The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Challenges in bioinformatics include tools to treat large-scale processing, mainly due to the large volumes of data generated by high-throughput sequencing machines. Besides, many of these tools are not user friendly, and do not distribute their workloads properly. In federated cloud environments, even though services and resources are shared and available online, the processes of a workflow execution...
Although non-functional requirements (NFR) are the basis for the definition of a appropriate architecture to the software context and have influence on the time and cost of development, elicitation of the requirements still seems to be a problem for many organizations. The objective of this study is to identify the current situation of the organizations as the NFR elicitation. We conducted a survey...
In last few years, cloud computing has emerged asa popular alternative to satisfy the computing requirement ofusers. To support large number of users which is increasingvery fast, the cloud service providers are forced to deploy morenumber of machines continuously. On the other hand, it hasbeen observed that there are large number of machines indifferent organizations, educational institutions etc...
At present, there exist the following problems in online course design in our country: pay more attention on teaching content presentation, but less on learning environment design, lack of teaching and learning activities, etc, which have seriously affected the quality of online courses. Based on the research and analysis of currently online course applications, we have got an insightful understanding...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
The management of knowledge, in particular knowledge about the architecture, plays a pivotal role in global software development (GSD). In earlier research, we have defined what architectural knowledge is, and elaborated several practices for sound architectural knowledge management in a distributed setting. In this paper, we report on a large survey performed at an agile global software development...
Stakeholder concerns extend beyond end-user functionality and often go beyond error free operation, fast response times, high throughput, high availability and security. A large set of stakeholder concerns relate to the cost of building, owning and managing an IT-system in terms of quality attributes such as the ease of modifiability, configurability, manageability, usability and maximizing the system's...
In the present paper we discuss the concepts on which is based the GEMBus framework, a multi-domain, federated Enterprise Service Bus. Then, we show certain production scenarios as general use-cases, and a brief analysis of the selected platforms for the basis of the framework. Furthermore, we discuss the role that Autonomic Computing (AC) services play on the framework, showing a representative scenario...
In this paper we introduce a new software architecture for autonomic grid computing networks by military C4ISR (command, control, communications, computers and intelligence, surveillance, & reconnaissance) architecture. We discuss self-* property of autonomic grid computing networks in autonomic grid computing networks can lead and manage by C4ISR architecture because we found many held in common...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
Remote sensing provides huge multi-temporal data for earth surface, which has not been used completely. In the study, based on Visual C++ and Geographic Information System (GIS) platform, a multi-temporal data processing system using Grey Model (GM) is developed. By the interactive system, some functions, such as data input/output, visualization, simulation, prediction, data transformation, comparison,...
Trust based access control models have recently attracted significant interest in the area of pervasive computing. In several trust based models, organizations are required to establish a set of trust beliefs regarding their neighboring nodes. In an organization there may be multiple administrators or the administrators may change with time. When multiple administrators contribute to the creation...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
This paper describes a new path computation model in Multi-protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. It introduces a path computation element (PCE), which is functionally separate from label switching routers (LSRs). The Path Computation Element (PCE) is an entity that is capable of computing a network path or route based on a network graph, and applying computational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.