Search results for " Software"

showing 10 items of 1178 documents

Proceedings della Sixth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2012)

2012

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComplex Systems Intelligent Systems Software Intensive Systems
researchProduct

Proceedings della Fourth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2010)

2010

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComplex Systems Intelligent Systems Software Intensive Systems
researchProduct

XPL and the Synchronization of Multimodal User Interfaces based on Design Pattern

2008

The great diversity of presentations in software applications deals with fulfilment of various types of user interface constructions related to different programming languages. Furthermore, the growing interest for multimodal applications entails that their user interfaces have to support multiple access channels within a single development framework. User Interfaces Design Patterns (UIDPs) are helpful to define interaction schemas between user and computer and they provide remarkable tools for the design and reuse of software components. This paper describes the eXtensible Presentation architecture and Language (XPL), a framework aimed at streamlining multi-channel interface design process…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceInterface (Java)Human–computer interactionDesign patternComponent (UML)Component-based software engineeringSoftware design patternSoftware designUser interfacemultimodality interfaces design patternUser interface design
researchProduct

A possible approach to the development of robotic multi-agent systems

2004

The design of a an agent system for robotics is a problem that involves aspects coming from many different disciplines (robotics, artificial intelligence, computer vision, software engineering). The most difficult part of it, often consists in producing and tuning the algorithms that incorporates the robot behavior (planning, obstacle avoidance,. . . ) and abilities (vision, manipulation, navigation,. . . ). Frequently, the reuse of these parts is left to a copy and paste procedure from previous applications to the new one. In so doing many problems could arise. We propose a comprehensive approach for multi-agent systems oriented to robotics applications that uses a complete design methodol…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer sciencebusiness.industryMulti-agent systemAgent Oriented Software engineeringMobile robotRoboticsAgentsRoboticsReuseMulti-Agent SystemsHuman–computer interactionArtificial IntelligenceObstacle avoidanceRobotComputer visionArtificial intelligencePatternsBehavior-based roboticsbusinessDesign methods
researchProduct

State of the art in passive digital image forgery detection: copy-move image forgery

2017

Authenticating digital images is increasingly becoming important because digital images carry important information and due to their use in different areas such as courts of law as essential pieces of evidence. Nowadays, authenticating digital images is difficult because manipulating them has become easy as a result of powerful image processing software and human knowledge. The importance and relevance of digital image forensics has attracted various researchers to establish different techniques for detection in image forensics. The core category of image forensics is passive image forgery detection. One of the most important passive forgeries that affect the originality of the image is cop…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopyingCopy-move forgery Digital forensics Duplicated detection Manipulation detectionbusiness.industryComputer sciencemedia_common.quotation_subjectDigital forensicsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyImage (mathematics)Digital imageArtificial IntelligenceOriginalityPattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionRelevance (information retrieval)Computer Vision and Pattern RecognitionArtificial intelligenceState (computer science)businessmedia_commonPattern Analysis and Applications
researchProduct

A Novel Time Series Kernel for Sequences Generated by LTI Systems

2017

The recent introduction of Hankelets to describe time series relies on the assumption that the time series has been generated by a vector autoregressive model (VAR) of order p. The success of Hankelet-based time series representations prevalently in nearest neighbor classifiers poses questions about if and how this representation can be used in kernel machines without the usual adoption of mid-level representations (such as codebook-based representations). It is also of interest to investigate how this representation relates to probabilistic approaches for time series modeling, and which characteristics of the VAR model a Hankelet can capture. This paper aims at filling these gaps by: deriv…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDynamic time warpingSeries (mathematics)SVMProbabilistic logic020207 software engineering02 engineering and technologyTime SerieClassificationVector autoregressionSupport vector machineKernelAutoregressive modelKernel (statistics)Similarity (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAlgorithmMathematics
researchProduct

An embedded iris recognizer for portable and mobile devices

2010

Software-intensive systems play an increasingly dominant role in our lives and daily activities. Several applications, in which a timely response to user and environment stimulus is essential, require real-time software intensive systems. Computation-intensive applications, such as video compression, control systems, security systems, result in significant growth for processor workload. To address the above issues, one possible solution is to design embedded specialized components. At the same time, the integration of new features in portable and mobile devices is rapidly increasing. Several services and applications require robust user authentication for access to services, data, and resou…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEmbedded Software Intensive Systems Real-Time Embedded Systems Iris-based Authentication Systems FPGA Technologies
researchProduct

How to Extract Fragments from Agent Oriented Design Processes

2013

Using Method Engineering for creating agent oriented design processes is a challenging task because of the lack of a fragment repository defined and filled starting from a shared and unique definition of fragment. The creation of a repository implies the fragmentation of existing agent design processes. In this paper we propose a set of guidelines for extracting fragments from agent design processes. The work is based on a precise definition of fragment and it aims to establish a method for fragmenting processes and obtaining homogeneous fragments regardless of how the starting design processes are defined and described. © 2013 Springer-Verlag.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFragment repositoryWork breakdown structureDatabaseComputer scienceDistributed computingMethod engineeringPrecise definitioncomputer.software_genreAgent designAgent oriented designDesign Processagent oriented software engineeringAgent oriented designDesign processMethod Fragmentmulti-agent systemsDesign procecomputerMethod engineering
researchProduct

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2019

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDistributed algorithmComputer scienceMulti-agent systemQuality of servicemedia_common.quotation_subjectNetwork simulation020206 networking & telecommunications02 engineering and technologycomputer.software_genreVariety (cybernetics)Simulation softwareDistributed systems security.Risk analysis (engineering)Software deploymentRobustness (computer science)020204 information systems0202 electrical engineering electronic engineering information engineeringDisseminationcomputerReputationmedia_common
researchProduct

Modeling and Verification of Symbolic Distributed Applications Through an Intelligent Monitoring Agent

2022

Wireless Sensor Networks (WSNs) represent a key component in emerging distributed computing paradigms such as IoT, Ambient Intelligence, and Smart Cities. In these contexts, the difficulty of testing, verifying, and monitoring applications in their intended scenarios ranges from challenging to impractical. Current simulators can only be used to investigate correctness at source code level and with limited accuracy. This paper proposes a system and a methodology to model and verify symbolic distributed applications running on WSNs. The approach allows to complement the distributed application code at a high level of abstraction in order to test and reprogram it, directly, on deployed network…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceGeneral EngineeringGeneral Materials ScienceElectrical and Electronic EngineeringDistributed applications Distributed processing Embedded Systems Fault detection Fault diagnosis Internet of Things Knowledge based systems Software maintenance Software monitoring Wireless sensor networksIEEE Access
researchProduct