Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
August 2011
BCB '11: Proceedings of the 2nd ACM Conference on Bioinformatics, Computational Biology and Biomedicine
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2, Downloads (12 Months): 17, Downloads (Overall): 70
Full text available:
PDF
NcRNAs play important roles in many biological processes. Existing genome-scale ncRNA homology search tools identify ncRNAs in local sequence alignments generated by conventional sequence comparison methods. However, some types of ncRNA lack strong sequence conservation and tend to be missed by conventional sequence comparison methods. In this paper, we propose ...
Keywords:
application
CCS:
Information systems applications
Keywords:
application
Primary CCS:
Information systems applications
Full Text:
... than conventional sequence comparison tools.Categories and Subject DescriptorsH.4 [Information Systems Applications] ]: MiscellaneousGeneral TermsApplication1. INTRODUCTIONIdentifying non-coding RNAs (ncRNAs), which are tran-scribed ...
2
November 2010
ISA '10: Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Indoor Spatial Awareness
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 18, Downloads (Overall): 181
Full text available:
Pdf
This talk will give an overview of five research projects in active indoor environments that I have conducted with my colleagues and students.
Keywords:
applications
CCS:
Information systems applications
Keywords:
applications
Full Text:
... and Software EngineeringThe University of Melbournelkulik@unimelb.edu.auCategories and Subject DescriptorsH.4.3 [Communications Applications] ]: Information Brow-sers; H.4.2 [Types of Systems]: Decision SupportGeneral TermsApplicationsExtended ... whereabouts ofobjects.Location Sensitive ?Post-It? MessagesThis project builds a prototype iPhone application that en-ables users to post messages at certain positions (for ...
3
August 2010
MobiHeld '10: Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 92, Downloads (Overall): 671
Full text available:
PDF
Mobile handheld devices have been changing form and functionality over the last decade. It has changed from a limited-function device, with the primary function being making phone calls, to a multi-function device that morphs into a media device for watching movies, or into a remote control for home appliances, or ...
Keywords:
mobile applications
CCS:
Personal computers and PC applications
Keywords:
mobile applications
Abstract:
... models, techniques and middleware infrastructures that abstract this complexity from application development and delivery perspectives. Developing intelligent mobile applications, , such as, augmented reality, that optimize use of context ... "Internet of Things". Finally, I'll talk about three categories of applications: : (1) consumer, (2) enterprise and (3) industry-specific. Differences between ... industry-specific. Differences between the requirements of each category of mobile applications will be discussed and examples will be given with real ... with real working demos. Challenges in scaling and deploying mobile applications in real-world environment will be highlighted. In addition, privacy and ... and security issues with integrating both personal (consumer) and enterprise applications on the same mobile handheld will be discussed as real ... In that context, the value of end-to-end testing of mobile applications will be highlighted and potential approaches to testing will be ... mobile handhelds as a platform for conducting geographically distributed complex applications and in future, for deploying such applications
Primary CCS:
Personal computers and PC applications
Full Text:
... models, techniques and middleware infrastructures that abstract this complexity from application development and delivery perspectives. Developing intelligent mobile applications, , such as, augmented reality, that optimize use of context ... power will be the key to success for any mobile device/application. . This will require new perspective on how to approach ... ?Internet of Things?. Finally, I?ll talk about three categories of applications: : (1) consumer, (2) enterprise and (3) industry-specific. Differences between ... industry-specific. Differences between the requirements of each category of mobile applications will be discussed and examples will be given with real ... with real working demos. Challenges in scaling and deploying mobile applications in real-world environment will be highlighted. In addition, privacy and ... and security issues with integrating both personal (consumer) and enterprise applications on the same mobile handheld will be discussed as real ... In that context, the value of end-to-end testing of mobile applications will be highlighted and potential approaches to testing will be ... mobile handhelds as a platform for conducting geographically distributed complex applications and in future, for deploying such applications in a scalable manner. Categories & Subject Descriptors: C.5.3 Microcomputers; ... (e.g., laptops, personal digital assistants) General Terms: Design Keywords: mobile applications Copyright is held by the author/owner(s). MobiHeld 2010, August 30, ...
4
February 1997
MULTIMEDIA '96: Proceedings of the fourth ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 7, Downloads (Overall): 304
Full text available:
PDF
Keywords:
communications/networking/VOD applications
CCS:
Organizing principles for web applications
Keywords:
communications/networking/VOD applications
References:
J i ... Carlis, J. Riedl, A. Georgopoulos, G. Wilcox, R. Elde, J. H. Pardo, K. Ugurbil, E. Retzel, J. Maguire, B. Miller, M. Claypool, T. Brelje, and C. Honda. A zoomable DBMS for brain structure, function and behavioro In International Conference on Applications of Databases, June 1994.
W. Dean McCarty, Steven Sheasby, Philip Amburn, Martin R. Stytz, and Chip Switzer. A virtual cockpit for a distributed interactive simulation. IEEE Computer Graphics and Applications, January 1994.
Full Text:
... Virtual CockpitMark ClaypoolJohn Riedl{claypool,riedl) @cs.urnn.eduUniversity of MinnesotaComputer Science DepartmentABSTRACTTomorrow?s multimedia applications will stress all parts ofa computer system. To determine the ... ofa computer system. To determine the computer resourcesneeded to meet application demands we have developed anew capacity planning model that is ... quality. We find processor per-formance is the current bottleneck in application quality forthe Virtual Cockpit, but that higher-speed networks, such asATM, ... presented the opportunity for multiple users to collabo-rate using one application. . Today, two to tens of users cancommunicate through a ... [4]. With highmultimedia system requirements and many users, today?s andtomorrow?s applications will stress all parts of a computerOTh~~Workis sponsored in part ... limit their usefulnessby not considering the user perception of the application qual-ity. We have developed a new capacity planning model thatis ... have developed a new capacity planning model thatis based on application quality as perceived by the user. Likeother models, our model ... perceived by the user. Likeother models, our model incorporates users, applications andhardware into a measure of performance. We enhance themodel by ... predict changes in quality that a user willperceive when the application or hardware is changed.We start with a distributed, multimedia application. . We modelthe user, application and computer system. We perform somedetailed experiments to measure the ... We perform somedetailed experiments to measure the fundamental componentsof the application. . We validate the detailed experiments throughlarger experiments. Lastly, we ...
multimedia application. . Among the factors weinvestigate are the performance of the ... show how our research complements thatof research in related areas.Quality Application quality research focuses on the user?sperception of the applications they are running. Quality re-searchers have developed some models for ... quality [15, 20]. Researchers have studied some fac-tors that affect application ... performance such as latency andframe rate. Some of the many. applications studied includevideoconferences and teleoperation [18].We build upon the reported acceptable ... teleoperation [18].We build upon the reported acceptable tolerance levels formultimedia applications in computing our measures of qual-ity. We expand upon the ... our measures of qual-ity. We expand upon the work of application quality re-searchers by extending quality models to a new multimediaapplication.Geographic ... a form of capacity planning that emphasizes thequality of the application as perceived by the user, enablingdesigners to tradeoff application performance and system cost.Networks Networks connect the components of distributedapplications. ... system cost.Networks Networks connect the components of distributedapplications. Unlike centralized applications of the past, dis-tributed multimedia applications run over one or more net-works. Network researchers have studied ... Network utilization re-search includes the effects of delay jitter on application per-formance and transport mechanisms on packet-switched net-works [12],We use quality ... the Standard PerformanceEvaluation Corporation, has sought to create objective seriesof applications- -oriented tests, which can serve as commonreference points and be ... the quality of a distributed multimedia appli-cation incorporates the user, application and hardware. Fig-ure 1 depicts our model.Users We start with ... hardware. Fig-ure 1 depicts our model.Users We start with the application users. People interactwith touch, sight and hearing. We would like ...
... simulators to be fast enough toprovide practical ?live? training.Application The application is the software the users willrun. The Virtual Cockpit has ... Pursuit. See the VirtualCockpit paper for more details on the application [19].254( Users )User RequirementsSystem Requirements~kJWf2 ~: Quatity Planning Model. Our ... ~: Quatity Planning Model. Our model of applicationperformance incorporates users, applications, , user requirements,system requirements, architecture and hardware. In addition, weinclnde ... requirements, architecture and hardware. In addition, weinclnde a measure of application quatity as perceived by the user.User Requirements Theapplication is founded ... the selection of the underlying system in order to makethe application acceptable for the user.System Requirements The user requirements impose aseries ... determine the system requirements from theuser requirements depends upon the application and, to someextent, its implementation. For instance, the workstation canmake ... the system requirements and architecture,the hardware needed to support the application can be de-termined. Hardware might range from a low-end worksta-tion ... The variations in hardware, architecture, systemrequirements, user requirements and the application all effectthe application ... quality as perceived by the user. The accept-ability of the application to the user is determined by howclose the application performance matches the user require-2 55ments. We are developing a ... We are developing a quantitative measure of the dif-ference between application performance and user require-ments. We call this the application quality.QUALITYThe quality of a distributed multimedia application is a mea-sure of the application?s acceptability to the user. ... acceptability to the user. Althoughwe often think of a multimedia application as a continuousstream of data, the computer system handles multimedia ... to the user we call latency. Latencydecreases the effectiveness of applications by making themless like real-life interaction.. Jittez Distributed applications usually run on non-decli-cated systems. The underlying networks are often ... reduce jitter and/or latency.There may be additional measures that affect application qual-ity that are application specific. For instance, DIS simulatorsuse ?dead reckoning? algorithms to compute ...
... and non-dedicated computer this can not be achieved.To compute the application quality, we use the above qualitycomponents in a process depicted ... process depicted by Figure 4. The user re-quirements for the application ... define the acceptable latency,~+m?gl+(=--fa+~~ySystem ProjectedfigUtK? A: The process for computing application quality. Theuser defines the acceptable Iatency, jitter, data loss and ... specified in the user requirements, a quality met-ric computes the application qrtatity from the actual vahtes.jitter, data loss and missed updates. ... and projected data are fed into a quali~ metric forthe application. . The quality metric is a function, based onthe acceptable ... acceptable components and dependent upon the projectedcomponents, that computes the application quality.In order to quantitatively compare application quality for dif-ferent system configurations, we need a reasonable qualitymetric. ... many quality metrics thatagree with a user?s perception of the application. . Mean opin-ion score (MOS) testing can be used to ...
... the ?delay? and ?jitter? axes each have aninfinite bound. Comparing application quality for two differ-ent configurations at the upper-limit of any ... user-defined acceptability limits along each axisare greatly dependent upon the application and must be re-evaluated for each new application. ... . For example, the accept-able latency for an audio broadcast application of a radio pro-gram may be far more than the ... latency as 100 to 300 mil-liseconds as acceptable for DIS applications [4]. We use300 milliseconds as the maximum acceptable latency for ... requirements summarized in Table 1 determine a re-gion of acceptable application quality, depicted by the shadedregion. All points inside the shaded ... those outside the region do not. An instantia-tion of the application and the underlying computer systemwould lie at one point in ... axes are defined by theuser. The shaded region depicts acceptable application quality. Aninstantiation of the Vktual Cockpit and the underlying computersystem ... this space. If the point was insidethe shaded region, the application would have acceptable quality.MICRO EXPERIMENTSExperiments that measure processor performance of ... quality.MICRO EXPERIMENTSExperiments that measure processor performance of compo-nents of an application we call micro experiments. We domicro experiments to allow us ... to allow us to predict the effects of sys-tems on applications built with those components. The fun-damental components for the Vktual ... induced by each component, we canpredict the load of an application built with those compo-nents. Changes in application configuration or changes inhardware are represented by modifying the individual ... modifying the individual com-ponents and observing how that affects the application per-formance. Examples of previous micro experiments appearin [2, 3].The fundamental ...
... to reflect the workstation perfor-mance.MACRO EXPERIMENTSExperiments that measure performance of applications builtwith micro experiment components we call macro experi-ments. We do ... We do macro experiments to validate micro experiment-based predictions of application performance. Examples ofmacro experiments appear in [2, 3].We ran macro ...
... Cockpit ? what is theapplicrztion quality? In order to predict application quality,we need to predict latency, jitter, data loss and missed ... we assume the processor processes all updates beforerendering frames.To compute application quality, we use the methods describedin Section ?Quality? above. We ... use the methods describedin Section ?Quality? above. We examine the application qual-ity for Virtual Cockpit exercises with SGI Indigo 2s becauseSGI ...
... 11: Virtual Cockpit Quality versus Soldiers. The middleline represents predicted application quality as the number soldiersincreases. The upper and lower lines ... could support 1000 soldlerswhen we analyzed the frame rate alone. Application qualityis determined by latency, jitter and missed updates as well ... Vir-tual Cockpit quality. SGI Personal Iris? are unable to deliveracceptable application quality. More powerful SGI Indigo 2scan deliver acceptable application quality for up to 500 sol-diers. 15x?s provides better application quality than Indigo3Processorperformanceapproximatelydoubleseveryyear[10]. The 15xprocessorwill come along in about 8 ... line represents the ac-ceptable quality limit.2s and can deliver acceptable application quality for up to7000 soldiers.High-speed NetworksWith theVirtual Cockpit running on ...
