The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When enterprises decide to outsource their business processes to the Cloud, various considerations should be tackled. Indeed, the enterprises aim to reduce the business processes investment cost, to enhance their performance, and to focus on the enterprise core competency while considering security constraints. Hence, it is essential to assist enterprises to take the suitable decision by providing...
E-health applications are methods used by medical practitioners to assess and follow their patients' mental and physical conditions. They may also provide feedback to patients and help them to change their behavior. Our research project aims to propose a mobile application (app in short) for suicide prevention. The principle is to develop a connected tool used by the patient to report about his/her...
Adaptations need to be considered at design-time (adapting complex systems to new technologies, reengineering due to new regulations etc.), but also during runtime (e.g. new emerging functional and non-functional requirement, context-specific decisions). Objective: I use SPLs as a strategy for coping with uncertainty and adapting to change, where conventionally change occurs in the requirements of...
Vehicles equipped with various types of sensors can act as mobile sensors to monitor the road conditions. To speed up the information collection process, the monitoring data can be shared among vehicles upon their encounters to facilitate drivers to find a good route. The vehicular network experiences intermittent connectivity as a result of the mobility, which makes the inter-vehicle contact duration...
It is possible to streamline Environmental, Health and Safety (EH&S) duties through the use of workflow management technology. This approach requires to specify workflow models which among others consist of activities. In order to meet given safety regulations these activities are to be completed correctly and within given deadlines. Otherwise, activity failures emerge which may lead to breaches...
In the cloud computing context, Service Level Agreements (SLAs) are contracts between Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the guaranteed quality level of the services offered by CSPs. Existing cloud SLAs focus only on few service terms, completely ignoring all security related aspects. They are often reported in a way that is hardly understandable for customers...
Most challenges associated with Network Functions Virtualisation (NFV) are related to the automated and large-scale deployment of virtualised network functions (VNFs) within an operational infrastructure, as well as their availability and performance. In order to effectively face these challenges, efficient and comprehensive monitoring of NFV services is a critical aspect. This paper discusses the...
In many subjective listening tests, audio is evaluated on either “quality” or “preference”. These terms are often conflated. Little evidence has been gathered which explains the subtle differences between these terms in audio perception — we may not necessarily prefer high-quality audio samples. In the case of music, hedonic preference is strongly related to familiarity with the audio samples, which...
This proposed research questions the assumption that strategic performance measurement systems (SPMS) define strategic goals at the individual job level, reducing role ambiguity and ensuring desired employee outcomes. Through qualitative research of both white-collar and blue-collar jobs, we seek to determine the types of jobs most amenable to SPMS guidance.
Security issues of cloud computing environments are considered a major challenge for its full adoption. A Service Level Agreement (SLA) corroborates the shared management vision provided by the cloud computing paradigm, which can assist with related security issues. The necessity to address security requirements in cloud computing SLAs is considered important for both providers and consumers, along...
The Smart Cities can be seen as a new approach to dealing with urban problems such as traffic management. Through the availability, infrastructure and quality of Information Technologies and human capital the quality of citizens' life can improve, their participation is promoted and better monitoring of events occurring in the city is provided. As Lisbon is a big city, this article seeks to study...
Mobile surveys are an important research tool. In mobile health, triggering survey questions based on patient health, context, and other external information can aid in tailoring a survey to each specific user's particular situation. However, creating such a survey with existing systems is burdensome. Therefore, this paper presents a novel information system to ease the creation and deployment of...
The purpose of this paper is to elaborate a conceptual scheme for assessing deliberative spaces within political parties that propose the direct input of citizens in policy-making as a possible solution for the crisis that representative democracy is facing. Building on existing dimensions, we used a qualitative research design with data from observation, interviews and document analysis to investigate...
Measuring the impact of releasing data to the public can be challenging since the effects may not be directly linked to particular open data activities or substantial impact may occur only several years after the data is published. This paper proposes a framework to assess the impact of releasing open data by applying the Social Return on Investment (SROI) approach. SROI was developed for organizations...
Collaborative learning activities have shown to be useful to address educational processes in several contexts. Monitoring these activities is mandatory to determine the quality of the collaboration and learning processes. Recent research works propose using Social Network Analysis techniques to understand students' collaboration learning process during these experiences. Aligned with that, this paper...
With the advent of social networking sites and the development of interactive tools that allow users to share information and opinions, the way people socialize in terms of both teaching and learning is also changing. Nowadays, educators have considered using this technology as an e-learning platform: a stage where interaction between instructors and learners takes place. This promotes participation...
Aspect Mining is a research domain that tries to identify occurrences of crosscutting concerns in software systems that were developed without using the aspect oriented paradigm. A top-down approach to aspect mining first manually analyzes the pattern(s) used for implementing crosscutting concerns and then tries to automatically identify them in legacy software systems. In this paper we analyze three...
As power becomes one of the most important re-sources to provision while building modern HPC systems and applications, it becomes crucial to obtain deeper insights into applications' power and thermal characteristics. There exists aneed to correlate application context with processor-level andsystem-level power and thermal measurements. Existing profilingtools to monitor power and thermal measurements...
Attacks on critical infrastructures are beginning to increase in number and severity. They are often initiated by highly skilled attackers, who are capable of deploying advanced attacks to exfiltrate data or even to cause physical damage. In this paper, we re-visit the rationale for protecting against cyber attacks and propose a framework to monitor, detect and evaluate anomalous behaviour within...
Remote software usability testing has been studied for over two decades. Yet, many of the existing testing methods are not ideal for field testing in challenging environments typical to military and emergency operations and contexts. In this paper we introduce a model and a messaging framework that allow remote usability tests to be run easily in the real work context of the users. We also introduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.