IARIA

Displaying 121-160 of 1223 results

  • White Papers // Jan 2013

    A Comparison of MapReduce and Parallel Database Management Systems

    Businesses have come to rely on their data warehouse as a key component in their information technology infrastructure. The costs of the architecture to support these environments are significant. Therefore, choosing the wrong architecture can be a very costly decision. However, considerable confusion exists in relation to MapReduce and parallel...

    Provided By IARIA

  • White Papers // Jan 2013

    A Validation Model of Data Input for Web Services

    Web services inherited many well-known security problems of web applications and brought new ones. Major data breaches today are consequences of bad input validation at the application level. This paper presents a way to implement an input validation model for web services which can be used to prevent cross-site scripting...

    Provided By IARIA

  • White Papers // Jan 2013

    WebODRA - A Web Framework for the Object-Oriented DBMS ODRA

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database. It makes it easier to develop web applications by raising the level of abstraction. In contrast to many existing solutions, where the business logic is developed in...

    Provided By IARIA

  • White Papers // Jan 2013

    Geometric Mean based Boosting Algorithm to Resolve Data Imbalance Problem

    Data imbalance problem has received a lot of attention in machine learning community because it is one of the causes that degrade the performance of classifiers or predictors. In this paper, the authors propose Geometric Mean based boosting algorithm (GM-Boost) to resolve the data imbalance problem. GM-Boost enables learning with...

    Provided By IARIA

  • White Papers // Jan 2013

    FIMIOQR: Frequent Itemsets Mining for Interactive OLAP Query Recommendation

    The authors propose in this paper an interactive query recommendation system, namely FIMIOQR. It is designed to help OLAP (On-Line Analytical Processing) users in their decision query writing task based on both a set of selected measures and decision queries log file. Their FIMIOQR system is designed to discover associations...

    Provided By IARIA

  • White Papers // Jan 2013

    Data Management According to the Good Scientific Practice

    Data Management in scientific and research processes needs to comply with rules defined in the Good Scientific Practice polices, e.g., issued by scientific institutes and research organizations. Typically these regulations include definitions to protect the data privacy and security throughout the entire lifecycle of the scientific data. Beginning from the...

    Provided By IARIA

  • White Papers // Jan 2013

    Primitive Operation Aggregation Algorithms for Improving Taxonomies for Large-Scale Hierarchical Classifiers

    Naive implementations of hierarchical classifiers that classify documents into large-scale taxonomy structures may face the contradiction between relevancy and efficiency performances. To address this problem, the authors focused on taxonomy modification algorithms for gradually improving the relevance performances of large-scale hierarchical classifiers. They developed four taxonomy modification algorithms that aggregate...

    Provided By IARIA

  • White Papers // Jan 2013

    A New Representation of WordNet Using Graph Databases

    WordNet is one of the most important resources in computation linguistics. The semantically related database of English terms is widely used in text analysis and retrieval domains, which constitute typical features, employed by social networks and other modern Web 2.0 applications. Under the hood, WordNet can be seen as a...

    Provided By IARIA

  • White Papers // Jan 2013

    An Implementation Model for Managing Data and Service Semantics in Systems Integration

    The ubiquity of data, services and computing devices demands a higher level of understanding of their real nature if one wants to create value-added services based on them. The human brain can understand the concepts behind these artifacts and find appropriate conceptual links easily, however, by applying semantic technologies (ontologies,...

    Provided By IARIA

  • White Papers // Jan 2013

    About Summarization in Large Fuzzy Databases

    Moved by the need increased for modeling of the fuzzy data, the success of the systems of exact generation of summary of data, the authors propose in this paper a new approach of generation of summary from fuzzy data called \"Fuzzy-SaintEtiQ\". This approach is an extension of the SaintEtiQ model...

    Provided By IARIA

  • White Papers // Jan 2013

    Shrinking Data Balls in Metric Indexes

    Some of the existing techniques for approximate similarity retrieval in metric spaces are focused on shrinking the query region by user-defined parameter. The authors modify this approach slightly and present a new approximation technique that shrinks data regions instead. The proposed technique can be applied to any metric indexing structure...

    Provided By IARIA

  • White Papers // Jan 2013

    Explanations of Recommendations Considering Human Factors in Recommender Systems

    Traditional evaluation metrics based on statistical formulas employed to assess the performance of a recommender system are now considered to be inadequate when utilized solely. New metrics considering the quality of user-system interaction alongside with traditional ones have been proposed in evaluation process in order to arrive at more adequate...

