The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electronic organizations are not operating in an isolated manner. Instead, they form an ecosystem defined by various relationships. We will look at organizations that can share norms and/or a hierarchical bond. Determining what is the set of norms that should be shared and acknowledged among organizations that implement identical concepts, as well as how responsibility is delegated between an organization...
The World Wide Web easily becomes the largest repository of natural language text data. We are particularly interested in state-of-the-art methods in exploiting geospatial information the web. The survey is done in the context of its extraction methods, retrieval, visualization, and further possible mining or knowledge discovery scenarios in order to produce thematic maps automatically from the web...
Symbolic execution is a powerful, systematic analysis that has received much visibility in the last decade. Scalability however remains a major challenge for symbolic execution. Compositional analysis is a well-known general purpose methodology for increasing scalability. This paper introduces a new approach for compositional symbolic execution. Our key insight is that we can summarize each analyzed...
The interfacing technologies have motivated the behavior of people and change their living style. Mobile is the prompt entity for human life and the applicant user can't live without it. It means mobile is a necessary entity for human life in similar to cloth, food, water and air etc. The continuous up- gradation into mobile technologies has made them more effective. Currently most of the user uses...
This paper presents a code-clone detection and its analysis method, based on an execution-semantic and arbitrarygranularity model[8] of code fragments The principal goal of introducing the proposed detection method is to provide a codeclone detection method suitable for programming languages, where software developers can define their own “control sentences” with such as lambda or lazy evaluation...
A common approach in research projects is to plan the evaluation and in particular the validation phase In the last months of the project. When done late in the project, validation cannot provide valuable inputs to the development of the research idea, because there is no space to bring about changes, and very often ends up as confirmatory tests. Software validation can and should occur since creating...
With the explosion of the usage and capabilities of mobile devices, software deployment is getting more and more complicated. In order to tackle the difficulty of achieving adaptive and distributed deployment, a deployment-oriented development process is presented in this paper. While existing deployment methodologies are lack of variability concern, the approach takes advantage of a variability model...
Design Science research is a mainstream Information systems discipline, yet Living Lab literature seems not to leverage its insights. The paper describes how Living Labs can be conducted as Design Science Research (DSR) by adapting the Action Design Research method. The resulting method is named LL-ADR. A case is presented to indicate how LL-ADR can be applied and findings for both Living Labs and...
This paper applies gamification to leverage the use of information for information-intensive business tasks in the context of corporate intranets. It presents the results of an online experiment, which was conducted in the banking industry with 68 advisors from different institutes using a prototype of a corporate intranet. They indicate that adding gamification elements, such as ranking lists and...
In today's technology dependent world, business leaders within organizations must address information technology (IT) incident response needs. Yet, piecemeal and inadequate incident response tools frequently stymie their engagement. This paper discusses a user-centered approach undertaken to design, develop and evaluate an initial leader-centric IT incident response visualization that would facilitate...
This contribution addresses the development of technology for the elderly with the aim to improve their general well-being. We report work on a prototype system named CARE that combines the functionality of a digital image frame with an active recommender mode. Recommendations are chosen on the basis of context information acquired by sensors embedded in the user's environment, and a well-being model...
Traffic localisation is an important aspect of traffic management on the Internet. The caching of content and its distribution from localised servers is one mechanism that enables traffic localisation and reduces transit costs for network providers while enhancing service performance. However, personalized, dynamic user content is often un-cacheable due to its nature. As we move towards a world of...
This paper presents an organic view of prototyping for managing dynamic factors involved in evolutionary design of information systems (IS). Those dynamic factors can be caused by, for example, continuing suggestions from users, changes in the technologies, and users-designers learning related stepwise progresses. Expanding the evolutionary prototyping to 'start small and grow', the organic view of...
In this paper, we present an incremental clustering approach for shape annotation, which is useful when new sets of images are available over time. A semi-supervised fuzzy clustering algorithm is used to group shapes into a number of clusters. Each cluster is represented by a prototype that is manually labeled and used to annotate shapes belonging to that cluster. To capture the evolution of the image...
Creating sufficiently large annotated resources for supervised machine learning, and doing so for every problem and every domain, is prohibitively expensive. Techniques that leverage large amounts of unlabeled data, which are often readily available, may decrease the amount of data that needs to be annotated to obtain a certain level of performance, as well as improve performance when large annotated...
This paper presents a proposal for the use of Spatial Augmented Reality as a tool for 3D data visualizations. The use of traditional display technologies such as LCD monitors provides a fish tank metaphor for the user, i.e. the information is behind a plane of glass. The use of VR technologies allows the user to be immersed in the 3D volume and remove this fish tank problem, but can limit the set...
This paper reports the results and findings of a historical analysis of open source intelligence (OSINT) information (namely Twitter data) surrounding the events of the September 11, 2012 attack on the US Diplomatic mission in Benghazi, Libya. In addition to this historical analysis, two prototype capabilities were combined for a table top exercise to explore the effectiveness of using OSINT combined...
In a multi-stakeholder cloud computing environment, data access control is of essential importance. Nowadays, it is usually handled in and deployed by every single cloud service on its own which makes the configuration of fine-grained access privileges cumbersome and economically expensive. In this paper, we introduce a novel cloud ecosystem architecture featuring an overall lightweight data access...
Engineering students in a project-based curriculum are expected to learn and apply the engineering design process to their course embedded projects. Practice of embedded skills typically occurs through embarking on a new project context provided by an instructor. It is a rare occurrence for students to participate in experiences that break-up the process into smaller chunks providing low-pressure...
In the process of designing engineered systems, it is not uncommon for engineers to underestimate or altogether ignore the societal and cultural context of the problem. This is particularly true when designs are developed to solve world problems; a lack of societal consideration leads to implementation failures when engineers from developed countries attempt to design solutions "for" people...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.