A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Agents for collecting application usage data over the Internet
1998
Proceedings of the second international conference on Autonomous agents - AGENTS '98
This paper presents an agent-based approach and prototype system that makes large-scale collection of usage data over the Internet a practical possibility. ...
However, current techniques for collecting usage data have not kept pace with the opportunities presented by Web-based deployment. ...
Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. ...
doi:10.1145/280765.280793
dblp:conf/agents/HilbertR98
fatcat:ojzah5zenraftcr7dmhxfhrcwu
Separating the wheat from the chaff in Internet-mediated user feedback expectation-driven event monitoring
1999
ACM SIGGROUP Bulletin
For instance, the Internet can be used as a medium for collecting "direct" user feedback in the form of subjective user reports, as well as "indirect" feedback in the form of automatically-captured data ...
usage expectations" in the development process. ...
This work is financially supported by the National Science Foundation, grant number CCR-9624846. ...
doi:10.1145/327556.327611
fatcat:arurydp56ffybinuknv2yho6hy
TAOS: Testing with Analysis and Oracle Support
1994
Proceedings of the 1994 international symposium on Software testing and analysis - ISSTA '94
An Approach to Large-Scale Collection of Application Usage Data Over the Internet Department of Information and Computer Science University of California, Irvine Irvine, CA 92697-3425 USA +1 714 824 3100 ...
inspiration for some of the ideas developed in this paper. ...
APPLICATION USAGE MONITORING Application usage monitoring is a technique for collecting data about human-computer interactions for the purpose of evaluating application usability. ...
doi:10.1145/186258.187158
dblp:conf/issta/Richardson94
fatcat:273c32drkncajmzg5pk7eoq5ee
Optimizing cloud resources allocation for an Internet of Things architecture
2015
Scalable Computing : Practice and Experience
The optimization of the cloud resources used to power a multi-agent Internet of Things architecture is an important issue which has an important impact on the overall operation cost of the architecture ...
The infrastructure for the multi-agent system should not be affected by the deployment or maintenance life cycle, operations require parts of the system, or even the entire system to be offline during ...
These types of instances are used for the data collection end-points. ...
doi:10.12694/scpe.v15i4.1055
fatcat:3677fymco5eu7b5e4hwypqhgrm
Energy Monitoring for Small Smart Farm Using Internet of Things
2017
DEStech Transactions on Environment Energy and Earth Science
It will provide optimal solutions for real time monitoring of energy for regulation. Our system is based on Internet of Things (IoT) and mobile phone. ...
The primary aim of this study is to monitor energy utilization. Real time energy monitoring to avoid over energy surcharges in residential buildings. ...
The energy data can be collected in real time for monitoring and control through web server as well as mobile application. The user can control energy usage. ...
doi:10.12783/dteees/eesd2017/11973
fatcat:qw73new6qjdvjgosa63a5ofx4u
Accounting and Billing of Wireless Internet Services in the Third Generation Networks
[chapter]
2003
Lecture Notes in Computer Science
The wireless service providers have difficulties in billing their customers due to their inability to associate customer transactions with network usage, correlate data from multiple sources and flexibly ...
The evaluation of the services proved that the number of roles and partners in the wireless services is huge and that solutions like accounting agents and billing mediation servers are needed for tracking ...
or service usage check The accounting agent need to interface a variety of usage data sources and to provide collected data encoded into different output formats. ...
doi:10.1007/978-3-540-45275-1_20
fatcat:seaxhe4x4fb6nn4bic3kqkcn7u
Infrastructure Management Support in a Multi-agent Architecture for Internet of Things
2014
2014 European Modelling Symposium
This paper examines the cloud resources management for a multi-agent IoT architecture. ...
Also, the security audit and its impact over a distributed multi-agent architecture that handles a large number of heterogeneous devices is discussed. ...
ACKNOWLEDGMENT The work of the first author was supported by the strategic grant POSDRU/159/1.5/S/137750, "Project Doctoral and Postdoctoral programs support for increased competitiveness in Exact Sciences ...
doi:10.1109/ems.2014.36
dblp:conf/ems/ManateFN14
fatcat:7imlpixcdzamxjqdfjtrmgyi5u
The Design Of The Multi-Agent Classification System (Macs)
2014
Zenodo
The Prometheus methodology is used for the design of the agents of MACS. ...
The monitoring agents of MACS are intended to be distributed over the WWW in order to satisfy the monitoring and classification of the multiple developer aspect. ...