... network greatly increases scalability. The networkas the present bottleneck in application quality has been re-0.011Quality Predictions vs. Soldiers, , ,-1Ethernet ?ATM ... the DIS use of dead reckoning and multicast.CONCLUSIONSMulti-person distributed multimedia applications stress allparts of a computer system. We have developed a ... system. We have developed a qualityplanning model for distributed multimedia applications thatallows us to investigate potential bottlenecks in applicationquality. We have ... exercises must support up to 100,000 soldiers.Our objective in identifying application ... bottlenecks is to un-derstand the system limits that will prevent applications frommeeting users? needs. After identifying each bottleneck, weexplore ways to ... Vir-tual Cockpit quality. Low-end processors are unable to de-liver acceptable application quality. More powerful proces-sors can deliver acceptable application quality for 1000?s ofsoldiers.l High-speed networks are unimportant for Virtual ... UnicastDataLossIq Acceptable Quality.imit of AcceptableData LOSS SGI Personal Iris, ATM. Application Instance(3 fmmeske)Limit of Acceptable JitterlSGJ Jn(lgo 2, EthernetLimit Of Ac&ptable ... jitter and data loss. These values determine a region ofacceptable application quality, depicted by the shaded region. AI]points inside the shaded ... jitter, data loss and missedupdates determine a region of acceptable application quality,depicted by the shaded region.. Each point is an instantia-tion ... the shaded region.. Each point is an instantia-tion of the application and the underlying computer system.All points inside the shaded region ...
... Our model could be used to deter-mine the affect on application quality for the various deadreckoning parameters, possibly recommending a specific ... examined more closely to determine the applicationquality bottleneck within.For some applications, , there is potential for interaction ef-fects among the quality ... for interaction ef-fects among the quality events. For example, 3-dimensionalgraphics applications have multiple factors affecting users?perception of objects and different combinations ... and different combinations of require-ments may yield satisfactory results. Such applications mayeven have a non-convex region of acceptable quality. Futureresearch into ... extend-ing our model to discover which workstation components arebottlenecks to application quality,AcknowledgmentsWe would like to thank the anonymous reviewers for theirinsightful ...
... A virtual cockpitfor a distributed interactive simulation. IEEE ComputerGraphics and Applications, , January 1994.20. Radhika R. Roy. Networking constraints in multime-dia ...
5
October 2011
MobiHeld '11: Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 43, Downloads (Overall): 121
Full text available:
PDF
We would like to provide high-quality video conferencing so that people can communicate comfortably with each other anywhere, anytime. This is not a new goal, and there are now several applications such as Skype™ and FaceTime™ on mobile platforms that bring us closer to achieving anywhere, anytime video communications. Alas, ...
Keywords:
mobile applications
CCS:
Web applications
Keywords:
mobile applications
Abstract:
... is not a new goal, and there are now several applications such as Skype™ and FaceTime™ on mobile platforms that bring ...
Primary CCS:
Web applications
References:
Tanguay, D., Gelb, D. and Baker, H. 2004. Nizza: A Framework for Developing Real-time Streaming Multimedia Applications. HP Labs Technical Report HPL-2004-132, HP Laboratories.
Full Text:
... is not a new goal, and there are now several applications such as SkypeTM and FaceTimeTM on mobile platforms that bring ... prototype and not a finished project.Categories and Subject DescriptorsH.4.3 [Communications Applications] ]: Computer conferencing, teleconferencing, and videoconferencing; H.5.1 [MultimediaInformation Systems]: Video; ... Systems]: Video; H.5.2 [User Interfaces].General TermsDesign, Experimentation, Human Factors. KeywordsMobile applications. . 1. INTRODUCTIONVideo conferencing on different kinds of platforms still ...
... the display screen (portrait or landscape), but in our prototype application we use them for a different purpose. The accelerometers sense ...
... module was a bottleneck, being slow and inaccurate. For our application of correcting for bad view angle, an additional very difficult ...
... bad view angle detection and feedback, we have implemented an application on the Palm Pre Plus that proportionally washes out the ... latency) have combined to increase recent use of video conferencing applications.
commonly see in today?s video conferencing applications indicate that we are only beginning to harness the potential ... H. 2004. Nizza: A Framework for Developing Real-time Streaming Multimedia Applications. . HP Labs Technical Report HPL-2004-132, HPLaboratories.[6] Wilbur, S. and ...
6
March 2010
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 13, Downloads (12 Months): 99, Downloads (Overall): 661
Full text available:
PDF
This contribution presents a method to evaluate business applications. The method allows for using artifacts of enterprise architectures. Artifacts like business processes or hardware can exert influence on the application's quality and thus have to be regarded. A central aspect is to modularize the method's basic components, which are key ...
Keywords:
application, evaluation, enterprise architecture
Title:
A method for application evaluations in context of enterprise architecture
CCS:
Information systems applications
Keywords:
application
Abstract:
<p>This contribution presents a method to evaluate business applications. . The method allows for using artifacts of enterprise architectures. ... criterion. A criterion addresses a certain aspect to evaluate an application and allows for using linguistic terms to represent a key ...
Primary CCS:
Information systems applications
References:
J. S. Addicks. Enterprise architecture dependent application evaluations. In Proceedings of the 3rd IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2009): Cyber Engineering and Creating Value by Making Connections, pages 628--633, Istanbul, 2009.
J. S. Addicks. A fuzzy logic based approach for enterprise application evaluations. In G. I. Doukidis and C. Avgerou, editors, Proceedings of the 4th Mediterranean Conference on Information Systems (MCIS). 2009.
J. S. Addicks and P. Gringel. Application landscape metrics: Overview, classification, and practical usage. In W. Esswein, J. Mendling, and S. Rinderle-Ma, editors, Proceedings of the 3rd International Workshop on Enterprise Modelling and Information Systems Architectures (EMISA), 2009.
J. Lankes. Metrics for Application Landscapes: Status Quo, Development, and a Case Study: Dissertation. PhD thesis, Technische Universität München, München, 2008.
J. Lankes and C. M. Schweda. Using metrics to evaluate failure propagation and failure impacts in application landscapes. In M. Bichler, T. Hess, H. Krcmar, U. Lechner, F. Matthes, A. Picot, B. Speitkamp, and P. Wolf, editors, Multikonferenz Wirtschaftsinformatik, MKWI 2008, Proceedings: {26. -- 28. Februar 2008, TU München in Garching}, pages 1827--1838. GITO--Verlag, Berlin, Berlin, 2008.
L. A. Zadeh. The concept of a linguistic variable and its application to approximate reasoning. Information Sciences, (8):199--249, 1975.
Full Text:
A Method for Application Evaluations in Context of Enterprise ArchitectureA Method for Application Evaluations in Context ofEnterprise ArchitectureJan Stefan AddicksOFFIS - Institute for ... as criterion. A criterion addresses a certain aspect toevaluate an application and allows for using linguistic termsto represent a key figure.Categories ... termsto represent a key figure.Categories and Subject DescriptorsH.4.m [Information Systems Applications] ]: Miscella-neousGeneral TermsMeasurement, ManagementKeywordsEnterprise Architecture, Application, , Evaluation1. INTRODUCTIONOrganizations today have application landscapes that arecomplex and which continuously grow in complexity, due ... big picture of the over-all structure (cf. [12]); however, the application landscape(denoted as landscape in the following) is only a part ... that are usedto partition the whole structure.Artifacts are for example applications, , servers on whichan application is installed, or business processes that aresupported by an application. . Winter et al. presented essen-tial layers and artifacts for ... be adoptable to each kindof organizational environment. The Enterprise Architecturebased Application Evaluation (EA|AE) method presentedin this contribution is based on key ... torepresent indicators for more concrete questions, like ?Howgood is an application regarding its availability, its costs peryear and its importance?. One ...
... industry was that such questionsare good starting point to introduce application evaluationswithin organizations.Since classifying metrics according to terms like good or131bad ... done in the area of landscape evalua-tions or evaluations of applications with consideration of theEA context. Lankes [19], for instance, presents ... which relies on metrics for failurepropagation within a landscape. Since applications are oftenclosely coupled, failures propagate quickly within the inter-woven system ... forexample the administrators experience influences the avail-ability of the administrated application to a certain degree.We do not want to use properties ... the above-mentioned publications, which addressmetrics and key figures to assess applications, , Gammelg?ardet al. [13] deal with the reliability of ratings ... an overview of foundations and as-is sit-uations regarding assessments of applications within orga-nizations is presented. The first subsection deals with thebasics ... assessments, whereas the second focuses on factorsthat exert influence on applications. . The third subsectionpresents the state-of-the-art regarding application landscapemetrics that are basic components of the EA|AE method.3.1 Assessments ... ?cost per year? might be seen as?good? for an ?important? application, , but ?bad? for unim-portant ones. Since cost-benefit analysis (CBA) ... publications dealing with EA man-agement (for instance [27]), to which application evaluationsbelong. Depending on the organizational structure, the CIOcan exert more ...
... quality indicator. Although the focus ofthe EA|AE method lies on applications, , the overall contexthas to be regarded. As described in ... thereare lots of physical and logical connections between otherartifacts and applications, ... , which can not be ignored.The influence factors on enterprise applications vary fromenterprise to enterprise. By analyzing publications and dis-cussions with ... (organi-zational strategies). Changes in business processes (1) oftenrequire changes of applications that provide functionality tosupport business processes. Properties of applications canbe influenced by attributes of other applications ... (2); for in-stance the availability can depend on another application?savailability. Applications may be influenced by the proper-132ties of the underlying hardware ... canmake certain strategic decisions exerting direct or indirectinfluence on enterprise applications (5). For instance, ven-dor strategies could be established, which demand ... strategic decision towards applying service-oriented ar-chitecture [9] could be made.3.3 Application Landscape MetricsMetrics are essential components of our method. One kindof ... of our method. One kindof metrics with special importance are application landscapemetrics (ALM). ALM differ from classical software metrics[10] since these ... differ from classical software metrics[10] since these focus on one application and its softwarearchitecture. Exemplary metrics of this kind are presentedin ... the application?s attributes, (b) itmust be an indicator of an application and its value is de-termined by attributes and relations from ... is de-termined by attributes and relations from other EA artifacts(the applications? ? enterprise context), and (c) it must indi-cate a landscape?s ... figures for context-dependent evaluationskey figures for landscape propertieskey figures for application properties11%52%39%8%53%Figure 1: Results of the TUM survey (left) and ourmetrics ...
EVALUATIONS (EA|AE)The EA|AE method addresses single applications and howto evaluate those in regard to influences and expectations ... a stakeholder like the CIO to eval-uate a set of applications. . The last subsection will presentdetails of the technical process ... will presentdetails of the technical process to derive overall indicatorsfor applications out of EA artifacts? attributes.4.1 TaxonomyThis section covers the relevant ... evaluation (see Figure 2)consists of several criteria on which certain applications haveto be evaluated:A criterion in our model is a 6-tuplec ... an aspect that can be directly assessed whenregarding a concrete application. . Criteria can be mapped toone or more attributes of ... use more than one criterion to determine thequality of an application, , we specify evaluations. Evalua-tions are collections of criteria. Each ... and uses the informationto infer an overall indicator for an application. . Aggrega-tion functions can vary in the complexity of the ... our approach, in thissection we introduce the method to evaluate applications inan abbreviated manner. Figure 3 depicts the whole process.The numbers ... evaluations start with the evaluation?s def-inition. First of all, the applications to be evaluated haveto be selected (1). The second step ... latter case, the stakeholder mayreselect the set of criteria or applications. . Following thatdecision, the evaluation process can be configured (4). ...
... stakeholder may choose whether the results ofeach criterion of an application should be represented by keyfigures or indicators or as aggregated ... be checked (7). Ifthe degree is insufficient to evaluate the applications, , thestakeholder has to verify (8) whether it is in ... point, because the representation of (numerical)values for each criterion and application is considered to beappropriate. The method provides this possibility and ... results are represented by indica-tors for each criterion and each application (13). Similar tonumber 12, the method ends with the result?s ... indicator?sgeneration (15). With the representation of overall indica-tors for each application (16) the method will end (17).It is difficult to perform ... to infer the overall indicatorsThe main process for evaluating an application from astakeholder view is presented in Section 4.2. Within thissection ... thissection the technical process to infer an overall indicator foran application is explained, but with respect to the limitedspace in abbreviated ... technical process is visual-ized in Figure 4.Let a1 be the application under investigation; further letthere be two criteria c1 and c2. ... based indicators or key figures to representthe quality of an application. . In the latter case, the resultof the evaluation has ... have exactly one key figure for eachcriteria applied on each application. . This can be reportedwithin a tabular representation containing the ...
