IARIA

Displaying 1081-1120 of 1224 results

  • White Papers // Jul 2011

    Studying the Impact of Partition on Data Reduction for Very Large Spatiotemporal Datasets

    Now-a-days, huge amounts of data are being collected with spatial and temporal components from sources such as metrological, satellite imagery etc. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology...

    Provided By IARIA

  • White Papers // Jul 2011

    Systems Biology Warehousing: Challenges and Strategies toward Effective Data Integration

    The rapid development of genomics, proteomics, metabolomics and structural genomics techniques have provided an unprecedented amount of data, enabling system-wide biological research. Although information integration has been well investigated in database theory research, biological data present numerous challenges from the lack of standard formats to data inconsistencies resulting from experimental...

    Provided By IARIA

  • White Papers // Jul 2011

    An Approach for Distributed Streams Mining Using Combination of Na?ve Bayes and Decision Trees

    Now-a-days the people have various kinds of data generated at high speed in distributed environment. In many cases, it is difficult or unallowed to gather all the distributed data into a central place for processing. So the people have to perform part of the work at the location where data...

    Provided By IARIA

  • White Papers // Jul 2011

    Remote Comparison of Database Tables

    Database systems hold mission critical data in all organizations. These data are often replicated for being processed by different applications as well as for disaster recovery. In order to help handle these replications, remote sets of data must be compared to detect unwanted changes due to hardware, system, software, application,...

    Provided By IARIA

  • White Papers // Jul 2011

    A Field Analysis of Relational Database Schemas in Open-Source Software

    The relational schemas of 407 open-source projects storing their data in MySQL or PostgreSQL databases are investigated by querying the standard information schema, looking for various issues. These SQL queries are released as the Salix free software. As it is fully relational and relies on standards, it may be installed...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficient Access to Non-Sequential Elements of a Search Tree

    This paper describes how a search tree can be extended in order to allow efficient access to predefined subsets of the stored elements. This is achieved by marking some of the elements of the search tree with marker bits. The authors show that their approach does not affect the asymptotic...

    Provided By IARIA

  • White Papers // Jul 2011

    Managing and Processing Office Documents in Oracle XML Database

    Office Open XML, an XML-based file format for office data, has been standardized, adopted by Microsoft Office 2007 and supported by other major office suites like OpenOffice. The question the authors try to answer in this paper is where Oracle XML DataBase (XMLDB) stands with respect to the new advances...

    Provided By IARIA

  • White Papers // Jul 2011

    An Algorithm for Clustering XML Data Stream Using Sliding Window

    This paper proposes an algorithm for clustering XML data stream using sliding window. It is a dynamic clustering algorithm based on XML structure. Firstly, the authors use level structure to represent XML document, which is based on temporal clustering feature. This structure is suitable for extracting information from XML document...

    Provided By IARIA

  • White Papers // Jul 2011

    Modeling of Microsystems Production Processes for the MinaBASE Process Knowledge Database Using Semantic Technologies

    In this paper, the authors present the consolidation of a process knowledge database for knowledge-intensive production processes in the field of micro-systems technology with a workflow component. Among the requirements to be met by the workflow component are the hierarchical presentation of process chains, a close integration of the product...

    Provided By IARIA

  • White Papers // Jul 2011

    Commonsense Knowledge Acquisition Using Compositional Relational Semantics

    A method for the acquisition of commonsense knowledge based on instantiations of meta-rules is presented. The meta-rules refer to some properties and objects that have those properties. Meta-rules are instantiated by automatically identifying objects that have those properties. In order to increase the applicability of a commonsense property to objects,...

    Provided By IARIA

  • White Papers // Jul 2011

    Merging Differential Updates in In-Memory Column Store

    To meet the performance requirements of enterprise application for both, transactional applications as well as analytical scenarios, data storage of in-memory databases are split into two parts: One optimized for reading and a write-optimized differential buffer. The read-optimized main storage together with the differential buffer for inserts provides the current...

    Provided By IARIA

  • White Papers // Jul 2011

    IMA: Identification of Multi-Author Student Assignment Submissions Using a Data Mining Approach

    In this paper, the authors describe a novel application of data mining techniques which can be used to identify multi-authorship contained within student submissions. They show that by regarding the pages of the submission as a set of Cascading Style Sheets, CSS type files, which they call Author Signature Styles...