    Provided By IARIA

  • White Papers // Jan 2013

    Parallel Genetic Algorithm Model to Extract Association Rules

    Over the past generation, the process of discovering interesting association rules in data mining and knowledge discovery has become a cornerstone of contemporary decision support environments. While most of the existing algorithms do indeed focus on discovering high interestingness and accuracy relationships between items in the databases, they tend to...

    Provided By IARIA

  • White Papers // Jan 2013

    Parallel Processing of Multiple Graph Queries Using MapReduce

    Recently the volume of the graph data set is often too large to be processed with a single machine in a timely manner. A multi-user environment deteriorates this situation with many graph queries given by multiple users. In this paper, the authors address the problem of processing multiple graph queries...

    Provided By IARIA

  • White Papers // Jan 2013

    An Approach for Dynamic Materialization of Aggregates in Mixed Application Workloads

    Aggregate queries are one of the most resource intensive operations for databases systems. Despite scanning and processing large data sets, they only return relatively small outputs, making them predestined for reuse in future queries. The challenge is to manage the infinite number of possible data areas that can be selected...

    Provided By IARIA

  • White Papers // Jan 2013

    Comparison of Subspace Projection Method With Traditional Clustering Algorithms for Clustering Electricity Consumption Data

    There are many studies about using traditional clustering algorithms like K-means, SOM and Two-Step algorithms to cluster electricity consumption data for definition of representative consumption patterns or for further classification and prediction work. However, these approaches are lack of scalability with high dimensions. Nevertheless, they are widely used, because algorithms...

    Provided By IARIA

  • White Papers // Jan 2013

    Adoptation of Weil Pairing IBE for Secure File Sharing

    Competitive enterprise has lots of secret files in digital form, which is vulnerable to illegal online activity. The authors' target network accepts authorized users on registered machines. In general it is known that the traditional public-key scheme is suitable to strong authentication and encryption, but it is inferior to the...

    Provided By IARIA

  • White Papers // Jan 2013

    An Approach for Reduction of the Security Overhead in Smart Grid Communication Infrastructure Employing Dedicated Encryption

    Generally, a Smart Grid is an autonomous system consisting of an information collection network, a data management center, a power grid control center and power generation and transmission infrastructures. This paper considers an approach for partial reduction of the overhead implied by request for data security within the Smart Grid...

    Provided By IARIA

  • White Papers // Jan 2013

    A Real Time Synchronous V-C System with the Extracted Data from Buffering Function

    This paper introduces the state-of-art of the Real-time LVC (Live-Virtual-Constructive) interoperation systems that are being used for the purpose of warfare training and presents the first Real-time V-C (Virtual-Constructive) interoperation system building project. In this paper, the authors have developed a new UAV (Unmanned Aerial Vehicle) image simulation system, which...

    Provided By IARIA

  • White Papers // Jan 2013

    Mapping XML to Key-Value Database

    XML is a popular data format used in many software applications. Native XML databases can be used for persistence of XML documents or the document can be stored in a relational database. In this paper, the authors propose an alternative storage for XML documents based on key-value databases. They propose...

    Provided By IARIA

  • White Papers // Jan 2013

    Considerations About Implementation Variants for Position Lists

    Within \"Traditional\" database systems (row store), the values of a tuple are usually stored in a physically connected manner. In a column store by contrast, all values of each single column are stored one after another. This orthogonal storage organization has the advantage that only data from columns which are...

    Provided By IARIA

  • White Papers // Jan 2013

    Modeling a Data Storage System (DSS) for Seamless Real-Time Information Support From Information Manufacturing System (IMS)

    Now-a-days, a large number of enterprises operate in a business time schedule of 24?7. These enterprises need to deliver information as fast as possible for information support. Therefore, the information manufacturing system of the enterprises should have the ability for seamless real-time information support. Data storage system in the information...

    Provided By IARIA

  • White Papers // Jan 2013

    Typing XPath Subexpressions With Respect to an XML Schema

    This paper discusses typing XPath sub-expressions with respect to an XML schema, which is a new static analysis problem of XPath expressions. More formally, the typing problem is to decide whether there exists an XML document conforming to a given XML schema such that the nodes of the document matching...

    Provided By IARIA

  • White Papers // Jan 2013

    Finding Nearest Neighbors for Multi-Dimensional Data

    As one of the important research topics in the data mining field, the nearest neighbor search problem has been studied and various approaches have been proposed in different research scenarios. For example proposes a scheme for nearest neighbor search by hashing data points from a data set, so that for...