... aggregation?s result is represented by a single (overall)indicator for each application that is considered; however,with a defuzzification method (cf. [18]) a ... Some EA tools have integrated metrics and sup-port evaluations of application in general; however, most ofthe metrics are hard-coded and do ... based on the Eclipse Rich Client Platform,which supports module-based software applications. . Eachsoftware module, which is denoted as ?bundle?, can be ... ?bundle?, can be eas-ily added or removed from the main application. . In our case??????????t????????r??t??????????????????t???????????????????t???t????t????????????????t?????????t???t???????????t??????r????r???t?r????r???t???????????r????????????????t???r??? ??????????????????????????t?? ?????!"t?#t?? ???????t?????t?????????? ?#t?? ???????t?????t????????????#t?? ?r?????????t?????t????????????????????Figure ... be added to the prototype to represent the results.Our prototypical application evaluation by one of our part-ners from industry is intended ... landscape evaluationapproach. This project should encompass every of the fewhundred applications and vary from cyclic evaluations toreal-time monitoring. With the results ... CONCLUSION AND FUTUREWORKThis contribution introduces our EA based method toevaluate applications. . First of all, we provided a motiva-tion of the ... to be applied withinan extensive scenario with a few hundred applications. . Tothis end, the missing but required data has to ...
... 2009.[2] J. S. Addicks. A fuzzy logic based approach forenterprise application evaluations. In G. I. Doukidisand C. Avgerou, editors, Proceedings of ... on Information Systems(MCIS). 2009.[3] J. S. Addicks and P. Gringel. Application landscapemetrics: Overview, classification, and practical usage.In W. Esswein, J. Mendling, ... logicmodels. MIT Press, Cambridge, Mass., 2001.[19] J. Lankes. Metrics for Application Landscapes: StatusQuo, Development, and a Case Study: Dissertation.PhD thesis, Technische ...
... L. A. Zadeh. The concept of a linguistic variable andits application
7
October 2015
CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7, Downloads (12 Months): 73, Downloads (Overall): 154
Full text available:
PDF
Pedestrians movements have a major impact on the dynamics of cities and provide valuable guidance to city planners. In this paper we model the normal behaviours of pedestrian flows and detect anomalous events from pedestrian counting data of the City of Melbourne. Since the data spans an extended period, and ...
Keywords:
application, anomaly detection
CCS:
Information systems applications
Keywords:
application
Primary CCS:
Information systems applications
Full Text:
... and more accurate than HyCARCE.Categories and Subject DescriptorsH.4 [Information Systems Applications] ]: Miscellaneous;D.2.8 [Software Engineering]: MetricsGeneral TermsApplication; Anomaly Detection1. INTRODUCTIONThe ease ...
8
January 1995
MULTIMEDIA '95: Proceedings of the third ACM international conference on Multimedia
Publisher: ACM
Keywords:
home applications, expert systems, multimedia, health applications
CCS:
Information systems applications
Keywords:
home applications
health applications
9
October 2011
ASSETS '11: The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3, Downloads (12 Months): 26, Downloads (Overall): 139
Full text available:
PDF
This paper presents a prototype of an educative and inclusive application: the Brazilian Sign Language Multimedia Hangman Game. This application aims to estimulate people, specially children, deaf or not, to learn a sign language and to help deaf people to improve their vocabulary in an oral language. The differential of ...
Keywords:
inclusive application, educational application, gesture recognition, fingerspelling applications, sign language
Title:
Brazilian sign language multimedia hangman game: a prototype of an educational and inclusive application
CCS:
Personal computers and PC applications
Information systems applications
Theory and algorithms for application domains
Keywords:
inclusive application
educational application
fingerspelling applications
Abstract:
... <p>This paper presents a prototype of an educative and inclusive application: : the Brazilian Sign Language Multimedia Hangman Game. This application aims to estimulate people, specially children, deaf or not, to ...
Primary CCS:
Personal computers and PC applications
Information systems applications
Theory and algorithms for application domains
References:
R. C. B. Madeo, S. M. Peres, H. H. Bíscaro, D. B. Dias, and C. Boscarioli. A committee machine implementing the pattern recognition module for fingerspelling applications. In Proceedings of the 25th Annual ACM Symposium on Applied Computing 2010, pages 954--958. ACM Press, 2010.
R. C. B. Madeo, S. M. Peres, D. B. Dias, and C. Boscarioli. Gesture recognition for fingerspelling applications: An approach based on sign language cheremes. In Proceedings of the 12th International ACM SIGACCESS Conference on Computers and Accessibility, pages 261--262. ACM, 2010.
Full Text:
... This paper presents a prototype of an educative and inclu sive application: : the Brazilian Sign Language Multimedia Hangman Game. This application aims to estimulate peo ple, specially children, deaf or not, to ... reaching 84.3% accuracy. Categories and Subject Descriptors I.2.1 [Arti?cial Intelligence]: Applications and Expert Systems?Games; I.2.1 [Arti?cial Intelligence]: Appli cations and Expert Systems?Natural ... technologies for persons with disabilities. General Terms Experimentation Keywords Fingerspelling Applications, , Educational Application, , Inclu sive Application, , Gesture Recognition, Sign Language. 1. INTRODUCTION In recent years, ... the author/owner(s).ASSETS?11, October 24?26, 2011, Dundee, Scotland, UK.ACM 978-1-4503-0919-6/11/10.children. This application has two main goals: estimulating children, deaf or not, to ...
... just to change the rules in the fuzzy grammar. 3. APPLICATION TESTS To get real results on the perception of users ... on the perception of users about the game developed, the application was tested by four users. These tests were performed in ... were performed in two stages: ?rst, the users tested the application by themselves and wrote freely their perceptions about the game; ... by problems with the segmentation. 4. FINAL CONSIDERATIONS The presented application is still a prototype and needs some improvements. Firstly, it ... children (deaf or not) to assess their opinions on the application and, ?nally, make the application available to these children. 5. REFERENCES [1] D. B. Dias, ... A committee machine implementing the pattern recognition module for ?ngerspelling applications. . In Proceedings of the 25th Annual ACM Symposium on ... D. B. Dias, and C. Boscarioli. Gesture recognition for ?ngerspelling applications: : An approach based on sign language cheremes. In Proceedings ...
10
July 2009
IPTComm '09: Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0, Downloads (12 Months): 4, Downloads (Overall): 90
Full text available:
PDF
There is a growing demand for IP based multimedia services that encompass usage of multiple user interfaces including web and telephony. The complexity of such converged applications requires sophisticated development tools and techniques. While standards such as SIP and HTTP Servlets enable the application developer to develop and deploy converged ...
Keywords:
converged applications, telecommunications, testing, VoIP applications
Title:
Towards automated functional testing of converged applications
CCS:
Web applications
Information systems applications
Keywords:
converged applications
VoIP applications
Abstract:
... interfaces including web and telephony. The complexity of such converged applications requires sophisticated development tools and techniques. While standards such as ... While standards such as SIP and HTTP Servlets enable the application developer to develop and deploy converged applications, , there is a growing need for tools and techniques ... and techniques that can help with functional testing of converged applications. . This paper makes the following contributions - (1) identifies ... challenges including concurrency and coordination in functional testing of converged applications (2) describes our solution to address these challenges and (3) ... its use in functional testing of a real-world converged conferencing application.
Primary CCS:
Web applications
References:
G. W. Bond and H. H. Goguen. ECharts: balancing design and implementation. In M. Hamza, editor, Proceedings of the 6th IASTED International Conference on Software Engineering and Applications (SEA 2002), pages 149--155. ACTA Press, 2002. Available from: http://echarts.org.
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. RTP: A Transport Protocol for Real-time Applications. RFC 1889, Jan. 1996.
T. M. Smith and G. W. Bond. ECharts for SIP servlets: a state-machine programming environment for VoIP applications. In IPTComm '07: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, pages 89--98, New York, NY, USA, 2007. ACM.
Venkita Subramonian, Eric Cheung, and Gerald Karam. Automated Testing of a Converged Conferencing Application. In Proceedings of the 31st International Conference on Software Engineering (ICSE), Fourth International Workshop on the Automation of Software Test (AST), 2009.
Full Text:
... andtechniques. While standards such as SIP and HTTP Servletsenable the application developer to develop and deployconverged applications, , there is a growing need for tools andtechniques that ... key challenges including concurrency andcoordination in functional testing of converged applications( (2) describes our solution to address these challenges and(3) describes ... in functional testing of a real-worldconverged conferencing application.KeywordsTesting, Telecommunications, VoIP applications, , Convergedapplications1. INTRODUCTIONConverged applications are applications whose input (out-put) events originate from (or are sent to) ... protocols - e.g., SIP [17], HTTP [16],RTP [18], email. These applications typically allow theend-user to interact with the application using multipleuser interfaces - e.g., web browser, telephone. One popularexample ... - e.g., web browser, telephone. One popularexample of a converged application is the click-to-call featurethat we often see in online stores. ... service representative and the customer, possiblythrough SIP. Similarly, a conferencing application could beresponsible for displaying the list of current participantsdialed-in to ... USA. Copyright 2009ACM.SIP session initiates web server logic in the application thatultimately updates a web browser.Creating and running converged applications is a non-trivial task. Typically such applications require non-trivialand often complex coordination among multiple protocolsessions. There are ... and mechanisms to ease the task of developingand running converged applications. . For example, the SIPServlet standard [11, 12] defines the ... and shareinformation among multiple protocol sessions. Currently,there are several converged application servers with multipleprotocol containers that are capable of hosting convergedapplications ... capable of hosting convergedapplications - e.g., SailFin, Oracle Communications Con-verged Application Server, IBM Websphere. These serverstake care of handling multiple protocols ... a singleapplication server instance. While such standards and toolsenable the application developer to develop and deploycomplex applications, , there is a growing need for toolsand techniques that ... The focus of this paper is on functional testingof converged applications involving web browser and IPtelephony interfaces.The rest of this paper ... thesechallenges. This solution was applied to automate functionaltesting for the application in the motivating example andthis is described in Section 5. ... motivate the need for an automated converged testingplatform, a real-world application and one of its functionaltest scenarios is described here. The ... has been deployed internally in our companysince 2007. This conferencing application
EndpointActivity1 Host Browser Login into the conferencing application web portal2 Host Browser Create a conference bridge through the ... minutes on a daily basis. The conferencingapplication is a converged application and offers a webportal interface for its users apart from ... webportal interface for its users apart from the telephonyinterface. The application offers a number of features forthe conference users, some of ... conference are generated and displayedon the conference web page; the application alsoprovides features to distribute the conference web pageURL and PIN ... participants can upload documents and makethem available to othersThe conferencing application was developed in-house. Theweb components in the application run on standard JavaServlet and JavaServer Pages application servers and theSIP components run on standard SIP Servlet applicationservers. ... test scenario that is used in manual testing ofthe conferencing application. . It also constitutes a ?sanity?test since it provides end-to-end ... it provides end-to-end testing of the most essentialbehavior of the application, , as experienced by an end user.To perform this test ...
... atest tool that allows us to automate functional testing ofconverged applications. . Automation of functional tests aidsin the reduction of regression ... be required tosupport asynchronous content-retrieval techniques such asAJAX4. The conferencing application uses both JavaScriptand AJAX. For example, after a host or ...
... among3JavaScript is a scripting language and is widely used inweb applications. . JavaScript scripts can be embedded aspart of an HTML ... many tools, both free and commercial products,available for testing web-based applications [29, 10]. Wefound HtmlUnit to satisfy the web testing capabilities ... on the appropriatelink in the conference web pageTable 2: Conferencing application- -specific webtesting primitivesa specific type of meeting, called ad-hoc meeting, ... primitivesa specific type of meeting, called ad-hoc meeting, on theconferencing application home page. It then clicks on thatlink to create the ... a sample) for web testing that are specific to theconferencing application. . These primitives can be reusedacross test cases within the ... These primitives can be reusedacross test cases within the conferencing application, , andimproves test case readability. These primitives hide detailsof searching ...
... cumbersome (not impossible) to use for functional testingof a converged application. . In fact, originally we had partlyautomated the SIP part ... originally we had partlyautomated the SIP part of the conferencing application testscenario using SIPp. Tests in SIPp are written in XML ... our functional test challenges, we developed theKitCAT (Kit for Converged Application Testing) frame-work, which is a Java-based library and released opensource ...
... from the test case. A simple KitCAT test for aB2BUA application with a caller and callee can be easilywritten (KitCAT primitives ...
... a race condition. Let us imagine a scenario in theconferencing application where the meeting is ended fromSUTWeb PortalVoIP Feature ServerMedia ServerJava ... 3 shows the test environment architecture in KitCATto test converged applications. . A test case creates TAs whichare then used to ...