    Provided By IARIA

  • White Papers // Jul 2011

    A Representation of Certain Answers for Views and Queries With Negation

    The paper is about databases content processing, namely query processing. Certain answers are very important in the study of the data complexity of the problem of answering queries using materialized views and constitute a semantics of query answers in mediated integration systems. The computing of these answers depends on database...

    Provided By IARIA

  • White Papers // Jul 2011

    Ambients of Persistent Concurrent Objects

    This paper develops a typed object-oriented paradigm equipped with message-based orthogonal persistence. Messages in this paradigm are viewed as typed objects. This view leads to a hierarchy of types of messages that belong to the core of typed reflective capabilities. Unlike most persistent object-oriented models, this model is equipped with...

    Provided By IARIA

  • White Papers // Jul 2011

    An Optimistic Transaction Model for a Disconnected Integration Architecture

    Now-a-days, Transaction Management (TM) must not only deal with short lived and flat transactions, TM must provide a transactional execution of long running and hierarchically structured business processes, so called complex transactions, involving many distributed loosely coupled, heterogeneous, and autonomous systems, represented as services as in Service Oriented Computing (SOC)...

    Provided By IARIA

  • White Papers // Jul 2011

    Employing Semantically Driven Adaptation for Amalgamating Software Quality Assurance with Process Management

    Often in software development processes, tighter and more systematic integration of quality assurance techniques and measurements in the operational processes is desirable. While some processes specify abstract quality assurance measures, concrete requisite measures directly relevant for specific product artifacts (e.g., code) or processes (e.g., testing) must be determined operationally and...

    Provided By IARIA

  • White Papers // Jul 2011

    Semantic Workflow Adaption in Support of Workflow Diversity

    The application of business process execution and guidance to environments with highly dynamic situations and workflow diversity is hindered by rigid predefined workflow models. Software engineering environments constitute an acute example where developers could benefit from automated workflow guidance if the workflows were made sufficiently concrete and conformant to actual...

    Provided By IARIA

  • White Papers // Jul 2011

    The Collaborative Gaming for Business in Pervasive Networks

    Ubiquitous collaboration should be provided for pervasively children and business people in not relation to their socio-economical conditions. This ubiquity is freely and openly to access various chances and resources in networked communities for global citizens. New business and knowledge based economy can be engendered by these active people. In...

    Provided By IARIA

  • White Papers // Jul 2011

    Using Reinforcement Learning for Autonomic Resource Allocation in Clouds: Towards a Fully Automated Workflow

    Dynamic and appropriate resource dimensioning is a crucial issue in cloud computing. As applications go more and more 24/7, online policies must be sought to balance performance with the cost of allocated virtual machines. Most industrial approaches to date use ad hoc manual policies, such as threshold-based ones. Providing good...

    Provided By IARIA

  • White Papers // Jun 2011

    Critical Friend Model: A Vision Towards Inter-Cooperative Grid Communities

    Much work is under way within the distributed computing community in order to assign a job to an appropriate resource discovered from a fully decentralized and heterogeneous infrastructure with reasonable cost, such as optimized job responsible time, executing price, etc. However, local resources of individual Virtual Organizations (VOs) are managed...

    Provided By IARIA

  • White Papers // Apr 2011

    Evaluation of Distributed SOAP and RESTful Mobile Web Services

    Even mobile Web Services are still provided using servers that usually reside in the core networks. Main reason for not providing large and complex Web Services from resource limited mobile devices is not only the volatility of wireless connections and mobility of mobile hosts, but also, the often limited processing...

    Provided By IARIA

  • White Papers // Apr 2011

    Traffic Shaping Via Congestion Signals Delegation

    This paper presents a new architecture that enables a set of clients to enforce traffic shaping policies among them through the delegation of congestion signals. When congestion-aware Internet flows share a bottleneck link, the users compete for bandwidth and must respond to congestion signals promptly by decreasing their throughput. For...

    Provided By IARIA

  • White Papers // Apr 2011

    A Further Look at the Distance-Availability Weighted Piece Selection Method: A BitTorrent Piece Selection Method for On-Demand Media Streaming

    During the last few years, BitTorrent has become a popular way of transferring large files over the Internet. However, the original out-of-order nature of the BitTorrent protocol has made it difficult to enable playback of media files that have not yet been fully transferred. In this paper, the authors describe...

