The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advent of “Soft Networking”, where networks are composed of virtual nodes and links, promises to dramatically ease the definition and deployment of networks whilst allowing network applications that are limited only by the imagination of the developers of those applications. In such a dynamic environment, the Autonomic Management pattern supervised by policies has been recognised as holding more...
Finding the shortest path between two points on Earth is important especially in navigation. Since the Earth does not exactly follow one of the geometric shapes, calculating the distance on its surface is one of the important challenges. Haversine and Vincenty formulas are the two major formulas used for calculating distances on a sphere and elliptic shapes, respectively. Since the Earth is neither...
Nowadays, a growing number of companies are using Cloud Computing to optimize their business processes by using dynamically scalable and often virtualized resources on demand. Nevertheless, due to the lack of explicit and formal description of the resource perspective in existing business processes, Cloud resource allocation behavior cannot be efficiently and correctly managed. In this paper, we aim...
Orientation and wayfinding in architectural Immersive Virtual Environments (IVEs) are non-trivial, accompanying tasks which generally support the users' main task. World in Miniatures (WIMs) — essentially 3D maps containing a scene replica — are an established approach to gain survey knowledge about the virtual world, as well as information about the user's relation to it. However, for large-scale,...
Pervasive computing envisions environments where computers are blended into everyday objects in order to provide added-value services to people. This new form of computing gives rise to huge economical and societal expectations. However, pervasive applications raise major challenges in term of software engineering and remain hard to develop, deploy, execute and maintain. Context-awareness, in particular,...
This paper addresses conformance testing of communication protocols. The Session Initiation Protocol (SIP) is often considered "the standard protocol" for deploying VoIP (Voice over IP) solutions. We implemented a popular SIP distributed scenario on an industrial test bed. Active testing of SIP maintains our attention, while we kept on experimenting with the test cases dependencies architecture...
In this paper we propose D3PART (Dynamic 3D Plastic And Redistribuable Technology), a model to handle redistribution for 3D user interfaces. Redistribution consists in changing the components distribution of an interactive system across different dimensions such as platform, display and user. We extend previous plasticity models with redistribution capabilities, which lets developers create applications...
Internet of Things-aware process execution imposes new requirements on process modeling, that are outside the scope of current modeling languages. Internet of Things (IoT) devices may vanish, appear or stay unknown during process execution. Therefore, design time process resource allocation is not feasible. Additionally, device capabilities are only available in a certain real world context at runtime,...
Computation offloading is a promising way to improve the performance as well as reducing the battery power consumption of a mobile application by executing some parts of the application on a remote server. Recent researches on mobile cloud computing mainly focus on the code partitioning and offloading techniques, assuming that mobile codes are offloaded to a prepared server. However, the context of...
Dynamically adaptive multi-agent systems (DAMS) consist of multiple agents that adapt to changing system and environmental conditions in order to achieve collaborative goals. As DAMS are found in applications across various domains, ensuring the correct and safe adaptations of DAMS has become more important. Formal verification techniques such as model checking present a promising approach to guaranteeing...
A system configuration consists of many entities with many configuration attributes that are interrelated by system constraints. A system configuration is consistent when all the constraints are satisfied by the entities, their attributes and relations. At runtime a system configuration may be modified for instance in response to changes in the system environment or for security/performance fine-tuning...
The market for smartphone applications is steadily growing. Unfortunately, along with this growth, the number of malicious applications is increasing as well. To identify this malware, various automatic code-analysis tools have been developed. These tools are able to assess the risk associated with a specific app. However, informing users about these findings is often difficult. Currently, on Android,...
System substitution can be defined as the capability to replace a system by another one that preserves the specification of the original one. It may occur in different reconfiguration situations like failure management or maintenance. When substituting a system at runtime, a key requirement is to correctly restore the state of the substituted one. This paper proposes a correct by construction generic...
Although extensive progress has been made in Mobile Cloud Augmentation, automated decision support on the device that enables the opportunistic and intelligent use of cloud resources is missing. Furthermore, we need solutions with reflective capabilities that can handle a changing environment and runtime variability. To simplify the deployment of smart mobile applications, we present a framework with...
Multi-agent systems have been introduced as a new paradigm for conceptualizing, designing and implementing software systems that are becoming increasingly complex, open, distributed, dynamic, autonomous and highly interactive. However, agent-oriented software engineering has not been widely adopted, mainly due to lack of modeling languages that are expressive and comprehensive enough to represent...
Dynamic metrics are known to assess the actual behavior of software systems as they are extracted from runtime data obtained during program execution. However, recent literature indicates that dealing with dynamic information remains a formidable challenge due to the huge size of execution data at hand, resulting in long processing delays. We present an efficient and scalable technique to extract...
To keep up with the competition, organizations must be capable to dynamically change business process components at runtime. This problem has been relevant for many years; however, there is no proposed solution, which ensures the dynamicity. This paper presents analysis of related work on dynamic business processes, i.e. the analysis of definitions of dynamic business process and different views on...
Quick reactions and rescues are critical requirements in disaster and emergency management. However, the decision on how to react should be taken based on the correct judgment on the disaster situation. Nowadays ICT plays a pivotal role in the decision-making in disasters management. Particularly, the IoT technology is indispensable for information collection and analysis. Despite the rapid development...
Debugging in large-scale parallel applications with long runtime where frequency of errors is high became very problematic. Traditional debugging techniques with locating exactly errors no longer seems to be appropriate when applying to these applications because of high overhead in storing trace files, especially they are difficult to be able to scale efficiently. An effective solution to these problems...
Fully distributed memory multi-processors (MPSoC) implemented in multi-tiled architectures are promising solutions to support modern sophisticated applications, however, reliability of such systems is always an issue. As a result, system-level solution like task migration keeps its importance. Transferring the execution of a task from one tile to another helps keep acceptable reliability of such systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.