... SIP sideassertThat(hostVoIP, is (disconnected()));assertThat(partVoIP, is (disconnected()));Figure 4: Excerpt from conferencing application testcaseof test activities within a single test case, multiple testcases ... usinga JUnit plugin. This is very useful for functional testingduring application development.5. AUTOMATEDTEST SOLUTIONFORCON-FERENCING APPLICATIONThe combination of KitCAT and HtmlUnit provided ... uswith a converged test tool for functional testing of theconferencing application. . Figure 4 shows an extract fromthe actual test case ... automated test solution for converged ap-plications such as the conferencing application. . Automatedsanity tests are run frequently (every 5 minutes 24 7) ... tests are run frequently (every 5 minutes 24 7) forour conferencing application. ... . These functional tests are rundirectly against each production SIP application server sothat faults on a specific server can be detected ... used this tool combination for regression and loadtesting the conferencing application before major releases ofthe application software.Apart from the conferencing application,
... thathave used this solution. These test cases are used inregression-testing applications as part of multiple internalprojects. This converged testing toolset has ... ?!2&???????????1??! ??????????1??!???,??r'???????????????r'??????????????????????????????????????????????????????????????????????????,??3????????????4??3????????????????????????,??3??????????????????4??3?????????????????????????,?????35??????????????????????????????????????,??3????????????4??r'?????????????????,??3??????????????????4??r''??'??????????????????????????,??,?????????????????3????????????????????????????????????????????????????????2?3?????????,???????????6???????????????????,???!Figure 5: Approximate sequence of events in the conferencing application test case???????? ????t???? ???t???? ????r??? ???r???????????????????????????????????????????????????? ?t! ??????t! ????????????"?????#??????????????t! t! ... a wide variety of platforms; support tools for Java-baseddevelopment are applicable to test development also; testcan include other protocols/activities (e.g., database ... search capabilities within an HTML document, itis useful to have application- -specific primitives that hidesdetails about how a particular functional testing ...
... primitives are: (a) whilethese primitives may not be reusable across applications, ,they can be reusable across different test cases for the ... utility of higher-level wrapper primitives is best decided on an application- -by-application basis.Testing-oriented hints in web pages aid in functionaltesting of applications. . Relying on web page content forour testing has two ... since it would require understandingthe structure of the content within application web pages.For example, in our conferencing application tests, we useXPath [30] search expressions to determine the existence ... only if one has control over thesource code for the application. . We plan to explore thistopic further as part of ... ? e.g., performance testing, loadtesting, protocol testing ? on SIP applications. . However, itis cumbersome to do functional testing of SIP ... test. On the other hand, SipUnit hassupport for testing Presence applications which KitCATdoes not currently support.SIPr is a Ruby-based testing tool ...
... co-exist with their VoIP counterparts to do functionaltesting of converged applications. . Moreover, it is not clearwhether there is any scope ... case studies where TTCN-3 has been used for testing converged applications. . On theother hand, KitCAT uses a popular language (Java) ... KitCAT and HtmlUnit is an open sourcesolution.8. CONCLUSIONS AND FUTUREWORKConverged applications are gaining increasing significance inthe context of convergence of web ... convergedapplications. We presented a solution towards automatedfunctional testing of converged applications involving weband SIP events. We presented benefits and limitations ofour ... our successful experience in the contextof a real-world converged conferencing application. . Lessonslearnt from our experience may be applicable to the broadercommunity involved in converged application development,testing and deployment.The following are interesting areas for future work ... pursue. First, automatically generating tests basedon analysis of a high-level application specification will be avaluable aid in service creation and testing. ... execution paths of theSUT. Based on analysis of a SIP application created usinghigh-level service-creation languages such as StratoSIP [14],it may be ... to work on supporting test primitives forPresence and instant messaging applications. . Third, weplan to explore high-level test specification capabilities, asopposed ... editor,Proceedings of the 6th IASTED InternationalConference on Software Engineering and Applications( (SEA 2002), pages 149?155. ACTA Press, 2002.Available from: http://echarts.org.[7] Canoo ... Casner, R. Frederick, andV. Jacobson. RTP: A Transport Protocol forReal-time Applications. . RFC 1889, Jan. 1996.[19] H. Schulzrinne and T. Taylor. ...
... W. Bond. ECharts for SIPservlets: a state-machine programming environmentfor VoIP applications. . In IPTComm ?07: Proceedingsof the 1st international conference on ... IPTComm ?07: Proceedingsof the 1st international conference on Principles,systems and applications of IP telecommunications,pages 89?98, New York, NY, USA, 2007. ACM.[26] ... Subramonian, Eric Cheung, and GeraldKaram. Automated Testing of a ConvergedConferencing Application. . In Proceedings of the 31stInternational Conference on Software Engineering(ICSE), ...
11
September 2014
DocEng '14: Proceedings of the 2014 ACM symposium on Document engineering
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 6, Downloads (12 Months): 15, Downloads (Overall): 92
Full text available:
PDF
Creating web applications for the multiscreen environment is still a challenge. One approach is to transform existing single-screen applications but this has not been done yet automatically or generically. This paper proposes a refactoring system. It consists of a generic and extensible mapping phase that automatically analyzes the application content ...
Keywords:
application distribution, authoring, multiscreen, web application
Title:
The virtual splitter: refactoring web applications for themultiscreen environment
CCS:
Organizing principles for web applications
Keywords:
application distribution
web application
Abstract:
<p>Creating web applications for the multiscreen environment is still a challenge. One approach ... still a challenge. One approach is to transform existing single-screen applications but this has not been done yet automatically or generically. ... a generic and extensible mapping phase that automatically analyzes the application content based on a semantic or a visual criterion determined ... it for the splitting process. The system then splits the application and as a result delivers two instrumented applications ready for distribution across devices. During runtime, the system uses ... a mirroring phase to maintain the functionality of the distributed application and to support a dynamic splitting process. Developed as a ... a Chrome extension, our approach is validated on several web applications, , including a YouTube page and a video application
Primary CCS:
Organizing principles for web applications
References:
L. Bassbouss, M. Tritschler, S. Steglich, K. Tanaka, and Y. Miyazaki. Towards a multi-screen application model for the web. In IEEE 37th Annual Computer Software and Applications Conference Workshops, pages 528--533, Japan, July 2013.
B. Cheng. Virtual browser for enabling multi-device web applications. In Proceedings of the Workshop on Multi-device App Middleware, Montreal, Quebec, December 2012.
Full Text:
The Virtual Splitter: Refactoring Web Applications for theMultiscreen EnvironmentMira Sarkis, Cyril Concolato, Jean-Claude DufourdTelecom ParisTech; Institut ... Jean-Claude DufourdTelecom ParisTech; Institut Mines-Telecom; CNRS LTCI{sarkis, concolato, dufourd}@telecom-paristech.frABSTRACTCreating web applications for the multiscreen environmentis still a challenge. One approach is ... environmentis still a challenge. One approach is to transform existingsingle-screen applications but this has not been done yet au-tomatically or generically. ... of a generic and extensible mappingphase that automatically analyzes the application contentbased on a semantic or a visual criterion determined by ... prepares it for the splitting process.The system then splits the application and as a result de-livers two instrumented applications ready for distributionacross devices. During runtime, the system uses a ... as a Chrome extension, our approach is validatedon several web applications, , including a YouTube page anda video application from Mozilla.Categories and Subject DescriptorsC.2.4 [Distributed Systems]: Distributed Applications; ;D.2.11 [Software Engineering]: [Software Architecture]KeywordsApplication Distribution; Authoring; Multiscreen; Web Ap-plication1. ... Insuch a cooperative environment, a ?Multi-Screen Applica-tion? (MSA) is an application distributed across multipleconnected devices, each having a screen, and designed ... of a PC or a TV to display media elements.Multi-screen applications impose multiple challenges tothe application developers. First, they have to design anapplication that leverages the ... diversity of devices. Then, they have to deter-mine how the application content will be distributed acrossdevices based on their specific capabilities, ... of deploying a ubiquitous applica-tion. In this paper, the term application refers to a webapplication. Many applications were created before the de-velopment of the multi-screen concept. Many ... one principalobjective: To propose a new approach that reuses existingsingle-screen applications and refactors them for the multi-screen environment. In contrast to ... to existing works, our ap-proach is based on mapping the application content ontoavailable devices by automatically analyzing the content fol-lowing the ... or the user choices, on splitting the ap-plication into two sub-applications and synchronizing themwhile maintaining the overall application functionality andsupporting a dynamic splitting process. The ability for theuser ... ARTIn prior works, a ?WebSplitter? [5] was proposed to splitXML-based applications, , based on a metadata file. This fileis unique for ... based on a metadata file. This fileis unique for each application
... eachuser device. The splitter requires a middleware proxy thatsplits the application content into partial views and a client-side component that receives ... Virtual Splitter Architectureual mapping for each XML element of the application. . Inhis research, Cheng [3] proposed a virtual browser capable ... research, Cheng [3] proposed a virtual browser capable ofseparating the application logic from its rendering. The logicis kept within a virtual ... de-noted in a hint file that is specific to each application andmanually created by the developer. Cross-device operationsare executed in a ... ultimatelyon the browser. Bassbouss et al.[2] outlined how to enabletraditional applications to become multi-screen-ready. Theapplication is developed as a single-screen application andrequires a multi-screen enabled browser. Based on metadatainformation provided manually ... The common part for the three previous works isthat each application is analyzed and mapped separatelyand manually by the author (via ... generic analysis method that can beapplied to a set of applications. . On the contrary, we pro-pose an extensible system that ... pro-pose an extensible system that is capable of automaticallyanalyzing the application and mapping its elements, thussimplifying the author?s task and involving ... the author?s task and involving the end user inmapping her application. . The author only has to determinethe analysis criterion.3. THE ... has to determinethe analysis criterion.3. THE VIRTUAL SPLITTER3.1 OverviewA web application consists mainly of HTML, CSS andJavaScript (JS) resources, that are ... the CSS via selectors, etc. Insuch a context, splitting an application will break some linksand cause a failure in the application look and functionality.In addition, an application presents two dynamic aspectsthat make the splitting approach more complicated. ... the splitting approach more complicated. Onone side, splitting a web application requires support forits dynamism since elements are continuously modified, cre-ated, ... paper, we take care of the links and dynamicityof the application by focusing on splitting only the HTMLdocument, maintaining links and ... in our system. Itspurpose is to determine which of the application elementsmap to the devices involved in the multi-screen experience.In any ... 1, the mappingphase takes as input a query from the application author,when the application is pre-processed o?ine; or from theuser, when the whole process ... or from theuser, when the whole process of splitting the application isdone at run-time. In our approach, we have envisaged sev-eral ...
... the author or the user. In the context of multi-screen applications, , we analyzed the HTML5 elements de-fined in the standard ... roles and how theycould be classified for the purpose of application splitting.We identified four relevant classes: interactive elements(i.e., a, area, button, ... lists of elements as follows. First, for each element ofthe application, , the algorithm compares it to the tag namespresent in ... criterion. It is fully automatic but this time based onthe application visual rendering. It is selected during run-time by the end-user ... 1, the second phase is the annota-tion. It prepares the application for the splitting phase andtakes as input the lists of ... will be present on both de-vices. As a result, the application is totally annotated: eachelement contains metadata information, in a ?data-device?attribute, ... metadata information, in a ?data-device?attribute, reflecting its target device(s).3.4 Splitting Application ContentAfter the annotation phase, during run-time, the splittingphase relies on ... splittingphase relies on the element metadata information to formtwo separated applications: : a master and a slave applicationas Figure 1 shows. ... and a slave applicationas Figure 1 shows. From the original application, , elementsannotated with ?device1? or ?dev1&dev2? values are kept visi-ble ... value are hidden on the primary device. Thisforms the master application. . These hidden elements servesas a shortcut whenever the application main logic requiresreading or modifying elements of the remote application onthe secondary device, thus the term ?virtual splitter?. Ele-ments annotated ... annotated with ?device2? and ?dev1&dev2? values areextracted from the original application and imported to thenew slave application running on the secondary device. Onthe master application, , in addition to the retained originalapplication logic, JS code ... added in an instrumentationphase and aims at making the master application capable ofworking synchronously with its slave (see Section 3.5). Thiscode ... with its slave (see Section 3.5). Thiscode also supports the application dynamism and ensures adynamic mapping and splitting at run-time. On ...
application capable ofcollecting user interactions, redirecting them to the master,receiving and ... master,receiving and integrating changes made to its DOM tree.3.5 Mirroring Application ContentsThe virtual splitting phase described in Section 3.4 du-plicates some ... role of the mirroring phase is to ensure thatthe slave application has a DOM tree that is an accuratemirror of the ... mirroredto that device through change messages. Upon receiving amessage, the application running on the ?secondary device?updates its DOM tree and integrates ... as a GoogleChrome extension, first to enable on-the-fly instrumentationof the application without having to change the applicationitself, and second for the ... supporting dynamism, we use the Monkey Patching1see http://code.google.com/p/mutation-summary2see http://www.w3.org/TR/domcore141(a) Main Application (b) Master Application (c) Slave ApplicationFigure 2: Splitting The Semantic Video Application Based On The Screen-Region Criteriontechnique [7], to extend in JS ... library, and to replace an event handler triggered onthe slave application to a call to the master application. .4.2 Results and DiscussionWe tested our system on different applications from simplestatic pages to dynamic applications, , among them: a seman-tic video application3, relying on the ... video. We first used the region-based mapping. On the video application, , we separated thevideo and Flick?r images from the additional ... multi-screen context, this paper proposed a sys-tem to transform existing applications from single-screen tomulti-screen applications based on author or user choices.The system consists of an ... of an automatic and extensible map-ping phase that analyzes the application
... Tritschler, S. Steglich, K. Tanaka, andY. Miyazaki. Towards a multi-screen application modelfor the web. In IEEE 37th Annual Computer Softwareand Applications Conference Workshops, pages528?533, Japan, July 2013.[3] B. Cheng. Virtual browser ... Japan, July 2013.[3] B. Cheng. Virtual browser for enabling multi-deviceweb applications. . In Proceedings of the Workshop onMulti-device App Middleware, Montreal, ... the artThe Virtual SplitterOverviewHTML Elements MappingSemantic MappingScreen Region MappingAnnotating ElementsSplitting Application ContentMirroring Application
12
November 2011
WHPCF '11: Proceedings of the fourth workshop on High performance computational finance
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 6, Downloads (Overall): 92
Full text available:
PDF
Although grid technologies have been embraced by academia and industry as a viable solution to build integrated systems out of heterogeneous resources, a number of challenges still hamper their widespread acceptance and use. One particular challenge has proven difficult to overcome: the transition of legacy code into grid environments. The ...