    Provided By IARIA

  • White Papers // Jan 2013

    Optimization of SuperSQL Execution by Query Decomposition

    SuperSQL is an extension of SQL that allows formatting and publishing of database contents into various kinds of application data directly as a result of a query. Possible application data output formats include, but are not limited to, HTML, PDF, XML, XLS, and Ajax-driven pages. Originally, the SuperSQL query is...

    Provided By IARIA

  • White Papers // Jan 2013

    On Using Object-Relational Technology for Querying LOD Repositories

    Query engines for managing RDF repositories based on relational technology represent an alternative to query engines based on triple-stores. The paper presents adaptation of object-relational technology for managing RDF data. The architecture of query engine for RDF databases is proposed: mapping of RDF graph model to object-relational representation is described,...

    Provided By IARIA

  • White Papers // Jan 2013

    Using Social Network Information to Identify User Contexts for Query Personalization

    In recent years, social networks have gained a huge popularity among internet users, serving diverse purposes and communities. Meanwhile, in data-oriented applications, the increasing amount of available data has made it hard for users to find the information they need in the way they consider relevant. To help matters, a...

    Provided By IARIA

  • White Papers // Jan 2013

    Dr Warehouse - An Intelligent Software System for Epidemiological Monitoring, Prediction, and Research

    The authors present Dr Warehouse, an extensible intelligent web-based system for epidemiological analyses. It features a data warehouse containing medical data about registered disease cases and relevant demographical data. There is also a segment of the system that is devoted to presentation and analysis of epidemiological data collected in the...

    Provided By IARIA

  • White Papers // Jan 2013

    Data and Provenance Management for Climate Effect Studies Adaption of Climate Data With Distribution Based Scaling for Hydrological Simulations

    Climate effect studies are currently of high interest to predict the impact of a changing climate. The results of such studies are used by decision makers as a basis for planning how to mitigate and adapt to the effects of expected climate changes. However, these studies require heavy computations on...

    Provided By IARIA

  • White Papers // Jan 2013

    Business Intelligence in an Educational Landscape

    In this paper, the authors report a work in progress about the effectiveness of Business Intelligence in the academic environment. Business management, competitiveness, excess of information and dispersion of data in the organizational environment have proven to be important barriers that need to be overcome by managers today, both in...

    Provided By IARIA

  • White Papers // Jan 2013

    Feasibility of the Implementation of a UML to XML Evolution Architecture Using Eclipse as Technological Ecosystem

    Unified Modeling Language (UML) and eXtensible Markup Language (XML) are two of the most commonly used languages in software engineering processes. One of the most critical of these processes is that of model evolution and maintenance. More specifically, when an XML schema is modified, the changes should be propagated to...

    Provided By IARIA

  • White Papers // Jan 2013

    Parameterized Attribute and Service Levels Semantic Matchmaking Framework for Service Composition

    The paper presents a parameterized and highly customizable semantic matchmaking framework. The matchmaking approach on which this framework is based distinguishes three types of matching: functional attribute-level matching, functional service-level matching, and non-functional matching. This paper focuses only on functional matching. A series of algorithms is advised for both attribute-level...

    Provided By IARIA

  • White Papers // Jan 2013

    Modeling and Simulation Versions of Business Process Using Petri Nets

    This paper proposes a solution for modeling and simulating flexible Business Processes (BP) using version concepts. It advocates a Model Driven Architecture approach to handle versions of BP. The paper presents, first, a meta model (VBP2M: Versioned Business Process Meta Model) for modeling versions of BP considering six perspectives of...

    Provided By IARIA

  • White Papers // Jan 2013

    Enhancing Distributed Data Mining Performance by Multi-Agent Systems

    Data Mining (DM) is focused on identifying patterns and trends from massive data integrated within a data warehouse. However, a single data mining technique has not been proven appropriate for every domain and data set. Data mining is a computationally intensive process involving very large datasets, affecting the overall performance...

    Provided By IARIA

  • White Papers // Jan 2013

    Sales Prediction With Parametrized Time Series Analysis

    When forecasting sales figures, not only the sales history but also the future price of a product will influence the sales quantity. At first sight, multivariate time series seem to be the appropriate model for this task. Nontheless, in real life history is not always repeatable, i.e. in the case...

