• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 198
  • 137
  • 33
  • 19
  • 17
  • 10
  • 4
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 470
  • 470
  • 162
  • 125
  • 111
  • 108
  • 91
  • 86
  • 77
  • 69
  • 67
  • 67
  • 63
  • 60
  • 59
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Facilitating file retrieval on resource limited devices

Sadaquat, Jan January 2011 (has links)
The rapid development of mobile technologies has facilitated users to generate and store files on mobile devices. However, it has become a challenging issue for users to search efficiently and effectively for files of interest in a mobile environment that involves a large number of mobile nodes. In this thesis, file management and retrieval alternatives have been investigated to propose a feasible framework that can be employed on resource-limited devices without altering their operating systems. The file annotation and retrieval framework (FARM) proposed in the thesis automatically annotates the files with their basic file attributes by extracting them from the underlying operating system of the device. The framework is implemented in the JME platform as a case study. This framework provides a variety of features for managing the metadata and file search features on the device itself and on other devices in a networked environment. FARM not only automates the file-search process but also provides accurate results as demonstrated by the experimental analysis. In order to facilitate a file search and take advantage of the Semantic Web Technologies, the SemFARM framework is proposed which utilizes the knowledge of a generic ontology. The generic ontology defines the most common keywords that can be used as the metadata of stored files. This provides semantic-based file search capabilities on low-end devices where the search keywords are enriched with additional knowledge extracted from the defined ontology. The existing frameworks annotate image files only, while SemFARM can be used to annotate all types of files. Semantic heterogeneity is a challenging issue and necessitates extensive research to accomplish the aim of a semantic web. For this reason, significant research efforts have been made in recent years by proposing an enormous number of ontology alignment systems to deal with ontology heterogeneities. In the process of aligning different ontologies, it is essential to encompass their semantic, structural or any system-specific measures in mapping decisions to produce more accurate alignments. The proposed solution, in this thesis, for ontology alignment presents a structural matcher, which computes the similarity between the super-classes, sub-classes and properties of two entities from different ontologies that require aligning. The proposed alignment system (OARS) uses Rough Sets to aggregate the results obtained from various matchers in order to deal with uncertainties during the mapping process of entities. The OARS uses a combinational approach by using a string-based and linguistic-based matcher, in addition to structural-matcher for computing the overall similarity between two entities. The performance of the OARS is evaluated in comparison with existing state of the art alignment systems in terms of precision and recall. The performance tests are performed by using benchmark ontologies and the results show significant improvements, specifically in terms of recall on all groups of test ontologies. There is no such existing framework, which can use alignments for file search on mobile devices. The ontology alignment paradigm is integrated in the SemFARM to further enhance the file search features of the framework as it utilises the knowledge of more than one ontology in order to perform a search query. The experimental evaluations show that it performs better in terms of precision and recall where more than one ontology is available when searching for a required file.
32

Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing

Kusen, Ema, Strembeck, Mark 18 December 2014 (has links) (PDF)
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research. Finally, we will examine the differences in addressing security in ubiquitous computing with those in traditional distributed systems. Method: In order to provide an overview of security-related challenges, goals and solutions proposed in the literature, we will use a systematic literature review (SLR). This protocol describes the steps which are to be taken in order to identify papers relevant to the objective of our review. The first phase of the method includes planning, in which we define the scope of our review by identifying the main research questions, search procedure, as well as inclusion and exclusion criteria. Data extracted from the relevant papers are to be used in the second phase of the method, data synthesis, to answer our research questions. The review will end by reporting on the results. Results and conclusions: The expected results of the review should provide an overview of attacks, vulnerabilities and threats that occur in ubiquitous computing and that have motivated the research in the last decade. Moreover, the review will indicate which security goals are gaining on their significance in the era of ubiquitous computing and provide a categorization of the security-related countermeasures, mechanisms and techniques found in the literature. (authors' abstract) / Series: Working Papers on Information Systems, Information Business and Operations
33

Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms

Ma, Bin Bin January 2018 (has links)
University of Macau / Faculty of Science and Technology. / Department of Computer and Information Science
34

"Construção de aplicações de captura e acesso baseada em recorrência de funcionalidades" / "Building capture and access applications based on recurrence of funcionalities"

Cattelan, Renan Gonçalves 19 April 2004 (has links)
Aplicações de captura e acesso exploram o paradigma de computação ubíqua --- que consiste em popular o ambiente com aplicações e dispositivos computacionais a fim de auxiliar transparentemente as pessoas na realização de suas atividades --- para dar apoio à captura automática de informação em experiências ``ao vivo' e à correspondente geração de documentos passíveis de armazenamento, recuperação, visualização e extensão ao longo do tempo. Devido à sua natureza distribuída, à heterogeneidade dos dispositivos computacionais envolvidos e à diversidade nas funcionalidades providas, essas aplicações são difíceis de se construir e requerem infra-estruturas e serviços de software que auxiliem o desenvolvedor nessa tarefa. Este trabalho investiga a construção e o uso de aplicações de captura e acesso por meio do desenvolvimento da xINCA, uma infra-estrutura estendida baseada em componentes de software reutilizáveis que englobam as funcionalidades recorrentes nessa classe de aplicações. A xINCA é uma extensão da infra-estrutura INCA --- uma infra-estrutura de baixo nível que provê abstrações de comunicação para aplicações de captura e acesso. Complementares, as infra-estruturas INCA e xINCA provêem um modelo simplificado para o desenvolvimento de aplicações de captura e acesso, considerando aspectos de projeto, implementação e reuso. Associada ao modelo de armazenamento do serviço StRES, a xINCA tem ainda papel na estruturação da informação capturada com o uso de XML e tecnologias correlatas. / Capture and access applications explore the ubiquitous computing paradigm --- that basically consists on populating the environment with computational devices and applications to transparently assist people on their activities --- to support the automatic capture of information on live experiences and generate corresponding documents that can be further stored, retrieved, visualized and extended. Due to their distributed nature, heterogeneity of involved devices and variety of provided functionalities, capture and access applications are hard to build and require software infrastructures and services that help the developer out on his task. This work investigates the building and use of capture and access applications through the development of xINCA, a component-based software infrastructure comprising the most common func-tio-na-li-ties present in such a class of applications. xINCA is an extension of INCA --- a low-level infrastructure that provides communication abstractions for capture and access applications. Complementary, INCA and xINCA provide a simplified model for the development of capture and access applications, concerning design, implementation and reuse aspects. Allied with the StRES storage model, xINCA also plays an important role on the structuring of captured information by using XML and corresponding technologies.
35

Uso de informações de contexto em segurança computacional / Use of context information on computer security

Milagres, Francisco Gomes 07 October 2004 (has links)
Diariamente, novos sistemas ubíquos são desenvolvidos e integrados ao nosso cotidiano, cuja presença às vezes não é percebida pelos seus usuários. O objetivo deste trabalho é investigar as questões de segurança e privacidade existentes nos paradigmas de computação ubíqua e ciente de contexto. Utilizando um protótipo de TV interativa - TV-I (Goularte, 2003) - que possui características de mobilidade e ciência de contexto, este trabalho define um conjunto de requisitos mínimos para a garantia de segurança e privacidade em sistemas ubíquos. É também objetivo deste trabalho utilizar informações contextuais para gerenciamento dinâmico de requisitos de segurança e privacidade por meio de políticas expressas em linguagem EPAL. Para validar os resultados desta pesquisa, foi implementado o Gerente de Segurança como um serviço do protótipo TV-I. A principal característica desse gerente é controlar o acesso a informações pessoais por meio de informações de contexto fornecidas pelo Gerente de Contexto, de autoria de Santos (2004) / Every day, new ubiquitous systems are being developed and integrated into our daily routines, whose presence is sometimes not even perceived by the casual user. The aim of this work is to investigate questions of security and privacy in ubiquitous and context aware computing. Using a prototype for interactive television - TV-I (Goularte, 2003) - that has characteristics of mobility and contextual-awareness, this work defines a set of basic requirements that are fundamental in order to guarantee security and privacy in ubiquitous systems. Furthermore, this work uses contextual information in order to dynamically manage security and privacy requirements according to security and privacy policies that are expressed in the EPAL language. In order to validate the experimental results, a Security Manager has been implemented as a service of the TV-I prototype. The principal characteristic of this manager is to enforce access control over the personal information using contextual information of the ubiquitous system, and which is supplied via the Context Manager, designed by Santos (2004).
36

