The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In electronic commerce, buyers and sellers conduct transactions without physical interactions. In reputation systems, the trustworthiness of sellers is achieved by aggregating the ratings shared by other buyers with whom the sellers have ever conducted transactions. However, the ratings provided by buyers for evaluating the same seller could be diverse due to their different judgment criteria, which...
Enterprise architecture supports enterprise transformation through model-based holistic descriptions that capture and share the knowledge, concepts, and relationships representing the enterprise. Although enterprise architecture models portray the gap between the as-is and to-be enterprise, they disregard the underlying aspects that together enact enterprise transformation. This paper proposes an...
Today, processing integrated information within and between enterprises is increasingly becoming more and more critical, and so is the implementation and evaluation of an Enterprise Architecture (EA). The review of literature on EA evaluation shows several issues. However, the evaluation of EAs has not attracted sufficient attention, and thus, this research area has not been explored thoroughly yet...
Due to the initial investments needed by companies to acquire the necessary expertise, hardware and software to run proper Big Data Analytics, small and medium enterprises (SMEs) are often incapacitated from exploiting the full benefits of Big Data. The Model-Driven provided by Toreador promises to support SMEs in reaping the fruits of Big Data Analytics, by keeping the inherent costs at a minimum...
Cognitive agents are typically utilized in autonomous systems for automated decision making. These systems interact at real time with their environment and are generally heavily power constrained. Thus, there is a strong need for a real time agent running on a low power platform. This paper examines how some of the components of a cognitive agent can be mapped onto lookup tables stored in memristor...
The recent growth of popularity of cloud computing services delivers various benefits in multiple fields of activity, including reduced resource costs due to optimized hardware setup, as well as improving mobility. However, cloud computing has some issues that need to be clarified, one of which is the security of cloud computing. The dispersion of cloud service vendors means that most security issues...
The ontological change, understood as the process that allows to represent, implement, maintain and propagate the update of an ontology, it is managed mainly from two perspectives: version control and ontological evolution. Among the alternatives proposed management is supported management in conceptual models, where abstraction implementation language used in the construction and deployment of ontology...
Under the background of system-of-systems (SoS) counterwork, it is more apparent that the simulation modeling of the equipment should be domain-specific, formal, automatic and composable. Current equipment effectiveness simulation modeling approaches are mainly based on the methods and techniques from the modeling and simulation (M&S) community and software engineering community, and they are...
Enterprise architecture (EA) model analysis can be defined as the application of property assessment criteria to EA models. Ontologies can be used to represent conceptual models, allowing the application of computational inference to derive logical conclusions from the facts present in the models. As the actual common EA modelling languages are conceptual, advantage can be taken of representing such...
Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over internet as a service providing cost effective and scalable solution to customers. As the customer needs are growing for the solutions of the complex problem, there is the need for the services from different cloud service providers...
In the last few years, we witnessed a growing interest in interoperability and portability topics within the Cloud Computing area. In fact, most heterogeneous PaaS solutions have been developed with no standard APIs, and with different models and levels of service; in this scenario, vendor lock-in becomes an issue. Cloud4SOA project aims to design and develop a Reference Architecture that could solve...
In the contemporary cloud computing environment, the various cloud providers adopt different architectures for their systems and usually these are not compatible. The scalable exchange of information about these heterogeneous resources is often not addressed; still this represents an interesting challenge, since different Cloud systems and vendors have different ways to describe and invoke their services,...
Software Architecture often evolves to meet the new requirement in component based software development. For understanding the nature of SA evolution and improve its quality, in this paper, we propose a model driven methodology to record and analyze the software architecture evolution information. That is, we record evolution information by using Extended Component Description Language and Ontology,...
Cloud computing is a promising business and computing model. The cloud storage is an essential and most used service, which provides stable and massive data storage space to end users. In this research work, new private cloud storage architecture is proposed with decentralized indexing which is based on peer to peer network. The proposed cloud architecture has semantic middleware for data storage...
SmartLife ecosystems are emerging as intelligent user-centered systems that will shape future trends in technology and communication. Biological metaphors of living adaptable ecosystems provide the logical foundation for self-optimizing and self-healing run-time environments for intelligent adaptable business services and related information systems with service-oriented enterprise architectures....
Enterprise architecture involves the use of models for facilitating the communication between stakeholders, which is required for the maintenance of the business/IT alignment. In that sense, the models should provide the necessary information for articulated decision-making, which, in complex scenarios, can result in the overwhelming complexity of the architecture descriptions. The complexity of the...
The cloud computing paradigm with its pay-as-you-use business model is envisioned to provide immense benefits and promising returns. Hybrid cloud computing deployment model offers a viable solution of in-house private cloud with limited or unavailable resources on hand to meet the application requirements or at runtime. However, due to the large-scale, widely distributed and complexity of the underlying...
Cloud computing has emerged as one of the hottest area in the field of computer technology, which is used to deliver resources on demand. Users of the cloud can access the services published by the cloud providers. The availability of many cloud providers throughout the world has introduced the need for research in cloud service repository model and discovery. Searching a suitable cloud provider and...
Classical ontology is not sufficient to deal with vague or imprecise knowledge for real world applications such as malware behavioral analysis. In addition, malware has grown into a pressing problem for governments and commercial organizations. Anti-malware applications represent one of the most important research topics in the area of information security threat. As a countermeasure, enhanced systems...
Knowledge service is the integration of knowledge and services in which knowledge serves as a resource to be provided for consumers so as to achieve the purposes of knowledge exchanging, knowledge sharing and problem solving. This paper first introduces the typical knowledge service models, and then makes a review of the knowledge service system architecture raised in recent years. On that basis,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.