The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
The problem which companies want to face is the integration of the applications in an information system (IS) and the interconnection of the system itself with other information systems. The interoperability of IS constitutes, their ability to communicate and to inter-operate following a given model using a common language favoring the sharing of information for better performance and profitability...
Predicting memory occupancy during the execution of large-scale analytical workloads becomes critical for in-memory databases. In particular, probabilistic performance measures for such systems are of interest, but difficult to model with analytical methods due to the highly variable threading levels in corresponding workloads. Since literature with queueing theoretic background largely ignores the...
Diagnosis functionality as a key component for automated Network Management (NM) systems allows rapid, machine-level interpretation of acquired data. In existing work, network diagnosis has focused on building “point solutions” using configuration and performance management, alarm, and topology information from one network. While the use of automated anomaly detection and diagnosis techniques within...
The current operation and development of National Defense M&S (Modeling & Simulation) virtual test application runs by FOM (Federation Object Model) type through HLA/RTI during simulation to interchange data. Simulation data interchanged by this method is one-shot data and won't be stored persistently. However, FOM typed data is in need of analysis, processing and reusability for the purpose...
Model-Based Testing (MBT) is a method for automating software testing and improving fault detection by using an abstracted model of the system under test to systematically generate and execute test cases. One of the main challenges in MBT is the efficient locating of fundamental causes of errors, which can be achieved using root cause analysis. As MBT is being applied to many diverse domains using...
The growing number and size of clinical medical records (CMRs) represents new opportunities for finding meaningful patterns and patient treatment pathways while at the same time presenting a huge challenge for clinicians. Indeed, CMR repositories share many characteristics of the classical ‘big data’ problem, requiring specialised expertise for data management, extraction, and modelling. In order...
Five fully automatic methods for X-ray digital mammogram enhancement based on a fast analytical textural model are presented. These efficient single and double view enhancement methods are based on the underlying two-dimensional adaptive causal autoregressive texture model. The methods locally predict breast tissue texture from single or double view mammograms and enhance breast tissue abnormalities,...
Accurate detection of iris eyelids and reflections is the prerequisite for the accurate iris recognition, both in near-infrared or visible spectrum measurements. Undected iris occlusions otherwise dramatically decrease the iris recognition rate. This paper presents a fast multispectral iris occlusions detection method based on the underlying multispectral spatial probabilistic iris textural model...
During the last years, the development of maturity models for business process management (BPM) has increased significantly. However, tools which support comprehensively BPM maturity models and, therefore, reduce the effort and the costs of a maturity level analysis do not exist at the moment. We want to close this gap by developing an Intelligent Maturity Model-Tool which uses already available data...
This paper presents the importance of application and integration of learning styles in adaptive educational hypermedia systems — AEHS. The main goal of the paper is a comparative analysis of the data obtained from the initial questionnaire based on Felder-Silverman learning style model and the data from the user model and domain model of our AEHS system TeleEDUCOS. Results of the analysis indicate...
The benefits of interorganizational systems (IOS) can often not be realized due to unknown or undiscovered impediments, technical deficiencies or lacking organizational capabilities. Maturity models are prominent examples for the assessment of organizations and their capabilities for interoperability. Nevertheless, they are often subject to critiques with respect to their purpose of use, model evaluation,...
Ontology is the foundation of the Semantic Web, and the relational database is the most current data storage method on the World Wide Web, so the ontology storage research based on relational database is the one of the main problems. In order to achieve general storage of ontology data, make it easy to use the ontology data in the following application. This paper presents a model of storing Ontology...
This paper describes the basis and functionality of a semantic database system that supports building, analyzing, and comparing any models that can be described in English. The examples are from the domain of system development but the tool can be used for models in any domain.
The performance of multi-service applications are known to be determined mainly by the interactions between workload and behaviors of the application. The change of workload can lead to dynamic service demands on system resources, and even cause dynamic bottleneck switches between services inside the application. In this paper, to profiling large-applications' behaviors, and help to locate the bottleneck...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.