IARIA

Displaying 161-200 of 1223 results

  • White Papers // Jan 2013

    A Comparison of MapReduce and Parallel Database Management Systems

    Businesses have come to rely on their data warehouse as a key component in their information technology infrastructure. The costs of the architecture to support these environments are significant. Therefore, choosing the wrong architecture can be a very costly decision. However, considerable confusion exists in relation to MapReduce and parallel...

    Provided By IARIA

  • White Papers // Jan 2013

    A Validation Model of Data Input for Web Services

    Web services inherited many well-known security problems of web applications and brought new ones. Major data breaches today are consequences of bad input validation at the application level. This paper presents a way to implement an input validation model for web services which can be used to prevent cross-site scripting...

    Provided By IARIA

  • White Papers // Jan 2013

    WebODRA - A Web Framework for the Object-Oriented DBMS ODRA

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database. It makes it easier to develop web applications by raising the level of abstraction. In contrast to many existing solutions, where the business logic is developed in...

    Provided By IARIA

  • White Papers // Jan 2013

    Location-Aware Routing for Service-Oriented Opportunistic Computing

    Smartphones, tablets, netbooks and laptops are intensively used every day by a large part of the population. These devices which are equipped with Wi-Fi interfaces can form Disconnected Mobile Ad-hoc NETworks (DMANETs) dynamically. These networks may allow service providers, such as local authorities, to deliver new kinds of services in...

    Provided By IARIA

  • White Papers // Jan 2013

    Improving Fairness in QoS and QoE Domains for Adaptive Video Streaming

    In this paper, the authors present an enhancement to a category of Adaptive Video Streaming solutions aimed at improving both Quality of Service (QoS) and Quality of Experience (QoE). The specific solution used as baseline for the work is the Smooth Streaming framework from Microsoft. The presented enhancement relates to...

    Provided By IARIA

  • White Papers // Jan 2013

    NGS Workflow Optimization Using a Hybrid Cloud Infrastructure

    E-science applications involve great deal of data, to satisfy these processing requests, distributed computing paradigms, such as cluster, Grid, Virtual Grid, Cloud Computing, and Hybrid System are growing exponentially. Existing computing infrastructures, software system design, and use cases have to take into account the enormity in volume of requests, size...

    Provided By IARIA

  • White Papers // Jan 2013

    Managing Timing Implications of Security Aspects in Model-Driven Development of Real-Time Embedded Systems

    Considering security as an afterthought and adding security aspects to a system late in the development process has now been realized to be an inefficient and bad approach to security. The trend is to bring security considerations as early as possible in the design of systems. This is especially critical...

    Provided By IARIA

  • White Papers // Jan 2013

    Securing Access to Data in Business Intelligence Domains

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Jan 2013

    Verification with AVISPA to Engineer Network Security Protocols

    This paper summarizes work on formal mechanized verification of security protocols using Avispa, a model checker dedicated to security protocols. Avispa has been successfully used in various Master's projects. In this paper, the authors present two outstanding projects of quite different nature that highlight the spectrum of formal security protocol...

    Provided By IARIA

  • White Papers // Jan 2013

    Mitigating Distributed Service Flooding Attacks with Guided Tour Puzzles

    Various cryptographic puzzle schemes have been proposed as defenses against Denial of Service (DoS) attacks. However, these schemes have two common shortcomings that diminish their effectiveness as a DoS mitigation solution. First, the DoS-resilience that these schemes provide is minimized when there is a large disparity between the computational power...

    Provided By IARIA

  • White Papers // Jan 2013

    A Distributed Hash Table Assisted Intrusion Prevention System

    Using collaborative intrusion detection to sense network intrusions comes at a price of handling an enormous amount of data generated by detection probes, and the problem of properly correlating the evidence collected at different parts of the network. The correlation between the recorded events has to be revealed, as it...

    Provided By IARIA

  • White Papers // Jan 2013

    Enabling User Involvement in Trust Decision Making for Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in a specific collaboration, given the risks and incentives involved. The authors have built support for automating routine trust decisions based on a combination of risk, reputation and incentive information. To handle non-routine decisions, they...

