Search results for "Computer Networks"

showing 10 items of 860 documents

Automated Synthesis of Application-layer Connectors from Automata-based Specifications

2019

Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…

CorrectnessUbiquitous computingGeneral Computer ScienceComputer Networks and CommunicationsComputer scienceDistributed computingInteroperability0102 computer and information sciences02 engineering and technology01 natural sciencesHeterogeneous ApplicationsTheoretical Computer Science020204 information systems0202 electrical engineering electronic engineering information engineeringProtocol MismatchesCommunication & CoordinationProtocol (object-oriented programming)Automated Mediator SynthesisSoundnessApplied MathematicsAutomated Mediator Synthesis Interoperability Protocols Heterogeneous Applications Communication & Coordination Protocol MismatchesInteroperabilityApplication layerAutomatonComputational Theory and Mathematics010201 computation theory & mathematicsKey (cryptography)Protocols
researchProduct

High performance hardware correlation coefficient assessment using programmable logic for ECG signals

2003

Abstract Correlation coefficient is frequently used to obtain cardiac rhythm by peak estimation and appreciate differences in the signal compared to a pattern. This work focuses on the description of a real-time correlation assessment procedure. Applied to electrocardiogram (ECG) signals, a new correlation value is obtained every new sample and pulse detection information is provided. The ECG pattern is internally stored and can be changed when desired. This procedure is useful in Systems on Chip implementation and can be applied to design compact ECG monitoring systems consisting on a system on chip where programmable logic offloads the main processor. A Xilinx FPGA device has been used fo…

Correlation coefficientComputer Networks and CommunicationsComputer sciencebusiness.industryPulse (signal processing)SignalSample (graphics)Ecg monitoringProgrammable logic deviceArtificial IntelligenceHardware and ArchitectureComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSSystem on a chipEcg signalField-programmable gate arraybusinessSoftwareComputer hardwareMicroprocessors and Microsystems
researchProduct

Tracing the Cultural Background of Lone-Wolf Terrorism

2021

The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact wi…

Cultural backgroundInformation Systems and ManagementComputer Networks and CommunicationsHardware and ArchitecturePolitical scienceLone wolfTerrorismCriminologySafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

2020

Abstract Information technology (IT) engagement is defined as a need to spend more time using IT. Practice-based examples show that IT engagement can have adverse effects in organizations. Although users can potentially get more work done through IT engagement, observations show that the users might jeopardize their well-being and hamper their work performance. We aimed to investigate this complexity in the research on IT engagement by examining its potential antecedents and outcomes in organizations. Considering the potentially mixed outcomes, we developed a model to examine the effects of IT engagement on personal productivity and strain. We also aimed to explain the antecedents of IT eng…

CurseComputer Networks and Communicationsbusiness.industry05 social sciencesBlessingInformation technology02 engineering and technologyLibrary and Information SciencesPublic relationsWork performance020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringNormativeSurvey data collection050211 marketingPsychologybusinessProductivityInformation SystemsDependency (project management)International Journal of Information Management
researchProduct

Consumers' perceptions of mobile banking continuous usage in Finland and South Africa

2015

This study examines continuous usage behaviour related to mobile banking (m-banking) among consumers living in Finland (FI) and South Africa (ZA). The study investigates three post-adoption behavioural consequences - namely, trust, satisfaction and word of mouth. Using purposeful sampling techniques, we found that trust plays a significant role in promoting continuous usage of m-banking. In general, the respondents reported high levels of trust in m-banking technology and were satisfied with the m-banking application and services. In addition, convenience, user friendliness and speed emerged as the main sub-topics related to satisfaction. In most cases, the convenience of using m-banking do…

Customer retentionComputer Networks and Communicationsmedia_common.quotation_subjectmature marketWord of mouthm-bankingUser friendlinessSouth AfricaManagement of Technology and InnovationPerceptionmobile bankingMarketingword of mouthEmerging marketsta512Finlandmedia_commonMobile bankingelectronic financee-financesatisfactionAdvertisingtrustComputer Science ApplicationsPurposeful samplingluottamusemerging marketCustomer satisfactionBusinessFinanceInternational Journal of Electronic Finance
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

Criminal networks analysis in missing data scenarios through graph distances.