    Provided By IARIA

  • White Papers // Jan 2013

    Clustering XML Data Streams by Structure based on Sliding Windows and Exponential Histograms

    To group online XML data streams by structure, this paper introduces an algorithm named the CXDSS-SWEH. It is a dynamic clustering algorithm based on sliding windows and exponential histograms. Firstly, the algorithm formalizes an XML document into a structure synopsis named Temporal Cluster Feature for XML Structure (TCFXS). Secondly, it...

    Provided By IARIA

  • White Papers // Jan 2013

    Capturing the History and Change Structure of Evolving Data

    Evo-graph is a model for data evolution that encompasses multiple versions of data and treats changes as first-class citizens. A change in evo-graph can be compound, comprising disparate changes, and is associated with the data items it affects. In previous papers, the authors have shown that recording data evolution with...

    Provided By IARIA

  • White Papers // Jan 2013

    Knowledge Enhanced Framework for Designing e-Workflow Systems

    Traditional workflow framework in implementing e-business processes has ignored the worker knowledge, the user feedback and problems resulting of incompatibility of inter-organization e-business processes. The limitation of this framework comes from its behavioral perspective, which focuses only on monitoring and detecting problems in the execution of homogenous intra-organization business processes....

    Provided By IARIA

  • White Papers // Jan 2013

    Towards Online Engagement Via the Social Web

    The blossom of Web 2.0 has created new opportunities for the enterprises. Web users are disseminating more information than ever before about their interests, their experiences with products and services, their thoughts and whatever interacts with them in a daily basis. The challenge for the enterprise is to exploit and...

    Provided By IARIA

  • White Papers // Jan 2013

    Merging Multidimensional Data Models: A Practical Approach for Schema and Data Instances

    Meta-model merging is the process of incorporating data models into an integrated, consistent model against which accurate queries may be processed. Within the data warehousing domain, the integration of data marts is often time-consuming. In this paper, the authors introduce an approach for the integration of relational star schemas, which...

    Provided By IARIA

  • White Papers // Jul 2011

    Collaborative Digital Library Services in a Cloud

    The authors have developed a web-based system that allows users to collaboratively organize large online image collections according to an evolving faceted classification schema. One of the major issues identified in the early deployment and evaluation in a university setting is the scalability of the system on traditional server implementations....

    Provided By IARIA

  • White Papers // Jul 2011

    Business Protocol Monitoring

    Because it is never sure that a business process successfully tested or statistically checked will have the expected behaviour during its execution, it is necessary to bring verification to the execution phase, by continuously observing and checking the correct behaviour of business processes during run-time. In this paper, the authors...

    Provided By IARIA

  • White Papers // May 2013

    Towards Semantic-Supported SmartLife System Architectures for Big Data Services in the Cloud

    SmartLife applications are emerging as intelligent user-centered systems that will shape future trends in technology and communication. The development of such applications integrates web services, cloud computing, and big data management, among other frameworks and methods. The authors' paper reports on new perspectives of services and cloud computing architectures for...

    Provided By IARIA

  • White Papers // Jul 2012

    Community-Commerce Brokering Arena for Opportunistic Cloud Services Offerings

    Community clouds are formed when a cloud infrastructure is created to support the needs of multiple, independent service consumers that have shared concerns. Such infrastructures may allow member organizations to share resources on an opportunistic basis, i.e., one entity may provide services to the other members during off-peak times, and...

    Provided By IARIA

  • White Papers // Jul 2012

    An Approach to Find Integration and Monitoring Points for Container Logistics Business Processes

    An end-to-end intermodal container transportation usually requires business processes of various enterprises to work together in a fast, accurate, reliable and secure way. This can be achieved with integrated business services, which are monitored constantly for the above mentioned quality objectives. Although there is academic research currently available for the...

    Provided By IARIA

  • White Papers // Jul 2012

    Workload Characterization for Stability-As-A-Service

    Stability-As-A-Service is critical for data centers and workload characterization is one of the essential services within Stability-As-A Service. Different solutions have been proposed in the past for characterizing various system properties, however most of these approaches often require high levels of instrumentation and intrusiveness. This makes their use difficult in...

    Provided By IARIA

  • White Papers // Jul 2012

    Visualization Method Based on Cloud Computing for Real Estate Information

    In order to accelerate the computing speed and display efficiency of large-scale information visualization, this paper proposes a visualization method based on cloud computing for real estate information. The core idea is combining cloud computing and information visualization, making the data processing stage of information visualization on the cloud computing...

    Provided By IARIA

  • White Papers // Aug 2011

    Adaptive Security on Service-based SCM Control System

    On a large-scale application subject to dynamic interactions, the description and enforcement of security rules are complex tasks to handle, as they involve heterogeneous entities that do not have the same capabilities. In the context of SCM-application for example, the authors have different goods that are being transported across different...

