The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Integrating data from very large, dynamic, heterogeneous and autonomous data sources is a key requirement to satisfy growing information needs. In order to allow for ad-hoc answering of analytical questions, necessary up-front integration effort must be minimized and data integration systems must be adapted to the expectations and requirements of their users. While existing approaches offer support...
Hyper-heuristics are methods for problem solving that decouple the search mechanisms from the domain features, providing a reusable approach across different problems. Even when they make a difference regarding metaheuristics under this perspective, proposals in literature commonly expose parameters for controlling their behavior such as metaheuristics does. Several internal mechanisms for automatically...
Mutation analysis is a powerful technique for software testing but it is also known to be computationally expensive. The main reason for the high computational cost is that many of the mutants are redundant and thus, do not contribute to the quality of the test suite. One of the most promising approaches to avoid producing redundant mutants is to identify subsumption relations among mutants, preferably...
An analysis of MATLAB® integration into mathematical modules at two UK universities is carried out. Both MATLAB integration projects appear to be successful, despite the fact that the two institutions in question are quite different, with one being a well-established research intensive institution and the other a teaching-oriented institution that gained university status in 1992. Despite these differences...
System architecture is a key driver in defining a system's form and function. The Object-Process Methodology (OPM) integrates system function, structure, and behavior in one model for the study of system architectures. While the methodology eliminates the challenges of managing multiple views of a system architecture, it is a descriptive approach and does not explicitly address the life cycle properties...
The mutation score is defined as the number of killed mutants divided by the number of non-equivalent mutants. However, whether a mutant is equivalent to the original program is undecidable in general. Thus, even when improving a test suite, a mutant score assessing this test suite may become worse during the development of a system, because of equivalent mutants introduced during mutant creation...
Practitioners have found exploratory testing (ET) to be cost effective in detecting defects. The team exploratory testing (TET) approach scales exploratory testing to team level. This paper reports the effectiveness of (TET), and the experiences of the participants of TET sessions. The research was carried at F-Secure Corporation, where two projects were investigated. The results show that the TET...
Mutation testing is endorsed by software testing researchers for its unique capability of providing pragmatic estimates of a test suite's fault detection capability, and for guiding testers in improving their test suites. In practice, however, wide-spread adoption of mutation testing is hampered because any non-trivial program results in huge numbers of mutants, many of which are either trivial or...
Mobile technology has become a staple in our society. It plays a crucial and profound role inassisting learners (despite their level and age) in their leaning process using various apparatus and mobile devices (laptop, tablets …). This paper presents a new learning framework based on tablets. This solution has been developed and tested in Esprit "Ecole Supérieure Privée d'Igénieurie et de Technologies",...
Data aggregation for VANETs is considered a vital building block for many applications due to its bandwidth saving potential. In this paper, we propose a novel context aware data aggregation technique for VANETs. The data aggregation is done by the cluster head based on the context i.e. vehicle speed and density to reduces the required bandwidth for periodic data dissemination. The proposed technique...
5G represents the next generation of communication networks and services, and will bring a new set of use cases and scenarios. These in turn will address a new set of challenges from the network and service management perspective, such as network traffic and resource management, big data management and energy efficiency. Consequently, novel techniques and strategies are required to address these challenges...
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing...
Within the last years the demand for intercultural awareness and intercultural competences among the working force in engineering grows significantly. Even if engineers more than other professions have always been working in international settings, the situations of international collaboration in engineering work increased. Moreover, strategy papers on European and national levels endorse the rising...
Today is world of electronics gadget's which generates voluminous data that includes the various forms of multimedia data. In these data collections images need more space to store the content and need more bandwidth to transmit through network. By using Image compression the size of the image can be reduced which helps in less utilization of memory and transmitted across network with less bandwidth...
The present workshop focuses on the topic of intention recognition in HRI. To be able to recognise intentions of other agents is a fundamental prerequisite to engage in, for instance, instrumental helping or mutual collaboration. It is a necessary aspect of natural interaction.
Pervasive applications raise major challenges in term of software engineering and remain hard to develop, deploy, execute and maintain. Context-awareness, in particular, is a salient and difficult property that must be met by pervasive applications. We have developed a service-based approach facilitating the design and execution of a context module on top of iPOJO/iCasa, our pervasive platform. This...
Word Sense Disambiguation is the process of identifying accurate meaning of a polysemous words given in a context. The paper proposes a Supervised Malayalam word sense disambiguation system using Naive Bayes classifier. Word Sense Disambiguation is a complex problem in NLP because a particular word may have different meanings in different situations. For all human beings it is very easy to find out...
Text summarization combines the process of POS tagging, term frequency and topical analysis. All these together are used to produce insightful summary of the document/documents. The concise version of the text document can be made using the concept of frequency of the terms and inverse frequency of documents. Text summarization is useful for bring the short story of all the newspaper articles, email...
We propose an extension of the mDNS/DNS-SD service discovery protocol, which enables service clients to discover and select services based on their context. The extension improves scalability in large networks, which is of particular importance in future Internet of Things deployments.
In this paper we consider a diffusion based molecular communication network. The information is encoded in the concentration of the signalling molecules at the transmitter end. At receiver end these signalling molecules react with a set of chemical reactions referred as a receiver molecular circuit to produce output molecules. In this work we employ a reversible conversion (RC) type receiver molecular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.