Filters








65,332 Hits in 5.4 sec

Agents for collecting application usage data over the Internet

David M. Hilbert, David F. Redmiles
1998 Proceedings of the second international conference on Autonomous agents - AGENTS '98  
This paper presents an agent-based approach and prototype system that makes large-scale collection of usage data over the Internet a practical possibility.  ...  However, current techniques for collecting usage data have not kept pace with the opportunities presented by Web-based deployment.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon.  ... 
doi:10.1145/280765.280793 dblp:conf/agents/HilbertR98 fatcat:ojzah5zenraftcr7dmhxfhrcwu

Separating the wheat from the chaff in Internet-mediated user feedback expectation-driven event monitoring

David M. Hilbert, David F. Redmiles
1999 ACM SIGGROUP Bulletin  
For instance, the Internet can be used as a medium for collecting "direct" user feedback in the form of subjective user reports, as well as "indirect" feedback in the form of automatically-captured data  ...  usage expectations" in the development process.  ...  This work is financially supported by the National Science Foundation, grant number CCR-9624846.  ... 
doi:10.1145/327556.327611 fatcat:arurydp56ffybinuknv2yho6hy

TAOS: Testing with Analysis and Oracle Support

Debra J. Richardson
1994 Proceedings of the 1994 international symposium on Software testing and analysis - ISSTA '94  
An Approach to Large-Scale Collection of Application Usage Data Over the Internet Department of Information and Computer Science University of California, Irvine Irvine, CA 92697-3425 USA +1 714 824 3100  ...  inspiration for some of the ideas developed in this paper.  ...  APPLICATION USAGE MONITORING Application usage monitoring is a technique for collecting data about human-computer interactions for the purpose of evaluating application usability.  ... 
doi:10.1145/186258.187158 dblp:conf/issta/Richardson94 fatcat:273c32drkncajmzg5pk7eoq5ee

Optimizing cloud resources allocation for an Internet of Things architecture

Bogdan Manate, Teodor-Florin Fortis, Viorel Negru
2015 Scalable Computing : Practice and Experience  
The optimization of the cloud resources used to power a multi-agent Internet of Things architecture is an important issue which has an important impact on the overall operation cost of the architecture  ...  The infrastructure for the multi-agent system should not be affected by the deployment or maintenance life cycle, operations require parts of the system, or even the entire system to be offline during  ...  These types of instances are used for the data collection end-points.  ... 
doi:10.12694/scpe.v15i4.1055 fatcat:3677fymco5eu7b5e4hwypqhgrm

Energy Monitoring for Small Smart Farm Using Internet of Things

Pictchaya JAMJAN, Waris RATTANANIMIT
2017 DEStech Transactions on Environment Energy and Earth Science  
It will provide optimal solutions for real time monitoring of energy for regulation. Our system is based on Internet of Things (IoT) and mobile phone.  ...  The primary aim of this study is to monitor energy utilization. Real time energy monitoring to avoid over energy surcharges in residential buildings.  ...  The energy data can be collected in real time for monitoring and control through web server as well as mobile application. The user can control energy usage.  ... 
doi:10.12783/dteees/eesd2017/11973 fatcat:qw73new6qjdvjgosa63a5ofx4u

Accounting and Billing of Wireless Internet Services in the Third Generation Networks [chapter]

Päivi Kallio, Giovanni Cortese, Roberto Tiella, Alessandro Zorer
2003 Lecture Notes in Computer Science  
The wireless service providers have difficulties in billing their customers due to their inability to associate customer transactions with network usage, correlate data from multiple sources and flexibly  ...  The evaluation of the services proved that the number of roles and partners in the wireless services is huge and that solutions like accounting agents and billing mediation servers are needed for tracking  ...  or service usage check The accounting agent need to interface a variety of usage data sources and to provide collected data encoded into different output formats.  ... 
doi:10.1007/978-3-540-45275-1_20 fatcat:seaxhe4x4fb6nn4bic3kqkcn7u

Infrastructure Management Support in a Multi-agent Architecture for Internet of Things

Bogdan Manate, Teodor-Florin Fortis, Viorel Negru
2014 2014 European Modelling Symposium  
This paper examines the cloud resources management for a multi-agent IoT architecture.  ...  Also, the security audit and its impact over a distributed multi-agent architecture that handles a large number of heterogeneous devices is discussed.  ...  ACKNOWLEDGMENT The work of the first author was supported by the strategic grant POSDRU/159/1.5/S/137750, "Project Doctoral and Postdoctoral programs support for increased competitiveness in Exact Sciences  ... 
doi:10.1109/ems.2014.36 dblp:conf/ems/ManateFN14 fatcat:7imlpixcdzamxjqdfjtrmgyi5u

The Design Of The Multi-Agent Classification System (Macs)