    Provided By IARIA

  • White Papers // Apr 2011

    Call Admission Control Dimensioning for VoIP Traffic Over Wireless Access Networks: From Network to Application-Specific Perspective

    Admission control is a key issue for Quality of Service (QoS) provisioning in both wired and wireless communication networks. Providing QoS for voice traffic transmission over packet-based network is a crucial task, which requires development of accurate resource estimation models. In order to perform bandwidth saving and improve the naturalness...

    Provided By IARIA

  • White Papers // Apr 2011

    Model-Based Performance Anticipation in Multi-Tier Autonomic Systems: Methodology and Experiments

    This paper advocates for the introduction of performance awareness in autonomic systems. The authors' goal is to introduce performance prediction of a possible target configuration when a self-feature is planning a system reconfiguration. They propose a global and partially automated process based on queues and queuing networks modelling. This process...

    Provided By IARIA

  • White Papers // Apr 2011

    Layers Optimization Proposal in a Post-IP Network

    In this paper, a post IP structure is proposed, which eliminates the use of network and transport layers in networks with layer 2 connectivity. The goal is to optimize the network structure for distributed systems at the next generation Internet and to propose a delivery guarantee mechanism to FINLAN packets...

    Provided By IARIA

  • White Papers // Apr 2011

    Multiple Criteria Routing Approaches in Mesh Overlay Networks

    The multi-constrained optimal path problem is one of the main issues of Quality-of-Service (QoS) routing, which consists in finding a route between two nodes that meets a series of QoS requirements such as overall delay time, maximum acceptable packet loss ratio, and others. With the aim to improve the QoS...

    Provided By IARIA

  • White Papers // Apr 2011

    IMS-Centric Evaluation of IPv4/IPv6 Transition Methods in 3G UMTS Systems

    The Internet Protocol is facing version change nowadays, IPv4 will be replaced by IPv6 in the near future. This transition strongly affects also wireless and mobile architectures due to widespread application of IP-based mobile networking architectures, the continuously increasing number of mobile Internet users, and the emerging convergence of different...

    Provided By IARIA

  • White Papers // Apr 2011

    Simulation and Analysis of a QoS Multipath Routing Protocol for Smart Electricity Networks

    This paper presents several considerations that must be taken into account in the design of a QoS multipath routing protocol suitable for Smart Electricity Networks (SENs). The main goal is to analyze the routing requirements that will facilitate the future formal specification of a QoS-aware multipath routing algorithm for the...

    Provided By IARIA

  • White Papers // Apr 2011

    Efficiency Benefits Through Load-Balancing With Link Reliability Based Routing in WSNs

    In Wireless Sensor Networks (WSN) energy efficiency of routing protocols is of primary importance. Embedded with local load balancing mechanisms, the proposed L2RP protocol is a link reliability based routing protocol which aims to help source nodes to exploit the potential capabilities of their respective neighbors. As it is a...

    Provided By IARIA

  • White Papers // Apr 2011

    CARMA: A Distance Estimation Method for Internet Nodes and Its Usage in P2P Networks

    Topological distance estimation is the key to the efficiency in distributed systems and peer-to-peer networks. Contrary to many existing or proposed methods, which usually require the exchange of messages between the nodes, the authors have developed a metric, which is computed purely within a node, and which is based on...

    Provided By IARIA

  • White Papers // Apr 2011

    Improving IPTV QoE Taking the Suitable MPEG-2/MPEG-4 Quantizer Based on Jitter, Delay and Lost Packets Measurements

    MPEG-2 and MPEG-4 encoding are standards that are widely used by the digital television industry. Although, nowadays, MPEG-2 is the most used, MPEG-4 is gaining ground because it provides good quality image with lower bandwidth consumption. The application fields where MPEG-4 can be applied are Digital Television, interactive graphical applications...

    Provided By IARIA

  • White Papers // Apr 2011

    User Equipment Energy Efficiency Versus LTE Network Performance

    The purpose of this paper is to analyze the tradeoff conditions between battery saving opportunities at the user terminal and Long Term Evolution network performance. To achieve the goal Voice over IP with discontinuous reception and a vast amount of different settings, including on duration, inactivity and discontinuous reception cycle...