Keywords:
data parallel applications, gridification, financial applications
CCS:
Organizing principles for web applications
Keywords:
data parallel applications
financial applications
Abstract:
... legacy code into grid environments. The ability to adapt legacy applications to benefit from grid resources is vital to the success ... This paper describes the efforts conducted to modify legacy financial applications to be executed under a commercial grid middleware named Sparsi ... describe the steps involved in the transition of a legacy application into the grid environment and present two examples of actual ... the grid environment and present two examples of actual financial applications
Title:
Practical experiences on the gridification of financial applications
References:
T. Delaitre, T. Kiss, A. Goyeneche, G. Terstyanszky, S. Winter, and P. Kacsuk. Gemlca: Running legacy code applications as grid services. Journal of Grid Computing, 3(1--2):75--90, 2005.
J. Kommineni and D. Abramson. GriddLeS enhancements and building virtual applications for the Grid with legacy components. In Advances in Grid Computing-EGC 2005 (Lecture Notes in Computer Science, vol. 3470), pages 961--971. Springer Berlin / Heidelberg, 2005.
D. Synapse. Gridserver: High performance application infrastructure for your business critical applications. http://www.datasynapse.com/gridserver, May 2010.
S. Vadhiyar and J. Dongarra. Grads gridification of numeric applications based on globus and mpi. Self adaptability in Grid computing. Concurrency and Computation: Practice and Experience, 17(2--4), 2005. Special Issue on Grid Performance.
Full Text:
... transitionof legacy code into grid environments. The ability to adaptlegacy applications to bene?t from grid resources is vital tothe success of ... re-written. This paper describes the e?orts conductedto modify legacy ?nancial applications to be executed un-der a commercial grid middleware named Sparsi ... the grid environment and present two ex-amples of actual ?nancial applications that have undergonethat process.Categories and Subject DescriptorsC.2.4 [Computer-Communication Networks]: Distrib-uted ... have undergonethat process.Categories and Subject DescriptorsC.2.4 [Computer-Communication Networks]: Distrib-uted Systems?distributed applications; ; D.1.3 [Program-ming Techniques]: Concurrent Programming?parallel pro-gramming ; H.3.4 [Information ... [Information Storage and Retrieval]:Systems and Software?distributed systems,performance eval-uation; J.1 [Computer applications] ]: Administrative dataprocessing?financialGeneral TermsAlgorithms, Design, PerformanceKeywordsgridi?cation, ?nancial applications, , data parallel applica-tionsPermission to make digital or hard copies ... of buildingdependable grid environments.Although it is possible to write grid applications fromscratch, the most commonly found scenario is to adapt legacyapplications ... legacyapplications to take advantage of grid technologies. E?ortsto gridify legacy applications typically fall into the two cat-egories listed below.? Resource integration: ... fall into the two cat-egories listed below.? Resource integration: the application is being inte-grated into a larger grid system and needs ... Access Grid [5] is an example of anenvironment where several applications are integratedusing grid technologies.? Performance enhancement: the application needsto reduce execution time and uses grid technologies toharness idle ... Data Synapse and Sparsi meetthis criteria.This article focuses on legacy applications that fall in thesecond category. Typically, these applications exhibit someform of data parallelism, that is, the same set ... upon di?erent, independent data items. As anexample, consider a back-o?ce application that processesmillions of transactions at the end of each day. ... of computing resourcesand thus reduce its execution time.For this back-o?ce application to run in a grid environ-ment, some changes will have ... Sparsi Maestro o?ers loadbalancing and fault-tolerance services speci?cally tailored todata-parallel applications, , in an e?ort to minimize the mod-39i?cations needed to ... an e?ort to minimize the mod-39i?cations needed to port legacy applications
... of the Sparsi Maestro middleware. Section 4describes how adapted legacy applications are executed bySparsi Maestro. Section 5 describes the steps involved ... Section 5 describes the steps involved inmodifying a data-parallel legacy application to be executedunder Sparsi Maestro. Section 6 presents two examples ... be executedunder Sparsi Maestro. Section 6 presents two examples oflegacy applications that were adapted to execute in a gridenvironment, while section ... computers spread all over theirfacilities, while dedicated data centers contain application, ,database and storage servers with strict performance and se-curity requirements. ...
... at startup. Examples ofservice functionality are monitoring, distributed ?le systemand application management and execution. Since the lasttwo are the most important, ... Distributed File Service bymeans of an API with standard methods.The Application Manager Service is responsible for appli-cation management and execution. This ... This service makes useof the Distributed File Service to make application con?gu-ration and orchestration ?les available to all nodes.The Application Manager Service also provides the loadbalancing logic, taking into consideration ... the grid applicationwill eventually ?nish and produce the correct results.4. APPLICATION EXECUTIONThe interaction between legacy applications and SparsiMaestro is accomplished via ordinary executable ?les. Roughlyspeaking, the ... that contains all the informa-tion regarding the progress of the application execu-tion. This ?le can be used by the legacy applicationto ... the legacy applicationto display the execution progress to the user.? Application parameters: application- -speci?c param-eters that are passed verbatim to the processing codewhen ...
... mechanism guarantees thatSparsi Maestro does not have to deal with application spe-ci?c details. By requiring the application to only inform thenumber of items to be processed, Sparsi ... the same by the grid platform.4.1 Heterogeneous itemsA data parallel application requires that data items beindependent from each other but not ... na-ture of the items, it is the responsibility of the application toprovide their relative weights. The application may do so byspecifying a text ?le with the relative ... calling Sparsi Maestro. Theserelative weights must be estimated by the application usingsome heuristic that consistently produces larger weights tothe items that ... weights tothe items that will take longer to process.5. ADAPTING APPLICATIONS TO GRIDSThis section deals with the modi?cations that have to ... with the modi?cations that have to bemade to a legacy application to be executed in a grid man-aged by Sparsi Maestro.5.1 ... a grid man-aged by Sparsi Maestro.5.1 FeasibilityBefore modifying a legacy application to execute in a gridenvironment, it is advisable to evaluate ... a gridenvironment, it is advisable to evaluate the potential gainsthe application may have. As stated before, Sparsi Mae-stro focuses on data ... have. As stated before, Sparsi Mae-stro focuses on data parallel applications, , so this is the ?rstcondition that the legacy application should meet. Otherconditions relate to the parallelizable portion of the ... the parallelizable portion of the codeand the scalability of the application. .5.1.1 Parallelizable portion of the codeAs stated by Amdahl?s law ... by Amdahl?s law in [1], the speedup obtained byexecuting an application in a parallel environment is limitedby the serial portion of ... a parallel environment is limitedby the serial portion of said application. . Simply put, if theparallelizable portion of the application is responsible for30% of the overall execution time, then a ... determine the proportion of the serial toparallelizable parts of the application. . This analysis can bemade quickly and with a relatively ... e?ort, since mostusers have already collected relevant data about applicationperformance. Applications whose serial parts exceed 50%of the total execution time are ... important aspect to consider when decidingwhether to modify a legacy application ... to execute in a gridis the inherent scalability of the application. . The paralleliz-able portion of a data parallel application typically followsthe steps listed below.1. Fetch an item.2. Process the ... typically CPU bound. Step 2 is clearly bene?tedby executing the application in a grid environment as eachcomputer will have fewer items ... may su?er from scalability issues.As an example, consider a legacy application that fetchesan item from a database in step 1, processes ... section presents the actual steps involved in modify-ing a legacy application to run in a grid environment man-aged by Sparsi Maestro.5.2.1 ... Sparsi Maestro.5.2.1 Isolating relevant codeThe ?rst step in grid-enabling an application is to isolatethe portion of its code that does the ... its simplest form, Sparsi Maestro will append asu?x to the application arguments of the form [min : max]that de?nes the interval ...
... nature of the items. It is, therefore,the responsibility of the application to translate the argu-ments received to the actual items to ... actual items to be processed. Con-sider, for instance, a database application receiving the ar-guments above. The application will have to translate whatit means ?from item 120 to ... in the participating computers. Since it lacks knowl-edge about the application domain, the only way for SparsiMaestro to know whether an ... since they are usually monolithic and do not interactwith other applications. .425.2.4 Avoiding interaction with the userWhen executing in a grid, ... Avoiding interaction with the userWhen executing in a grid, an application will use non-dedicated computers and run processes in the background.There ... what-ever means necessary to avoid human interaction.5.2.5 Preparing for re-executionAn application may fail or be canceled by the user dur-ing its ... anapplication to implement mechanisms to avoid re-processingin those scenarios. Some applications may even be forced todeal with this issue, as is ... forced todeal with this issue, as is the case for application whoseprocessing algorithms are not idempotent.Legacy applications are rarely concerned with re-processing.However, in a grid environment, where ... items may have ahigher cost. To avoid this scenario, an application may haveto include mechanisms to register which items have alreadybeen ... this information during its execu-tion. As an example, a database application may create atemporary table indicating which items have already beenprocessed.5.2.6 ... a call to Sparsi Maestro. As indicatedby Fig. 2, the application will use Sparsi Maestro to startinstances of the processing code ... the parallel exectution progressusually can be obtained by pooling the application data-basefor status information, but this might impose a prohibitiveoverhead. An ... regularly updated to re?ectthe status of the grid execution. The application may parsethis ?le and o?er its information as a feedback ... the user.6. CASE STUDIESThis section presents two of the legacy applications thathave already been adapted to execute in a grid environmentmanaged ... to execute in a grid environmentmanaged by Sparsi Maestro. Both applications exhibit someform of data parallelism. The main di?erence between themis ... The main di?erence between themis where the items are stored: application 1 processes itemsfrom a database, while application 2 processes items from alarge ?le.6.1 Application 1: Risk-complianceThe ?rst application processes tens of thousands itemsstored in several database tables in ... 80% of the overall execution time in thesequential version. The application runs a loop that selectssome items, processes them and stores ... Since the processing part of the loop is relativelycomplex, the application does not stress the database serverwith constant requests. This scenario ... This scenario is depicted in Fig.3(a).Figure 3: A data parallel application that processesitems from a database. (a)Sequential version (b)Gridi?ed versionThe ?rst ...
... and thus avoid re-processing incase of task re-submition. The main application replacedthe code that processed the items by the invocation of ... with the user (i.e. message and dialog boxes). Finally,the main application was modi?ed to read the status ?le andpresent the user ... for grid execution; this usually takes asingle meeting between the application developers and theSparsi team. The next step is to modify ... and theSparsi team. The next step is to modify the application sothat it accepts command-line arguments that specify whichitems should be ... initial tests on a controlled environment to determinehow scalable the application is as the number of executioninstances (or nodes) increases. The ... conducted.An execution under Sparsi Maestro is shown in Fig. 3(b).This application is executed several times each day in di?er-ent production environments. ... time Speedup1 4h17m ?5 1h 4,2811 27m 9,5216 18m 14,286.2 Application 2: Risk indexes for car insur-ance premiumsThe second application calculates risk indexes to deter-mine car insurance premiums. The most ... to deter-mine car insurance premiums. The most time-consumingsegment of this application had items stored on a single,large ?le which consisted of ... which consisted of a sequence of records in binaryformat. The application reads each record, performs a ratherheavy processing, and produces a ... text ?le as a result, asshown in Fig. 4(a).Since the application does not have a complex GUI andits code is relatively ... of the whole ?le. The portionof records processed by each application instance is spec-i?ed as command-line arguments in the form of ... ?le was available locally.Also, the text ?les produced by the application were storedin the ?le server and concatenated into a single ... at an increased cost when comparedFigure 4: A data parallel application that processesitems from a binary ?le. (a)Sequential version (b)Gridi?ed versionto ... weeksAn execution under Sparsi Maestro is shown in Fig. 4(b).This application is currently executed several times a day atthe end of ... ?10 41m 4,1515 30m 5,67Di?erently from the ?rst example, this application has aperformance bottleneck in the ?le server, since ?le serversare ...
