Search results for " Software"
showing 10 items of 1178 documents
Proceedings della Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2012)
2012
Proceedings della Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2010)
2010
XPL and the Synchronization of Multimodal User Interfaces based on Design Pattern
2008
The great diversity of presentations in software applications deals with fulfilment of various types of user interface constructions related to different programming languages. Furthermore, the growing interest for multimodal applications entails that their user interfaces have to support multiple access channels within a single development framework. User Interfaces Design Patterns (UIDPs) are helpful to define interaction schemas between user and computer and they provide remarkable tools for the design and reuse of software components. This paper describes the eXtensible Presentation architecture and Language (XPL), a framework aimed at streamlining multi-channel interface design process…
A possible approach to the development of robotic multi-agent systems
2004
The design of a an agent system for robotics is a problem that involves aspects coming from many different disciplines (robotics, artificial intelligence, computer vision, software engineering). The most difficult part of it, often consists in producing and tuning the algorithms that incorporates the robot behavior (planning, obstacle avoidance,. . . ) and abilities (vision, manipulation, navigation,. . . ). Frequently, the reuse of these parts is left to a copy and paste procedure from previous applications to the new one. In so doing many problems could arise. We propose a comprehensive approach for multi-agent systems oriented to robotics applications that uses a complete design methodol…
State of the art in passive digital image forgery detection: copy-move image forgery
2017
Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…
A Novel Time Series Kernel for Sequences Generated by LTI Systems
2017
The recent introduction of Hankelets to describe time series relies on the assumption that the time series has been generated by a vector autoregressive model (VAR) of order p. The success of Hankelet-based time series representations prevalently in nearest neighbor classifiers poses questions about if and how this representation can be used in kernel machines without the usual adoption of mid-level representations (such as codebook-based representations). It is also of interest to investigate how this representation relates to probabilistic approaches for time series modeling, and which characteristics of the VAR model a Hankelet can capture. This paper aims at filling these gaps by: deriv…
An embedded iris recognizer for portable and mobile devices
2010
Software-intensive systems play an increasingly dominant role in our lives and daily activities. Several applications, in which a timely response to user and environment stimulus is essential, require real-time software intensive systems. Computation-intensive applications, such as video compression, control systems, security systems, result in significant growth for processor workload. To address the above issues, one possible solution is to design embedded specialized components. At the same time, the integration of new features in portable and mobile devices is rapidly increasing. Several services and applications require robust user authentication for access to services, data, and resou…
How to Extract Fragments from Agent Oriented Design Processes
2013
Using Method Engineering for creating agent oriented design processes is a challenging task because of the lack of a fragment repository defined and filled starting from a shared and unique definition of fragment. The creation of a repository implies the fragmentation of existing agent design processes. In this paper we propose a set of guidelines for extracting fragments from agent design processes. The work is based on a precise definition of fragment and it aims to establish a method for fragmenting processes and obtaining homogeneous fragments regardless of how the starting design processes are defined and described. © 2013 Springer-Verlag.
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems
2019
Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …
Modeling and Verification of Symbolic Distributed Applications Through an Intelligent Monitoring Agent
2022
Wireless Sensor Networks (WSNs) represent a key component in emerging distributed computing paradigms such as IoT, Ambient Intelligence, and Smart Cities. In these contexts, the difficulty of testing, verifying, and monitoring applications in their intended scenarios ranges from challenging to impractical. Current simulators can only be used to investigate correctness at source code level and with limited accuracy. This paper proposes a system and a methodology to model and verify symbolic distributed applications running on WSNs. The approach allows to complement the distributed application code at a high level of abstraction in order to test and reprogram it, directly, on deployed network…