Mohamed R. Mhereeg
2014 Zenodo  
The Prometheus methodology is used for the design of the agents of MACS.  ...  The monitoring agents of MACS are intended to be distributed over the WWW in order to satisfy the monitoring and classification of the multiple developer aspect.  ...  A typical off as a simple consumer of data and progress through simple charts, formulas, pivot tables, VBA development further to automate other applications, use and XML for sharing data over the Internet  ... 
doi:10.5281/zenodo.1337159 fatcat:bjepmolzrfgjbiwmtta54lelcy

Beyond gender differences: Self-concept orientation and relationship-building applications on the Internet

Maureen E. Hupfer, Brian Detlor
2007 Journal of Business Research  
However, a regression analysis of Web-based survey data collected from 386 respondents concerning their use of such Internet applications found that usage was better predicted when agentic (Self-Orientation  ...  With the exception of instant messaging, Other-Orientation was a positive predictor of usage rates for relational applications including email, greeting cards, and finding new friends or relationships.  ...  increasingly important explanations of Internet usage behaviors that until now have been accounted for by a simple male-female distinction.  ... 
doi:10.1016/j.jbusres.2006.06.010 fatcat:o6tmsqy7sneifechmmv4b5nvpi

Java for On-line Distributed Monitoring of Heterogeneous Systems and Services

P. Bellavista
2002 Computer journal  
PerfAnal [9] exploits the SUN HPROF profiler agent to perform an off-line analysis of collected monitoring data and to obtain a user-level concise view for debugging Java applications.  ...  JAVA TECHNOLOGIES FOR MONITORING The Java technology plays a fundamental role in the design, implementation and deployment of Web services over the Internet infrastructure.  ... 
doi:10.1093/comjnl/45.6.595 fatcat:44z4if5uqvhc3iuejmbgoptasy

Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment

Ogunleye G. O., Fashoto S.G, Mbunge Elliot, Arekete S.A, Ojewumi T.O.
2018 International Journal of Advanced Computer Science and Applications  
This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology.  ...  It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks.  ...  DATA COLLECTION The data that were required for the paper include the IP addresses sending request and the bandwidth of the network.  ... 
doi:10.14569/ijacsa.2018.090955 fatcat:bxqx6bre5zfm7niaebqs7mhuzi

REST APIs: A Large-Scale Analysis of Compliance with Principles and Best Practices [chapter]

Carlos Rodríguez, Marcos Baez, Florian Daniel, Fabio Casati, Juan Carlos Trabucco, Luigi Canali, Gianraffaele Percannella
2016 Lecture Notes in Computer Science  
Quickly and dominantly, REST APIs have spread over the Web and percolated into modern software development practice, especially in the Mobile Internet where they conveniently enable o✏oading data and computations  ...  We analyze more than 78GB of HTTP tra c collected by Italy's biggest Mobile Internet provider over one full day and study how big the trend is in practice, how it changed the tra c that is generated by  ...  The authors thank all partners within e2Call for their contribution.  ... 
doi:10.1007/978-3-319-38791-8_2 fatcat:lxvylyyu2bfp3ix74npo7qbt6q

Internet Usage in Agricultural Extension Activities in Lampung Province, Indonesia

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This study aimed to (1) analyze the internet availability in Lampung Province (2) to analyze the level of internet usage for extension agent in Lampung and (3) to analyze factors influencing internet usage  ...  The use of the internet by extension agent was influenced by the nature of internet innovation, the number of Internet-based applications and the amount of existed hardware.  ...  The collected data was analyzed by tabulation, using descriptive analysis.  ... 
doi:10.35940/ijitee.l3097.1081219 fatcat:ourrmf6u5fh7tlpvmw2p33gxkm

Evaluation of the data handling pipeline of the ASTRID framework [article]

Guerino Lamanna, Matteo Repetto, Alessandro Carrega
2021 Zenodo  
The data handling process entails collection from heterogeneous sources, local aggregation and transformation operations before transmission, and finally collection and delivery to multiple processing  ...  As part of our activity in ASTRID, we therefore conducted experimental investigation on resource consumption of the data handling pipeline, starting from embedded agents up to delivery to the Context Broker  ...  Low bandwidth and packet loss over the Internet is a common problem for any distributed cybersecurity framework; to mitigate this problem, the ASTRID platform should be deployed in the same virtualization  ... 
doi:10.5281/zenodo.5347847 fatcat:gymtmcd2wfandgiumcm3eox64e

Evaluation of the data handling pipeline of the ASTRID framework [article]

Guerino Lamanna, Matteo Repetto, Alessandro Carrega
2021 Zenodo  
The data handling process entails collection from heterogeneous sources, local aggregation and transformation operations before transmission, and finally collection and delivery to multiple processing  ...  As part of our activity in ASTRID, we therefore conducted experimental investigation on resource consumption of the data handling pipeline, starting from embedded agents up to delivery to the Context Broker  ...  ACKNOWLEDGMENT This work was supported in part by the European Commission under Grant Agreement no. 786922 (ASTRID).  ... 
doi:10.5281/zenodo.5156519 fatcat:oonc5rihfrh3lfjmk3oe3hebdm
« Previous Showing results 1 — 15 out of 65,332 results