The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
BIT-ORIENTED CONTROL PROCEDURES ARE A NEW GENERATION OF COMMUNICATION LINK CONTROL PROCEDURES WHICH HAVE EVOLVED DURING THE PAST SEVERAL YEARS. THESE NEW PROCEDURES OFFER MANY ADVANTAGES OVER CHARACTER-ORIENTED OR BASIC MODE CONTROL PROCEDURES WHICH ARE COMMONLY USED TODAY. BECAUSE OF THIS, IT IS EXPECTED THAT BIT-ORIENTED CONTROL PROCEDURES WILL EVENTUALLY REPLACE CHARACTER-ORIENTED PROCEDURES FOR...
DATA COMMUNICATIONS,1 AS OUR INDUSTRY USES THE TERM, INVOLVES THE EQUIPMENT OR SERVICES USED IN THE FLOW OF INFORMATION TO OR FROM A COMPUTER CENTER, WHERE A COMPUTER MUST HAVE A PART IN PROCESSING THE INFORMATION TRANSMITTED. IT IS NOT SIMPLY THE TRANSMISSION OF DATA FROM ONE SOURCE TO ANOTHER.
THIS PAPER DESCRIBES THE IMPLEMENTATION OF A COMMUNICATIONS SOFTWARE SYSTEM WITH VERY MANY GENERAL PURPOSE FEATURES. THIS SYSTEM ALSO POSSESSES CLEARLY DEFINED INTERFACES TO THE OPERATING SYSTEM.
The COSTAR system keeps medical records and does accounting and administrative tasks for group practices. It also offers clinical researchers a useful query language for manipulating medical data.
The effects of human factors on "high-level" software properties–too intangible to quantify directly–can be inferred from the collective behavior of related "low-level" aspects.
Summarization, the art of abstracting key content from one or more information sources, has become an integral part of everyday life. Researchers are investigating summarization tools and methods that automatically extract or abstract content from a range of information sources, including multimedia. Researchers are looking at approaches which roughly fall into two categories. Knowledge-poor approaches...
Two closely linked projects aim to dramatically improve storm forecasting speed and accuracy. CASA is creating a distributed, collaborative, adaptive sensor network of low-power, high-resolution radars that respond to user needs. LEAD offers dynamic workflow orchestration and data management in a Web services framework designed to support on-demand, real-time, dynamically adaptive systems
Sensors produce large streams of raw events while instrumenting environments such as computer systems, communications networks, physical spaces, and human organizations. Extracting meaningful and actionable information from these events, however, remains a challenge. Process query systems, a new algorithmic and software paradigm, offer a powerful and generic way to address event-processing challenges
Although there are times when random search is dangerous and should be avoided, software analysis should start with random methods because they are so cheap, moving to the more complex methods only when random methods fail
Although successful in many applications, data mining poses special concerns for private data. An integrated architecture takes a systemic view of the problem, implementing established protocols for data collection, inference control, and information sharing. Our goal in investigating privacy preservation issues was to take a systemic view of architectural requirements and design principles and explore...
Business intelligence (BI) is now widely used, especially in the world of practice, to describe analytic applications. BI is currently the top-most priority of many chief information officers. BI has become a strategic initiative and is now recognized by CIOs and business leaders as instrumental in driving business effectiveness and innovation. BI is a process that includes two primary activities:...
Applying a suite of tools from artificial intelligence and data mining to existing archaeological data from Monte Alban, a prehistoric urban center, offers the potential for building agent-based models of emergent ancient urban centers. The authors use decision trees to characterize location decisions made by early inhabitants at Monte Alban, a prehistoric urban center, and inject these rules into...
ProDA employs wavelets to support exact, approximate, and progressive OLAP queries on large multidimensional datasets, while keeping update costs relatively low. ProDA not only supports online execution of ad hoc analytical queries on massive datasets, but also extends the set of supported analytical queries to include the entire family of polynomial aggregate queries as well as the new class of plot...
We continue to investigate the use of trust management techniques to specify dynamic policies in complex integrated service-oriented networks. For this work, we use the DoD GIG's service-oriented architecture as a focal point. In this research's initial phase, we are developing prototype dynamic trust management policy services for a service-oriented architecture. In our research's next phase, we...
IPv6, the new version of the Internet protocol, has been developed to provide new services and to support the Internet's growth. This paper presents an overview of the key security issues, which outlines the challenges in deploying and transitioning to IPv6.
In addition to reducing the time it took to pay for purchases, bar codes and scanners provided a system that would track inventory, reduce theft, and provide data to help merchants understand how their goods were purchased.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.