The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data with vastly different access characteristics is efficiently stored in multi-tiered storage systems. A cost-effective way to retain large volumes of infrequently accessed data is to store it on tape. Steady developments in tape technology deliver ever increasing storage capacities at low cost. This has established tape as a viable solution to cope with the extreme data growth in the context of...
The increase of amount of accumulated data in organizations have provoked the emergence of new necessities of more complex and efficient analysis tools, context in which the Business Intelligence spring up as a discipline for boarding this problem. The improvement of the efficiency in the storage and access to analytical databases has been reported in many researches, upon which results several companies...
A self-adaptive software aims at adjusting itself in response to changes at runtime while considering several important factors. To do this task, such a system should realize the adaptation process, which consists of four phases. Among those phases, we just focus on the deciding (planning) process, especially addressing adequate reflection of requirements to adaptation. In this paper, we represent...
Provenance awareness adds a new dimension to the engineering of service-based systems, enabling them to increase their accountability through answering questions about the provenance of any data produced. Provenance awareness can be achieved by recording provenance data during system execution. In our previous work we have proposed an overall research agenda towards a design and analysis framework...
In cyber analysis, it is highly desirable to support the analysis of junior analysts by leveraging the experiences of experts. But, there are two major challenges to achieve this goal. First, it is very costly to capture the experience of experts for the complex task of cyber analysis using traditional approaches such as protocol analysis. Second, it is difficult to identify previous experiences of...
Cyber analysis is a difficult task for analysts due to huge amounts of noise-abundant monitoring data and increasing complexity of the reasoning tasks. Therefore, experience from experts can provide guidance for analysts' analytical reasoning and contribute to training. Despite its great potential benefits, experience has not been effectively leveraged in the existing reasoning support systems due...
Analytical solutions are considered as increasingly important for modern enterprises. Currently, systematical adoption of analytical solutions is limited to only a small set of large enterprises, as the deployment cost is high due to high performance hardware requirement and expensive analytics software. Moreover, such on-premises solutions are not suitable for the occasional analytics consumers....
Highly available services are nowadays provided by large and complex systems built from Commercial-Of-The-Shelf (COTS) components. Such systems are deployed on top of standardized middleware services that manage service availability by monitoring the component health and by dynamically shifting workload from a faulty component to a healthy one. This management is achieved through the usage of a configuration...
Since security has become an essential asset in numerous application areas, the integration of security policies has become a major issue in the design of security architectures, and many commodity operating systems have been furnished with abstractions to support policy protection and enforcement.
Web log files store data related to the use of a website. Analyzing these data in detail is therefore crucial for improving the user browsing experience. However, usually Web log data are stored in flat files in different formats which hinders their analysis, thus obliging to use specific Web log analysis tools. In this context, approaches for structuring Web log data to better analyze them are highly...
With the rapid and profound changes in computing technology, distributed computing, as an important branch of it, is becoming increasingly important, and gradually shifts from academia to specific areas of application. Currently, extensive researches on cloud computing, grid computing, large-scale E-Commerce web sites are all manifestations of a distributed system. Participating entities in a distributed...
The performance analysis of distributed software systems is a challenging task in which the assessment of performance measures is a vital step. Due to its versatility, the concept of software performance engineering (SPE) has been advocated as a promising solution towards realizing that step. This paper illustrates how by using our recently proposed Model-Driven SPE (MDSPE) approach, one can design...
Interactions between dependent or conflicting aspects are a well-known problem with aspect-oriented development (and related paradigms). These interactions are potentially dangerous and can lead to unexpected or incorrect results when aspects are composed. To date, most aspect interaction detection methods have been based either on purely syntactic comparisons or have relied on heavyweight formal...
Configuration complexity is a novel research field.The concept of configuration complexity is outlined in this paper, as well as current research is introduced briefly. Based on the current study results and best practice, improved configuration complexity quantitative model is proposed in the paper. Then, after an enterprise network environment is constructed in the laboratory, the quantitative model...
Next generation network on the high speed train is aimed to achieve high mobility, broadband and large data rates as required. However, the wireless signal has been proved instable due to high doppler shift, poor weather conditions and various geography environment. In this context, the e-business on the high speed train has to face a few e-business quality problems for wavy data rates and transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.