The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Specific requirements and characteristics of primary storage make designing desirable deduplication schemes a sophisticated task. In this paper, we propose DIODE, a Dynamic Inline-Offline DEduplication scheme that provides salient read/write performance and space-saving simultaneously for primary storage systems. DIODE orchestrates inline and offline processes in a dynamic manner. We propose two innovative...
With the rapid development of regional economy in Shandong Province, the demand of electric power increases rapidly. So, the development of the substation construction and its status information detection system has led to the massive power equipment status information data, which needs to be sorted out and standardized work. In this paper, the MapReduce technology is used for the degradation processing...
Continuous assessment of the quality of health-related life (HRQoL) of patients is an important aspect of health and gives rise to several readings. On one hand, the enormous amount of information that is generated allows the extraction of knowledge with great accuracy concerning the disease, the treatments and the impact it has on society, on the other hand, this continuous monitoring allows effective...
In the past few years, the advances in context-aware systems and sensor technologies, has elevated the Internet of Things (IoT) development greatly and rather quickly. Services of IoT systems must be reasonably designed to provide not only the user's requirements and requests, but also perceive the environmental context and customized services to get user's satisfaction. Systematic modeling methodologies...
Applications in the cloud are subject to sporadic changes due to operational activities such as upgrade, redeployment, and on-demand scaling. These operations are also subject to interferences from other simultaneous operations. Increasing the dependability of these sporadic operations is non-trivial, particularly since traditional anomaly-detection-based diagnosis techniques are less effective during...
This paper discusses the topic of uncertainty quantification in prognostics and explains the importance of accurately estimating such uncertainty in order to aid risk-informed operational decision-making. Since prognostics deals with predicting the future behavior of engineering systems, it is impossible to accurately predict the future response, and therefore, it is necessary to compute the uncertainty...
Drawing on the concept of Network Centric Warfare (NCW) in the military domain, we provide a generic provider-consumer services framework to model services exchange networks. An example use of the model in the context of healthcare is provided in order to illustrate its multi-domain applicability. The framework is based on the exchange of six fundamental services between the entities in the network:...
Cyber analysis is a difficult task for analysts due to huge amounts of noise-abundant monitoring data and increasing complexity of the reasoning tasks. Therefore, experience from experts can provide guidance for analysts' analytical reasoning and contribute to training. Despite its great potential benefits, experience has not been effectively leveraged in the existing reasoning support systems due...
The paper focuses on implementation of the integral OLAP-model constructing method for the emergency risk estimation in the case of Krasnoyarsk region. Emergency, meteorological, hydrological, seismological, radiation, flood, housing and communal situations are observed. The process of an analytical query constructing support based on integral OLAP-model is described. Discovered nonstandard analytical...
As a result of new business demands and technological advances processes are becoming increasingly complex and heterogeneous. This calls for business processes that must be managed in an autonomic manner in response to changes in its environmental context. However, a key challenge is to provide variability, understandability and scalability in modeling increasingly complex business processes. In our...
Human-intensive cyber-physical systems involve software applications and hardware devices, but also depend upon the expertise of human participants to achieve their goal. In this paper. we describe a project we have started to improve the effectiveness of such systems by providing Smart Checklists to support and guide human participants in carrying out their tasks, including their interactions with...
Excessive mobile phone use has gained attention in the media recently, where it has been associated with driving fatalities and productivity decrements as well as social embarrassment. To provide successful interventions, there is a need to understand why some mobile phone owners can't resist the urge to use their devices. Much prior research has investigated excessive use through the perspective...
This article focuses on describing a Model Driven Architecture (COCA-MDA) approach that facilitates the development of self-adaptive application for indoor wayfinding for individuals with cognitive impairments. COCA-MDA provides the following benefits: 1) It enables the architecture to anticipate several behavioural variations based on the context and the specific needs of the individuals with cognitive...
The automaton of program behavior based on system call is often used to model program behavior. The automaton of program behavior based on system call and time interval is proposed, which overcomes one of drawbacks of traditional automaton of program behavior based on system call: inability to monitor the program behavior between adjacent system calls. The method of quantifying time intervals between...
On the context of centralized ownership, the basic conflicts exited in the companies are not the principal-agent conflicts, but the principal-principal conflicts. According to this consideration, we choose the listed companies in China's manufacturing industry from 2003 to 2006 as our research target, and exam the relationship between firm value and ownership structure for the listed companies with...
Context is a significant factor in deciding the set of requirements relevant to a system (i.e., software product construction), the alternatives the system can adopt to satisfy these requirements, and the quality assessment of each alternative. By context we mean the conditions in the operating environment of an system that influences how the system should behave in different situations. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.