The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Usability is considered as one of the most important quality factors for commercial Web interfaces, along with others such as performance and security. However, most of usability evaluation methods for these Web applications do not support automatic measures. This paper addresses these issues through the presentation of an automatic evaluation model based on a systematic qualitative technique to validate...
This paper explores what constitutes a trustworthy message in the context of e-learning. We did this by asking students to produce messages that they believed people like themselves would trust and then analyzed the data they produced. Coming from a user experience (UX) perspective, our interest is in improving the design of e-learning systems. We found that students reinforced and reiterated several...
With the immense growth of online social applications, trust plays a more and more important role in connecting users to each other, sharing their personal information and attracting him to receive recommendations. Therefore, how to obtain trust relationships through mining online social networks became a critical issue. To calculate the level of trust between two users, many computational trust models...
In today's military environment large quantities of distinct information are available. In a time-constrained environment it is vital to have some way to judge the relative importance of information. Recent research has developed a fuzzy-based system to assign a Value of Information (VoI) determination for individual pieces of information. Subsequent work presented ideas for integrating complementary...
Typing is a well known concept to prepare services for data processing for instance by choosing the correct service to a mime type for processing. But a lot more metadata elements, like availability and access conditions, provenance, processing preconditions or integrity parameters, are useful to be known in advance for preprocessing data services. In order to expose such metadata independently from...
WebRTC provides web calling services by enabling communication between browsers in a P2P fashion. To achieve security and enhance user privacy it is essential to define the level of trust between the various entities involved in WebRTC security architecture. The existing P2P trust models are not directly applicable as the characteristics of browser to browser communication are not taken into account...
Knowledge Management methods, techniques and experience can bring a considerable help in preventing all kind of risks. The current economic context amplified the existing risks and introduced new ones such as environmental, political and social. Among the most critical risks of this century is this of lost of knowledge and “memory” in particular in industry involved in long-term activities. After...
The use of Information and Communication Technology (ICT) has touched various aspects in the domain of transport engineering and logistics (TEL). As the development of TEL tends to be more complex in operation and large in scale, recent practices start to pay more attentions on improving system robustness and reliability. In addition, current ICT innovations (such as WSN and IOT) could record and...
Information and communication technologies (ICTs) can enhance the knowledge sharing by lowering temporal and spatial barriers between prosumers and enterprises, and improving access to prosumers' knowledge for enterprises. A major challenge for enterprises involves investing in the appropriate ICTs that help facilitate prosumers' knowledge engagement and knowledge transfer. The purpose of the paper...
The assessment of travel time reliability for segments and routes is a rapidly advancing frontier. The increasing availability of probe data is making it possible to monitor reliability in real-time based on individual vehicle data as opposed to ex-post-facto based on averages. This paper examines metrics that can be used to monitor reliability based on probe data. The merits of traditional metrics...
Sedentary behaviors such as prolonged occupational and leisure-time sitting are now ubiquitous in modern societies. Sedentary time is positively associated with increased risk of obesity, diabetes, cardiovascular disease, and all-cause mortality. Smartphones can sense the sedentary behaviors performed by their users, as well as the contexts (situations) in which sedentary behaviors occur. In this...
A key property in tactical network environments is that the wireless network itself is typically the major limiting factor in how much information can be shared between users. In such environments, tactical operations often employ group communication protocols (one-to-many or many-to-many) to send information between users. This often results in situations where every message sent gets delivered to...
Cloud computing has emerged as the primary and popular computing paradigm recently. Since cloud users move continuously, sustaining the required quality of service (QoS) in a cost effective manner is very challenging. For maintaining the required QoS for a moving user, the current cloud systems use some of the existing service replication or/and migration strategies. However, those policies become...
To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable...
As robots aspire for long-term autonomous operations in complex dynamic environments, the ability to reliably take mission-critical decisions in ambiguous situations becomes critical. This motivates the need to build systems that have situational awareness to assess how quali ed they are at that moment to make a decision. We call this self-evaluating capability as introspection. In this paper, we...
With the increasing amount of renewable and difficult-to-forecast generation units, Transmission System Operators (TSO) are facing new challenges to operate the grid properly. Indeed, given the intrinsic variability and limited predictability of most renewable generations, the application of the conventional and deterministic N-1 method becomes very costly. Therefore, a new approach is needed for...
Green Information Technology (IT) is the study of environment friendly practices in the IT context. Science and technology has brought in many benefits over the years but we failed to see the environmental degradation that is happening due to anthropogenic activities. In recent times, there exists an enthusiasm in sustainable activities among people but its relationship with their day to day work...
This study utilized a quantitative survey and open-ended items to understand engineering students' epistemic beliefs and gather content and face validity evidence. The survey included 22 items from the Engineering-Related Beliefs Questionnaire. Fifty undergraduate bioengineering students completed the survey. In addition to responding to the items on an anchored scale, the students were asked to provide...
In the collaborative systems, in order to establish successful and protected collaboration, the trust management is first established between the participating entities and the trust score of each entity is calculated. This score is obtained based on the three trust criteria (satisfaction, reputation and recommendation) that are redefined and reused in our model: Tr-OrBAC. The evaluation of these...
In the context of swift development of P2P e-commerce, it is critical to defending both customers and sellers from being victimized by probable deception stemming from uncertainties, vagueness and ambiguities that characterize the interactions amongst unfamiliar dealers. Accordingly, credit standing concerning each business partaker plays a decisive part in preventing fraud in P2P transactions and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.