Search
Now showing items 21-30 of 45
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Routing-aware partitioning of the internet address space for server ranking in CDNs
(Elsevier, 2017-07)
The goal of Content Delivery Networks (CDNs) is to serve content to end-users with high performance. In order to do that, a CDN measures the latency on the paths from its servers to users and then selects a best available ...
Automated refinement of models for model-based testing using exploratory testing
(Springer International Publishing, 2017-09)
Model-based testing relies on models of the system under test to automatically generate test cases. Consequently, the effectiveness of the generated test cases depends on models. In general, these models are created manually, ...
Sequential decision making based on emergent emotion for a humanoid robot
(IEEE, 2017)
Certain emotions and moods can be manifestations of complex and costly neural computations that our brain wants to avoid. Instead of reaching an optimal decision based on the facts, we find it often easier and sometimes ...
Location attestation and access control for mobile devices using GeoXACML
(Elsevier, 2017-02)
Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)
Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ...
Impact of education and experience level on the effectiveness of exploratory testing: an industrial case study
(IEEE, 2017)
Exploratory Testing (ET) is a widely applied approach in practice. This approach relies on the knowledge and experience of test engineers and technicians who perform ET. Hence, we aimed at evaluating the impact of education ...
Generating runtime verification specifications based on static code analysis alerts
(ACM, 2017)
Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ...
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)
With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ...
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
Share this page