Skip Content
You are currently on the new version of our website. Access the old version .

Information, Volume 7, Issue 2

2016 June - 17 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
9 Citations
7,742 Views
33 Pages

A Framework for Measuring Security as a System Property in Cyberphysical Systems

  • Janusz Zalewski,
  • Ingrid A. Buckley,
  • Bogdan Czejdo,
  • Steven Drager,
  • Andrew J. Kornecki and
  • Nary Subramanian

This paper addresses the challenge of measuring security, understood as a system property, of cyberphysical systems, in the category of similar properties, such as safety and reliability. First, it attempts to define precisely what security, as a sys...

  • Article
  • Open Access
8 Citations
10,226 Views
19 Pages

Implementation Support of Security Design Patterns Using Test Templates

  • Masatoshi Yoshizawa,
  • Hironori Washizaki,
  • Yoshiaki Fukazawa,
  • Takao Okubo,
  • Haruhiko Kaiya and
  • Nobukazu Yoshioka

Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulne...

  • Article
  • Open Access
22 Citations
7,609 Views
18 Pages

User in the Loop: Adaptive Smart Homes Exploiting User Feedback—State of the Art and Future Directions

  • Abir B. Karami,
  • Anthony Fleury,
  • Jacques Boonaert and
  • Stéphane Lecoeuche

Due to the decrease of sensor and actuator prices and their ease of installation, smart homes and smart environments are more and more exploited in automation and health applications. In these applications, activity recognition has an important place...

  • Review
  • Open Access
34 Citations
11,563 Views
22 Pages

Speech Compression

  • Jerry D. Gibson

Speech compression is a key technology underlying digital cellular communications, VoIP, voicemail, and voice response systems. We trace the evolution of speech coding based on the linear prediction model, highlight the key milestones in speech codin...

  • Article
  • Open Access
1 Citations
4,525 Views
12 Pages

With rapid development and application of mobile internet, geographic information in the field of business process is now more widely used. There are more and more researches in the field of the relationships between geographic information and workfl...

  • Article
  • Open Access
2 Citations
5,200 Views
16 Pages

Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability

  • Xinpeng Zhang,
  • Chunxiang Xu,
  • Xiaojun Zhang,
  • Taizong Gu,
  • Zhi Geng and
  • Guoping Liu

With the advent of the big data era, cloud data storage and retrieval have become popular for efficient data management in large companies and organizations, thus they can enjoy the on-demand high-quality cloud storage service. Meanwhile, for securit...

  • Article
  • Open Access
15 Citations
6,605 Views
32 Pages

Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that ar...

  • Article
  • Open Access
25 Citations
11,915 Views
11 Pages

As an important part of knowledge management (KM), the KM performance evaluation tries to find out the key factors restraining the enhancement of the enterprises' performance. This paper investigates the feasibility of the balanced scorecard (BSC) me...

  • Article
  • Open Access
20 Citations
9,614 Views
20 Pages

Feature Engineering for Recognizing Adverse Drug Reactions from Twitter Posts

  • Hong-Jie Dai,
  • Musa Touray,
  • Jitendra Jonnagaddala and
  • Shabbir Syed-Abdul

Social media platforms are emerging digital communication channels that provide an easy way for common people to share their health and medication experiences online. With more people discussing their health information online publicly, social media...

  • Article
  • Open Access
2 Citations
5,491 Views
12 Pages

The Potential of Three Computer-Based Communication Activities for Supporting Older Adult Independent Living

  • Melinda Heinz,
  • Jinmyoung Cho,
  • Norene Kelly,
  • Peter Martin,
  • Johnny Wong,
  • Warren Franke,
  • Wen-Hua Hsieh and
  • Joan Blaser

Technology has become an increasingly integral part of life. For example, technology allows individuals to stay in touch with loved ones, obtain medical services through telehealthcare, and enjoy an overall higher quality of life. Particularly for ol...

  • Article
  • Open Access
7 Citations
4,791 Views
21 Pages

The wiretap channel models secure communication between two users in the presence of an eavesdropper who must be kept ignorant of transmitted messages. This communication scenario is studied for arbitrarily varying channels (AVCs), in which the legit...

  • Article
  • Open Access
188 Citations
13,244 Views
19 Pages

A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology

  • Anhtuan Le,
  • Jonathan Loo,
  • Kok Keong Chai and
  • Mahdi Aiash

Routing Protocol for Low power and Lossy network (RPL) topology attacks can downgrade the network performance significantly by disrupting the optimal protocol structure. To detect such threats, we propose a RPL-specification, obtained by a semi-auto...

  • Article
  • Open Access
7 Citations
13,173 Views
24 Pages

26 April 2016

The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created deca...

  • Article
  • Open Access
5 Citations
4,891 Views
17 Pages

14 April 2016

Knowledge management systems are widely used to manage the knowledge in organizations. Consulting experts is an effective way to utilize tacit knowledge. The paper aims to optimize the match between users and experts to improve the efficiency of taci...

  • Article
  • Open Access
31 Citations
7,122 Views
10 Pages

23 March 2016

Data fusion is usually performed prior to classification in order to reduce the input space. These dimensionality reduction techniques help to decline the complexity of the classification model and thus improve the classification performance. The tra...

  • Article
  • Open Access
5 Citations
5,787 Views
42 Pages

Minimax Duality for MIMO Interference Networks

  • Andreas Dotzler,
  • Maximilian Riemensberger and
  • Wolfgang Utschick

23 March 2016

A minimax duality for a Gaussian mutual information expression was introduced by Yu. An interesting observation is the relationship between cost constraints on the transmit covariances and noise covariances in the dual problem via Lagrangian multipli...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489