Search
Now showing items 181-190 of 276
Interest-based negotiation for policy-regulated asset sharing
(Springer Nature, 2016)
Resources sharing is an important but complex problem to be solved. The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a ...
Preface
(Springer International Publishing, 2016)
The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ...
Composing domain-specific physical models with general-purpose software modules in embedded control software
(Springer Science+Business Media, 2014-02)
A considerable portion of software systems today are adopted in the embedded control domain. Embedded control software deals with controlling a physical system, and as such models of physical characteristics become part ...
Optimizing decomposition of software architecture for local recovery
(Springer Science+Business Media, 2013-06)
The increasing size and complexity of software systems has led to an amplified number of potential failures and as such makes it harder to ensure software reliability. Since it is usually hard to prevent all the failures, ...
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ...
Availability analysis of software architecture decomposition alternatives for local recovery
(2017)
We present an efficient and easy-to-use methodology to predict—at design time—the availability of systems that support local recovery. Our analysis techniques work at the architectural level, where the software designer ...
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Privacy enforcement through policy extension
(IEEE, 2016)
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ...
Moving switching functions to continuous domain
(IEEE, 2016)
This paper proposes a method for moving switching functions to continuous domain. The benefits of this approach are twofold. First, the elementary calculus works with the transformed functions. Second, this transformation ...
A big data processing framework for self-healing internet of things applications
(IEEE, 2016)
In this study, we introduce a big data processing framework that provides self-healing capability in the Internet of Things domain. We discuss the high-level architecture of this framework and its prototype implementation. ...
Share this page