    Provided By IARIA

  • White Papers // Nov 2012

    Supporting Time Planning Aligned With CMMI-DEV and PMBOK

    Software projects often fail, because they are not adequately managed. The establishment of effective and efficient project management practices especially with respect to time management still remains a key challenge to software organizations. Striving to address these needs, \"Best practice\" models, such as, the Capability Maturity Model Integration (CMMI) or...

    Provided By IARIA

  • White Papers // Nov 2012

    Automated Test Code Generation Based on Formalized Natural Language Business Rules

    The paper addresses two fundamental problems in requirements engineering. First, the conflict between understandability for non-programmers and a semantically well founded representation of business rules. Second, the verification of productive code against business rules in requirements documents. As a solution, a language to specify business rules that are close to...

    Provided By IARIA

  • White Papers // Nov 2012

    AgileKDD: An Agile Business Intelligence Process Model

    In a knowledge-based society, transforming data into information and knowledge to support the decision making process is a crucial success factor for all the organizations. In this paper, one mission of Software Engineering is to produce systems able to process large volumes of data, transform them into relevant knowledge and...

    Provided By IARIA

  • White Papers // Nov 2012

    User-Centric IT Security: How to Design Usable Security Mechanisms

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Nov 2012

    Group Key Establishment Scheme Using Wireless Channel Status

    Broadcast-based wireless communication is vulnerable to sniffing and eavesdropping by adversaries. Hence, wireless network security mechanisms have relied on cryptographic algorithms to protect information and support confidentiality. The authors propose a group key establishment scheme for secure wireless multicast services without a key management center. The proposed scheme exploits wireless...

    Provided By IARIA

  • White Papers // Nov 2012

    Software Architectural Drivers for Cloud Testing

    In this paper, the authors focus on the research issues that cloud computing imposes on software testing. For this purpose, cloud testing can be defined as a software testing method based on cloud computing technology. Software testing has been an important component within the development process. In order to face...

    Provided By IARIA

  • White Papers // Oct 2012

    User Involvement and Social Networking for Information System Development

    Since the beginning of Business Information System (BIS) development, the problem of end-user involvement in the system design and implementation has been discussed. For years, BISs for users have been changed into the systems constructed by end-users. The Web 2.0 technologies should strongly support this tendency. The paper aims to...

    Provided By IARIA

  • White Papers // Oct 2012

    Enabling Dynamical Use of Integrated Systems and Scientific Supercomputing Resources for Archaeological Information Systems

    This paper presents the results from combining Integrated Information and Computing System components with classification for the purpose of enabling multidisciplinary and dynamical use of information systems and supercomputing resources for Archaeological Information Systems. The essential base are a flexible collaboration framework, suitable long-term documentation, structuring and classification of objects,...

    Provided By IARIA

  • White Papers // Oct 2012

    Cloud Applications Versus Web Applications: A Differential Study

    Cloud computing revolution started reshaping the entire ICT industry and adding new concepts; cloud application is one of these new concepts. This paper aims at differentiating between cloud applications and web applications and to position on the question \"What are the differences between cloud applications and web applications?\" The paper...

    Provided By IARIA

  • White Papers // Oct 2012

    A Framework for Migrating Traditional Web Applications Into Multi-Tenant SaaS

    Software-as-a-Service (SaaS) is emerging as a new model of delivering a software, where users utilize software over the internet as a hosted service rather than an installable product. Multi-tenancy is a core concept in SaaS. It is the principle of running a single instance of the software on a server...

    Provided By IARIA

  • White Papers // Oct 2012

    Biometric Security Systems for Mobile Devices Based on Fingerprint Recognition Algorithm

    In this paper, the authors propose a selective attention algorithm which increases the reliability of biometrics security system based on fingerprint recognition. They compare the existing fingerprint recognition algorithms and test their own algorithm on fingerprints database which changes in the structure as a result of physical damage. They propose...

