The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software development is an essential field today. The advancement in software systems leads to risk of them being exposed to defects. It is important to predict the defects well in advance in order to help the researchers and developers to build cost effective and reliable software. Defect prediction models extract information about the software from its past releases and predict the occurrence of...
Backbone networks are critical infrastructure that interconnect networks across cities, countries, and continents. Maintaining and expanding such networks is a progressive task as the number of network users increases. High capacity and availability are amongst the main objectives of backbone networks planning because they serve critical services in healthcare, business, and education. Disrupting...
The most important aim of Automated Intrusion Response Systems (AIRSs) is selecting responses that impose less cost on the protected system and which are able to neutralize intrusions progress effectively. Cost-sensitive AIRSs use different methods to launch efficient responses. In this regard, risk assessment as a component for assessing intrusion danger on the system is introduced in many papers...
The design of a trust management framework in a mobile ad hoc network and its various components to protect against different attacks has a significant impact upon the performance of the secure routing protocol which is meant to form the most reliable route for data delivery. Specifically, the current work focuses upon the impact of certain parameters specific to two components within the proposed...
Automated riving is becoming the focus of various research institutions and companies. In this context, road estimation is one of the most important tasks. Many works propose to realize this task by employing one or multiple of the following orthogonal information sources: road markings from optical lane recognition, leading vehicle, digital map. etc. Each of them has its own strength and drawbacks...
The data fusion community have introduced multiple procedures of situational assessments to facilitate timely responses to emerging situations. Process Refinement (level 4) of the Joint Directors of Laboratories (JDL) is a meta-process used to assess and improve the data fusion task during a real-time operation. The User Refinement (level 5) of the JDL is intended to address knowledge representation...
Software evolution is a well-established research area, but not in the area of web systems/applications. Web projects are normally more complex than other software development projects because they have both server and client code, encompass a variety of programming languages, and are multidisciplinary. We aim to produce a catalog of web smells to help avoiding the problems in web development code...
Subjective experimental results are widely used as the ground truth in objective Image Quality Assessment (IQA). Specifically, Pairwise Comparison method has superiority over Mean Opinion Scores (MOS), but there is a problem when measuring the consistency between subjective pairwise comparisons and objective quality predictions. In this paper, we first analyze the existing problem of current evaluation...
We present the results of an experiment which indicate that automated alignment of electronic learning objects to educational standards may be more feasible than previously implied. We highlight some important deficiencies in existing alignment systems and formulate suggestions for improved future ones. We consider how the changing substance of newer educational standards, a multi-faceted view of...
Reliable non-intrusive online assessment of speech intelligibility can play a key role for the functioning of hearing aids, e.g. as guidance for adjusting the hearing aid settings to the environment. While existing intrusive metrics can provide a precise and reliable measure, the current non-intrusive metrics have not been able to achieve acceptable intelligibility predictions. This paper presents...
Cognitive radar refers to an adaptive sensing system exhibiting high degree of waveform adaptivity and diversity enabled by intelligent processing and exploitation of information from the environment. The next generation of radar systems are characterized by their application to scenarios exhibiting non-stationary scenes as well as interference caused by use of shared spectrum. Cognitive radar systems,...
Design by Contract (DbC) is a software engineering paradigm that aims to reduce the amount of source code in a computer program by avoiding redundant parameter checking. It is based on strict interface specifications, including the specification of responsibilities for checking. Although DbC potentially leads to better quality programs, it has to be supported by the programming language/environment...
In this short paper we present a socio-technical framework for integrating a security risk escalation maturity model into a security information and event management system. The objective of the framework is to develop the foundations for the next generation socio-technical security information and event management systems (ST-SIEMs) enabling socio-technical security operations centers (ST-SOCs)....
Evaluation of software quality is one of the main challenges of software engineering. Several researches proposed in literature the definition of quality models for evaluating software products. However, in the context of Free/Open Source software, differences in production, distribution and support modality, have to be considered as additional quality characteristics. In particular, software reliability...
The increasing penetration of variable and uncertain generation from renewable resources poses a challenge for balancing the power system supply and demand. Violations of this constraint seriously impact system reliability and thus carry with them a very high cost. In order to address the issues created by variable generation increased system flexibility is required. System operators are considering...
In order to provide reliable information on the instantaneous field-of-view considered in hyperspectral images through spectral unmixing, understanding the kind of mixture that occurs over each pixel plays a crucial role. In this paper, a new method for fast detection of linear mixtures is introduced. The proposed method does not need statistical information and performs an a priori test on the spectral...
One of the main aims of lifelong learning architectures is to efficiently and reliably cope with the stability-plasticity dilemma. A viable solution of this dilemma combines a static offline classifier, which preserves ground knowledge that should be respected during training, with an incremental online learning of new or specific information encountered during use. A feasible realisation has been...
This paper proposes a method for tuning compilations to improve the size, execution time and reliability of the final application altogether. Our approach implements a genetic strategy with a multi-objective evolution that takes advantage of the NSGA-II algorithm for selecting the best compilations. Experiments show that reliability can be improved by efficiently exploring the compiler optimization...
Vehicular Adhoc Networks (VANETS) enable the vehicles to communicate with each other as well as with road side units. But developing an efficient routing for these networks potentially due to the large mobility and regular changes in these networks is a challenging job. In VANETS transmission links are at the risk of disconnection. Thus the development of the efficient routing mechanism is needed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.