The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
OCRA provides a language and tool support to model and analyze acomponent-based architecture enriched with contracts. Assumptions andguarantees of components are specified in different variants oflinear-time temporal logics, supporting variables with infinitedomains and continuous dynamics. The tool provides different analysistechniques including contracts refinement checking, contract-basedcompositional...
When a Department of National Defence (DND) project manager expresses clarity in how much money he/she needs to implement a project as well as cover through-life costs, it is an optimal situation. The information presented in this paper answers the "CENTRAL" question: what process could be used to integrate Availability Reliability and Maintainability (AR&M) and In-Service Support (ISS)...
Previous approaches to fault and failure modeling are based on adding explicit models of faults/failures, and failure propagation to behavioral and architectural modes. This adds a lot of overhead (extra work), and also, is a cause of creating inconsistencies, especially by obtaining a mismatch between failures and violation of requirements or specifications. Instead of creating separate models for...
The Business Process Model Notation (BPMN) provides a standard graphical language that can be used by business analysts for modeling business process choreographies. A challenging task is to formally verify that constructed choreography models are logically correct with respect to safety, liveness, and various application-specific correctness requirements. To aid with this important task, we present...
Based on the generalized model of principal-agent theory, the Holmstrom-Milgrom Model is pre-digested, which is adopted mostly in literatures. However, the model assumes that the production function is linear, and the model doesn't consider the ability level of agent, except for the effort level. This paper incorporates the ability level of the agent into the Holmstrom-Milgrom Model, constructing...
With the rapid growth of financial markets, many complex derivatives have been structured to meet specific financial goals. But most complex derivatives have no analytical formulas for their prices, e.g., when more than one market variable is factored. As a result, they must be priced by numerical methods such as lattice. A derivative is called multivariate if its value depends on more than one market...
Short-wave near-infrared (SWNIR) technique was applied to determine the protein contents in milk powder. NIR spectra in the 800-1025nm region of 350 milk powder samples were analyzed. Based on the whole SWNIR spectra, least-square support vector machine (LS-SVM) obtained the best performance than partial least squares (PLS). Determination coefficient for prediction (Rp2) and root mean square error...
The Open Distributed Processing Reference Model (ODP-RM) provides viewpoints and abstract infrastructure guidelines that can be used for a basis for enterprise architecture, especially for an inter-enterprise architecture. The ODP-RM does not prescribe methodology for modeling itself, but provides common vocabulary and focus for description. This paper performs a brief analysis of the ODP-RM (and...
We developed a quality of service (QoS) management system to support service level management (SLM) for global enterprise services. The QoS management system is integrated with one of our enterprise services in a preproduction system, an identical system as the production system but in a test environment. Lab experiments showed that our integrated solution helps global enterprise services to better...
Information privacy typically concerns the confidentiality of personal identifiable information (PII) and protected health information (PHI) such as electronic medical records. Thus, the information access control mechanism for e-health services must be embedded with privacy-enhancing technologies. Role-based access control (RBAC) model has been widely investigated and applied to various applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.