Ubiservices: um modelo para administração de serviços em ambientes ubíquos

Brand, Gustavo Bervian 28 April 2010 (has links)
Made available in DSpace on 2015-03-05T14:01:49Z (GMT). No. of bitstreams: 0 Previous issue date: 28 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / Com a evolução acelerada dos dispositivos computacionais, diminuição de tamanho e custo, ocorre uma imersão das pessoas no mundo digital. Com o uso de mais tecnologia, abundante e barata, surgem ambientes que tiram proveito da computação ubíqua, permitindo aos seus usuários uma interatividade e acesso a informações de forma fácil, ágil e natural. No entanto, ambientes ubíquos foram definidos em função da necessidade de uma grande infra-estrutura instalada para funcionar adequadamente, algo que não é uma realidade atualmente. Este trabalho apresenta uma alternativa aos ambientes ubíquos clássicos: um modelo para administração de serviços chamado Ubiservices. O objetivo do Ubiservices é fornecer conectividade em ambientes formados através de redes Ad Hoc não estruturadas, com aplicações como migração, replicação, publicação e busca de informações e serviços nesta rede. A interconexão das redes Ad Hoc ocorre através de uma rede overlay de forma transparente ao usuário, utilizando tecnologias existentes que, devi / With the fast evolution of the computing devices, its reduced size and cost, there is an immersion of people in the digital world. With the use of more technology, abundant and cheap, there are environments that can take advantage of the ubiquitous computing, allowing users to interact and have access to information easily, quickly and naturaly. However, ubiquitous environments were defined needing a large installed infrastructure to work properly, something that is not a reality nowadays. This work presents an alternative to the classic ubiquitous environments called Ubiservices. Its goal is to provide connectivity to environments made up of unstructured Ad Hoc networks, besides applications like migration, replication, publishing and search of information and services at the network. The interconnection of Ad Hoc networks occurs through an overlay network, user transparently, using existing technologies that, properly adapted and refined, can create a network that allows different mesh networks to interact
37

UbiPri : middleware para controle e gerenciamento de privacidade em ambientes ubíquos / UBiPri : middleware control and privacy management in ubiquitous environments