    Provided By IARIA

  • White Papers // May 2012

    Unsupervised Activity Recognition using Temporal Data Mining

    Excellent results have been obtained from data mining techniques in many areas. This paper presents one such technique, in the context of activity recognition in a smart home. The authors use sequential pattern mining to analyze the history of information transmitted by the sensors, discovering thereby the frequent activities of...

    Provided By IARIA

  • White Papers // Jun 2013

    A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things

    The Internet Of Things (IoT) is an architecture in which billions of devices with computing capacities and communication interfaces are connected to the internet and perform collaborative tasks. In this context security is a major issue. In this paper, the authors focus on access control services to logical (OPENID) and...

    Provided By IARIA

  • White Papers // Jun 2013

    Event-Driven Communication on Application Level in a Smart Home

    In recent years, research on the Internet of things focused on wired or wireless information transport. Progress has been made in energy-efficiency, reduction of bandwidth usage and bringing standard Internet protocols to small resource constrained devices. Yet, an application level protocol that not only aims at enabling such devices for...

    Provided By IARIA

  • White Papers // Jul 2013

    Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the automotive field. Hence, opportunities are not limited only...

    Provided By IARIA

  • White Papers // Jul 2011

    Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments

    Industrial control networks, e.g., for factory, process or energy automation and smart metering, are increasingly based on IT communication technologies like Ethernet, IP, and Web-Services. Security measures as authentication or cryptographic VPNs are used to protect communication links to supervising control stations and for remote service. While standard communication technologies...

    Provided By IARIA

  • White Papers // Apr 2012

    CincoSecurity: Automating the Security of Java EE Applications with Fine-Grained Roles and Security Profiles

    Almost every software system must include a security module to authenticate users and to authorize what elements of the system can be accessed by each user. This paper describes a security model called \"Cinco-Security\" that follows the Role Based Access Control model (RBAC), but implementing fine-grained roles that can be...

    Provided By IARIA

  • White Papers // Apr 2012

    Advancement Towards Secure Authentication in the Session Initiation Protocol

    The digest access authentication method used in the voice over IP signaling protocol, SIP, is weak. This authentication method is the only method with mandatory support and widespread adoption in the industry. At the same time, this authentication method is vulnerable to a serious real-world attack. This poses a threat...

    Provided By IARIA

  • White Papers // Jan 2013

    A Distributed Hash Table Assisted Intrusion Prevention System

    Using collaborative intrusion detection to sense network intrusions comes at a price of handling an enormous amount of data generated by detection probes, and the problem of properly correlating the evidence collected at different parts of the network. The correlation between the recorded events has to be revealed, as it...

    Provided By IARIA

  • White Papers // Apr 2012

    Preventing Protocol Switching Covert Channels

    Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques arose which are based on the capability of protocol switching. Such protocol switching covert channels operate within overlay networks and can (as a special case) contain their own internal control protocols....

    Provided By IARIA

  • White Papers // Jan 2013

    Verification with AVISPA to Engineer Network Security Protocols

    This paper summarizes work on formal mechanized verification of security protocols using Avispa, a model checker dedicated to security protocols. Avispa has been successfully used in various Master's projects. In this paper, the authors present two outstanding projects of quite different nature that highlight the spectrum of formal security protocol...

    Provided By IARIA

  • White Papers // Jan 2013

    Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles

    Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that diminish their effectiveness as a DoS mitigation solution. First, the DoS-resilience that these schemes provide is minimized when there is a large disparity between the computational power...

    Provided By IARIA

  • White Papers // Jan 2013

    Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems

    Considering security as an afterthought and adding security aspects to a system late in the development process has now been realized to be an inefficient and bad approach to security. The trend is to bring security considerations as early as possible in the design of systems. This is especially critical...

    Provided By IARIA

  • White Papers // Jan 2013

    Securing Access to Data in Business Intelligence Domains

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2012

    Sensor Based Risk Assessment for the Supply of Dangerous Products

    As a consequence of globalization, supply chain systems recently evolved toward a dynamic network of firms and industries. This complexification of supply chain processes raises several challenges in particular with respect to compliance to regulations (e.g., safety, security). With the multiplication of intermediate actors, a single non-compliant actor might jeopardize...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Jun 2010

    A Distributed Identity Handling Approach Enriched with Identity Semantics

    People rely on many forms of identities to access offline and online services. The inconvenience of possessing and using identities creates significant security vulnerability. This paper proposes an identity handling mechanism enriched with identity semantics which is believed to ease and secure identity usage. In this regard, user's identities are...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Jul 2012

    Advances in Protecting Remote Component Authentication

    Component authentication allows verifying the originality of various components being part of a machine or a system, or being connected to control equipment. Various technologies are available, ranging from holograms, hidden marks, and special inks to cryptography-based component authentication. Typical applied cryptography-based mechanisms employ a challenge-response-based component authentication mechanism. These...

