Dragoş NICOLAU dragos@ici.ro National Institute for Research & Development of Informatics – ICI Bucharest Abstract: At the beginning of the Internet Era, communications did not pose any threat either to servers or users. This is mainly explained by the fact that the information was conveyed in one sense, from the …
Read More »Monthly Archives: December 2017
Biometric Methods for Secure Authentification – A Case Study TypingDNA
Antonio COHAL antonio.cohal@rotld.ro Carmen ROTUNĂ carmen.rotuna@rotld.ro National Institute for Research & Development of Informatics – ICI Bucharest Abstract: In recent years secure internet and electronic communications are key drivers to economy and society in general as we can notice an increase in the number of major cyber security incidents due …
Read More »National Library of Programs: a New Approach in Software Management
Lidia BĂJENARU lidia.bajenaru@ici.ro Ion Al. MARINESCU ionut@ici.ro Mihaela TOMESCU mtomescu@ici.ro Daniel SAVU dsavu@ici.ro National Institute for Research & Development of Informatics – ICI Bucharest Abstract: The existence of software libraries led to a significant increase in software developer productivity, reducing the interval spanning from design to sale and improving software …
Read More »Using Multi-agent Systems in a Cloud Infrastructure fot the Development of Learning Management System
Ovidiu BICA ovi@ici.ro Eugenia TÎRZIU ginet@ici.ro National Institute for Research & Development of Informatics – ICI Bucharest Abstract: In this article are presented the concepts used in the “Perceptual modeling and mechanisms for generating actions in the development of autonomous agents” project from TEHSIN core program. Among the concepts used, …
Read More »Dew Computing Approaches as Extension of Cloud Oriented Architectures – Opportunity Analysis
Gabriel NEAGU gneagu@ici.ro Marilena IANCULESCU manina@ici.ro National Institute for Research & Development of Informatics – ICI Bucharest Abstract: The paper presents the concept of dew computing, which has been approached in the literature especially in the last two years. Similar to fog computing, developed in the context of Internet of …
Read More »