The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Message ordering is one of the essential problems in distributed systems and applications. In spite of the importance, most of publish/subscribe systems do not guarantee the ordering of messages and events because of its cost which may give an impact on the overall performance. When we suppose dynamic systems, such as peer-to-peer systems, the implementation of the message ordering would be pretty...
We proposed a novel scheme that combines information exchange and user social activities in real-time so that users can integrate their communications seamlessly with their daily lives. Called the Real-Spatial Information-Based Group Communication (r-Space) system, this scheme creates r-Space groups by considering personal and location information and enables users to share information within those...
This poster presents a gamified system for equivalent mutants detection. This system can be used as a standalone tool for developers and testing teams alike - but we plan to use this system on a crowdsourcing platform to evaluate the various parameters involved in the detection of equivalent mutants, such as, expertise (coding and testing), familiarity with the code base, complexity of the code and...
Driven by the rapid growth in the area of the Internet of Things, everyday environments become increasingly smart and pervasive. Simultaneously, this development faces users with emerging challenges in interacting with pervasive environments. Due to the ongoing and often invisible embedding of functionality into everyday objects and environments, the wireless interconnection of devices and the increasing...
Mutation analysis is a method for predicting the quality of test suite accurately. However, it has high computational cost due to the number of mutants that are generated. For example, the ROR (Relational Operator Replacement) mutation operator will generate seven mutants for just one relational operator. Naively applying multiple operators over the entire program can result in a high number of generated...
The high quality of computer vision (CV) software has a great impact on the usability of the overall CV systems in real world scenarios. As the usage of standardized quality assurance methods, metrics and tools can ease the work of any CV developer and quickly improve the overall process, we report here on the introduction of code coverage analysis in the field. Our initial motivations were both to...
Packet integrity or modification attacks commonly happen in Opportunistic Networks (OppNets). In this paper, we propose a technique that uses Merkle trees to protect the integrity of the packets transferred in a network. When adopting the technique in an OppNet, nodes will be able to verify that data transferred from node to node is received unchanged and in its original state. Using a solid trust...
Floating Content (FC) has recently been proposed as an attractive application for mobile networks, such as VANETs, to operate opportunistic and distributed content sharing over a given geographic area, namely Anchor Zone (AZ). FC performances are tightly dependent on the AZ size, which in literature is classically chosen by the node that generates the floating message. In the present work, we propose...
The Sensorian Hub is a software platform designed and developed for using the Raspberry Pi Single Board Computer (SBC) as a sensor node, whether independently or in a larger network of sensors. The intention of the platform is to provide an easy to use and highly customizable system for collecting and processing sensor data in a variety of environments and applications. In this paper, the design and...
In this paper, we investigate the data integrity attack against Optimal Power Flow (OPF) with the least effort from the adversary's perspective. The investigated attack can first select the minimum number of target nodes to compromise by analyzing the difference between the capacity of transmission line and the real transmission power, and then search for a critical attack vector (with a goal to minimize...
The World Wide Web is a place where people can shop, read articles, search for information of all kinds. Like other activities that are carried out by people offline, browsing the Web involves very complex cognitive processes. According to the Cognitive Load Theory, the human cognitive capacity is limited to processing a few pieces of information at a given time, because the cognitive resources available...
This paper deals with an extended framework of the distributed asymptotic agreement problem by allowing the presence of unilateral interactions (optimistic or pessimistic) in place of bilateral ones, for a large class of nonlinear monotone time-varying networks. In this original setup we firstly introduce notions of unilateral optimistic and/or pessimistic interaction, of associated bicolored edge...
We consider in this paper a discrete-time deterministic m-ary diffusion model over a strongly connected directed graph. The update rule is easy to state: let the vertices of the graph represent the agents and the edges represent the information flow; at every time step, each vertex updates its value to the maximum value held by its incoming neighbors at the last time step. The resulting system, defined...
In online social networks (OSNs), highly-connected users are generally more capable to trigger viral diffusion. However, recent research demonstrates that ordinary users who only have a few connections can also cause large-scale diffusion. In this paper, we study the relation between the global spreading influence and the local connections of users to theoretically explain this phenomenon. We focus...
Software testing is the process of executing a program or system with the intent of finding errors. Budgets assigned for software testing are generally limited. Performing exhaustive testing which tests all possible input combinations (test cases) is practically impossible. A major challenge in testing is how to achieve maximum test coverage using limited number of test cases. In this article, we...
Due to the ever-advancing technology, usage of information technology in modern life is increasing at a fast pace. Hence, ICT based systems have enormous potential providing accessibility and affordability to the urban inhabitants in developing countries. In this paper, a framework for a dynamic vehicle pooling system for Dhaka city is proposed. Comparing to existing systems, some new concepts have...
In higher education globalization brings challenges as part of a reform process. An important aspect of such a reform has to do with the flexibility of the contents of a curriculum. Normally curricula offer students a whole set of possibilities to make decisions regarding optional courses recommended in an educational programme. In this work we present the design of a semi-automated Academic Tutor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.