    Provided By IARIA

  • White Papers // Apr 2011

    Secure Video for Android Devices

    Android is rapidly gaining market share among smart phones with high-speed next-generation Internet connectivity. A whole new generation of users is consuming rich content that requires high throughput. Applications like FaceBook and YouTube have reached mobile devices. Multimedia data, i.e. video, is becoming easily accessible: large multi-media files are being...

    Provided By IARIA

  • White Papers // Apr 2011

    Evaluation of Spectrum Occupancy in an Urban Environment in a Cognitive Radio Context

    Lack of frequency spectrum is becoming one of the major problems in the telecommunication field with the introduction of several new radio communication technologies. Cognitive Radio (CR) technology promises to be one possible solution to this problem, by allowing access of unlicensed users in licensed bands, based on an opportunistic...

    Provided By IARIA

  • White Papers // Apr 2011

    Advanced Consideration of a Caller Pre-Validation Against Direct Spam Over Internet Telephony

    Spam over Internet Telephony as the distribution of unwanted voice messages over Voice over Internet Protocol networks is an upcoming threat. It is harder to prevent than e-mail spam since its content is not available before the victim is annoyed. This is even more difficult if the spam is sent...

    Provided By IARIA

  • White Papers // Apr 2011

    Software Defined Radio Certification in Europe: Challenges and Processes

    Standardization and certification of Software Defined Radio technologies are closely related. This paper describes the current standardization efforts for Software Defined Radio technologies in Europe and the related certification processes with a specific focus to the public safety and military domain. This paper describes the regulatory and technical requirements for...

    Provided By IARIA

  • White Papers // Apr 2011

    A Media Delivery Framework for on Demand Learning in Manufacturing Processes

    This paper presents a streaming-based E-Learning environment where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. It contains a comprehensive and detailed explanation of the proposed E-Learning streaming framework, especially the adaption of streaming services to mobile environments. The authors first analyze several...

    Provided By IARIA

  • White Papers // Apr 2011

    An Improved Multi-Band Speech Enhancement Method for Colored Noise Estimation and Reduction

    There are many situations where speech is affected by different kind of acoustic noise. The authors propose an improved spectral subtraction method for the reduction of colored acoustic noise added to the speech. Their implementation uses a multi-band spectral over subtraction method to reduce the colored noise. They use a...

    Provided By IARIA

  • White Papers // Apr 2011

    A Semantic-Oriented Framework for System Diagnosis

    In the field of system and network diagnosis, there is a variety of modeling and inference methods reported in literature. However, very few are focusing on the validation and knowledge transfer in case of similar symptoms. Many researchers targeted the use of a generic diagnosis framework, semantic-oriented solutions, and temporal...

    Provided By IARIA

  • White Papers // Jul 2013

    Towards Enhanced Usability of IT Security Mechanisms

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Feb 2013

    Starting a Spatially Enabled Society: a Web System for Collecting Volunteered Geographic Information in the Area of Public Security

    A spatially enabled society provides to citizens, businesses and government access to spatial data regardless of computing platform. The paper describes a collaborative Web system to gather geographic information about the area of public security and disseminate it at all levels of a society using Web 2.0 tools. The data...

    Provided By IARIA

  • White Papers // Jul 2011

    Trusted Data in IBM's Master Data Management

    A good business data model has little value if it lacks accurate, up-to-date customer data. This paper describes how data quality measures are processed and maintained in IBM InfoSphere MDM Server and IBM InfoSphere Information Server. It also introduces a notion of trust, which extends the concept of data quality...

    Provided By IARIA

  • White Papers // Jul 2011

    The Use of Data Cleansing in Mobile Devices

    Now-a-days, people utilize huge amount of data coming from a range of mobile devices under different data storage and data formats in order to make business. It is very well known that companies having useful information have better possibilities to exploited it, and make better informed decisions. Companies establishing better...

    Provided By IARIA

  • White Papers // Jul 2011

    A Secure Database System Using Homomorphic Encryption Schemes

    Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a...

    Provided By IARIA

  • White Papers // Jul 2011

    New Fuzzy Multi-Class Method to Train SVM Classifier

    In this paper, the authors present a new classification method based on Support Vector Machine (SVM) to treat multi-class problems. In the context of multi-class problems, they have to separate large number of classes. SVM becomes an important machine learning tool to handle multi-class problems. Usually, SVM classifiers are implemented...

