The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies communication patterns in mobile applications. Our analysis shows that 63% of the external communication made by top-popular free Android applications from Google Play has no effect on the user-observable application functionality. To detect such covert communication in an efficient manner, we propose a highly precise and scalable static analysis technique: it achieves 93% precision...
In this paper we conduct an intensive investigation into a recent remote collaboration support system called t-Room. This system virtually overlays a room onto other distant rooms using media data processing technologies, and it provides users in the distant rooms the sense of being in the same room. We improve t-Room by expanding its shared room space. We first introduce our own t-Room system, which...
We describe the Ignite Distributed Collaborative Scientific Visualization System (IDCVS), a system which permits real-time interaction and visual collaboration around large data sets, with an initial emphasis on scientific data. The IDCVS offers such a collaborative environment, with real-time interaction on any device between users separated across the wide area. It provides seamless interaction...
One of the visual challenge problems that the blind faces is the consumer product identification with contextual and description information problem. In order to increase their independence in food shopping and other product recognition, we implement an Android application called UCap to assist the blind in this visual challenge problem. In the visually impaired and blind persons mode, UCap is a camera-base...
The main purpose of this paper is to create a research/development tool enabling the network, system administrators and any developers to bring new innovative easy-scaling services for clients where the infrastructure is composed solely from Software Defined Networking (SDN) components. SDN is a new emerging technology that was being adopted by key players in network technologies all over the world...
Bugs reports and version archives are two useful sources of information for quality analysts, with the goal of mapping the bugs fixes to source code files. Manually performing this task is as arduous as it is time consuming. We propose a tool which programmatically performs this job in two phases-First, it filters relevant log entries by traversing CVS/SVN log files and then it parses the textual...
Bitcoin is a digital currency whose transactions are stored into a public ledger, called blockchain, that can be viewed as a directed graph with more than 70 million nodes, where each node represents a transaction and each edge represents Bitcoins flowing from one transaction to another one. We describe a system for the visual analysis of how and when a flow of Bitcoins mixes with other flows in the...
Systematic monitoring of the status and trends of the thunderstorm activity of a given region is caused by necessity to minimize damage from lightning. Particular attention is paid to the reliability of the thunderstorm activity forecast and the time of its formation. So a small time span between the formation of a reliable forecast of the storm hazards and the onset of adverse events does not allow...
Attack Graphs (AGs) are a well-known formalism and there are tools available for AG generation and security risk analysis. The security posture of a networked system can be evaluated via an AG. However, as the size of the system becomes large, the AG suffers from the state-space explosion problem. Scalable security models have been developed to cope with this issue. Hierarchical Attack Representation...
The role of human sight becomes increasingly important as information technology progresses. Presentations based on multimedia help to explain many kinds of situations. However, this form of communication, so convenient for persons gifted with sight, is inaccessible to the visually impaired. Thus, persons lacking eyesight are eager for a method that can provide them with access to progress in technology...
ITS solutions suffer from the slow pace of adoption by manufacturers despite the interest shown by both consumers and industry. Our goal is to develop ITS applications using already available technologies to make them affordable, quick to deploy, and easy to adopt. In this paper we introduce an ITS system for overtaking assistance that provides drivers with a real-time video feed from the vehicle...
Traditional vehicle recognition and retrieval systems are almost based on vehicle license plate recognition, which requires the user to provide images containing the license plate of the vehicle. In order to recognize and retrieve vehicles more convenient and efficient, and solve the problem of missing or wrong license plate, this paper proposes a method based on the overall appearance characteristics...
In recent years there has been an exponential increase in the growth in multimedia applications, and in particular in video applications. Understanding the behavior of the video traffic and the requirements for the network helps network administrators to improve the traffic. In this work, a quantitative analysis is performed by experimentation, in order to evaluate the behavior and impact of video...
For server and network administrators, it is a challenge to keep an overview of their systems to detect potential intrusions and security risks in real-time as well as in retrospect. Most security tools leverage our inherent ability for pattern detection by visualizing different types of security data. Several studies suggest that complementing visualization with sonification (the presentation of...
The aim of this paper is to present a web-based evaluation system developed as part of a research has been carried out in cooperation with University of Debrecen and University of Miskolc in the framework of the project TÁMOP-4.2.2.C-11/1/KONV (Social Renewal Operational Programme) called ‘Basic and Applied Research for Internet-based Speech Development of Deaf and Hard of Hearing People and for Objective...
This paper describes an automated process of active perception for cyber defense. Our approach is informed by theoretical ideas from decision theory and recent research results in neuroscience. Our cognitive agent allocates computational and sensing resources to (approximately) optimize its Value of Information. To do this, it draws on models to direct sensors towards phenomena of greatest interest...
Debugging sessions require a methodical process of finding causes and reducing the number of software problems. During such sessions, developers run a software project, traversing method invocations, setting breakpoints, stopping or restarting executions. In these sessions, developers explore different parts of the code and create knowledge about them. When debugging sessions are over, it is likely...
In many enterprises the number of deployed applications is constantly increasing. Those applications - often several hundreds - form large software landscapes. The comprehension of such landscapes is frequently impeded due to, for instance, architectural erosion, personnel turnover, or changing requirements. Therefore, an efficient and effective way to comprehend such software landscapes is required...
Multi-hop transmission of real time video in IEEE 802.11p from vehicle to infrastructure access point and then via other access points to the server is addressed in this paper. We perform the feasibility study of such systems by analyzing the end to end quality of distortion in video signals among many competing vehicles, to and from the tagged vehicle which is located several hops from the server...
This paper reports experience in developing a parallel reality system which allows its user to observe and move around their real environment whilst wearing a stereoscopic 3D head mounted display imbued with video-see through capabilities, with their position and gaze tracked by an indoor positioning system and head tracker, allowing them to alternately view their real environment and an immersive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.