    Provided By IARIA

  • White Papers // Oct 2012

    Oracle NoSQL Database - Scalable, Transactional Key-Value Store

    Oracle NoSQL Database is a highly scalable, highly available key-value database, designed to address the low latency data access needs of the \"Big data\" space. Among its unique features, Oracle NoSQL Database provides major and minor keys, flexible durability and consistency policies, and integration with both MapReduce infrastructure and conventional...

    Provided By IARIA

  • White Papers // Sep 2012

    Optimization of Proxy Caches using Proxy Filters

    Web proxy caches are a widely used tool to reduce the network load by storing often needed web pages. Increasing amounts of data transferred require new intelligent caching strategies with smarter replacement algorithms to predict, which web documents will be requested most likely in the future. However, these algorithms are...

    Provided By IARIA

  • White Papers // Sep 2012

    The Open Data Interface (ODI) Framework for Public Utilization of Big Data

    In the paper, the Open Data Interface (ODI) framework for public utilization of Big Data was suggested. Comparing to conventional Web based open APIs which provide restricted access to the internal database of large data companies, the ODI provides multi-level access of data in public domain, ranging from copying plain...

    Provided By IARIA

  • White Papers // Sep 2012

    Ontology-Guided Data Acquisition and Analysis: Using Ontologies for Advanced Statistical Analysis

    The authors present an ontology-based, domain independent data acquisition and preparation system, which is able to process arbitrarily structured data. The system is fully generic and customizes itself automatically at runtime based on a user-defined ontology. So it can be instantiated for any domain of application by defining an ontology...

    Provided By IARIA

  • White Papers // Sep 2012

    Structured Data and Source Code Analysis for Financial Fraud Investigations

    Financial fraud investigations are becoming increasingly complex. The volume of data continues to increase along with the volume and complexity of underlying source code logic. As the volume and complexity increase, so too does the importance of identifying techniques for reducing the data to manageable sizes and identifying fraudulent activity...

    Provided By IARIA

  • White Papers // Sep 2012

    Towards an Agile E-Commerce

    Creating an agile e-commerce is still a challenging issue. The alignment between business and IT plays a key role as changing business demands must be implemented immediately. To avoid misunderstandings and to lead to a better business-IT alignment the authors provide an ontology model, describing enterprise objects and their relations....

    Provided By IARIA

  • White Papers // Sep 2012

    Semantic Supply Chain Management

    The efficiencies of Supply Chain Management (SCM) are often impaired by inconsistent exchange and sharing of information semantics among supply chain partners. Small and medium enterprises formed into a supply chain are working in a multi-cultural and multilingual environment. The eBEST platform equips these enterprises and their associations with state-of-the-art...

    Provided By IARIA

  • White Papers // Sep 2012

    An Architecture for Semantically Enriched Data Stream Mining

    Data Stream Mining (DSM) techniques can be used to extract knowledge from continuous data streams. In this paper, the authors present an approach providing a modelling and execution architecture for networks of DSM operators. It can be applied in resource-constrained environments, and provides capabilities for semantic enrichment of data streams....

    Provided By IARIA

  • White Papers // Sep 2012

    Evaluating Data Minability Through Compression - An Experimental Study

    The authors' goal is to show that compression can be used as a tool to evaluate the potential of a data set of producing interesting results in a data mining process. The basic idea that data that displays repetitive patterns or patterns that occur with a certain regularity will be...

    Provided By IARIA

  • White Papers // Sep 2012

    Analysis of Streaming Service Quality Using Data Analytics of Network Parameters

    Quality of multimedia streaming service depends on network parameters such as bandwidth, delay, jitter and packet loss rate. In order to effectively improve the Quality of Service (QoS), it is needed to know which parameter is dominant in deterioration of the service quality at the moment. In the paper, the...

