The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Logs are generated by output statements that developers insert into the code. By recording the system behaviour during runtime, logs play an important role in the maintenance of large software systems. The rich nature of logs has introduced a new market of log management applications (e.g., Splunk, XpoLog and log stash) that assist in storing, querying and analyzing logs. Moreover, recent research...
JIT spraying has an assured spot in an attacker's toolkit for Web browser exploitation: With JIT spraying an attacker is able to circumvent even the most sophisticated defense strategies against code injection, including address space layout randomization (ASLR), data execution prevention (DEP) and stack canaries. In this paper, we present Lobotomy, an architecture for building injection-safe JIT...
Context-awareness is becoming an important foundation of adaptive mobile systems, however, techniques for discovering contextually relevant Web content and Smart Devices (i.e., Smart Resources) remain consigned to small-scale deployments. To address this limitation, this paper introduces Ambient Ocean, a Web search engine for context-aware Smart Resource discovery. Ocean provides scalable mechanisms...
In hyperconnectivity scenario, managing the amount of data acquired from sensors in the Body Area Networks (BANs) is one of the major issues. In this paper we propose an on-chip context predictor based sparse sensing technology with smart transmission architecture which makes use of confidence interval calculation from the features that present in the data, thereby achieving statistical guarantee...
We propose a shared control architecture to enable the modeling of human-in-the-loop cyber physical systems (HiLCPS) in robotics applications. We identify challenges that currently hinder ideas and concepts from cross-domain applications to be shared among different implementation of HiLCPS. The presented architecture is developed with the intent to help bridge the gap between different communities...
In order to maintain Europe as world leader in development of safety relevant systems one of the keys would be to join together the European industrial, academic and scientific communities. One of the main industrial challenges is that any company that wants to compete in the safety-related embedded systems market and have success in business, have to develop competent systems reducing the time to...
With increasing complexity of the social systems under surveillance, demand grows for automated tools which are able to support end users in making sense of situational context from the amount of available data and incoming data streams. This paper presents MOSAIC (Multi-Modal Situation Assessment and Analytics Platform), a semantically integrated system which aims at exploiting multi-modal data analysis...
Overall high power consumption in the mobile applications forces the mobile users to recharge frequently. Most of the Android applications do not implement any self-adaptive strategies that react to the battery level, status and context. Thus the applications continue to consume power even when battery is critically low. Intelligent control of hardware and software optimization based on the battery...
As Agent-based software development methods get more and more attention and Agent-based software system has been used in a variety of occasions, the features and advantages of Agent have been recognized by scholars. However, the runtime environment of Agent is dynamic, open and changeable; runtime in this kind of environment is a big challenge to ensure that the software system can satisfy the user's...
Pervasive healthcare is emerging as a possible solution for the healthcare needs of an increasingly elderly population in the developed world. It is capable of providing a technology-driven approach to alleviate the healthcare needs by allowing healthcare to move from hospital-centered care to self-care, mobile care, and at-home care. When pervasive computing is used to provide technology-driven assistive...
We introduce and investigate a novel problem of image recommendation for web search engine users. Modern web search engines have become a critical assistant for people's daily life. Through interacting with web search engines, users exhibit personalized information needs in various aspects. While this information is critical to improve user experience, it is mostly used only in the web search domain...
In this paper, we reduce the energy overheads of continuous mobile sensing for context-aware applications that are interested in collective context or events. We propose a cloud-based query management and optimization framework, called CloQue, which can support concurrent queries, executing over thousands of individual smartphones. CloQue exploits correlation across context of different users to reduce...
Nowadays, Cloud offers many interesting features such as on-demand and pay-as-you-go resources, but induces new security problems in case a company wants to outsource its critical services. But since Clouds are shared between multiple tenants, both applications and execution environments need to be secured consistently in order to avoid possible attacks from malicious tenants. Moreover, if a large...
Penetration of smart phones and localization technologies are enabling a variety of smart location-based social mobility services that can notably improve the quality life of citizens on the go. Most existing solutions are shaped from a specific set of data sources processed through predefined computational flows to provide a specific class of services, and rarely strive for generality and urban-scale...
The advancement of technologies in the area of Ubiquitous Computing has resulted in a widespread use of services in order to improve the quality of human life. These services should be permeable to end-users so that they can compose and configure them in order to personalize them and have an experience of having proper control over them. On the other hand, adaptation during service usage is essential...
Mashup is becoming a powerful approach for end-users to meet their ad-hoc requirements based on existing services. Quite a few researches have been performed to achieve rapid, on-demand, intuitive development of mashups, which mainly focus on finding suitable quality components from a large number of available services. However, for mashups with procedure and context features, it is more crucial and...
GPUs are being increasingly adopted as compute accelerators in many domains, spanning environments from mobile systems to cloud computing. These systems are usually running multiple applications, from one or several users. However GPUs do not provide the support for resource sharing traditionally expected in these scenarios. Thus, such systems are unable to provide key multiprogrammed workload requirements,...
Users utilize web applications to perform everyday tasks in order to achieve personal goals. Personalized Web-Tasking (PWT) is the automation of such web interactions while exploiting personal context to enrich users experience. However, web-tasking is affected by unpredictable context behaviour -- environment, user, and infrastructure -- and situational changes. Given that current web systems are...
Android provides native development kit through JNI for developing high-performance applications (or simply apps). Although recent years have witnessed a considerable increase in the number of apps employing native libraries, only a few systems can examine them. However, none of them scrutinizes the interactions through JNI in them. In this paper, we conduct a systematic study on tracking information...
Various personalized recommendation services are provided through internet for users with different screen sizes and various sensors. It is also expected to be many competing service providers for similar recommendation service, and the users are expected to have the chances to select one of these services. However, the user related information as well as the environmental information around the user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.