The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The health degree of large distributed information system reflected from the business perspective is the core index to measure the stability of information system. It has significant meaning for the fault diagnosis of any information system. To solve the above problems, a knowledge representation method based on weighted fault diagnosis is proposed in this paper. Based on the knowledge representation...
The exponential growth of internet traffic over the last twenty years presents a real challenge to ISP looking to ensure a reliable and efficient service to their customers. Network traffic is far from being straightforward to predict and a deep understanding of the routing domains is a first requirement to achieve proper management of the traffic. This paper focuses on the monitoring and characterization...
In this study we analyzed the curricula of 65 university students to investigate the impact of activities progression on student performances. Clustering curricula based on activity order and type we discovered a significant incidence on performance, validating the predictive power of curricula. Nevertheless, we discovered that the characterization of clusters is mainly due to non mandatory activities,...
This paper presents an overview on optimizing interoperability between different applications for enhanced return-on-investment through utilization of business intelligence in conjunction with prognostics and health management methodology. Such implementation is particularly suitable for deployment in mass-produced vehicle onboard diagnostics system.
Enterprises face the challenge of rapidly adapting to dynamic business environments. The traditional approach to process management is only partially appropriate to this new context, and calls for the advent of new, evolutionary business processes. This new approach attempts to address specific issues related to flexibility and adaptation such as design of easily adaptable processes, dynamic handling...
For enterprises, it is important to know how the IT infrastructure contributes to the business goals set. The COBIT IT governance framework provides a high-level view how this can be achieved. However, COBIT provides no machine-readable model that allows to refer to entities (processes, goals, actions, metrics etc.). In this paper, we present an approach to create a formal model for COBIT using an...
The concept and design of a valuable approach to enforce complex data migration activities in large-scale enterprise architecture projects could be seen as a competitive advantage. How can you meet the new challenges of global competitiveness? Might handling and reducing cost pressure be an asset?
Internet and World Wide Web foster the innovation of software. Networked software (or applications) has gradually been a promising form of Internet-based software, which would have a profound effect on human society. It is a hard task for software engineers to build rapid on-demand services of networked software in terms of personalized requirements. However, requirement evolution has received little...
This paper proposes an appropriate incentive scheme design for service delivery systems to ensure service deliverability. We use proactive continuous performance monitoring to provide qualitative observations and data on how well services are being provided and whether desired service outcomes are being achieved as a result of interaction between two parties (service provider and service requester)...
Workflow recognition through processing of humans and objects in a camera sensor network, presents a significant challenge recently. Human action recognition and sequence of actions manipulation, that construct a workflow situation/rule, has many practical applications in many different real human application environments. This article presents a multi agent based real time infrastructure, for recognizing...
As enterprise business process (BP) becomes more dynamic and flexible, business process management system (BPMS) is required to strengthen its capability to monitor the operation of BP. Referring to the monitoring mode from IBM's “WebSphere Business Integration”, this paper proposes the idea of monitoring BP based on process knowledge (PK), that is, utilizing PK extracted from BP to assist process...
The context: Results of performance evaluations of IT services are frequently based on technical metrics collected using tools. Subjective and uncertainty aspects, however, are disregarded or infrequently used. The problem: How to estimate the quality percent of an IT service, in order to provide a continual activity in the service life cycle, linked to a business-driven service improvement strategy...
In order to obtain full value from Business Process Management (BPM) solutions, small and medium-sized enterprises (SMEs) need to adopt an integrated suite approach that combines the Enterprise Resource Planning (ERP) functionality with the extended process capabilities. In this paper we propose a unified configurable architecture (UCA) to simplify and quicken the implementation of a BPM solution...
Regardless of which networking protocols or technologies form the core of the future Internet it is clear that the environment as a whole will need to support a very broad range of business and user interaction modes. In todays Internet we observe the growing trend for services to be both provided and consumed by loosely coupled value networks of consumers, providers and combined consumer/providers...
Monitoring on heterogeneous large-scale business process is crucial for system management. But heterogeneous large-scale business processes cannot be satisfactorily monitored because there is no interoperability among process monitoring functions provided by multiple vendors. We found that monitoring on messages and messaging activities of Web Services Business Process Execution Language (WS-BPEL)...
In last few years, the use of wireless sensor networks and cell phones has become ubiquitous; fusing these technologies in the field of business will open up new possibilities. To fill this lacuna, a novel idea is proposed where the combination of these will facilitate stores to receive feedback on their products and services. Systempsilas unobtrusive sensors will not only collect shopping data from...
Being a novel P2P system, P2P E-commerce faces all network security issues as ordinary P2P systems do. One of the most severe threats is the imminent worm attacks aiming at P2P systems. Simple definition and taxonomy of P2P worm are presented and characteristics of different types of P2P worm are discussed. The possibility of using P2P system to contain P2P worm is explored, and preliminary countermeasures...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.