    Provided By IARIA

  • White Papers // Sep 2012

    Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application

    Large amount of traffic data are transmitted during day-to-day operation of wide area networks. Due to the increment of diversity in network applications, its traffic features have substantially changed. Data complexity and its diversity have been rapidly expanding with the changing nature of network applications. In addition, bandwidth and speed...

    Provided By IARIA

  • White Papers // Sep 2012

    How to Find Important Users in a Web Community? Mining Similarity Graphs

    In this paper, the authors provide a useful tool to the web site owner for enhancing her/his marketing strategies and rise as consequence the click rates on her/his web site. Their approach addresses the following research questions: which users are important for the web community? Which users have similar interests?...

    Provided By IARIA

  • White Papers // Sep 2012

    A QoS Monitoring Framework for Composite Web Services in the Cloud

    Due to the dynamic nature of the cloud, continuous monitoring of QoS requirements is necessary to manage the cloud computing environment and enforce service level agreements. In this paper, the authors propose a QoS monitoring framework for composite web services implemented using the BPEL process and deployed in the cloud...

    Provided By IARIA

  • White Papers // Sep 2012

    Fighting Botnets - A Systematic Approach

    The increasing impact of Internet in the global economy has transformed botnets into one of the most feared security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to...

    Provided By IARIA

  • White Papers // Sep 2012

    Building OLAP Data Analytics by Storing Path-Enumeration Keys Into Sorted Sets of Key-Value Store Databases

    In this paper, a novel approach that allows the retrieval of OLAP analytics by means of storing multidimensional data in key-value databases is described and evaluated. The proposed mechanism relies on generated keys based on the path-enumeration model built upon a tree representation of a relational database. Each key represents...

    Provided By IARIA

  • White Papers // Aug 2012

    Message Scheduling and Forwarding in Congested DTNs

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the...

    Provided By IARIA

  • White Papers // Aug 2012

    Sensor Based Risk Assessment for the Supply of Dangerous Products

    As a consequence of globalization, supply chain systems recently evolved toward a dynamic network of firms and industries. This complexification of supply chain processes raises several challenges in particular with respect to compliance to regulations (e.g., safety, security). With the multiplication of intermediate actors, a single non-compliant actor might jeopardize...

    Provided By IARIA

  • White Papers // Jul 2011

    Collaborative Digital Library Services in a Cloud

    The authors have developed a web-based system that allows users to collaboratively organize large online image collections according to an evolving faceted classification schema. One of the major issues identified in the early deployment and evaluation in a university setting is the scalability of the system on traditional server implementations....

    Provided By IARIA

  • White Papers // Jul 2011

    Security Service for the Rollout of Security Credentials in Ubiquitous Industrial Automation Environments

    Industrial control networks, e.g., for factory, process or energy automation and smart metering, are increasingly based on IT communication technologies like Ethernet, IP, and Web-Services. Security measures as authentication or cryptographic VPNs are used to protect communication links to supervising control stations and for remote service. While standard communication technologies...

    Provided By IARIA

  • White Papers // Jul 2011

    Data Mining Governance for Service Oriented Architecture

    In recent years, data mining has attracted a great deal of attention in the information industry, as well as in society as a whole. This is due to the wide availability of huge amounts of data and the imminent need for converting such data into useful information and knowledge. The...

    Provided By IARIA

  • White Papers // Jul 2011

    MBPR'A Business Process Repository Supporting Multi-Granularity Process Model Retrieval

    Business process repository aims at business process model discovery and reusing. However, most of current approaches for process matchmaking have the limitation that the process models should be in the same granularity, whereas a process repository with good support for multi-granularity business process retrieval is still rare. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    Critical Information Infrastructures Management System and Security Issues Focusing on the Public Administrative Sector

    The IT society is absolutely reliant on communications infrastructure. Social infrastructures, including administration, transportation, healthcare and education, rely on the communications infrastructure to function. A breakdown of the communications infrastructure due to destruction or malfunction will result in other social infrastructures malfunctioning. Thus it can be said that the information...

