The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The topic of this article, except of description of general issues concerning stringing, is also choice between two aerial method of unrolling initial rope, taking into account various technical, financial, and locational aspects as well as availability of offers on the market, which might help determine the most suitable and appropriate solution. Additionally, the following work focuses on limitations...
The number of elderly people in the world is growing rapidly. For this reason, is necessary more tools for the care, entertainment, and interaction of the elderly. This paper presents an application to foment social interaction among elderly people. This app is part of the SAFER platform, focused on meeting the needs of this part of population. The app stores in a database the profiles of the elderly...
The paper is devoted to development of intelligent context-aware energy management system of power semiconductor converters inside a SmartGrid using the principles of cognitive, object-oriented analysis. Mathematical software for decision-making system of power semiconductor converters was developed using combination of different converter control strategies. The proposed solution includes processing...
Cloud computing platforms are increasingly deploying multi-processors that are heterogeneous in the resource capacities or functionality of their processors (Instruction Set Architecture, or ISA). ISA heterogeneity (e.g., CPU vs GPU) or administrative policies can additionally create placement constraints whereby certain threads may only execute on a subset of the available cores. Fair CPU scheduling...
Since Apple introduced the iBeacons in Worldwide Developers Conference (WWDC) 2013, the iBeacon has been rapidly accepted and generalized in the market. For the deployed iBeacons, it is necessary to monitor their status. In this paper, we design a crowd sensing based monitoring framework which combines the moving and static schemas of participants to monitor the real status of iBeacons. In such a...
State machines are a common technique to describe state dependent systems such as communication protocols. Although such state machines typically incorporate events to switch between states, a description based on a pure event-based system is quite challenging. In this work, we describe the factors that complicate state machines on event basis and present solutions. These solutions are developed especially...
Bug prediction allows developers to focus testing eorts onspecic areas of software systems. While this topic has beenextensively studied for traditional applications, investiga-tions on mobile apps are still missing. In this paper wepreliminarily study the eectiveness of a previously denedJust-In-Time bug prediction model applied onve mobileapps. Key results indicate the poor performance of the modeland...
Aiming to keep under control a particular system or environment or to ensure that it works as expected there is a need to know what-when-why happens there. Various conditions and environmental factors can lead to errors, unexpected behavior or loss of control. To pursue these factors manually is time consuming, error prone, slow and usually quite expensive. Monitoring is quite complex and challenging...
Summary form only given. The complete presentation was not made available for publication as part of the conference proceedings. CESI 2017 workshop summary. CESI2017 is about "conducting empirical studies in industrial settings". We aim at identifying, debating about, and mitigating the barriers challenging the design and execution of empirical studies in industrial settings. In the past...
Context: Agile software processes are more frequently being integrated with aspects of human centered design given the commonalities that the two approaches share, such as user involvement, importance attributed to testing and prototyping practices, iterative design and so on. Goal: tailor a SCRUM-based process by integrating it and adapting it with Human Centered Design (HCD) practices. Method: action...
Context: Conducting a Grounded Theory study is rigorous, demanding, and challenging. Misperceptions exist within the software engineering community. Objective: The purpose of this paper is to describe one extended participant observation Grounded Theory study for aiding new empirical researchers wanting to run similar research studies. Method: Following Constructivist Grounded Theory, we conducted...
Software Product Line (SPL) consists in an approach that enables software reuse by allowing the creation of software applications through the features composition to address a particular domain. Framework Product Line (FPL) is an extension of SPL, whose features composition result in targeted frameworks, which are used to address subdomains of applications. Model-Driven Engineering is a promising...
Formal approaches to software development have traditionally aimed at guaranteeing software correctness, through the use of notations, analysis mechanisms and other elements founded on solid mathematical grounds. Since the seminal works of Hoare, Floyd and others, formal methods have used logical notations to capture intended software behavior, and proposed techniques for reasoning about software...
a recent trend in intrusion detection is toward utilizing knowledge-based IDSs. Knowledge-based IDSs store knowledge about cyber-attacks and possible vulnerabilities and use this knowledge to guide the process of attack prediction. One significant limitation of knowledge-based IDSs is the lack of contextual information and domain knowledge used to detect attacks. Contextual information is not only...
In this work, we report a study carried out to identify a set of metrics to early estimate the development effort of mobile apps. The applied methodology was inspired by the work of Mendes et al. who addressed a similar problem in the field of web apps. In particular, we extracted an initial set of metrics by analyzing the online quotes forms that companies made available on their websites. Afterward,...
Self-driving cars are technologically a reality and in the next decade they are expected to reach the highest level of automation. While there is general agreement that an advanced human-autonomous vehicle (HAV) interaction is key to achieve the benefits of self-driving cars, it is less clear what role artificial intelligence (AI) should play in this context. While the scientific community is debating...
The advent of social media in education has the potential to foster collaborative learning. Exploring students' interactions on the social media tools is an important research direction, which could bring an insight into the collaborative learning process. Therefore, our aim is to propose a conceptual framework for knowledge extraction and visualization from a social media-based learning environment...
This paper introduces a methodology to design a Context-aware Adaptive System based on a layered software architecture. The model of the context awareness multi-modal traffic management takes into account the context parameters in order to adapt dynamically the decisions (choice of the best transportation route). The efficiency of the proposed technique is validated through a case study including...
Recent advances in sample efficient reinforcement learning algorithms in quasi-deterministic environments highlight the requirement for computationally inexpensive visual representations. Here we investigate non-parametric dimensionality reduction techniques based on random linear transformations and we provide empirical evidence on the importance of high-variance projections using sparse random matrices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.