The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of our research is to define a requirements model for Adaptive Multi-organizational Systems. Our work considers the functional complexity of contemporary internet-based, multi-organizational systems. Not only the business functions, but also the interactions between the components of such systems are highly dynamic and global. Furthermore, these systems function in extremely uncertain...
In the present paper, the desired Data/Info that the operational officers need is examined, both during the design phase and during the execution of operational missions. This information has been developed and organized by several military and civilian authorities and organizations at national and international level, but there are severe problems in acquiring external collections of Data/Info. In...
Demand for reliable, efficient mobile network services is increasing, as customers seek for more value-added services (VAS) from telecom operators. However, many operators still suffer from network outages as they do not have solutions in place that will detect and alert them of a problem even before it escalates. Network outages can be prevented through a comprehensive, intelligent monitoring system...
This paper discusses several important concepts in cybernetics, including holism, transformation, variety, feedback, control, autopoiesis, and nearly decomposable systems. The paper then examines and critiques three systems methodologies that are based on these concepts, and identifies their strengths and weaknesses. The approaches include Forrester's System Dynamics, Checkland's Soft Systems Methodology,...
Cross-organizational service-based processes are increasingly adopted by different companies when they can not achieve goals on their own. In order to guarantee that all involved partners are informed about errors that may happen in the collaboration, it is necessary to monitor the execution process by continuously observing and checking message exchanges during runtime. This allows a global process...
Programme is characteristic for its large-scale and long period. With complexity and uncertainty, the difficulty of programme risk management is increased. The essential features of programme risk and the basic ideas of integrated risk management are introduced in this paper. Based on the Hall Three Dimensions Structure Theory, an integrated risk management system of programme is set up in terms of...
This research investigates the relative effects of both organizational culture and profession on indicators of knowledge transfer. Using HLM, the effects of two organization types that contain different professions; "Operations" and "Support," are compared in their effects, as are those of partner similarity-a variable hypothesized to vary between the two organization types. Results...
Though water pollution control and prevention technologies have made a great progress, most polluting enterprises even have never heard of them, not to mention use them. So we design an technologies sharing model based on information Grid, and focus our discussion on the process of searching and invoking the wanted technologies with mobile agents.
Due to the dynamic characteristic of nodes in the Grid environment, the state of nodes need be efficiently monitored. Grid node organization, deployment, configuration and management problems of Grid monitoring system are the closely-related. Benefiting from self-management and self-configuration thinking of Autonomic Computing, the node self-organization mechanism and node initialization algorithm...
Emergence of enterprise modeling, and high integration of supply chains, virtual enterprises (VEs), virtual organizations (VOs), virtual government, agent programming, and autonomous systems represent a major trend in which organizations and enterprises seek joint organizations that allow them to participate in competitive business opportunities in new markets for innovative developments. An the virtual...
A fast inter mode decision algorithm for H.264 is proposed in this paper. Computational savings are achieved by identifying macroblocks (MBs) that are likely to be skipped in advance. This early prediction are made by three steps: 1) Based on the correlation of MBs and threshold, prior to motion estimation (ME), SKIP mode can be decided; 2) After ME, if the distortion for SKIP is less than or equal...
Due to the continuously growing possibilities provided by technology and its wider application, today's IT products are becoming more and more complex both from technical and managerial standpoints. Very often, multiple parties are involved in their development. Consequently, the organization of the integration and testing of these products gets increasingly complex. Organisations already encounter...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
Compliance management (CM) is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. Compliance auditing (CA) is a child-process of CM where compliance rules and policies are individually checked against the organization to determine the level of compliance achieved by the organization. In this paper, we arrange organizational...
Requirements modeling has been recently introduced in the UML world with the form of a new profile called SysML. This paper explores the possibility to link concepts used to describe requirements with those of the enterprise language of RM-ODP. Some correspondence rules are proposed and illustrated on a case study.
An important issue to the adoption of any enterprise architectural approach is the availability of tools to support the development, storage, presentation, analysis, improvement and evolution of enterprise architecture representations. As with enterprise architecture methodologies, enterprise architecture tools to support the architectural development process are still emerging. Most important software...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
As Grid networks grows, the complexity of resource management in Grid networks dramatically increases. To manage the Grid resources efficiently, policy based resource management system is suitable. However, the policy which made at a moment could not be appropriate to other time because the condition of the grid resources with time space changes. Thus, in this paper, we propose asynchronous policy-based...
In this paper we demonstrate the generality and wide applicability of zero-knowledge proofs, a notion introduced by Goldwasser, Micali and Rackoff. These are probabilistic and interactive proofs that, for the members x of a language L, efficiently demonstrate membership in the language without conveying any additional knowledge. So far, zero-knowledge proofs were known only for some number theoretic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.