... data to a traditional data-base environ-ment should greatly improve the application ... scalability.7. RELATED WORKGrid systems have di?erent approaches when dealing withlegacy applications. . Projects such as GEMLCA [6] andGriddLeS [9], for instance, ... integrating legacy code without modi?cations.Condor [15] also allows unmodi?ed legacy applications toexecute under a workload manager that ?nds and managesavailable CPU ... aimed at high-performance computingusually relies on modi?cations to the legacy application toinclude grid-speci?c code. Such is the case of legacy applica-tions ... it is possible to ?nd studies concerning spe-ci?c kinds of applications, , such as the gridi?cation of aero-dynamic applications [8] and scienti?c computations [17].This paper provided such an analysis ... CONCLUSIONSThis paper described practical experiences obtained inthe modi?cation of ?nancial applications to be executed un-der Sparsi Maestro, a commercial grid platform ... adopted by the research community. Automatic, ef-?cient gridi?cation of legacy applications is still far aheadand should constitute a focal point of ... Goyeneche, G. Terstyanszky,S. Winter, and P. Kacsuk. Gemlca: Running legacycode applications as grid services. Journal of GridComputing, 3(1?2):75?90, 2005.[7] I. Foster. ... /Heidelberg.[9] J. Kommineni and D. Abramson. GriddLeSenhancements and building virtual applications for theGrid with legacy components. In Advances in GridComputing-EGC 2005 ...
... Sons, 2003.[16] S. Vadhiyar and J. Dongarra. Grads gridi?cation ofnumeric applications based on globus and mpi. Selfadaptability in Grid computing. Concurrency ...
13
May 2011
COM.Geo '11: Proceedings of the 2nd International Conference on Computing for Geospatial Research & Applications
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 13, Downloads (12 Months): 88, Downloads (Overall): 507
Full text available:
PDF
GPS-equipped mobile devices such as smart phones and in-car navigation units are collecting enormous amounts spatial and temporal information that traces a moving object's path. The popularity of these devices has led to an exponential increase in the amount of GPS trajectory data generated. The size of this data makes ...
Keywords:
compression, trajectories, GPS, applications
CCS:
Information systems applications
Visualization application domains
Keywords:
applications
Abstract:
... however these methods often lose important information essential to location-based applications such as object's position, time and speed. This paper describes ...
Primary CCS:
Information systems applications
Visualization application domains
References:
S. P. Greaves and M. A. Figliozzi. Commerical vehicle tour data collection using passive gps technology: Issues and potential applications. Transportation Research Record, 2049:158--166, 2008.
Full Text:
... data sets; howeverthese methods often lose important information essential tolocation-based applications such as object?s position, timeand speed. This paper describes the ... Sampling,Douglas-Peucker and Dead Reckoning.Categories and Subject DescriptorsH.2.8 [Information Systems]: Database Applications? ?Spatial databases and GISGeneral TermsAlgorithms and ApplicationsKeywordsGPS, Trajectories, Compression1. INTRODUCTIONA ... devices has led to a growthmarket called Location-based services. These applications, ,often developed for mobile devices, utilize location informa-tion, such as ... other users.Location-based service is an active area of research, encom-passing applications such as supply-chain management, lo-cation detection and tra?c modeling [11, ... as a pre-processing step prior to running computationally expensivealgorithms. Many applications require online processing andtransmission of GPS trajectory data.Finding solutions to ...
... [3] which is often used in cartographic and com-puter graphics applications. . However, this method runs inbatch mode, and therefore cannot ... isan online method that runs in linear time. However, oftentimes, applications require more precise approximations ofthe original trajectory than is achieved ...
... to a curve,thereby reducing storage requirements. Often implementedin computer graphics applications, , the Douglas-Peucker al-gorithm is applicable in a variety of geospatial applications.A common application is in reducing the number of pointsrequired to store state ...
... each algo-rithm, both spatial and temporal accuracy must be mea-sured. Applications using stored GPS data, often requirethe preservation of the spatial ... generaliza-tion and is often used in cartographic and computer graph-ics applications. . However, Douglas-Peucker is a batch algo-rithm. Most applications that require compressing of GPStrajectories cannot be implemented in batch-mode. ...
... speed and direction. Theseanomalies are often important to store for applications, , suchas the detection of erratic driving behavior, route changesand ...
... work include determining the e?ectiveness of com-pression on common spatial applications such as tra?c ?owmodeling, identi?cation of congestion bottlenecks and iden-ti?cation ... Commerical vehicletour data collection using passive gps technology:Issues and potential applications. . TransportationResearch Record, 2049:158?166, 2008.[7] J. Hershberger and J. Snoeyink. ...
14
April 2004
ACM Transactions on Information Systems (TOIS): Volume 22 Issue 2, April 2004
Publisher: ACM
Bibliometrics:
Citation Count: 69
Downloads (6 Weeks): 8, Downloads (12 Months): 91, Downloads (Overall): 5,369
Full text available:
PDF
Digital libraries (DLs) are complex information systems and therefore demand formal foundations lest development efforts diverge and interoperability suffers. In this article, we propose the fundamental abstractions of Streams, Structures, Spaces, Scenarios, and Societies (5S), which allow us to define digital libraries rigorously and usefully. Streams are sequences of arbitrary ...
Keywords:
applications., definitions, foundations, taxonomy
CCS:
Information systems applications
Keywords:
applications.
Abstract:
... collections, and services---required to formalize and elucidate "digital libraries". The applicability, , versatility, and unifying power of the 5S model are ... 5S model are demonstrated through its use in three distinct applications: : building and interpretation of a DL taxonomy, informal and ...
Primary CCS:
Information systems applications
References:
de Oliveira, M. C. F., Turine, M. A. S., and Masiero, P. C. 2001. A statechart-based model for hypermedia applications. ACM Trans. Inf. Syst. 19, 1, 28--52.]]
Flanagan, J. W., Fox, E. A., and Fan, W. 2003. Managing complex information applications: An archaeology digital library. http://feathers.dlib.vt.edu/.]]
Full Text:
... collections, and services?required to formalize and elucidate ?digital libraries?. The applicability, , versatility, and unifyingpower of the 5S model are demonstrated ... 5S model are demonstrated through its use in three distinct applications: : building andinterpretation of a DL taxonomy, informal and formal ... DigitalLibrariesGeneral Terms: TheoryAdditional Key Words and Phrases: foundations, taxonomy, definitions, applications. .1. MOTIVATIONDigital libraries are extremely complex information systems. The proper ...
... DL higher level con-structs and settings. Section 6 illustrates the application of the formal model.Section 7 discusses related work and Section ...
... The type ofthe stream defines its semantics and area of application. . For example, any textrepresentation can be seen as a ... well usinganother of the Ss, a space may well be applicable. . Despite the generality ofthis definition, spaces are extremely important ...
... This approach hasbeen used as a design model for hypermedia applications [Ogawa et al. 1990].Human information needs, and the processes of ...
... today is to be accessible to future generations [Lorie 2001].3. APPLICATIONS OF 5SIn this section, we illustrate the expressiveness and unifying ... 5S asa theory for digital libraries through three different example applications. . Inthe first, we build a taxonomy of DL concepts ... andcharacterize the result in light of the theory. The second application uses 5S asan analytical tool to understand and dissect a ... on 5S for the specification and automatic generation of DL applications. .3.1 Digital Library TaxonomyA taxonomy is a classification system of ...
... that occur among 5S components and DLconcepts in real DL applications; ; and (3) to illustrate the possibility of using 5Sas ...
... like searching and filtering.3.4 Declarative Generation of DLsAs a third application of the 5S framework, we have designed 5SL, a domain-specific, ... domain-specific, declarative language for conceptual modeling and generation of digitallibrary applications [Gonc alves and Fox 2002]. 5SL is an XML serialization of ...
... works as a portal for accessing the collection.In this particular application, , the component pool includes XML parsers, anOAI harvester and ... (Figure 2):(1) Class Managers and Indexing Classes for the NDLTD Application. . This in-cludes class managers to represent the MARIAN semantic ... metadata standard. Class managers define thelogical schema of the DL application, , which in MARIAN corresponds to aset of Java classes ... MARIAN general database schema for the specific structures ofthe DL applications at hand.MARIAN architecture and features as well as a complete ... using these techniques, we have automatically created several digital li-brary applications. . Most developed are those for the NDLTD union archive ...
... Nevertheless, it seems clear that 5S hasintuitive appeal and practical application. . In the next sections, we continue toexplore 5S further ...
... This makes the task of formally defining this kind of application andits components extremely difficult. In this section, we approach this ... that make a digital library, without which, in ourview, a system/application cannot be considered a digital library. Each compo-nent (e.g., collections, ...
... have proposed 5SL fordeclarative specification and generation of digital library applications. . Closelyrelated works, which are not supported by a rigorous ... the OAI and theNDLTD, as well as other digital library applications such as the NSDL [Zia2001] and the ETANA archaeological DL ...
... S., AND MASIERO, P. C. 2001. A statechart-based model forhypermedia applications. . ACM Trans. Inf. Syst. 19, 1, 28?52.DOMTEAM. 2003. Document ... FOX, E. A., AND FAN, W. 2003. Managing complex information applications: : Anarchaeology digital library. http://feathers.dlib.vt.edu/.FOSKETT, D. J. 1980. Thesaurus. In ...
15
August 2015
KDD '15: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 11, Downloads (12 Months): 174, Downloads (Overall): 502
Full text available:
PDF
The analysis of data represented as graphs is common having wide scale applications from social networks to medical imaging. A popular analysis is to cut the graph so that the disjoint subgraphs can represent communities (for social network) or background and foreground cognitive activity (for medical imaging). An emerging setting ...
Keywords:
graph cuts, application, fmri
Title:
Unified and Contrasting Cuts in Multiple Graphs: Application to Medical Imaging Segmentation
CCS:
Information systems applications
Keywords:
application
Abstract:
... of data represented as graphs is common having wide scale applications from social networks to medical imaging. A popular analysis is ...
Primary CCS:
Information systems applications
References:
J. Bailey and G. Dong. Contrast data mining: Methods and applications. IEEE ICDM 2007 Tutorials, 2007.
S. Gilpin, T. Eliassi-Rad, and I. Davidson. Guided learning for role discovery (glrd): framework, algorithms, and applications. In ACM SIGKDD, pages 113--121. ACM, 2013.
K. Ramamohanarao, J. Bailey, and H. Fan. Efficient mining of contrast patterns and their applications to classification. In Intelligent Sensing and Information Processing, 2005. ICISIP 2005. Third International Conference on, pages 39--47. IEEE, 2005.
X. Wang, B. Qian, and I. Davidson. On constrained spectral clustering and its applications. Data Mining and Knowledge Discovery, 28(1):1--30, 2014.
Full Text:
... of data represented as graphs is common hav-ing wide scale applications from social networks to medicalimaging. A popular analysis is to ... without the need forstrong domain knowledge.Categories and Subject DescriptorsH.2.8 [Database Applications] ]: Data mining; E.1 [DataStructures]: Graphs and networksPermission to make ...
... more than two, as is the case in our tar-geted application. . Perhaps the closest work to our own is[31] which ... subgraphs) in a database of graphs [29]. Howeverthese are not applicable to the medical imaging data whichintroduces additional challenges that limit ...
... we chose one whose re-sults are most promising and most applicable to our prob-lem setting. This method was published in Science ... prob-lem setting. This method was published in Science and isdirectly applicable to finding a consensus network/graph.The general idea behind this method ...
... 0.05)Figure 4: Unity within the demented subjectshave already explored this application in earlier work [17,28] but only for a single graph. ... in normal and dementedgroups differ.Although we focus on a particular application in medicalimaging in this paper, we expect our approaches to ...
... 2006.[2] J. Bailey and G. Dong. Contrast data mining:Methods and applications. . IEEE ICDM 2007Tutorials, 2007.[3] I. Davidson, S. Gilpin, O. ... and I. Davidson. Guidedlearning for role discovery (glrd): framework,algorithms, and applications. . In ACM SIGKDD, pages113?121. ACM, 2013.[8] A. Goder and ...
... Bailey, and H. Fan. Efficientmining of contrast patterns and their applications toclassification. In Intelligent Sensing and InformationProcessing, 2005. ICISIP 2005. Third ... B. Qian, and I. Davidson. On constrainedspectral clustering and its applications. . Data Miningand Knowledge Discovery, 28(1):1?30, 2014.[29] X. Yan and ...
16
May 2011
WIMS '11: Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 9, Downloads (Overall): 480
Full text available:
PDF
Online Social Networks (OSNs) provide new ways for people to communicate with one another and to share content. OSNs have become quite popular among the general population but their rapid growth has raised concerns about privacy and security. Many predict that the OSNs of today provide a glimpse of the ...
Keywords:
application, profile, Euclidean distance
CCS:
Information systems applications
Keywords:
application
Abstract:
... sharing of private information, malicious behavior of OSN services and applications, , and so on. This paper addresses several important security ... in metric space, and for determining how well an OSN application conforms to user privacy settings. We report on a case ... the proposed method is applied to Facebook to demonstrate the applicability of the method as well as to motivate its theoretical ...
Primary CCS:
Information systems applications
References:
A. Besmer and H. R. Lipford. Users' (mis)conceptions of social applications. In Proceedings of Graphics Interface 2010, GI '10, pages 63--70. Canadian Information Processing Society, 2010.