    Provided By IARIA

  • White Papers // May 2012

    Unsupervised Activity Recognition using Temporal Data Mining

    Excellent results have been obtained from data mining techniques in many areas. This paper presents one such technique, in the context of activity recognition in a smart home. The authors use sequential pattern mining to analyze the history of information transmitted by the sensors, discovering thereby the frequent activities of...

    Provided By IARIA

  • White Papers // Jun 2013

    A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things

    The Internet Of Things (IoT) is an architecture in which billions of devices with computing capacities and communication interfaces are connected to the internet and perform collaborative tasks. In this context security is a major issue. In this paper, the authors focus on access control services to logical (OPENID) and...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2012

    Sensor Based Risk Assessment for the Supply of Dangerous Products

    As a consequence of globalization, supply chain systems recently evolved toward a dynamic network of firms and industries. This complexification of supply chain processes raises several challenges in particular with respect to compliance to regulations (e.g., safety, security). With the multiplication of intermediate actors, a single non-compliant actor might jeopardize...

    Provided By IARIA

  • White Papers // Aug 2012

    Linking Sensor Data to a Cloud-based Storage Server Using a Smartphone Bridge

    There is a need for systems that unify the processes of collecting, storing and analyzing long-term sensor data in multi-user contexts. The ubiquity and communication features of Smartphone make them suitable as data aggregation platforms for standalone sensors. Cloud-based servers are advantageous for their centralization and scalability in the storage...

    Provided By IARIA

  • White Papers // Aug 2012

    Towards Intelligent Sensor Evolution: A Holonic-Based System Architecture

    Rapid developments of smart sensor technologies envisage a new era where information handling and knowledge sharing will play a crucial role. Traditional sensors were conceived as simple hardware transducers of physical quantities into measurable signals, eventually requiring an analogue/digital conversion to make data available for software applications. IEEE-1451 family of...

    Provided By IARIA

  • White Papers // Aug 2012

    Cluster-based Energy-efficient Composite Event Detection for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs), well known communicating architectures today, are often used to detect the occurrence of some environmental events, such as pollution monitoring, forest fires detection, location and tracking, etc. In order to reduce irrelevant alarms, multiple attributes are used in the event detection process. In WSNs, communication is...

    Provided By IARIA

  • White Papers // Aug 2012

    Solving Hidden Terminal Problem in Cognitive Networks Using Cloud Technologies

    Hidden terminal problem is one of the well-known problems when a node is visible from the access point but cannot communicate through it. The problem occurs in ad hoc networks as well as cognitive networks. The clear solution is not discussed in cognitive networks. In this paper, the authors proposed...

    Provided By IARIA

  • White Papers // Aug 2012

    Distributed Compromised Nodes Detection Scheme at First Stage for SurvSec Security Architecture

    SurvSec is a novel security architecture for reliable network recovery from base station BS failure of surveillance wireless sensor network WSN in hostile environment. Compromised nodes detection is a very important security mechanism in surveillance WSN to detect compromised nodes before they destroy the security of the WSN. Node compromise...

    Provided By IARIA

  • White Papers // Aug 2012

    Certificates Shared Verification Key Management for SurvSec Security Architecture

    SurvSec is a novel security architecture for reliable network recovery from base station BS failure of surveillance Wireless Sensor Network (WSN) in hostile environment. Key management is the fundamental security mechanism in WSN which is needed for secure localization, secure clustering, secure data aggregation, secure authenticated broadcasting and secure routing....

    Provided By IARIA

  • White Papers // Aug 2011

    A Pairing-Free ID-based One-Pass Authenticated Key Establishment Protocol for Wireless Sensor Networks

    Due to resource constraints and unique features of Wireless Sensor Networks (WSNs), designing a key establishment protocol is much harder for WSNs than for traditional wired and wireless counterparts. In this paper, the authors propose a new efficient and secure ID-based one-pass authenticated key establishment protocol between an outside user...