    Provided By IARIA

  • White Papers // Jul 2012

    A Scalability Analysis of an Architecture for Countering Network-Centric Insider Threats

    Dealing with the insider threat in networked environments poses many challenges. Privileged users have great power over the systems they own in organizations. To mitigate the potential threat posed by insiders, the authors introduced in previous work a preliminary architecture for the Autonomic Violation Prevention System (AVPS), which is designed...

    Provided By IARIA

  • White Papers // Aug 2011

    End-to-End Secure Data Delivery in Wireless Sensor Networks

    Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of...

    Provided By IARIA

  • White Papers // Jul 2011

    Data Mining Governance for Service Oriented Architecture

    In recent years, data mining has attracted a great deal of attention in the information industry, as well as in society as a whole. This is due to the wide availability of huge amounts of data and the imminent need for converting such data into useful information and knowledge. The...

    Provided By IARIA

  • White Papers // Jul 2011

    MBPR'A Business Process Repository Supporting Multi-Granularity Process Model Retrieval

    Business process repository aims at business process model discovery and reusing. However, most of current approaches for process matchmaking have the limitation that the process models should be in the same granularity, whereas a process repository with good support for multi-granularity business process retrieval is still rare. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    Critical Information Infrastructures Management System and Security Issues Focusing on the Public Administrative Sector

    The IT society is absolutely reliant on communications infrastructure. Social infrastructures, including administration, transportation, healthcare and education, rely on the communications infrastructure to function. A breakdown of the communications infrastructure due to destruction or malfunction will result in other social infrastructures malfunctioning. Thus it can be said that the information...

    Provided By IARIA

  • White Papers // Jul 2013

    A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

    Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad...

    Provided By IARIA

  • White Papers // Feb 2013

    Starting a Spatially Enabled Society: a Web System for Collecting Volunteered Geographic Information in the Area of Public Security

    A spatially enabled society provides to citizens, businesses and government access to spatial data regardless of computing platform. The paper describes a collaborative Web system to gather geographic information about the area of public security and disseminate it at all levels of a society using Web 2.0 tools. The data...

    Provided By IARIA

  • White Papers // Jul 2012

    Using Network-Based Business Process Analysis as a Tool for Delta Analysis of Process Models

    Business process models are often crucial for business software development. Using reference models or merged processes, software producers intend to optimize the development effort for enterprises of the same domain. Thus, it is important to know how to assess the similarity between the process and the reference or merged process...

    Provided By IARIA

  • White Papers // Sep 2011

    SBVR Based Representation of SPARQL Queries and SWRL Rules for Analyzing Semantic Relations

    Analyzing semantic relations is a cumbersome task because these relations often are distributed over different information sources and hidden in existing relational database structures. Even with Semantic Web ontologies describing semantic relations the authors need to explore them on the deep technological level that is not friendly for business users....

    Provided By IARIA

  • White Papers // Jul 2012

    Transformation Framework for SBVR Based Semantic Queries in Business Information Systems

    The paper presents transformation framework from questions in structured language based on Semantics of Business Vocabulary and Rules (SBVR) into SPARQL queries over ontologies defined in Web Ontology Language OWL 2 and, possibly, supplemented with Semantic Web rules SWRL. Such transformation depends on OWL 2 ontology related with corresponding SBVR...

    Provided By IARIA

  • White Papers // Jul 2012

    Context-Based Adaptation of Process Definition

    There are several ways to reach a goal. The right way often depends on the context of the process that produces the desired product. The context can be understood as a set of conditions including changing requirements and resource properties. The method described in this paper is a possible way...

    Provided By IARIA

  • White Papers // Jan 2013

    Geometric Mean based Boosting Algorithm to Resolve Data Imbalance Problem

    Data imbalance problem has received a lot of attention in machine learning community because it is one of the causes that degrade the performance of classifiers or predictors. In this paper, the authors propose Geometric Mean based boosting algorithm (GM-Boost) to resolve the data imbalance problem. GM-Boost enables learning with...

    Provided By IARIA