    Provided By IARIA

  • White Papers // Jul 2011

    MAXCLIQUE Problem Solved Using SQL

    This paper aims to show that SQL queries can be used to solve a well-known combinatorial optimization problem, the MAXimum CLIQUE Problem (MAXCLIQUE). This problem arises in many real world applications as computer vision and pattern recognition or coding theory to mention some of them. A clique of a graph...

    Provided By IARIA

  • White Papers // Jul 2011

    Exploring Statistical Information for Applications-Specific Design and Evaluation of Hybrid XML Storage

    Modern relational database management systems provide hybrid XML storage, combining relational and native technologies. Hybrid storage offers many design alternatives for XML data and in this paper the authors explore how to aid the user in effective design of hybrid storage. In particular they investigate how the XML schema and...

    Provided By IARIA

  • White Papers // Jul 2011

    Transforming XPath Expressions Into Relational Algebra Expressions with Kleene Closure

    In the problem of translating X-Path expressions into SQL queries, the most challenging part is to find a way to minimize the use of Least Fix-Point (LFP) operators when a DTD graph contains cycles. In this paper, the authors address this issue and present a new algorithm to do the...

    Provided By IARIA

  • White Papers // Jul 2011

    Large Software Component Repositories into Small Index Files

    Software component repositories have adopted semi-structured data models for representing syntactic and semantic features of handled assets. Such models imply challenges to search engines, which are related to the design of indexing techniques that ought to be efficient in terms of storage space requirements. In such a context, by applying...

    Provided By IARIA

  • White Papers // Jul 2012

    Adaptive OLAP Caching: Towards a Better Quality of Service in Analytical Systems

    Now-a-days, the use of multidimensional data systems has become a part of everyday actions in medium and large companies. These systems, which concern mainly in aiding their users in the process of decision-making, have a large flexibility in data exploration and high performance response levels to queries. Despite all the...

    Provided By IARIA

  • White Papers // Sep 2011

    Enforcing the Repeated Execution of Logic in Workflows

    The repeated execution of workflow logic is a feature needed in many situations. Repetition of activities can be modeled with workflow constructs (e.g., loops) or external workflow configurations, or can be triggered by a user action during workflow execution. While the first two options are state of the art in...

    Provided By IARIA

  • White Papers // Jul 2012

    Using Business Process Simulation to Assess the Effect of Business Rules Automation

    Application of the business rules approach is often argued in research and practice to result in more efficient and enhanced processes. As the extent of this statement has yet to be shown, in this paper the process simulation method is applied to assess the effect of business rules externalization and...

    Provided By IARIA

  • White Papers // Jul 2012

    Cultural Intelligence Decision Support System for Business Activities

    With the rapid growth of globalization, cross-cultural business activities are on the rise. These activities are of increasing importance for individuals and organizations. As a result, culture has become a decisive factor in the success of cross-cultural business. In today's global marketplace, individuals and organizations must be culturally intelligent. The...

    Provided By IARIA

  • White Papers // Jan 2013

    Dr Warehouse - An Intelligent Software System for Epidemiological Monitoring, Prediction, and Research

    The authors present Dr Warehouse, an extensible intelligent web-based system for epidemiological analyses. It features a data warehouse containing medical data about registered disease cases and relevant demographical data. There is also a segment of the system that is devoted to presentation and analysis of epidemiological data collected in the...

    Provided By IARIA

  • White Papers // Jan 2013

    Data and Provenance Management for Climate Effect Studies Adaption of Climate Data With Distribution Based Scaling for Hydrological Simulations

    Climate effect studies are currently of high interest to predict the impact of a changing climate. The results of such studies are used by decision makers as a basis for planning how to mitigate and adapt to the effects of expected climate changes. However, these studies require heavy computations on...

    Provided By IARIA

  • White Papers // Jan 2013

    Business Intelligence in an Educational Landscape

    In this paper, the authors report a work in progress about the effectiveness of Business Intelligence in the academic environment. Business management, competitiveness, excess of information and dispersion of data in the organizational environment have proven to be important barriers that need to be overcome by managers today, both in...

