to know the scope of the service (feature or knowledge) and therefore it is difficult to deliver the right...
The use of Application Programming Interfaces (APIs) is pervasive in software systems; it makes the development of new software much easier, but remembering large APIs with sophisticated usage protocol is arduous for software developers. Code recommendation systems alleviate this burden by providing developers with a ranked list of API usages that are estimated to be most useful to their development...
One more and more upcoming challenge for IT systems used in the Facility Management domain is the automated acquisition and processing of distributed heterogeneous data. Especially for approval or maintenance processes the mobile access to necessary data constantly gains significance. But because of their limited size particularly mobile devices require new ways for representing the needed amount...
People spend a lot of time at their workplace, for example in office environment. After consuming breakfast or lunch during the recess periods, one may feel lazy both physically and mentally. Thus, gaining extra calories may lower the working progress. To motivate individuals for healthier behavior, we designed, executed and tested an application for improving physical activity behavior at workplace...
In today's military environment large quantities of distinct information are available. In a time-constrained environment it is vital to have some way to judge the relative importance of information. Recent research has developed a fuzzy-based system to assign a Value of Information (VoI) determination for individual pieces of information. Subsequent work presented ideas for integrating complementary...
Architecture defines relationships between bodies and space. It is through these relationships that object-subject hierarchies form, effecting human behavior and habitus1. It follows that, by manipulating perception, architecture re-orients or disorients object-subject relationships and breaks down social habitus by first breaking down the initial body image. The continuing research studies how immersive...
User-driven Customization (UDC) is a promising concept to react on current developments in the markets. However, until now no successful applications of UDC for technical products exist. Therefore, this paper develops and implements a continuous toolchain for UDC from the customization toolkit via an OI-platform to the production back-end. The resulting prototype achieves the proof of concept for...
With a plethora of sensors and ubiquitous access to the Internet, modern smartphones have enabled a broad range of context-based applications. Most applications make use of the user's physical location to filter relevant content. However, filtering based on dynamic contextual information results in high complexity of the filtering process. This limits the applicability of existing publish/subscribe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.