A typical off as a simple consumer of data and progress through simple charts, formulas, pivot tables, VBA development further to automate other applications, use and XML for sharing data over the Internet ...
doi:10.5281/zenodo.1337159
fatcat:bjepmolzrfgjbiwmtta54lelcy
Beyond gender differences: Self-concept orientation and relationship-building applications on the Internet
2007
Journal of Business Research
However, a regression analysis of Web-based survey data collected from 386 respondents concerning their use of such Internet applications found that usage was better predicted when agentic (Self-Orientation ...
With the exception of instant messaging, Other-Orientation was a positive predictor of usage rates for relational applications including email, greeting cards, and finding new friends or relationships. ...
increasingly important explanations of Internet usage behaviors that until now have been accounted for by a simple male-female distinction. ...
doi:10.1016/j.jbusres.2006.06.010
fatcat:o6tmsqy7sneifechmmv4b5nvpi
Java for On-line Distributed Monitoring of Heterogeneous Systems and Services
2002
Computer journal
PerfAnal [9] exploits the SUN HPROF profiler agent to perform an off-line analysis of collected monitoring data and to obtain a user-level concise view for debugging Java applications. ...
JAVA TECHNOLOGIES FOR MONITORING The Java technology plays a fundamental role in the design, implementation and deployment of Web services over the Internet infrastructure. ...
doi:10.1093/comjnl/45.6.595
fatcat:44z4if5uqvhc3iuejmbgoptasy
Securing and Monitoring of Bandwidth Usage in Multi-Agents Denial of Service Environment
2018
International Journal of Advanced Computer Science and Applications
This paper proposes a real time system for securing and monitoring the amount of bandwidth consumed on the network using the multi-agent framework technology. ...
It also keeps a record of internet protocol (IP) addresses visiting the network and may be used as a starting point for the aspect of response in providing a comprehensive solution to DoS attacks. ...
DATA COLLECTION The data that were required for the paper include the IP addresses sending request and the bandwidth of the network. ...
doi:10.14569/ijacsa.2018.090955
fatcat:bxqx6bre5zfm7niaebqs7mhuzi
REST APIs: A Large-Scale Analysis of Compliance with Principles and Best Practices
[chapter]
2016
Lecture Notes in Computer Science
Quickly and dominantly, REST APIs have spread over the Web and percolated into modern software development practice, especially in the Mobile Internet where they conveniently enable o✏oading data and computations ...
We analyze more than 78GB of HTTP tra c collected by Italy's biggest Mobile Internet provider over one full day and study how big the trend is in practice, how it changed the tra c that is generated by ...
The authors thank all partners within e2Call for their contribution. ...
doi:10.1007/978-3-319-38791-8_2
fatcat:lxvylyyu2bfp3ix74npo7qbt6q
Internet Usage in Agricultural Extension Activities in Lampung Province, Indonesia
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
This study aimed to (1) analyze the internet availability in Lampung Province (2) to analyze the level of internet usage for extension agent in Lampung and (3) to analyze factors influencing internet usage ...
The use of the internet by extension agent was influenced by the nature of internet innovation, the number of Internet-based applications and the amount of existed hardware. ...
The collected data was analyzed by tabulation, using descriptive analysis. ...
doi:10.35940/ijitee.l3097.1081219
fatcat:ourrmf6u5fh7tlpvmw2p33gxkm
Evaluation of the data handling pipeline of the ASTRID framework
[article]
2021
Zenodo
The data handling process entails collection from heterogeneous sources, local aggregation and transformation operations before transmission, and finally collection and delivery to multiple processing ...
As part of our activity in ASTRID, we therefore conducted experimental investigation on resource consumption of the data handling pipeline, starting from embedded agents up to delivery to the Context Broker ...
Low bandwidth and packet loss over the Internet is a common problem for any distributed cybersecurity framework; to mitigate this problem, the ASTRID platform should be deployed in the same virtualization ...
doi:10.5281/zenodo.5347847
fatcat:gymtmcd2wfandgiumcm3eox64e
Evaluation of the data handling pipeline of the ASTRID framework
[article]
2021
Zenodo
The data handling process entails collection from heterogeneous sources, local aggregation and transformation operations before transmission, and finally collection and delivery to multiple processing ...
As part of our activity in ASTRID, we therefore conducted experimental investigation on resource consumption of the data handling pipeline, starting from embedded agents up to delivery to the Context Broker ...
ACKNOWLEDGMENT This work was supported in part by the European Commission under Grant Agreement no. 786922 (ASTRID). ...
doi:10.5281/zenodo.5156519
fatcat:oonc5rihfrh3lfjmk3oe3hebdm
« Previous
Showing results 1 — 15 out of 65,332 results