2021

Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …

Data AnalysisFOS: Computer and information sciencesComputer and Information SciencesScienceIntelligenceSocial SciencesTransportationCriminologyCivil EngineeringSocial NetworkingComputer Science - Computers and SocietyLaw EnforcementSociologyComputers and Society (cs.CY)PsychologyHumansComputer NetworksSocial and Information Networks (cs.SI)Algorithms; Humans; Terrorism; Criminals; Data Analysis; Social NetworkingSettore INF/01 - InformaticaQCognitive PsychologyRBiology and Life SciencesEigenvaluesComputer Science - Social and Information NetworksCriminalsTransportation InfrastructurePoliceRoadsProfessionsAlgebraLinear AlgebraPeople and PlacesPhysical SciencesEngineering and TechnologyCognitive ScienceMedicineLaw and Legal SciencesPopulation GroupingsTerrorismCrimeCriminal Justice SystemMathematicsNetwork AnalysisAlgorithmsResearch ArticleNeurosciencePLoS ONE
researchProduct

Effectively and efficiently supporting crowd-enabled databases via NoSQL paradigms

2013

In this paper we provide an overview of the Hints From the Crowd (HFC) project, whose main goal is to build a NoSQL database system for large collections of product reviews; the database is queried by expressing a natural language sentence; the result is a list of products ranked based on the relevance of reviews w.r.t. the natural language sentence. The best ranked products in the result list can be seen as the best hints for the user based on crowd opinions (the reviews). The HFC prototype has been developed as a web application, independent of the particular application domain of the collected product reviews. Queries are performed by evaluating a text-based ranking metric for sets of re…

DatabaseComputer Networks and Communicationsbusiness.industryComputer scienceHuman-Computer Interaction; Computer Networks and Communications; 1707; SoftwareNoSQLcomputer.software_genresearch enginesHuman-Computer InteractionWorld Wide WebComputer Networks and CommunicationRankingApplication domainMetric (mathematics)Web applicationRelevance (information retrieval)Product reviews; NoSQL Databases; search enginesProduct reviewsSettore ING-INF/05 - Sistemi di Elaborazione delle InformazionibusinesscomputerSoftware1707NoSQL DatabasesProceedings of the 3rd International Workshop on Semantic Search Over the Web
researchProduct

LC3: A spatio-temporal and semantic model for knowledge discovery from geospatial datasets

2015

International audience; There is a need for decision-makers to be provided with both an overview of existing knowledge, and information which is as complete and up-to-date as possible on changes in certain features of the biosphere. Another objective is to bring together all the many attempts which have been made over the years at various levels (international, Community, national and regional) to obtain more information on the environment and the way it is changing. As a result, remote sensing tools monitor large amount of land cover informations enabling study of dynamic processes. However the size of the dataset require new tools to identify pattern and extract knowledge. We propose a mo…

Decision support systemGeographic information systemGeospatial analysisComputer Networks and CommunicationsComputer scienceProcess (engineering)0211 other engineering and technologies02 engineering and technologyOntology (information science)Semantic data modelcomputer.software_genreKnowledge extraction[ INFO.INFO-HC ] Computer Science [cs]/Human-Computer Interaction [cs.HC]020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC]Semantic Web021101 geological & geomatics engineeringbusiness.industry15. Life on landData scienceHuman-Computer Interaction[INFO.INFO-HC] Computer Science [cs]/Human-Computer Interaction [cs.HC]businesscomputerSoftware
researchProduct

A Conceptual Architecture of Ontology Based KM System for Failure Mode and Effects Analysis

2014

Failure Mode and Effects Analysis (FMEA) is a systematic method for procedure analyses and risk assessment. It is a structured way to identify potential failure modes of a product or process, probability of their occurrence, and their overall effects. The basic purpose of this analysis is to mitigate the risk and the impact associated to a failure by planning and prioritizing actions to make a product or a process robust to failure. Effective manufacturing and improved quality products are the fruits of successful implementation of FMEA. During this activity valuable knowledge is generated which turns into product or process quality and efficiency. If this knowledge can be shared and reused…

Decision support systemKnowledge managementComputer Networks and Communicationsbusiness.industryComputer sciencemedia_common.quotation_subjectTroubleshootingOntology (information science)Computer Science ApplicationsKnowledge-based systemsComputational Theory and MathematicsKnowledge baseKnowledge extractionRisk analysis (engineering)Quality (business)businessFailure mode and effects analysismedia_commonInternational Journal of Computers Communications & Control
researchProduct