2,354 research outputs found
Personalizable Service Discovery in Pervasive Systems
Today, telecom providers are facing changing challenges.
To stay ahead in the competition and provide market
leading offerings, carriers need to enable a global ecosystem of
third party independent application developers to deliver converged
services. This is the aim of leveraging a open standardsbased
service delivery platform. To identify and to cope with
those challenges is the main target of the EU funded project
IST DAIDALOS II. And a central point to satisfy the changing
user needs is the provision of a well working, user friendly and
personalized service discovery. This paper describes our work
in the project on a middleware in a framework for pervasive
service usage. We have designed an architecture for it, that
enables full transparency to the user, grants high compatibility
and extendability by a modular and pluggable conception and
allows for interoperability with most known service discovery
protocols. Our Multi-Protocol Service Discovery and the Four
Phases Service Filtering concept enabling personalization should
allow for the best possible results in service discovery
The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services
As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols. In addition to that, users are authenticated and charged by different means. The lack of implicit human computer interaction, context-awareness and standardisation places an enormous burden of complexity on the shoulders of the final users. The IST-Simplicity project aims at leveraging such problems by: i) automatically creating and customizing a user communication space; ii) adapting services to user terminal characteristics and to users preferences; iii) orchestrating network capabilities. The aim of this paper is to present the technical framework of the IST-Simplicity project. This paper is a thorough analysis and qualitative evaluation of the different technologies, standards and works presented in the literature related to the Simplicity system to be developed
Recommended from our members
Towards an aspect weaving BPEL engine
This position paper proposes the use of dynamic aspects and
the visitor design pattern to obtain a highly configurable and
extensible BPEL engine. Using these two techniques, the
core of this infrastructural software can be customised to
meet new requirements and add features such as debugging,
execution monitoring, or changing to another Web Service
selection policy. Additionally, it can easily be extended to
cope with customer-specific BPEL extensions. We propose
the use of dynamic aspects not only on the engine itself
but also on the workflow in order to tackle the problems of
Web Service hot deployment and hot fixes to long running
processes. In this way, composing aWeb Service "on-the-fly"
means weaving its choreography interface into the workflow
A Survey on Web Usage Mining, Applications and Tools
World Wide Web is a vast collection of unstructured web documents like text, images, audio, video or Multimedia content. As web is growing rapidly with millions of documents, mining the data from the web is a difficult task. To mine various patterns from the web is known as Web mining. Web mining is further classified as content mining, structure mining and web usage mining. Web usage mining is the data mining technique to mine the knowledge of usage of web data from World Wide Web. Web usage mining extracts useful information from various web logs i.e. users usage history. This is useful for better understanding and serve the people for better web applications. Web usage mining not only useful for the people who access the documents from the World Wide Web, but also it useful for many applications like e-commerce to do personalized marketing, e-services, the government agencies to classify threats and fight against terrorism, fraud detection, to identify criminal activities, the companies can establish better customer relationship and can improve their businesses by analyzing the people buying strategies etc. This paper is going to explain in detail about web usage mining and how it is helpful. Web Usage Mining has seen rapid increase towards research and people communities
Cloud-based Recommendation Systems: Applications and Solutions
Recommender systems have become extremely common in recent years, and are applied in a variety of applications. They help businesses increase their sales and customer satisfaction. More and more computing applications including recommender systems, are being deployed as cloud computing services. This papers presents some of the most common recommendation applications and solutions which follow SaaS, PaaS or other cloud computing service models. They are provided both from academia and business domain and use recent data mining, machine learning and artificial intelligence techniques. The tendency of these kind of applications is towards SaaS service model which seems the most appropriate especially for businesses
GUISET: A CONCEPTUAL DESIGN OF A GRID-ENABLED PORTAL FOR E-COMMERCE ON-DEMAND SERVICES
Conventional grid-enabled portal designs have been largely influenced by the usual functional requirements such as security requirements, grid resource requirements and job management requirements. However, the pay-as-you-use service provisioning model of utility computing platforms mean that additional requirements must be considered in order to realize effective grid-enabled portals design for such platforms. This work investigates those relevant additional
requirements that must be considered for the design of grid-enabled portals for utility computing
contexts.
Based on a thorough review of literature, we identified a number of those relevant additional
requirements, and developed a grid-enabled portal prototype for the Grid-based Utility
Infrastructure for SMME-enabling Technology (GUISET) initiative â a utility computing platform.
The GUISET portal was designed to cater for both the traditional grid requirements and some of
the relevant additional requirements for utility computing contexts. The result of the evaluation of
the GUISET portal prototype using a set of benchmark requirements (standards) revealed that it
fulfilled the minimum requirements to be suitable for the utility context
VirtualIdentity : privacy preserving user profiling
User profiling from user generated content (UGC) is a common practice that supports the business models of many social media companies. Existing systems require that the UGC is fully exposed to the module that constructs the user profiles. In this paper we show that it is possible to build user profiles without ever accessing the user's original data, and without exposing the trained machine learning models for user profiling - which are the intellectual property of the company - to the users of the social media site. We present VirtualIdentity, an application that uses secure multi-party cryptographic protocols to detect the age, gender and personality traits of users by classifying their user-generated text and personal pictures with trained support vector machine models in a privacy preserving manner
- âŠ