The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Agile software development methodologies use an iterative and incremental development in order to handle evolving systems. Consolidated techniques in the field of testing have been applied to these techniques with the main purpose of aiding in the test creation stage. An example is Model-Based Test Driven Development (MBTDD) which joins the concepts of Model-Based Testing (MBT) and Test Driven Development...
Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of...
A method of measuring three-dimensional spatial wave size is proposed and statistical distributions of the size characteristics are derived in explicit integral forms for Gaussian sea surfaces. New definitions of wave characteristics such as the crest-height, the length, the size and the wave front location are provided in fully dimensional context. The joint statistical distributions of these wave...
With the proliferation of smart phones, mobile applications (APPs) are increasingly being used for mobile work and entertainment. In order to satisfy people's various demands, there are enormous mobile applications being delivered through different mobile application markets. This brings markets owners huge opportunities and tough challenges simultaneously. It is very difficult to find proper APPs...
Clustering product features is the essential task to mine opinions from unstructured online reviews because different customers usually express the same feature with different words or phrases. Several supervised and unsupervised methods have been applied to accomplish this task. In this paper, we propose an orthogonal nonnegative matrix tri-factorizations model to solve the problem. We first construct...
In this era of information explosion, providing the right information to the right person within reasonable time duration to support humans in accomplishing their tasks is the main task of knowledge recommendation systems. Context plays an important role in the process of improving the effectiveness and precision in knowledge recommendation system. While extant researches of knowledge recommendation...
Coefficient-level rate distortion optimized quantization (RDOQ) is an efficient tool to improve rate-distortion performance with 6%–8% bit-rate saving. It has been widely adopted in video encoders such as JM, x264, HM and so on. However, software implementation of RDOQ suffers from high computation complexity due to intensive path search and from data dependency caused by context based entropy coding...
Recently, the automatic highlighting of anomalous changes in a sequence of social graph snapshots is receiving growing interest due to its numerous applications. For instance, it may be helpful for the identification of attackers or risky users in Online Social Networks (OSNs). Indeed, dynamically monitoring and learning the friendship patterns of users in a large social graph over time for any anomalous...
Although non-functional requirements (NFR) are the basis for the definition of a appropriate architecture to the software context and have influence on the time and cost of development, elicitation of the requirements still seems to be a problem for many organizations. The objective of this study is to identify the current situation of the organizations as the NFR elicitation. We conducted a survey...
Non functional requirements are very interesting specially in case of business relationships. In fact they are idioms of communication between business environment parties: provider and consumer. In particular in web services context, these requirements and non functional characteristics are also seen as a ranking and selection criteria. Thus, many researchers propose tools to measure the quality...
Cities are seeking new innovative approaches to deliver public services by involving their community in a co-creation process. The main innovation of CLIPS is to provide a usable methodology with a toolkit that enables civil servants and other external stakeholders to collaborate in new designs and delivery of services, starting from a set of basic building blocks available in the cloud. This offers...
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental...
The proposed patterns for a specific domain were widely used for the concept of reusing of the resolved problems to similar ones. The verification criteria for proposed patterns evaluation are one of the important factors that affect the patterns quality. This research proposed patterns verification method and criteria based on quality attributes in order to improve patterns validity. The method was...
This paper introduces a novel approach for document re-ranking in information retrieval based on topic-comment structure of texts. While most information retrieval models make the assumption that relevant documents are about the query and that aboutness can be captured considering bags of words only, we rather consider a more sophisticated analysis of discourse to capture document relevance by distinguishing...
This paper focuses on the items/users representation in the domain of recommender systems. These systems compute similarities between items (and/or users) to recommend new items to users based on their previous preferences. It is often useful to consider the characteristics (a.k.a features or attributes) of the items and/or users. This represents items/users by vectors that can be very large, sparse...
Network function visualization and software-defined networking allow services consisting of virtual network functions to be designed and implemented with great flexibility by facilitating automatic deployments, migrations, and reconfigurations for services and their components. For extended flexibility, we go beyond seeing services as a fixed chain of functions. We present a YANG model for describing...
Integrating technology in pedagogy is a step for ICT capacity building for higher education to meet its current demands. Therefore, the integration of eLearning systems has been problematic, albeit huge investments in ICT infrastructure. This study investigates teacher adoption of a new upgraded eLearning platform being integrated at University of Rwanda. A six-constructs model related to technology...
We present a proof-based automatic synthesis experiment in the context of sorting binary trees, namely the synthesis of the function which inserts an element in a sorted binary tree at the appropriate place. The algorithm is automatically extracted from the automatically produced proof of the conjecture which expresses the existence of the desired output for each appropriate input of the function.
The purpose of this paper is to provide an overview of how a digital health innovation ecosystem was conceptualised and validated for South Africa. Largely, we focus on defining strategies to build Digital Health Innovation Ecosystems in the context of developing countries, and pay particular attention to the challenges and potentials. Over a period of two years the conceptualisation was done by applying...
The need to encourage citizens' adoption of e-government services has led to an increasing interest in the evaluation of e-government websites. The success of e-government websites depends on how well it is perceived by the end-users. User experience of e-government websites is considered one of important factors affecting the success or failure of e-government websites. However, researchers have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.