Leithardt, Valderi Reis Quietinho January 2015 (has links)
Atualmente em vários países já existem mais dispositivos e meios de comunicações que habitantes e a medida que a tecnologia avança a troca de informação tende a aumentar exponencialmente. Com isso, ganha destaque a área denominada computação ubíqua, que visa o desenvolvimento de aplicativos para automatizar processos, antes manuais, a fim de proporcionar conforto, rapidez e conexão aos usuários com seus dispositivos. Nos estudos realizados decorrer desta tese identificou–se a necessidade de desenvolver e controlar informações privadas fundamentadas no local, aqui denominado ambiente ubíquo. O problema de pesquisa identificado foi a grande heterogeneidade de dispositivos e comunicações nestes sistemas, tornando-os vulneráveis e expondo os dados de seus usuários. Assim, observou-se a necessidade de um modelo taxonômico de privacidade que engloba características necessárias para controlar e gerenciar a privacidade de dados em ambientes ubíquos. A partir dessa taxonomia desenvolveu–se um protótipo com base em um middleware estruturado em camadas necessárias para prover os controles e gerenciamentos necessários nestes ambientes. Os primeiros testes e resultados se mostraram promissores, tendo seus resultados publicados em conferências internacionais da área que nortearam os estudos para uma melhoria do tratamento e filtragem de dados. Também foi possível a ampliação dos controles e gerenciamento de parâmetros automáticos com aumento e redução de definição do tipo de perfil do usuário em adição são apresentados os resultados obtidos em diferentes cenários de uso e aplicação. Para tanto, o protótipo desenvolvido permite selecionar opções de variáveis atribuídas individualmente a cada ambiente de acordo com suas necessidades, com isso, a solução proposta visa ser empregada no gerenciamento de privacidade em ambientes ubíquos. Os resultados obtidos nos testes realizados comprovam a viabilidade e contribuição cientifica do modelo desenvolvido. O aplicativo UbiPri foi disponibilizado para utilização no google play store, podendo ser instalado e configurado na plataforma android. / Currently in many countries there are already more devices and communication means inhabitants and as technology advances the exchange of information tends to increase exponentially. As a result, stands out the area called ubiquitous computing, which aims to develop applications to automate processes before hand in order to provide comfort, speed and connecting users with their devices. In studies carried out throughout this thesis it identified the need to develop and control private information based on location, here called ubiquitous environment. The identified research problem was the great heterogeneity of devices and communications in these systems, making them vulnerable and exposing the data of its users. Thus, there was the need for a taxonomic model of privacy that encompasses features needed to control and manage data privacy in ubiquitous environments. From this taxonomy developed a prototype based on a middleware structured in layers to provide the necessary controls and managements required in these environments. The first tests and results were promising, with the results published in international conferences in the area that guided the studies for improved treatment and filtering of data. It was also possible the expansion of controls and management parameters with automatic increase and decrease setting in the user profile type in addition the results obtained are presented in different usage scenarios and application. Thus, the prototype allows you to select options variables individually assigned to each environment according to their needs, with it, the proposed solution is intended to be used in the privacy management in ubiquitous environments. The results obtained in the tests prove the feasibility and scientific contribution of the developed model. The UbiPri application was made available for use in the google play store and can be installed and configured on android platform.
38

On the Selection of Just-in-time Interventions

Jaimes, Luis Gabriel 20 March 2015 (has links)
A deeper understanding of human physiology, combined with improvements in sensing technologies, is fulfilling the vision of affective computing, where applications monitor and react to changes in affect. Further, the proliferation of commodity mobile devices is extending these applications into the natural environment, where they become a pervasive part of our daily lives. This work examines one such pervasive affective computing application with significant implications for long-term health and quality of life adaptive just-in-time interventions (AJITIs). We discuss fundamental components needed to design AJITIs based for one kind of affective data, namely stress. Chronic stress has significant long-term behavioral and physical health consequences, including an increased risk of cardiovascular disease, cancer, anxiety and depression. This dissertation presents the state-of-the-art of Just-in-time interventions for stress. It includes a new architecture. that is used to describe the most important issues in the design, implementation, and evaluation of AJITIs. Then, the most important mechanisms available in the literature are described, and classified. The dissertation also presents a simulation model to study and evaluate different strategies and algorithms for interventions selection. Then, a new hybrid mechanism based on value iteration and monte carlo simulation method is proposed. This semi-online algorithm dynamically builds a transition probability matrix (TPM) which is used to obtain a new policy for intervention selection. We present this algorithm in two different versions. The first version uses a pre-determined number of stress episodes as a training set to create a TPM, and then to generate the policy that will be used to select interventions in the future. In the second version, we use each new stress episode to update the TPM, and a pre-determined number of episodes to update our selection policy for interventions. We also present a completely online learning algorithm for intervention selection based on Q-learning with eligibility traces. We show that this algorithm could be used by an affective computing system to select and deliver in mobile environments. Finally, we conducts posthoc experiments and simulations to demonstrate feasibility of both real-time stress forecasting and stress intervention adaptation and optimization.
39

Architectures et mécanismes de sécurité pour l'auto-protection des systèmes pervasifs

