The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid improvement of computer performance, provides a broad space for the simulation technology and impetus for making full use of high performance computer in simulation technology. However, simulation models and languages also need to meet higher requirements, especially for simulation interoperability and reuse, while general guidance for the modeling of simulation modeling and specification...
"Having Divided to Conquer We Must Reunite [to] Rule" [3]. Decomposition of problems and systems into smaller, more manageable units has been at the heart of software engineering practice for decades. "Separation of concerns" gives software engineers the conceptual and practical tools to focus their attention, and their tools, on the parts of the problem or solution to which they...
App repackaging is a common threat in the Android ecosystem. To face this threat, the literature now includes a large body of work proposing approaches for identifying repackaged apps. Unfortunately, although most research involves pairwise similarity comparison to distinguish repackaged apps from their "original" counterparts, no work has considered the threat to validity of not being able...
In this paper we present a case study of applying fitness dimensions in API design assessment. We argue that API assessment is company specific and should take into consideration various stakeholders in the API ecosystem. We identified new fitness dimensions and introduced the notion of design considerations for fitness dimensions such as priorities, tradeoffs, and technical versus cognitive classification.
This paper presents our results from identifying anddocumenting false positives generated by static code analysistools. By false positives, we mean a static code analysis toolgenerates a warning message, but the warning message isnot really an error. The goal of our study is to understandthe different kinds of false positives generated so we can (1)automatically determine if an error message is truly...
The increasing popularity of blockchain-based cryptocurrencies has made scalability a primary and urgent concern. Compared with the completely open, uncontrolled public blockchain system, private blockchain can provide better access control management. This paper proposes an architecture for distributed private blockchain. At the same time, we propose three strategies to improve the scalability of...
This paper presents an event based model multi-processor system that can handle events from hundreds ofterminals. The overall system acts as a single system as if it iscontrolled by a single processor. A communication system wasimplemented using the proposed model. Every node in the systemruns the same program and in order to add new processing nodesinto the system only the configuration files have...
The requirement and expanding needs of bridging the physical and cyber world promote the emergence of a new global internet-based information architecture, the Internet of Things. The main challenge in Internet of Things is how to make fast and accurate decisions based on multi-modal sensing data. In this paper, we put human into the process and formulate a closed-loop computing paradigm for IoT data...
Over the past decades, Intelligent Transportation Systems (ITS) have developed and deployed in order to improve trans-portation safety and mobility, reduces environmental impact, promotes sustainable transportation development and enhances productivity. ITS combines high technology and improvements in information systems, communication, sensors, controllers and advanced mathematical methods with the...
We would like to welcome you to Valencia, to attend The 2nd International Conference on Fog and Mobile Edge Computing (FMEC 2017) in Valencia, Spain from May 8 to May 11, 2017. FMEC 2017 is becoming one of the most well-known international technical conferences in the areas of Fog and Mobile Edge Computing. We are much honored to serve this year as general chairs for this conference. We are also very...
Summary form only given, as follows. The complete presentation was not made available for publication as part of the conference proceedings. Cyber-Physical Systems can be harmed through both cyber-enabled or physically-enabled attacks, particularly ones that exploit the often ignored interplay between the cyber and physical spaces characterizing a system operating environment. Awareness of the topology...
We would like to welcome you to Valencia, to attend The 4th International Conference on Software Defined Systems (SDS 2017) in Valencia, Spain from May 8 to May 11, 2017. SDS 2017 is becoming one of most well-known international technical conferences in the area of Software Defined Systems. We are much honored to serve this year as the general chairs of this conference. We are also very proud of this...
The integration of Internet-of-Thing (IoT) devices to smart buildings raises the risk of vulnerabilities in building operation. This paper presents the software development work for the secure deployment of IoT devices in commercial buildings. Security threats with their countermeasures are analyzed in the context of a specific Building Automation System (BAS) implementation called Building Energy...
Car automation and surveillance is an escalating trend in this decade. Smart Vehicle security is becoming an indispensable need as it makes it easier for the owners to ensure their automobile's safety wirelessly. The core elements in our system consists of a mini central processing unit, motion detecting sensor accompanied with a camera module and buzzer. Our security network can be used to monitor...
A significant requirement for any steganography technique is to lessen the movements happening in the cover picture by the data embedding handle. The wander proposes a uncommon course for steganography using a reversible surface mix in perspective of edge flexible and tree based uniformity check methods to improve as far as possible. This approach offers three unmistakable central focuses. In any...
Mobile ad hoc networks (MANETs) play a significant role for communication whenever infrastructure is not available. In MANET, the group communication-based applications use the multicast routing protocol, where there is a single sender node and a group of receiver nodes. The benefits of multicast routing protocols are the capability to reduce the communication costs and saving the network resources...
This paper highlights the development and preparation process of the implementation of live working in Turkey; whilst focusing on contributing factors, undertaken operations and goals for the future.
The Internet of Things (IoT) includes billions of things, i.e., connected objects and devices that are heterogeneous, distributed, and possibly intelligent and run applications and services from the Internet of Services (IoS). Things span, for instance, RFID tags, sensors, computers, plants, lamps, autonomous robots, and self-driving vehicles. Often, things are connected through heterogeneous platforms...
This paper investigates the use of deception in combating the deceiving attack in IEEE 802.22 cognitive radio networks. The deceiving attack is a coordinated combination of diverse jamming attacks sourced by the same malicious platform. In this paper, a deception-based defense scheme is proposed to counteract the deceiving attack. The non-existence of the pure strategy Nash equilibrium was proven...
Technology is evolving at a greater speed, day-by-day various health monitoring devices are invented. Remotely monitored health data should reach the doctors to diagnose the health problems. Patient's health information can be stored at cloud, but the main issue here is that the privacy of the data stored is not guaranteed. Cryptographic encryption techniques can solve the problems of secure storage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.