A. Besmer, H. R. Lipford, M. Shehab, and G. Cheek. Social applications: exploring a more secure framework. In Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, pages 2:1--2:10, New York, NY, USA, 2009. ACM.
G. Crescenzo and R. J. Lipton. Social network privacy via evolving access control. In Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications, WASA '09, pages 551--560, Berlin, Heidelberg, 2009. Springer-Verlag.
A. Makridakis, E. Athanasopoulos, S. Antonatos, D. Antoniades, S. Ioannidis, and E. P. Markatos. Designing malicious applications in social networks. In In IEEE Network Special Issue on Online Social Networks, 2010.
L. H. Vu, K. Aberer, S. Buchegger, and A. Datta. Enabling secure secret sharing in distributed online social networks. In Proceedings of the 2009 Annual Computer Security Applications Conference ACSAC '09, pages 419--428. IEEE Computer Society, 2009.
J. Whittaker. Why secure applications are difficult to write. IEEE Security & Privacy, 1(2):81--83, Mars 2003.
Full Text:
... unautho-rized sharing of private information, malicious behavior ofOSN services and applications, , and so on. This paper ad-dresses several important security ... profiles in metric space, and for determining how wellan OSN application conforms to user privacy settings. Wereport on a case study ... the proposed method is ap-plied to Facebook to demonstrate the applicability of themethod as well as to motivate its theoretical foundation.Categories ... to motivate its theoretical foundation.Categories and Subject DescriptorsH.4 [Information Systems Applications] ]: Miscellaneous;I.2.1 [Artificial Intelligence]: Applications ... and ExpertSystems?online social networks, security settings, automaticconfigurationGeneral TermsAlgorithms, Measurements, Security.KeywordsProfile, application, , Euclidean distance.Permission to make digital or hard copies of ... data aggregators, users who are notdefined as friends, and external applications. . The variety ofexternal, or third party, applications
... user, the user must decide andgrant access to the specific application. . The application canthen use the private information, i.e., the owner of the ... totalcontrol of the development process. To access more infor-mation, the applications may ask for subsequent permissiongrants for each type of information. ... settingsmatch the permission requests for private data from an ex-ternal application. . It is also the case that the complexity ofthe ... provide a new context, orperspective, by which user profiles and applications can beanalyzed. The idea is to provide a means for ... provide a means for mapping theusers? privacy settings to the application requests that arecarried out to gain access to private user ... the distance between acertain user profile and a number of applications of interest.In addition, we define personal spheres, which are essentiallybounding ... enclose a certain user profile and otheruser profiles and external applications that are based on sim-ilar notions of privacy. Our perspective ... we apply the method to measuredistances between user profiles and applications in one of themajor OSNs. This study specifically targets the ... and policy settings ofusers to the permission requests of OSN applications. .1.2 OutlineSection 2 sheds some more light on the background ... a personal profile, and (4) it iseasy to develop new applications for users to accept and bespread among the trusted friends. ...
... feature in Facebook is the ability to cre-ate your own applications. . Developers with a novel idea andsome basic programming skills ... idea andsome basic programming skills can quite easily create Face-book applications. . Thus, today there exist several hundredthousands of applications [1]. The scope of the applicationscan be related to entertainment, ... pri-vate information. The same privacy setting is then used forall applications. . Therefore, it is recommended to follow thesecurity principle of ... of the user. This information canthen be exploited by systems, applications or other usersin the OSN. In Section 3 we are ... aparty with access to the infrastructure or a malicious third-party application provider. The adversaries can primarilybe seen as a legitimate user ...
... developers to integrate with the OSN users.This could be through applications on Facebook.com or ex-ternal websites and devices. Facebook applications have twocore components: a homepage and a profile box. Developerscan ... the use of peer-to-peer technology.In [15], techniques for building malicious applications insocial networks is presented as well as three proof-of-conceptexamples. The ... name of an existing famous appli-cation and then create an application with a similar namebut with different motives. Through this, the ... web server.Notice that, it is only the name of the application that hasto be similar not the software itself.The work presented ... [9] the privacy risks are addressed associated with so-cial networking Application Programming Interfaces (APIs)by presenting a privacy-by-proxy design. The authors havealso ... an interesting study of 150 popular Facebookapplications and nearly all applications could maintain theirfunctionality using limited profile information. The resultsfurther show ... using limited profile information. The resultsfurther show that, since the application is given full accessto private data, more than 90 % ... full accessto private data, more than 90 % of the applications are givenmore privileges then they require.In a study conducted by ...
... Lipford examine in users? motivations, inten-tions, and concerns about using applications, , as well as userperceptions of data sharing [4]. The ... this studyindicate that the social interaction that stimulates the useof applications also leads to a lack of awareness about datasharing, that ... is, the risks and possible implications. Thestudy concludes that malicious application that harvest pro-file information represent a serious threat to user ... developed an infrastructure, which is re-ferred to as FAITH (Facebook Applications: : IdentificationsTransformation & Hypervisor). The objective of FAITH isto provide ... and flexible services to users.FAITH itself is technically a Facebook application, , but itacts as a proxy between Facebook users and ... between Facebook users and the Facebookinfrastructure. It can hook other applications and provideservices to these applications. . FAITH provides two majorfunctions related to the presented study:1. ... FAITH provides two majorfunctions related to the presented study:1. Each application hooked under FAITH is monitoredby FAITH. All Facebook APIs that ... can customize the API related to their personalinformation that an application can call. If a user feels1http://dsl.cs.ucdavis.edu/an API is not necessary ... If a user feels1http://dsl.cs.ucdavis.edu/an API is not necessary for an application, , he/she canblock the API so that the application can not accessthe user?s relevant information. API customizationprevents applications from maliciously impersonatingthe user.In conclusion and to the best of ... work that focus directly on themethodology of comparing (user and application) ) profiles fordetermining or visualizing how well the profiles conform ... comparing user profiles and fordetermining whether or not an OSN application conforms tothe privacy settings of a particular user. First, we ... sphere.To summarize, we present methods for measuring profile-to-profile distance or profile-to-application distance. Theformer can be used, for example, to determine which ... to determine whether or not the permissionrequirements of an OSN application conform to the privacysettings of one?s user profile.3.1 Representing Profiles ... associated with: the list ofOSN friends, the list of blocked applications and users, orany other type of information or personalized setting. ...
... the user a certain functionality but more often thannot, the application provides this functionality with somestrings attached. A common argument is ... the service provided and to increase the socialnetworking experience, the application may ask for certainpermissions that can, for example, be associated ... which private profile data is shared or whether ornot the application can act on the user?s behalf for certainactions.UserFigure 1: A ... toconsider the very same privacy and security aspects eachtime an application is to be used for the first time (andsometimes even ... OSNs reviewed, there is not a clear one-to-one mapping between application permission queries anduser profile security and privacy settings, which means ... to address this issue, we therefore let Q repre-sent the application permission query space. Analogouslyto user profiles, an application permission query can be de-fined as a tuple, q ? ... . . , fm, whereeach element, fl, represent a required application permis-sion, l. Again, for our purposes, it is sufficient that ...
usually sufficient since a required application permissioncan be represented by a value of 1 whereas 0 ... used to measure the distance between a user profileand an application or to find out whether an application iswithin the personal sphere of a user: an application per-mission query, qk ? Q is first mapped to P ... focus on Facebook, as it is currently the mostwidely used application platform. Facebook reports having500 million active users (users who have ... time an ap-plication is installed most users give all the applications fullaccess to their accounts. Therefore, an adversary can collectsensitive information ... store it on an external web servercollaborating with the malicious application. .4.1 Facebook SharingThe following section describes Facebook?s privacy policyand practices3. ... describes Facebook?s privacy policyand practices3. When a user runs an application, , personalinformation (including profile information) is available tothe application developers. Facebook requires the develop-ers to agree to terms that ... they only obtain authorized information. When a userconnects with an application or website it will have access togeneral information. The term ... of a user?s computer or accessdevice and age available to applications and websites. If theapplication wants to access any other data, ... the users to review the policies of2http://www.facebook.com/press/info.php?factsheet3Facebook Policy, http://www.facebook.com/policy.phpthird party applications to make sure that the users are com-fortable with the ... knowledge of how to ad-just the settings or if the application seems to be trustedbecause other friends are using it. Therefore, ... friends are using it. Therefore, if a friendconnects with an application, , the application will then beable to access the name, profile picture, gender, ... has already connectedwith (or has a separate account with) that application, , itmay also be able to connect its friends on ...
... from other Facebook users to supplement a profile.Certain downloadable software applications and appletsthat Facebook offers, such as browser toolbars and photouploaders, ... and use of the information isthe obvious purpose of the application. .4.2 User Privacy SettingsFacebook provides user-customizable settings that governwhich type ... Facebook user can control which information is avail-able to Facebook applications, , games and websites whenthey are used by friends of ... has chosen to set to Everyone) is alwaysavailable to friends? applications unless the user chooses toturn off platform applications and websites.Table 2: Settings for which information is accessiblethrough a ... Activities, interests,things I likeMy photos Places I check in to4.4 Application PermissionsBy default, a Facebook application can access all publicuser profile data, including: name, profile picture, ... name, profile picture, gender,and the list of friends. If the application needs to accessother profile data or if the application needs to act on auser?s behalf on Facebook, e.g., to ...
... three groups: Publishing, Data,and Page permissions.Permission Descriptioncreate event Enables your application to create and modify events on the user?s behalfrsvp event ... and modify events on the user?s behalfrsvp event Enables your application to RSVP to events on the user?s behalfuser about me ... measurement of the distance betweena certain user profile and different applications. . As a proofof concept, we are going to measure ...
... sites publish trend analyses of OSNapplications in general and Facebook applications in partic-ular. One such site maintains a list of the ... Table 5 along with the extended permis-sions they require. All applications require permission to begranted for obtaining basic information about the ... in anappropriate way, given the context and possible restrictionsand requirements.5.2.1 Application ProfilesFor the purpose of this case study, we argue that ... ? represent a particular choice of sharingsettings, we define the application user profile as a vector,p? = {?a, ?b, ?c, ?d, ... study, wemake the assumption that, if a user grants an application anextended permission (e.g., user videos), the user has decidedthat the ... the ap-plication user profile element in question. For example, ifan application requires user videos, we let ?a = 3. Further-more, we ... corresponding elements in the user profile we wantto compare the application with. Thus, if we have Face-book?s Recommended user profile, a ... {?, 3, ?, ?, ?, ?, ?, ?, 3},the subsequent application user profile would be defined as:ba = {3, 3, 3, ... = {3, 3, 3, 2, 2, 2, 1, 1, 3}.5.2.2 Application Cluster IdentificationWe define an application cluster to be a point in (Eu-clidean) space at which ... a point in (Eu-clidean) space at which more than one application user pro-file reside. By observing the applications and their associ-ated permission requests presented in Table 5, it ... presented in Table 5, it is evidentthat three clusters of applications can be identified. Clus-ter 1 contains the applications: : Farmville, Phrases, TexasHoldEm Poker, Frontierville, Quiz Planet, and MillionaireCity. ... Trea-sure Island, and Pet Society. Finally, Cluster 3 containsthe two applications: : Causes and Cafe World. Apparently,the Are You Interested? application is situated on its ownunique point in space, that is, ... measure the distance between some user profiles ofchoice and the applications. . Which sphere radius is reason-able in practice is of ...
... graphically inFigure 3. Quite intuitively, the distances to more demand-ing applications (in terms of permission requests) are longerthan the distances to ... of permission requests) are longerthan the distances to less demanding applications. . In a real-world setting, the personal sphere radius could ... software technique: the user could begiven the opportunity to classify applications residing in-side their personal sphere as privacy-intrusive or vice versa.After ... profile, the Friends Only pro-file, and the same set of applications. . The Friends Only userprofile then, is located at acceptable ... too long. What this means is that the AreYou Interested? application and Cluster 3 reside outside thepersonal sphere of the Friends ... user profile and different appli-cations can be of use to application vendors: as people be-come more aware of the importance of ... andsecurity, vendors may tune the functionality and permissionrequirements of their applications, , using the results fromsuch analyses, to cater to an ... analyses, to cater to an security-aware audience. Ifseveral vendors provide applications with similar function-ality but which reside on quite different distances ... Two-dimensional visualizations, obtainedusing multi-dimensional scaling featuring compar-isons between the surveyed applications and theRecommended and Friends Only user profiles, re-spectively. A personal ... user profile vector. Optionally, or rather, dependingon the context, the application- -to-user-profile mapping func-tion, g, can be re-defined more elaborately. No ... answer questionsabout the extent of which users tend to use applications thatreside outside of their personal sphere. Of course, and evenmore ...
techniques can be em-ployed to warn users about applications that do not conformto their view of privacy.Although this paper ... user profile andprivacy settings analysis, namely by comparing user profilesand applications in the Euclidean space, and we have alsopresented a method ... distance between the profiles, and fordetermining how well an OSN application conforms to theprivacy settings defined in a user profile. The ... as the personal sphere) around the user profile andthen transforming application ... permission requests to userprofile space in order to determine which applications resideoutside the personal sphere of a user.We report on a ... method are applied to Facebook in order to demon-strate the applicability of our approach as well as to moti-vate the theoretical ... in the Facebook context,and that they can provide users (and application vendors)with a detailed, yet comprehensive, description of which ap-plications may ... elevating personal privacy and security by automaticallywarning users about privacy-intrusive applications. . How-ever, the method proposed in this paper could also ... reasons, for example, to assessuser profile similarity in match making applications. .6.2 Pointers to Future WorkFor future work, we are going ... to collect (anonymized) user profile settings as well asinformation about application usage statistics, from a largesample of Facebook users. These data ... the ratio of usersthat may be in jeopardy of using applications that are in-trusive to their privacy and integrity. For this ... 2009.[4] A. Besmer and H. R. Lipford. Users? (mis)conceptionsof social applications. . In Proceedings of GraphicsInterface 2010, GI ?10, pages 63?70. ...
