You are currently viewing a new version of our website. To view the old version click .

Information, Volume 7, Issue 2

June 2016 - 17 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
9 Citations
7,535 Views
33 Pages

A Framework for Measuring Security as a System Property in Cyberphysical Systems

  • Janusz Zalewski,
  • Ingrid A. Buckley,
  • Bogdan Czejdo,
  • Steven Drager,
  • Andrew J. Kornecki and
  • Nary Subramanian

This paper addresses the challenge of measuring security, understood as a system property, of cyberphysical systems, in the category of similar properties, such as safety and reliability. First, it attempts to define precisely what security, as a sys...

  • Article
  • Open Access
8 Citations
10,046 Views
19 Pages

Implementation Support of Security Design Patterns Using Test Templates

  • Masatoshi Yoshizawa,
  • Hironori Washizaki,
  • Yoshiaki Fukazawa,
  • Takao Okubo,
  • Haruhiko Kaiya and
  • Nobukazu Yoshioka

Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulne...

  • Article
  • Open Access
22 Citations
7,375 Views
18 Pages

User in the Loop: Adaptive Smart Homes Exploiting User Feedback—State of the Art and Future Directions

  • Abir B. Karami,
  • Anthony Fleury,
  • Jacques Boonaert and
  • Stéphane Lecoeuche

Due to the decrease of sensor and actuator prices and their ease of installation, smart homes and smart environments are more and more exploited in automation and health applications. In these applications, activity recognition has an important place...

  • Review
  • Open Access
33 Citations
11,002 Views
22 Pages

Speech Compression

  • Jerry D. Gibson

Speech compression is a key technology underlying digital cellular communications, VoIP, voicemail, and voice response systems. We trace the evolution of speech coding based on the linear prediction model, highlight the key milestones in speech codin...

  • Article
  • Open Access
1 Citations
4,382 Views
12 Pages

With rapid development and application of mobile internet, geographic information in the field of business process is now more widely used. There are more and more researches in the field of the relationships between geographic information and workfl...

  • Article
  • Open Access
2 Citations
5,064 Views
16 Pages

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability

  • Xinpeng Zhang,
  • Chunxiang Xu,
  • Xiaojun Zhang,
  • Taizong Gu,
  • Zhi Geng and
  • Guoping Liu

With the advent of the big data era, cloud data storage and retrieval have become popular for efficient data management in large companies and organizations, thus they can enjoy the on-demand high-quality cloud storage service. Meanwhile, for securit...

  • Article
  • Open Access
15 Citations
6,460 Views
32 Pages

Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that ar...

  • Article
  • Open Access
25 Citations
10,808 Views
11 Pages

As an important part of knowledge management (KM), the KM performance evaluation tries to find out the key factors restraining the enhancement of the enterprises' performance. This paper investigates the feasibility of the balanced scorecard (BSC) me...

  • Article
  • Open Access
20 Citations
9,429 Views
20 Pages

Feature Engineering for Recognizing Adverse Drug Reactions from Twitter Posts

  • Hong-Jie Dai,
  • Musa Touray,
  • Jitendra Jonnagaddala and
  • Shabbir Syed-Abdul

Social media platforms are emerging digital communication channels that provide an easy way for common people to share their health and medication experiences online. With more people discussing their health information online publicly, social media...

  • Article
  • Open Access
2 Citations
5,334 Views
12 Pages

The Potential of Three Computer-Based Communication Activities for Supporting Older Adult Independent Living

  • Melinda Heinz,
  • Jinmyoung Cho,
  • Norene Kelly,
  • Peter Martin,
  • Johnny Wong,
  • Warren Franke,
  • Wen-Hua Hsieh and
  • Joan Blaser

Technology has become an increasingly integral part of life. For example, technology allows individuals to stay in touch with loved ones, obtain medical services through telehealthcare, and enjoy an overall higher quality of life. Particularly for ol...

of 2