The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Client selection of web-based social networking has rapidly shot up as of late. Where associations used to participate in one-way information spread with customers earlier, today, multi-way examinations, with or without the consideration of the business, between clients are the standard. There now exist a class of super clients, or influencers, who expect a disproportionate part in the environment...
As a part of a project exploring ways to define transition to Territorial AgroEcological System (tTAES), researchers and rural stakeholders (policymakers and farmers) organized territorial participatory design (TPD) workshops. Such TPD workshops are especially challenging since actors projecting their activity into the future confront many viewpoints or controversial dimensions (farming systems, natural...
Software architecting is about making decisions that have system-wide impact and that shape software product and process alike. While researchers and practitioners have tried to define and scope the role of the architect, social and organizational impacts on the architect and the architecting process are often neglected. The SODA workshop focuses on the social and organizational dimensions in which...
Recent technological advances in molecular biology have enabled not only the real-time measurement of molecular activities in cellular systems but also the ability to manipulate some of these through engineered molecular-actuation systems and the ability to design new cellular systems that do not yet exist in nature. These capabilities have expanded the field of systems biology, which originally aimed...
Code ownership establishes a chain of responsibility for modules in large software systems. Although prior work uncovers a link between code ownership heuristics and software quality, these heuristics rely solely on the authorship of code changes. In addition to authoring code changes, developers also make important contributions to a module by reviewing code changes. Indeed, recent work shows that...
The purpose of this paper is to present the new IEEE Education Society Conference in its Region 9, Latin America, the IEEE World Engineering Education Conference - EDUNINE2017. Its first edition is in Santos, São Paulo, Brazil, an important city for its characteristics and History. It is a historical conference that has been designed to happen in the next years, in the different countries of Latin...
The new advent of digitized has lead to rise of volume, velocity and variety of data by passing every hour. In reality, most of the data were stored on Cloud for managing the storage system. Most of the organizations were moving their data into the Cloud. Thus, Cloud Computing will play a vital role in today's world. Cloud Computing provides remote access to the Client on the basis of Pay-What-Use...
Cloud computing has become an extremely attractive area of research and practice over the last few years. However, there are many concerns over privacy of shared documents while adopting and using public cloud solutions. Private cloud solution is useful for organizations to implement their own privacy policies. Through this paper we propose a method to upload privacy preserving application on private...
Energy and resource utilization efficiency are two of the most significant differentiators in the contemporary Cloud computing marketplace. This paper addresses both of these from system of systems architectural and optimization viewpoints. Our approach will allow multiple cloud providers to optimally utilize compute resources. It will do this by (1) lowering the datacenters deployments per provider...
The quotations from Peter Drucker and Henry Mintzberg define the management function: Drucker focuses on people, Mintzberg on on how managers provide opportunities. As managers, we take on great responsibilities as we try to meet organizational requirements as well as providing challenging work opportunities. This issue of EMR begins the Technology Managers Notebook followed by Reflections from the...
STEM activities are activities that promote learning in Science, Technology, Engineering, and Mathematics. They claim to help children work towards careers in these areas. They promote cognitive and psychomotor development in children, and assist in developing their meta-cognitive knowledge. While typical STEM activities for young children are categorized into broad categories of robotics, physics...
Moving item recommendation is now and again a champ among the most key and basic procedures in PC perspective programs. In this paper, a novel organization model is suggested to get rid of illustrating closer see things from files that may contain different sorts of disturbing impact, for instance, light changes, camera parameter varieties, bustles and component back-grounds, etc. For each appearance,...
This study was carried out to explore the steps of User-centered Design in development of health information technology. The technology was developed in two research projects: the European Union project United4Health that created a collaborative telemedicine system for remote monitoring of Chronic Obstructive Pulmonary Disease and the Southern Norway regional project eHealth-extended Care Coordination...
Secret sharing of data has certainly not been a trouble-free task with improvements in cloud computing, and a precise consideration on data that is shared offers several advantages to general public as well as individuals. There are a variety of issues that are faced when data is shared with many participants. An assuring applicant that could be used to build a secure and dependable data sharing system...
Feature selection is a form of both data reduction and attribute prioritization. It is modeled in existing work as a game between agents (buyers and sellers of information) in a corporate environment where information is accessible at a price. However, the interactions are typically moderated by a trusted third-party agent. Extending that work, we observe behavior in an unmoderated environment, integrated...
Closely coupled CPU and GPGPU system with the shared last level cache (LLC) enables fine-grained data exchange. However, traditional data exchange causes unnecessary LLC misses and degrades the entire system performance. We believe that the cache organization is not suitable for the temporary data exchange in the closely coupled system. We analyze the memory access pattern and discover the inefficiency...
Real-world knowledge is growing rapidly nowadays. New entities arise with time, resulting in large volumes of relations that do not exist in current knowledge graphs (KGs). These relations containing at least one new entity are called emerging relations. They often appear in news, and hence the latest information about new entities and relations can be learned from news timely. In this paper, we focus...
Graph-OLAP is an online analytical framework which allows us to obtain various projections of a graph, each of which helps us view the graph along multiple dimensions and multiple levels. Given a series of snapshots of a temporal heterogeneous graph, we aim to find interesting projections of the graph which have anomalous evolutionary behavior. Detecting anomalous projections in a series of such snapshots...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.