    Provided By IARIA

  • White Papers // Aug 2011

    End-to-End Secure Data Delivery in Wireless Sensor Networks

    Typical sensor nodes are resource constrained devices containing user level applications, operating system components, and device drivers in a single address space, with no form of memory protection. A malicious user could easily capture a node and tamper the applications running on it, in order to perform different types of...

    Provided By IARIA

  • White Papers // Aug 2011

    Adaptive Security on Service-based SCM Control System

    On a large-scale application subject to dynamic interactions, the description and enforcement of security rules are complex tasks to handle, as they involve heterogeneous entities that do not have the same capabilities. In the context of SCM-application for example, the authors have different goods that are being transported across different...

    Provided By IARIA

  • White Papers // Jul 2012

    Visualization Method Based on Cloud Computing for Real Estate Information

    In order to accelerate the computing speed and display efficiency of large-scale information visualization, this paper proposes a visualization method based on cloud computing for real estate information. The core idea is combining cloud computing and information visualization, making the data processing stage of information visualization on the cloud computing...

    Provided By IARIA

  • White Papers // Jun 2013

    Event-Driven Communication on Application Level in a Smart Home

    In recent years, research on the Internet of things focused on wired or wireless information transport. Progress has been made in energy-efficiency, reduction of bandwidth usage and bringing standard Internet protocols to small resource constrained devices. Yet, an application level protocol that not only aims at enabling such devices for...

    Provided By IARIA

  • White Papers // Jul 2013

    Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the automotive field. Hence, opportunities are not limited only...

    Provided By IARIA

  • White Papers // Jul 2013

    A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

    Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad...

    Provided By IARIA

  • White Papers // Jan 2013

    Provenance Policies for Subjective Filtering of the Aggregated Linked Data

    As part of LOD2.eu project and OpenData.cz initiative, the authors are developing an ODCleanStore framework enabling management of governmental linked data and providing web applications with a possibility to consume cleaned and integrated governmental linked data; the provided data is accompanied with data provenance and a quality score based on...

    Provided By IARIA

  • White Papers // Jan 2013

    Merging Multidimensional Data Models: A Practical Approach for Schema and Data Instances

    Meta-model merging is the process of incorporating data models into an integrated, consistent model against which accurate queries may be processed. Within the data warehousing domain, the integration of data marts is often time-consuming. In this paper, the authors introduce an approach for the integration of relational star schemas, which...

    Provided By IARIA

  • White Papers // Jan 2013

    Aspects of Append-Based Database Storage Management on Flash Memories

    New storage technologies, such as Flash and Non-Volatile Memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Jul 2012

    Organizing Security Patterns Related to Security and Pattern Recognition Requirements

    Software security is an emerging area in software development. More and more vulnerabilities are published and highlight the endangerment of systems. Hence, software designers and programmers are increasingly faced with the need to apply security solutions to software systems. Security patterns are best practices to handle recurring security problems. The...

    Provided By IARIA

  • White Papers // Aug 2011

    Downtime Analysis of Virtual Machine Live Migration

    Virtual machine environments like VMware, XEN, KVM, and Hyper-V support live migration of guest operating systems, which is used in data centers to provide uninterrupted service during maintenance or to move computation away from failure-prone hosts. The duration of migration, as well as the virtual machine downtime during this process...

    Provided By IARIA

  • White Papers // Jul 2011

    Industrial Application of Ontologies

    The industrial application of ontologies is usually connected to a real life problem. Over the last 2 years the people used ontologies to solve problems in the areas of retail article management, contract and Request For Proposal (RFP) analysis, standard service catalogues and materials management. All these problems were either...

    Provided By IARIA

  • White Papers // Jul 2012

    Application of Scenario-Driven Role Engineering in Knowledge Management Systems - Requirements and Implementation

    Collaborative systems, which are often used in short-term virtual enterprises or long-term cooperation networks, often contain information about the manufacturing and fabrication competences of the participating technology partners. These should only be made available to a very restricted group of persons for example to support feasibility studies in the context...

