Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Data provenance is useful for data analysis, including auditing, debugging, evaluating the trust and quality, access control and so on. For the scale of data keep increasing, data provenance also become large and constantly growing, and it brings challenges to the efficiency of provenance tracking which is the important base of data analysis. This paper proposes a kind of dependency view based on...
Sampling is becoming increasingly important for performance analysis as an alternative to or enhancement of instrumentation based measurement methods, although instrumentation is still necessary to guarantee capture of specific events, such as communication calls. Typically, sampling is superior to instrumentation in terms of overhead as the sampling frequency can be controlled. However, sampling...
NestedMP: Taming Complex Configuration Space of Degree of Parallelism for Nested-Parallel Programs. It is beneficial to exploit multiple levels of parallelism for a wide range of applications, because a typical server already has tens of processor cores now. As the number of cores in a computer is increasing rapidly, efficient support of nested parallelism will be more important. However, compared...
This paper tackles the issue of ambient systems adaptation to users' needs while the environment and users' preferences evolve continuously. We propose the adaptive multi-agent system Amadeus whose goal is to learn from users' actions and contexts how to perform actions on behalf of the users in similar contexts. However, considering the possible changes of users preferences, a previously learnt behaviour...
In today's world the competitiveness of an organization is decided by its ability to adapt to dynamically changing environments. Goal-based Social BPM (SBPM) has been proposed to overcome the rigid and sequential nature of traditional workflow and BPM models. This paper discusses the main components of this SBPM framework which are the role assignment and process recommendation mechanisms, explaining...
Oriented Programming is the supplement with OOP, which separate the core business logic from general supported service in software development. The concepts of AOP and the technology characteristics of .NET framework are introduced, then this paper analyzed the implement mechanism of AOP in .NET framework, finally an approach to implement AOP Framework in .NET framework and a corresponding example...
This article describes the first version of a tool designed to infer the network characteristics of JADE-based multiagent systems. The rationale behind the tool is that systems in general and multiagent system in particular, often have some hidden dynamics that contribute to the emergence of desired and undesired characteristics. Traditional sniffing tools simply display the message exchange. The...
In order to ensure accessibility of user interface, it is highly recommended to elaborate a generic solution which is compliant to disable user requirements and best accommodates their particular needs. Therefore, we propose, in this paper, a generic MDA-based solution of adapting application's interface to accessibility context. It consists of generating, automatically, accessible adapted User Interfaces...
Policies are rules that govern the choices in behavior of a system. Policy based management aims at supporting dynamic adaptability of behavior by changing policy without recoding or stopping the system. The common accepted architecture of such systems includes two main management agents: the Policy Decision Point that analyses requests and set decisions based on a policy and the Policy Enforcement...
Complex event processing has become an important technology for big data and intelligent computing because it facilitates the creation of actionable, situational knowledge from potentially large amount events in soft realtime. Complex event processing can be instrumental for many mission-critical applications, such as business intelligence, algorithmic stock trading, and intrusion detection. Hence,...
The advancement of technologies in the area of Ubiquitous Computing has resulted in a widespread use of services in order to improve the quality of human life. These services should be permeable to end-users so that they can compose and configure them in order to personalize them and have an experience of having proper control over them. On the other hand, adaptation during service usage is essential...
Composite applications leveraging the functionalities offered by Web services are today the underpinnings of enterprise computing. However, current Web services composition systems make only use of functional requirements in the selection process of component Web services, while the transactional consistency and quality of service (QoS) are crucial parameters of most business applications. In this...
Kernel minimization has already been established as a practical approach to reducing the trusted computing base. Existing solutions have largely focused on whole-system profiling - generating a globally minimum kernel image that is being shared by all applications. However, since different applications use only part of the kernel's code base, the minimized kernel still includes an unnecessarily large...
Users utilize web applications to perform everyday tasks in order to achieve personal goals. Personalized Web-Tasking (PWT) is the automation of such web interactions while exploiting personal context to enrich users experience. However, web-tasking is affected by unpredictable context behaviour -- environment, user, and infrastructure -- and situational changes. Given that current web systems are...
An emerging threat vector, embedded malware inside popular document formats, has become rampant since 2008. Owed to its wide-spread use and Javascript support, PDF has been the primary vehicle for delivering embedded exploits. Unfortunately, existing defenses are limited in effectiveness, vulnerable to evasion, or computationally expensive to be employed as an on-line protection system. In this paper,...
Autonomous adaptation in self-adapting embedded real-time systems introduces novel risks as it may lead to unforeseen system behavior. An anomaly detection framework integrated in a real-time operating system can ease the identification of such suspicious novel behavior and, thereby, offers the potential to enhance the reliability of the considered self-x system. However, anomaly detection is based...
The increasing use of runtime-compiled applications provides an opportunity for coarse-grained reconfigurable architecture (CGRA) accelerators to be used in a user-transparent way. The challenge is to provide efficient runtime translation for CGRAs. Despite the apparent difficulties stemming from the heterogeneous nature of CGRAs, this paper demonstrates that it is possible to speed up runtime-compiled...
The design and implementation of a multitasking run-time system on a tightly coupled FPGA-CPU platform is presented. Using a mix of CPU and FPGA programmable logic for computing, user applications are executed as mixed-architecture processes from the perspective of the OS. Context switching mechanisms with hybrid scheduling containing both blocking and preemption support were implemented to support...
Service-based business processes must evolve to remain aligned with their goals, with zero downtime to guarantee business continuity. A new version of a service should be adopted as soon as it becomes available to let clients benefit from the updated functionality and/or improved quality of service. In practice, however, existing services may be involved in distributed computations that cannot immediately...
Determining similarity between trees is an important problem in a variety of areas. The subtree similarity-search problem is that of finding, given a tree Q and a large set of trees Γ = {T1; …; Tn}, the subtrees of trees among Γ that are most similar to Q. Similarity is defined using some tree distance function. While subtree similarity-search has been studied in the past, solutions mostly focused...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.