The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the first performance benchmarks proposed more than 25 years ago, the concept of comparing/ranking computer systems or components has proven to be a powerful instrument to promote the improvement of specific computer or software features. Following this path, many benchmarking studies have extended the benchmarking model initially proposed for performance to address the comparison of different...
In this paper we present an exploratory smartphone usage study with logs collected from users in the wild, combined with the sociodemographic, technological and cultural information provided by them. We observe a high diversity among users' most used applications, but by classifying applications into services we find significant correlations between service usage and socio-demographic profile. We...
Best practices provide convenient, but general, guidelines for authoring web content; however, as general guidelines, they cannot possibly provide the best advice for every context. Testing is required to know if their application works in a specific context. However, testing web content is challenging, especially content that does not support the funnel-shaped interactions typically found in commerce-oriented...
Data provenance has been an active area of research as a means to standardize how the origin of data, process event history, and what or who was responsible for influencing results is explained. The common trend in capturing provenance is to collect all possible information, and then attempt to extract relevant information from the entire collection, which is not efficient especially at runtime. Unless...
In the service oriented, customer experience centric and customer changing demand driven market environment, ICT is becoming the leading enabler and partner of the modern enterprise business. More and more companies are transformed into more or pure digital style and virtual organized enterprises that are enabled and supported by a group of business oriented and microservice based applications and...
Code smells are symptoms of poor design and implementation choices. Previous studies empirically assessed the impact of smells on code quality and clearly indicate their negative impact on maintainability, including a higher bug-proneness of components affected by code smells. In this paper we capture previous findings on bug-proneness to build a specialized bug prediction model for smelly classes...
Code smells have been defined as symptoms of poor design and implementation choices. Previous studies showed the negative impact of code smells on the comprehensibility and maintainability of code. For this reasons, several detection techniques have been proposed. Most of them rely on the analysis of the properties extractable from the source code. In the context of this work, we highlight several...
A historically important tradition in exegesis, rooted in a number of scriptural passages, considers the Qur'an to be a self-similar text. This claim, while being sharply debated in literature, has never been independently tested. This paper proposes a strategy to measure self-similarity in classical Arabic texts, based on Leven-shtein distance, within the Self-Similar Qur'an (SSQ) project. The significance...
This paper presents a new representation for handwritten math formulae: a Line-of-Sight (LOS) graph over handwritten strokes, computed using stroke convex hulls. Experimental results using the CROHME 2012 and 2014 datasets show that LOS graphs capture the visual structure of handwritten formulae better than commonly used graphs such as Time-series, Minimum Spanning Trees, and k-Nearest Neighbor graphs...
Architectural self-organisation, in which different configurations of software modules are dynamically assembled based on the current context, has been shown to be an effective way for software to self-optimise over time. Current approaches to this rely heavily on human-led definitions: models, policies and processes to control how self-organisation works. We present the case for a paradigm shift...
Some open systems must address a standard resourceallocation problem: how to collectivise and distribute aset of common-pool resources, with respect to multiple criteriasuch as fairness, inclusivity and sustainability. Previous work inself-organising multi-agent systems formalised Nicholas Rescher'stheory of distributive justice so that agents could self-organise theallocation according to contextualised...
As we routinely face information overload in our daily lives, infographics have become an intuitive, relatable way to communicate both online and in print. Mainstream newspapers and magazines now employ staff who are specifically dedicated to data mining and telling stories with data through data visualizations and infographics. In addition to infographics, online ‘story telling’ is another trending...
In this paper, we use experimental measurements to calibrate and validate a discrete-event simulator for dynamic speed scaling systems. The experimental implementation work iscarried out in an Ubuntu Linux environment using a quad-core 2.3 GHz Intel i7 processor with the Ivy Bridge micro-architecture. Our implementation provides fine-grain user-level control of process execution, and uses the Running-Average...
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Computing paradigm. Potential Cloud Service Customers (CSCs) do not trust delegating every kind of resources and data to external Cloud Service Providers (CSPs). The problem grows in complexity due to the increasing adoption of complex supply chains: CSPs that offer Sofware-as-a-Service (SaaS) cloud services...
Considering metrics based on finite directed graph, introduced by Etzion and Firer, we characterize the graphs such that every linear code admits a G-canonical decomposition. This decomposition will play an important role in this work, since it will be the main tool to give a sufficient condition for a finite directed graph to satisfy both the MacWilliams Identity and the MacWilliams Extension Property.
This paper introduces an approach allowing cloud application developers, service providers to consider security and privacy requirements across the application lifecycle. Specifically, a DevOps framework has been described that took into account several emerging technologies such as Network Functions Virtualization (NFV) and Microservice Pattern Design. As an illustration, a proof-of-concept application...
The design of a trust management framework in a mobile ad hoc network and its various components to protect against different attacks has a significant impact upon the performance of the secure routing protocol which is meant to form the most reliable route for data delivery. Specifically, the current work focuses upon the impact of certain parameters specific to two components within the proposed...
Automated riving is becoming the focus of various research institutions and companies. In this context, road estimation is one of the most important tasks. Many works propose to realize this task by employing one or multiple of the following orthogonal information sources: road markings from optical lane recognition, leading vehicle, digital map. etc. Each of them has its own strength and drawbacks...
The aim of this study is to construct a system for pre-processing a text, including tokenization and correction of statements from social network, in order to adapt them for further extraction of information and sentiment analysis. Correction algorithm uses dictionary methods, statistical methods and rules-based approach. The system was tested on 50 statements including different kinds of errors....
In Service-Oriented Architecture (SOA), behaviour of a business process is specified using Business Process Execution Language (BPEL) which is a XML based language. In today's competitive market, enterprises change their business processes frequently. Changes in BPEL process may affect the quality of BPEL process for the consumer. It is desirable to measure and evaluate the BPEL process quality when...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.