    Provided By IARIA

  • White Papers // Jun 2012

    The Impact of a Requirements Specification on Software Defects and Quality Indicators

    Capturing requirements in a written, centralized specification is a recognized product development best practice. But, how does this document impact software defect rates and quality? Is there any correlation between a well-written, properly reviewed requirements specification and software defect levels and other quality indicators? This paper will present data from...

    Provided By IARIA

  • White Papers // Jan 2013

    Towards Online Engagement Via the Social Web

    The blossom of Web 2.0 has created new opportunities for the enterprises. Web users are disseminating more information than ever before about their interests, their experiences with products and services, their thoughts and whatever interacts with them in a daily basis. The challenge for the enterprise is to exploit and...

    Provided By IARIA

  • White Papers // Feb 2013

    Exploring Your Business Leaders Through Virtual Characters: Persona Design and Small Experiments

    The authors propose a novel method to identify desirable leader images in each situation. Leader's characteristics have been researched. However, many researchers could not find unique his/her characteristics. Therefore, desirable characteristics are different in each situation which he/her meets. In order to capture the desirable characters in each situation, they...

    Provided By IARIA

  • White Papers // Feb 2013

    Extraction of Semantic Relationships From Academic Papers Using Syntactic Patterns

    Integrating concept and citation networks on a specific research subject can help researchers focus their own work or use methods described in prior works. In this paper, the authors propose a method to extract semantic relations from concepts and citation in the descriptions of related work. Specifically, they examined topic-paper...

    Provided By IARIA

  • White Papers // Feb 2013

    An Expert-Driven Bayesian Network Model for Simulating and Predicting Software Quality

    This paper is to build an expert-driven Bayesian network model for simulating and predicting software quality. In contrast with earlier models, this model represents software quality as a hierarchy of features and their sub-features where the features are interrelated with other. It contains a range of project and process factors...

    Provided By IARIA

  • White Papers // Feb 2013

    Risk as a Subjective Construct: Implications for Project Management Practice

    The management of risk is a key element of all mainstream project management methodologies. It has implications for the effectiveness of the project management process itself, and for the management and communication of knowledge that is an inherent part of that process. There are two main schools of thought regarding...

    Provided By IARIA

  • White Papers // Jan 2012

    Web Personalization Implications and Challenges

    Companies are under the pressure to provide tailor-made products or services that match customers' preferences better. Personalization from web mining is a significant tool to accommodate this trend by extracting patterns of customer's preferences and connecting them directly to production line and supply chain. However, with exception of companies like...

    Provided By IARIA

  • White Papers // Jan 2013

    Enabling User Involvement in Trust Decision Making for Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in a specific collaboration, given the risks and incentives involved. The authors have built support for automating routine trust decisions based on a combination of risk, reputation and incentive information. To handle non-routine decisions, they...

    Provided By IARIA

  • White Papers // Jun 2010

    Towards User-Centric Identity Interoperability for Digital Ecosystems

    Digital Ecosystem is a new paradigm for dynamic IT business integration. Its main focus is to provide micro- and small enterprises with technological solutions bootstrapping their growth and cooperation. In a Digital Ecosystem, institutions compete in some business aspects and collaborate in others, and thus form stable and unstable coalitions....

    Provided By IARIA

  • White Papers // May 2013

    Seamlessly Enabling the Use of Cloud Resources in Workflows

    The hosting of large on-premise computational resources is common practice. Cloud Computing offers a promising, alternative infrastructure for using scalable on-demand off-premise resources. However, outsourcing whole applications is not a cost optimal solution in some scenarios, because the already existing on-premise resources are not considered. A flexible integration of additional...

    Provided By IARIA

  • White Papers // Jul 2012

    About the Flexible Migration of Workflow Tasks to Clouds Combining On-And Off-Premise Executions of Applications

    An increasing number of applications target their executions on specific hardware like general purpose Graphics Processing Units. Some Cloud Computing providers offer this specific hardware so that organizations can rent such resources. However, outsourcing the whole application to the Cloud causes avoidable costs if only some parts of the application...

    Provided By IARIA