... A. Besmer, H. R. Lipford, M. Shehab, and G. Cheek.Social applications: : exploring a more secureframework. In Proceedings of the 5th ... In Proceedings of the 4thInternational Conference on Wireless Algorithms,Systems, and Applications, , WASA ?09, pages 551?560,Berlin, Heidelberg, 2009. Springer-Verlag.[8] L. A. ... S. Antonatos,D. Antoniades, S. Ioannidis, and E. P. Markatos.Designing malicious applications in social networks. InIn IEEE Network Special Issue on Online ... distributed onlinesocial networks. In Proceedings of the 2009 AnnualComputer Security Applications Conference ACSAC?09, pages 419?428. IEEE Computer Society, 2009.[18] J. Whittaker. ... pages 419?428. IEEE Computer Society, 2009.[18] J. Whittaker. Why secure applications are difficult towrite. IEEE Security & Privacy, 1(2):81?83, Mars2003.[19] C. ...
17
December 2013
MoMM '13: Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 8, Downloads (Overall): 18
Full text available:
PDF
Recently, various kinds of automatic translator services have become available. Most of them are provided as a client-server model. We developed a phone call translator service, which enables people speaking different languages to communicate with each other over the phone. In this paper, we present the system architecture of the ...
Keywords:
application, translation, phone
CCS:
Web applications
Keywords:
application
Primary CCS:
Web applications
Sponsor:
International Organization of Information Integration and Web-based Applications and Services
Full Text:
... the system works. Categories and Subject Descriptors H.4.3 [INFORMATION SYSTEMS APPLICATION] ]: Communications Applications General Terms Experimentation. Keywords translation?phone?application. . 1. INTRODUCTION In recent years, an automatic translation function ... an automatic translation function has been provided as various software applications and web services. Most of them are offered in one-to-one ... into which the text is to be translated. Some software applications are also available to provide similar services, in which the ... the convenience of the translator service, we provide a translation application (hereinafter called the translation app) operable for Android OS 2.2 ...
... is called the Service Enabler Network (SEN), which implements AS (Application Servers) of the IMS?IP Multimedia Subsystem?infrastructure [1]. The SEN infrastructure ...
... synthesized voice is played through the telephone line. 3.4 Translation Application The basic functions of this service can also be provided ...
18
November 2008
GIS '08: Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 6, Downloads (Overall): 111
Full text available:
PDF
In applications that need meteorological forecast data, for instance for planning purposes (such as construction or environmental applications), each weather service is currently an effort-intensive result of domain-dependent programming. Instead, such applications need weather information platforms that would combine new forecast technologies and new information and communication technologies in a ...
Keywords:
situation, context, mobile application
CCS:
Information systems applications
Keywords:
mobile application
Abstract:
<p>In applications that need meteorological forecast data, for instance for planning purposes ... for instance for planning purposes (such as construction or environmental applications) ), each weather service is currently an effort-intensive result of ... is currently an effort-intensive result of domain-dependent programming. Instead, such applications need weather information platforms that would combine new forecast technologies ... information. We illustrate our approach with a particular up-and-running mobile application
Full Text:
... for Software and SystemsEngineering and FU Berlin10178 Mollstra e 1Berlin, Germanyagnes.voisard@isst.fraunhofer.deABSTRACTIn applications that need meteorological forecast data, forinstance for planning purposes (such ... data, forinstance for planning purposes (such as construction or envi-ronmental applications) ), each weather service is currently ane?ort-intensive result of domain-dependent ... weather service is currently ane?ort-intensive result of domain-dependent programming.Instead, such applications need weather information plat-forms that would combine new forecast technologies ... for weather information.We illustrate our approach with a particular up-and-runningmobile application de?ned in the SITUMET framework.Categories and Subject DescriptorsH.1 [Models and ... and Subject DescriptorsH.1 [Models and Systems]: Miscellaneous; H.4 [Infor-mation Systems Applications] ]: MiscellaneousGeneral TermsDesign, ExperimentationKeywordsMobile Application, , Context, Situation1. INTRODUCTIONMany applications use meteorological forecast data, forinstance for planning purposes. We can ... ISBN 978-1-60558-323-5/08/11 ...$5.00.agricultural, construction, transportation, or tourism appli-cations. In such applications, , each weather service is cur-rently an e?ort-intensive result of ... moregeneral approach to service provisioning in various domains.We focus on applications where planned activities play acentral role. Two cases are of ... the SITUMETplatform with emphasis on its situation component. A run-ning application example is given by the WIND system.2. BACKGROUND2.1 Weather dataWeather ...
... has a dynamic part, such as loca-tion in a mobile application, , but also a more static part toencompass user pro?les ...
... namely, the forecast backend, the mete-orological product engine, and the application services. Aconceptual presentation of the architecture is given on Fig-ure ...
... interfaces of the product engine, the meteoro-logical services implement the application- -speci?c businesslogic. The services are responsible for presentation of theweather ... for presentation of theweather information received and for the further application- -speci?c processing of the information. The services use thefunctionality of ... requests, which allows for intelligent andpro-active weather information services.4. APPLICATION4.1 Application DescriptionWIND is an implementation of a weather alerting systemdeveloped at ... about.WIND mobile adds dynamic to this alerting service. Itis an application for the current generation of smart mobilephones that informs users ... and anticipated locationand their situation-dependent pro?le (e.g., outdoor, in car).The application supports two user interface modes: an over-view mode and an ...
... and the EDXL Distribution Element[2] as the interface between the application and the requesthandling service of the server backend. Both standards ... backend. Both standards areXML-based languages speci?ed by the OASIS consortium.The application uses both pull and push mode. Thismeans that it uses ...
19
July 2015
C3S2E '15: Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8, Downloads (12 Months): 100, Downloads (Overall): 203
Full text available:
PDF
In recent years, research on mobile application testing is becoming popular. Testing of mobile application is more complicated compared to other applications such as web applications. User interactions in web applications are limited to its GUI through the mouse and keyboard. On the other hand, mobile applications are also influenced ...
Keywords:
Mobile Application, Android, Testing
CCS:
Personal computers and PC applications
Keywords:
Mobile Application
Abstract:
<p>In recent years, research on mobile application testing is becoming popular. Testing of mobile application is more complicated compared to other applications such as web applications. . User interactions in web applications are limited to its GUI through the mouse and keyboard. ... through the mouse and keyboard. On the other hand, mobile applications are also influenced by external events like phone calls, GPS, ... we propose an approach for generating test cases for mobile applications, , specifically Android applications, , focusing on external events. Our approach considers events that ... that are both handled and not handled by the mobile application,
Title:
External Event-Based Test Cases for Mobile Application
References:
D. Amalfitano, A. R. Fasolino, P. Tramontana, and N. Amatucci. Considering context events in event-based testing of mobile applications. In Proceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, pages 126--133, 2013.
D. Amalfitano, A. R. Fasolino, P. Tramontana, S. De Carmine, and A. M. Memon. Using GUI ripping for automated testing of Android applications. In Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, pages 258--261, 2012.
I. C. Morgado, A. C. R. Paiva, and J. a. P. Faria. Automated pattern-based testing of mobile applications. In Proceedings of the 2014 9th International Conference on the Quality of Information and Communications Technology, pages 294--299, 2014.
Full Text:
... UniversityYokohama, Japansienayu@keio.jpShingo TakadaKeio UniversityYokohama, Japanmichigan@ics.keio.ac.jpABSTRACTIn recent years, research on mobile application testing isbecoming popular. Testing of mobile application is morecomplicated compared to other applications such as web ap-plications. User interactions in web applications are limitedto its GUI through the mouse and keyboard. On ... GUI through the mouse and keyboard. On the otherhand, mobile applications are also influenced by externalevents like phone calls, GPS, and ... paper, we propose an approach for generating testcases for mobile applications, , specifically Android applica-tions, focusing on external events. Our approach ... events.CCS Concepts?Software and its engineering ? Software testingand debugging;KeywordsTesting, Mobile Application, , Android1. INTRODUCTIONSince the release of Google Play Store, the ... the release of Google Play Store, the number of An-droid applications has increased to 1.5 million as of June2015 [1]. There ... that testing is one of the big chal-lenges in mobile application development. Most developersstill think that current testing tools are not ... real features of mobile devices such as GPS andhardware sensors.Mobile application testing is not as simple compared toother applications such as web applications. . User inputs inPermission to make digital or hard copies ... held by the owner/author(s).ACM ISBN 978-1-4503-3419-8/15/07. . . $15.00DOI: http://dx.doi.org/10.1145/2790798.2790822web applications are limited to keyboard and mouse only.However, mobile devices are ... com-ponents such as phone capability, GPS, and hardware sen-sors. Mobile applications may be affected by external eventsfrom these components, thus complicating ... paper, we propose an approach on generating testcases for mobile applications, , specifically in Android appli-cations, focusing on external events. Our ... are events that arehandled and not handled by the mobile application, , respec-tively.The remaining part of this paper is structured as ... [3] created a tool called AndroidRip-per for automatically testing Android applications based onGUI Ripping. Anand, et al. [4] and Jensen, et ... ?GPSrecovered?.Morgado, et al. [7] proposed another approach for test-ing mobile applications focusing on external events. Theyalso used dynamic analysis of the ... on external events. Theyalso used dynamic analysis of the mobile application. . Theyincorporated this approach to a patterns catalogue of behav-ioral ... approach to a patterns catalogue of behav-ioral patterns in mobile application to generate test cases.Some examples of the behavior patterns they ... explicit events, which are events that are handledby the mobile application. . There are some events that amobile application should handle and ensure that it will notFigure 1: Proposed ...
... can sense and react to and the states whereinthe mobile application can react to the external events.The Event Repository stores the ... not handled by the code but must be handled bythe application. . The recommended categories of events to betested are available ... the Test Case Generator then generates test casesfor the mobile application testing. First, the events detectedTable 1: Event-PatternsCategory Event-PatternPhone Call 1) ... ?incoming phone call re-ceived? event is handled by the mobile application (explicitevent), but the ?phone call ended? event is not handled ... the repositories. This covers the implicit events. Forexample, the mobile application does not handle phone callevents, but the user wants to ... paper, we proposed an approach for generating testcases for mobile applications, , focusing on external events.Our approach considers both the explicit ... Tramontana, andN. Amatucci. Considering context events in event-basedtesting of mobile applications. . In Proceedings of the2013 IEEE Sixth International Conference on ... A. M. Memon. Using GUI rippingfor automated testing of Android applications. . InProceedings of the 27th IEEE/ACM InternationalConference on Automated Software ...
20
October 2010
CIKM '10: Proceedings of the 19th ACM international conference on Information and knowledge management
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3, Downloads (12 Months): 28, Downloads (Overall): 294
Full text available:
PDF
Semantics has many different definitions in science. In natural language processing, there has been much research over the past three decades involving extracting the semantics, the meaning, of natural texts. This has led to entity recognition (people, places, companies, prices, dates, and events), and more recently into sentiment analysis, exploring ...
Keywords:
semantics, commercial applications
CCS:
Information systems applications
Keywords:
commercial applications
Abstract:
... in products and online sites, finding their way into practical applications. . The stage is set for an explosion of semantically ... The stage is set for an explosion of semantically savvy applications, , from 3D design, to enhanced web browsing, to social ...
Primary CCS:
Information systems applications
Title:
Use of semantics in real life applications
Full Text:
Microsoft Word - key13gg-grefenstette.docUse of Semantics in Real Life Applications Gregory Grefenstette Exalead 10 place de la Madeleine, Paris, France ... in products and online sites, finding their way into practical applications. . The stage is set for an explosion of semantically ... The stage is set for an explosion of semantically savvy applications, , from 3D design, to enhanced web browsing, to social ... market. Categories & Subject Descriptors: H.4.0 [Information Systems] INFORMATION SYSTEMS APPLICATIONS ? General; H.5.2 [Information Systems] INFORMATION INTERFACES AND PRESENTATION -- ... AND TEXT PROCESSING General Terms: Design, Human Factors Keywords: Commercial applications, , Semantics Bio Gregory Grefenstette (Stanford'78, University of Pittsburgh'93) is ...
Result page:
1
2
3
4
5
6
7
8
9
10
>>