The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays more and more organisations use the collaborative environments, such as the social networks, to identify profiles of competencies, which are usually declared by the users themselves. We postulate that the analysis of the computer-supported collaborative activities may provide information about the users' competencies in specific domains. In this research work, we present a trace-based approach...
Online Analytics Processing (OLAP) is utilised to develop multidimensional operations enabling queries and visualisation for Business Intelligence (BI). Most of the OLAP systems come with a tightly integrated user interface for querying and visualisation of data without the core OLAP operations exposed as an API. Advanced BI applications can be developed and composed to create complex workflows if...
Haruspex is a suite of tools that assesses ICT risk through a scenario approach. Each scenario includes the target system and some threat agents that compose the attacks enabled by the system vulnerabilities to reach some predefined goals. The suite applies a Monte Carlo method with multiple simulations of the agent attacks against the target system. The simulation applies a formal model of the target...
Haruspex is a suite of tools that assesses ICT risk through a scenario approach. Each scenario includes the target system and some threat agents that compose the attacks enabled by the system vulnerabilities to reach some predefined goals. The suite applies a Monte Carlo method with multiple simulations of the agent attacks against the target system. The simulation applies a formal model of the target...
This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with security analytics package.
The rapid development of Intelligent Transport Systems has created new objectives and requirements for traffic simulation models. The development of visualization, procedural modeling, decision support requirements mean that simulation models need to satisfy different requirements. The chapter presents methods and tools to create distribute, integrated and interactive transport simulations, to enable...
Consumer interaction on Internet is establishing a new digital channel between the brands and their audiences. Exabytes of data are created everyday as information based on data models that keep growing in volume and variety. Predictive consumer scoring models have achieved significant lifts in conversion rates. Using the statistical techniques and other consumer web pioneers, personalized Predicate...
In this paper, we present CLOUDRUNNER, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CLOUDRUNNER automatically creates and configures virtual machines so that they can execute the applications,...
To resolve some bottleneck of certain missile weapon system simulation, simulating architecture, distributed simulation engine based-on HLA/RTI, simulation database management based on Oracle Berkeley DB, techniques of ocean waves synthesis based on directional spectrum and helicopter anti-submarine visual simulations are researched. The simulating result indicates that above research has great promoted...
This paper describes the architectural redesign of a distributed execution framework called State Machine Based Distributed System which uses a state machine-based representation of processes in order to reduce the applications development time while providing safety and reliability. Initially the system has been built on top of the .Net Framework employing static programming techniques and made use...
This paper provides a basic introduction to cloud computing for software developers and covers key concepts, major players and their offerings in the market today.
Cognitive radio has been a research hotspot because of its promise to improve the utilization of the assigned but unused radio spectrum. In order to have such ability, cognitive engine, the intelligent part of cognitive radio, should configure the system to adapt to its communication context. Although much artificial intelligence techniques have been proposed for the cognitive engine realization,...
One of the scariest aspects of doing business is the failure to come up with the right decision. This is one of the reasons why many businesses have failed because of one small wrong decision. So the aim of this paper is to develop web based business intelligence software as a service to help the enterprise to maximize the profit by analyzing the data and providing detailed graphical view of the business...
Synchronous execution of queries or Web service requests forces the calling application to block until the query/request is satisfied. The performance of applications can be significantly improved by asynchronous submission of queries, which allows the application to perform other processing instead of blocking while the query is executed, and to concurrently issue multiple queries. Concurrent submission...
The credit rating system for bank customers is based on J2EE technology architecture, is designed from the data sources, customers rating, approval rating and safety management and other aspects. In the paper, we describes the construction of bank customers in the background of credit rating system which is discussed in detail the application of Client/Web server/Application server/Database server...
In today' intensely competitive environment, traditional application systems such as ERP, lacks the autonomy and flexibility required by dynamic market. Given that, more and more companies are offering their software by Software as a Service (SaaS) application platform. Most SaaS platforms are implemented by traditional J2EE programming. This paper introduces a new well-designed SaaS application platform...
This Paper embarks from the actual demand of the Intelligent Computer-Assisted Instruction(ICAI) system, has analyzed system model, then creates a Web-based ICAI system and proposes the method to implement the teaching inference engine using prolog.
In recent years, the security issues on computer networks have become one of the primary concerns because the pervasiveness of computer technology has rendered computer networks to be more vulnerable to attacks than ever before. It is necessary to take corrective actions in the process of detecting surreptitious attacks to ensure proper safety of the entire system. However, effective post-intrusive...
With the increase of the number of independent database applications, Large organizations are eager to an effective solution of heterogeneous and distributed databases integration. Ontology is defined as an explicit formal specification of a shared conceptualization. It can provide semantics through relations between concepts and can be widely used on heterogeneous data. This paper mainly discusses...
Provenance, a record of the derivation history of scientific results, is critical for scientific workflows to support reproducibility, result interpretation, and problem diagnosis. Both prospective provenance, which captures an abstract workflow specification as a recipe for future data derivation, and retrospective provenance, which captures past workflow execution and data derivation information,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.