    Provided By IARIA

  • White Papers // Jan 2013

    Feasibility of the Implementation of a UML to XML Evolution Architecture Using Eclipse as Technological Ecosystem

    Unified Modeling Language (UML) and eXtensible Markup Language (XML) are two of the most commonly used languages in software engineering processes. One of the most critical of these processes is that of model evolution and maintenance. More specifically, when an XML schema is modified, the changes should be propagated to...

    Provided By IARIA

  • White Papers // Jan 2013

    Parameterized Attribute and Service Levels Semantic Matchmaking Framework for Service Composition

    The paper presents a parameterized and highly customizable semantic matchmaking framework. The matchmaking approach on which this framework is based distinguishes three types of matching: functional attribute-level matching, functional service-level matching, and non-functional matching. This paper focuses only on functional matching. A series of algorithms is advised for both attribute-level...

    Provided By IARIA

  • White Papers // Jan 2013

    Modeling and Simulation Versions of Business Process Using Petri Nets

    This paper proposes a solution for modeling and simulating flexible Business Processes (BP) using version concepts. It advocates a Model Driven Architecture approach to handle versions of BP. The paper presents, first, a meta model (VBP2M: Versioned Business Process Meta Model) for modeling versions of BP considering six perspectives of...

    Provided By IARIA

  • White Papers // Jan 2013

    Enhancing Distributed Data Mining Performance by Multi-Agent Systems

    Data Mining (DM) is focused on identifying patterns and trends from massive data integrated within a data warehouse. However, a single data mining technique has not been proven appropriate for every domain and data set. Data mining is a computationally intensive process involving very large datasets, affecting the overall performance...

    Provided By IARIA

  • White Papers // Jan 2013

    Sales Prediction With Parametrized Time Series Analysis

    When forecasting sales figures, not only the sales history but also the future price of a product will influence the sales quantity. At first sight, multivariate time series seem to be the appropriate model for this task. Nontheless, in real life history is not always repeatable, i.e. in the case...

    Provided By IARIA

  • White Papers // Jan 2013

    Mapping XML to Key-Value Database

    XML is a popular data format used in many software applications. Native XML databases can be used for persistence of XML documents or the document can be stored in a relational database. In this paper, the authors propose an alternative storage for XML documents based on key-value databases. They propose...

    Provided By IARIA

  • White Papers // Jan 2013

    Considerations About Implementation Variants for Position Lists

    Within \"Traditional\" database systems (row store), the values of a tuple are usually stored in a physically connected manner. In a column store by contrast, all values of each single column are stored one after another. This orthogonal storage organization has the advantage that only data from columns which are...

    Provided By IARIA

  • White Papers // Jan 2013

    Modeling a Data Storage System (DSS) for Seamless Real-Time Information Support From Information Manufacturing System (IMS)

    Now-a-days, a large number of enterprises operate in a business time schedule of 24?7. These enterprises need to deliver information as fast as possible for information support. Therefore, the information manufacturing system of the enterprises should have the ability for seamless real-time information support. Data storage system in the information...

    Provided By IARIA

  • White Papers // Jan 2013

    Typing XPath Subexpressions With Respect to an XML Schema

    This paper discusses typing XPath sub-expressions with respect to an XML schema, which is a new static analysis problem of XPath expressions. More formally, the typing problem is to decide whether there exists an XML document conforming to a given XML schema such that the nodes of the document matching...

    Provided By IARIA

  • White Papers // Jan 2012

    Web Services Integration with Regard to the Metrics of Data Believability

    The paper is concerned with estimating the believability of data acquired from web services. In the paper, a new method for believability estimation is introduced. The method is designed for integrating web services. The believability estimation is based on the following metrics: quantity, reputation, approval, independence, traceability, maturity, authority and...

    Provided By IARIA

  • White Papers // Jan 2012

    Mastering Security Anomalies in Virtualized Computing Environments Via Complex Event Processing

    To protect computer systems and their users against security attacks, all potential security related incidents should be detected by monitoring system behavior. In this paper, a novel approach to detect, analyze and handle security anomalies in virtualized computing systems is presented. Adequate sensors on different virtualization layers monitor relevant events,...

    Provided By IARIA

  • White Papers // Jan 2012

    An Overview of Norwegian Linked Open Data - Applications in Regional Development and Environmentally Friendly Behavior

    With Norway being one of the few countries outside of the English speaking world with a clear governmental strategy and commitment to open data, combined with one of the highest Internet penetration and mobile access in Europe, it offers interesting opportunities for becoming a great testbed for consuming Linked Open...