He, Ruan 30 November 2010 (has links) (PDF)
Contributions principales Les éléments précédents identifient les principes de conception de base pour construire un canevas logiciel d'auto-protection. Différentes technologies peuvent être choisies pour réaliser ces principes. Les contributions principales de cette thèse décrivent des mécanismes développés et mis en œuvre pour réaliser notre canevas logiciel d'auto-protection. Il s'agit des éléments suivants : - Une architecture a trois couches pour l'auto-protection : un espace d'exécution fournit un environnement d'exécution pour des applications; un plan de contrôle supervise l'espace d'exécution ; et un plan autonome guide le plan de contrôle en prenant en compte l'etat du systeme, l'evolution des risques, la strategie de securite definie par l'administrateur, et les preferences de l'utilisateur. - Une approche du contrôle d'acces a base d'attributs: l'approche proposee (appelee G-ABAC) exprime les politiques d'autorisation en se basant sur des attributs. Cette approche apporte a la fois une neutralite vis-a-vis du modele de contrôle d'acces, et une flexibilite permettant des manipulations elementaires sur ces politiques. - Un canevas logiciel a base de politiques pour realiser la gestion autonome de la securite : l'approche a base de politiques a montre ses avantages pour l'administration des systemes complexes et dynamiques. Un canevas logiciel autonome de politiques de securite (ASPF) fournit une solution coherente et decentralisee pour administrer les politiques d'autorisation pour les systemes pervasifs a grande echelle. L'integration des patrons autonomes ameliore egalement la souplesse et la facilite d'adaptation au contexte. - Un noyau de securite embarque pour l'application des politiques de contrôle d'acces : les politiques d'autorisation denies precedemment sont appliquees par une architecture d'autorisation au niveau du systeme d'exploitation. Ce noyau appele VSK contrôle l'acces aux ressources d'une maniere dynamique an de reduire le surcoût des mecanismes d'autorisation. Ce mecanisme permet egalement de supporter dierents types de politiques d'autorisation. - Un langage dedie (Domain-Specic Language ou DSL) pour la specication de politiques d'adaptation : toutes les adaptations de notre canevas logiciel d'auto-protection de bout en bout sont contr^olees par des strategies de haut niveau appelees politiques d'adaptation. Un DSL tenant compte de nombreux facteurs pour les decisions d'adaptation. est deni pour specier ces politiques.
40

Découverte de services sensible à la qualité de service dans les environnements de l'informatique diffuse.

Liu, Jinshan 11 July 2006 (has links) (PDF)
With the advent of portable devices (e.g., smartphones) and the advances in wireless networking technologies (e.g., WLAN, GPRS, UMTS), the vision of ubiquitous computing is becoming a reality. It aims to facilitate user tasks through the seamless utilization of heterogeneous computing and communication capabilities (represented as services) available in the environment. Service discovery, which is necessary for achieving the above goal, must be aware of the service's non-functional properties due to the challenges posed by ubiquitous computing, such as device portability and mobility. This thesis proposes an overall solution that supports QoS-aware service discovery in ubiquitous computing environments. Our contribution lies in substantiating QoS awareness in the following three aspects. Firstly, during the process of discovering services, the expiring wireless links resulting from device mobility are identified and avoided since they cause service failures and thus hamper service reliability. Secondly, as mu tiple services can be discovered, a comprehensive utility function is proposed to evaluate services in terms of their various non-functional properties, meanwhile taking into account the service user's preferences among them, for the purpose of selecting the best one. Thirdly, to avoid untrustworthy services, a distributed reputation mechanism is proposed to facilitate the evaluation of the service host's trustworthiness. The above three proposed solutions are extensively evaluated respectively, based on analysis and simulation. They are further incorporated into a middleware that supports QoS aware Web service discovery in ubiquitous computing environments. A prototype implementing the middleware is deployed and evaluated. The results show that the overhead introduced by QoS awareness seems reasonable.

Page generated in 0.0332 seconds