The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of context-aware applications is a difficult and error-prone task. The dynamics of the environmental context combined with the complexity of the applications poses a vast number of possibilities for mistakes during the creation of new applications. Therefore it is important to test applications before they are deployed in a life system. For this reason, this paper proposes a testing...
We present an automated compositional program verification technique for safety properties based on conditional inductive invariants. For a given program part (e.g., a single loop) and a postcondition ϕ, we show how to, using a Max-SMT solver, an inductive invariant together with a precondition can be synthesized so that the precondition ensures the validity of the invariant and that the invariant...
Software-as-a-Service (SaaS) providers increasingly rely on multi-cloud setups to leverage the combined benefits of different enabling technologies and third-party providers. Especially, in the context of NoSQL storage systems, which are characterized by heterogeneity and quick technological evolution, adopting the multi-cloud paradigm is a promising way to deal with different data storage requirements...
The use of Cloud infrastructures together with provisioning technologies can be successfully applied in scenarios where resources are only needed rarely and irregularly, for example simulation workflows in the eScience domain. There has already been proposed a solution for the on-demand provisioning of services required by workflows, but how to automatically provision the needed workflow middleware...
Context aware mobile applications are special types of context aware network systems that process gathered data from environment with context cycle functionalities and special infrastructure to obtain context information. Here, modelling and reasoning are most important functionalities and middleware is one of the common infrastructure to implement these functionalities. Essentially, techniques that...
We present a multi-agent framework for the formal verification of component-based systems after changes such as addition, removal and modification of components. The core of our approach is an Agent Verification Engine (AVE) that constructs evolvable Belief-Desire-Intention (BDI) agents to coordinate and plan the re-verification of component models after system changes. The engine provides BDI-agents...
High Efficiency Video Coding (HEVC) is becoming more and more important in current consumer application platforms. Compared with H264 standard, it can reach up to 8192×4320 resolutions at 120fps. To accelerate HEVC decoding processing, this paper presents an efficient hardware entropy decoding architecture, Entropy decoding includes Colomb and CABAC decoding. Hierarchy ring buffer is designed to storage...
A lack of appropriate engagement in online learning courses is a significant factor leading to poor performance and high dropout rates. This paper presents a framework that provides personalized motivations in the form of feedback, advices and reminders in order to enhance the engagement of students with online learning. It also describes the design, implementation and evaluation of the framework...
The workflow satisfiability problem has been studied by researchers in the security community using various approaches. The goal is to ensure that the user/role is authorised to execute the current task and that this permission doesn't prevent the remaining tasks in the workflow instance to be achieved. A valid authorisation plan consists in affecting authorised roles and users to workflow tasks in...
Current participatory sensing approaches usually do not consider device carriers as intelligent participants in sensing processes. However, modern mobile communication devices allow users express their opinions and judgements which can complement to captured sensor data. In this paper we bring together different modes of mobile crowd sourcing into a general sensing platform which treats device carriers...
The user's location is an important information to describe the current situation or context. In some scenarios, we have to rely on a purely textual description when a digital map is not available. Our approach efficiently generates a meaningful text that describes the current location. As an appropriate text is highly application-dependent, a formalism supports applications to configure the desired...
Problem-based learning (PBL) can be organized and conducted in a number of ways. Building a PBL application to support various PBL forms directly is difficult because the scope of variability cannot be completely known and there is a high cost in terms of time and efforts incurred. Existing PBL applications are developed usually to support a specific form of PBL. In this paper we propose a model-driven...
Machine and plant automation (M&PA) is becoming more and more complex, especially, as additional functionality is realized by a rising amount of software. In order to meet high requirements regarding the quality of these machines and plants, sophisticated methods for quality assurance (QA) are needed. Interaction diagrams have been established throughout different domains for specifying use cases,...
Social urban sensing is a new paradigm which exploits human-carried or vehicle-mounted sensors to ubiquitously collect data for large-scale urban sensing. A challenge of such scenario is how to transmit sensed data in situations where the networking infrastructure is intermittent or unavailable. In this context, this paper outlines our researches of a novel engine that uses Opportunistic Networks...
Recent developments such as the introduction of new mobile banking and mobile payment services represent both an opportunity and a challenge for banks. While there is great potential to increase revenue by providing new services to customers, this goes together with the need to improve the understanding of customer data through deeper analysis, and to react quickly to changes in customer demands....
In this work, we extend WuKong middleware to interface with context engine, to learn the context based on the history of user behaviors, and to command the devices in the system according to the context. With the enhanced WuKong framework, one can design and implement context-ware/user-behavior-aware IoT applications using FBP in WuKong middleware.
Push notification is an important approach to distribute interesting information to users timely. With the fast development of mobile devices and mobile applications, push notification is getting more and more popular. The convergence of mobile and IoT also bring new challenges on how the system can handle the mixed push channels designed for M2M communication and human interaction, and enable the...
n-gram statistical language model has been successfully applied to capture programming patterns to support code completion and suggestion. However, the approaches using n-gram face challenges in capturing the patterns at higher levels of abstraction due to the mismatch between the sequence nature in n-grams and the structure nature of syntax and semantics in source code. This paper presents GraLan,...
Several mobile-enabled solutions for education transformation have been deployed in Africa. Drawbacks of these systems include, a predominant focus on disseminating bulk learning content, student outcomes are measured solely on quantitative performance metrics, a lack of instrumentation to capture fine-grained user interaction data, and finally none of them seem to focus on capturing the contextual...
Functional diagnosis for complex systems can be a very time-consuming and expensive task, trying to identify the source of an observed misbehavior. We propose an automatic incremental diagnostic methodology and CAD flow, based on data mining (DM). It is a model-based approach that incrementally determines the tests to be executed to isolate the faulty component, aiming at minimizing the total number...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.