    Provided By IARIA

  • White Papers // Aug 2011

    Supporting Synthetic Data-Driven Diagnosis Through Automated Fault-Injection

    The automotive industry has become steadily more reliant on software-intensive distributed systems to implement advanced vehicle features. In fact, it has been estimated that \"Up to 90% of all innovations are driven by electronics and software\". Given the lack of empirical data available from automotive serial-communication networks, an automated fault-injection...

    Provided By IARIA

  • White Papers // Aug 2012

    Improving Consumer Satisfaction Through Building an Allocation Cloud

    Consumer satisfaction depends on the quality of service. Services with high quality usually lead to high cost. Due to the budget limitation, consumers tend to acquire services with lowest cost. Feasible request allocation can improve service quality or reduce service cost. Some request allocation algorithms need the coordination with service...

    Provided By IARIA

  • White Papers // Jul 2011

    Systems of Systems Concept in Knowledge Management

    The development of new acquisition technologies is important function of knowledge management. They are realizing via powerful computer tools such as the Internet interactive hypermedia or the Large Knowledge Collider. But except powerful tools new cognitive concepts and procedures should be synthesized for knowledge evolution. The Systems of Systems approach...

    Provided By IARIA

  • White Papers // Jul 2011

    Enhancing Knowledge Flow by Mediated Mapping Between Conceptual Structures

    Intra- and inter-institutional knowledge flow usually is hindered by a number of mutually related knowledge barriers. Removing some of these barriers may enhance knowledge flow and thus open new opportunities for cooperation. In this paper, the authors illustrate how indirect conceptual mappings supported by a software tool can remove some...

    Provided By IARIA

  • White Papers // Sep 2012

    Structured Data and Source Code Analysis for Financial Fraud Investigations

    Financial fraud investigations are becoming increasingly complex. The volume of data continues to increase along with the volume and complexity of underlying source code logic. As the volume and complexity increase, so too does the importance of identifying techniques for reducing the data to manageable sizes and identifying fraudulent activity...

    Provided By IARIA

  • White Papers // Sep 2013

    Discovering and Linking Financial Data on the Web

    The constant publishing of large volumes of financial information by various business sector organizations through its financial statements is a fact that must be exploited by using semantic technologies. This paper describes the use of Linked Data to generate a financial dataset that is part of the ongoing work of...

    Provided By IARIA

  • White Papers // Aug 2011

    Towards Virtual Fault-Based Attacks for Security Validation

    Applications increasingly rely on secure embedded systems or \"Trusted hardware\". ASICs (or smart cards) are typically used for high security but SRAM-based FPGAs are also appealing to implement lower-cost and flexible systems. In both cases, designers need a validation of the achieved level of security before they undergo long and...

    Provided By IARIA

  • White Papers // Aug 2011

    On Time, Conflict, Weighting and Dependency Aspects of Assessing the Trustworthiness of Digital Records

    In the area of digital records management, the reliability of a digital record's operator varies over time, and consequently affects the trustworthiness of the record. The quality of the reliability of the operator is a measure of the quality of the record's evidential value that is, in turn, a measure...

    Provided By IARIA

  • White Papers // Sep 2011

    Towards \"Executable Reality\": Business Intelligence on Top of Linked Data

    Tight competition within mobile technology domain resulted to quite advanced applications and services for the users. Among them there are mobile (augmented and mixed) realities as an effort to enhance real-world observation by bridging it with virtual worlds of relevant data and services. At the same time, due to emerging...

    Provided By IARIA

  • White Papers // May 2013

    Factors Influencing Pervasiveness of Organisational Business Intelligence

    Organisations can derive great value from the effective use of Business Intelligence (BI). The pervasive use of BI can help improve decision making by providing business users with relevant information, which will ultimately lead to better organizational performance and efficiency. However, organisations still struggle to derive the full benefits BI...

    Provided By IARIA

  • White Papers // Sep 2012

    The Open Data Interface (ODI) Framework for Public Utilization of Big Data

    In the paper, the Open Data Interface (ODI) framework for public utilization of Big Data was suggested. Comparing to conventional Web based open APIs which provide restricted access to the internal database of large data companies, the ODI provides multi-level access of data in public domain, ranging from copying plain...

    Provided By IARIA