257 resultados para object oriented regular expressions
Resumo:
With the growing significance of services in most developed economies, there is an increased interest in the role of service innovation in service firm competitive strategy. Despite growing literature on service innovation, it remains fragmented reflecting the need for a model that captures key antecedents driving the service innovation-based competitive advantage process. Building on extant literature and using thirteen in-depth interviews with CEOs of project-oriented service firms, this paper presents a model of innovation-based competitive advantage. The emergent model suggests that entrepreneurial service firms pursuing innovation carefully select and use dynamic capabilities that enable them to achieve greater innovation and sustained competitive advantage. Our findings indicate that firms purposefully use create, extend and modify processes to build and nurture key dynamic capabilities. The paper presents a set of theoretical propositions to guide future research. Implications for theory and practice are discussed. Finally, directions for future research are outlined.
Resumo:
There is a need for decision support tools that integrate energy simulation into early design in the context of Australian practice. Despite the proliferation of simulation programs in the last decade, there are no ready-to-use applications that cater specifically for the Australian climate and regulations. Furthermore, the majority of existing tools focus on achieving interaction with the design domain through model-based interoperability, and largely overlook the issue of process integration. This paper proposes an energy-oriented design environment that both accommodates the Australian context and provides interactive and iterative information exchanges that facilitate feedback between domains. It then presents the structure for DEEPA, an openly customisable system that couples parametric modelling and energy simulation software as a means of developing a decision support tool to allow designers to rapidly and flexibly assess the performance of early design alternatives. Finally, it discusses the benefits of developing a dynamic and concurrent performance evaluation process that parallels the characteristics and relationships of the design process.
Resumo:
Emerging from the challenge to reduce energy consumption in buildings is the need for energy simulation to be used more effectively to support integrated decision making in early design. As a critical response to a Green Star case study, we present DEEPA, a parametric modeling framework that enables architects and engineers to work at the same semantic level to generate shared models for energy simulation. A cloud-based toolkit provides web and data services for parametric design software that automate the process of simulating and tracking design alternatives, by linking building geometry more directly to analysis inputs. Data, semantics, models and simulation results can be shared on the fly. This allows the complex relationships between architecture, building services and energy consumption to be explored in an integrated manner, and decisions to be made collaboratively.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
In recent years, enterprise architecture (EA) has captured a growing attention as a means to systematically consolidate and interrelate diverse business and IT artefacts in order to provide holistic decision support. The recent popularity of a service-orientation has added “service “and related constructs as a new element that requires consideration within an Enterprise Architecture. Since the emergence of the Service-Oriented Architecture (SOA), many attempts have been made to incorporate SOA artefacts in existing EA frameworks. Yet, the approaches taken to achieve this goal differ substantially for the most commonly used EA frameworks to date. SOA in the context of enterprise architecture is one of the future research challenges. Several authors argue that further research is needed in order to understand how SOA impacts prior enterprise architecture frameworks. This study explores SOA integration within EA, identifies SOA integration approaches within EA and identifies factors that impact SOA integration within Enterprise Architecture.
Resumo:
Usability is a multi-dimensional characteristic of a computer system. This paper focuses on usability as a measurement of interaction between the user and the system. The research employs a task-oriented approach to evaluate the usability of a meta search engine. This engine encourages and accepts queries of unlimited size expressed in natural language. A variety of conventional metrics developed by academic and industrial research, including ISO standards,, are applied to the information retrieval process consisting of sequential tasks. Tasks range from formulating (long) queries to interpreting and retaining search results. Results of the evaluation and analysis of the operation log indicate that obtaining advanced search engine results can be accomplished simultaneously with enhancing the usability of the interactive process. In conclusion, we discuss implications for interactive information retrieval system design and directions for future usability research. © 2008 Academy Publisher.
Resumo:
Object segmentation is one of the fundamental steps for a number of robotic applications such as manipulation, object detection, and obstacle avoidance. This paper proposes a visual method for incorporating colour and depth information from sequential multiview stereo images to segment objects of interest from complex and cluttered environments. Rather than segmenting objects using information from a single frame in the sequence, we incorporate information from neighbouring views to increase the reliability of the information and improve the overall segmentation result. Specifically, dense depth information of a scene is computed using multiple view stereo. Depths from neighbouring views are reprojected into the reference frame to be segmented compensating for imperfect depth computations for individual frames. The multiple depth layers are then combined with color information from the reference frame to create a Markov random field to model the segmentation problem. Finally, graphcut optimisation is employed to infer pixels belonging to the object to be segmented. The segmentation accuracy is evaluated over images from an outdoor video sequence demonstrating the viability for automatic object segmentation for mobile robots using monocular cameras as a primary sensor.
Resumo:
Commissioned by SBS, and published in March 2006, Connecting Diversity: Paradoxes of Multicultural Australia is a follow-up study to SBS’s 2002 report, Living Diversity: Australia’s Multicultural Future. The attitudes of many younger Australians from culturally diverse backgrounds reveal paradoxes about Australian multiculturalism today. This report sheds light on their views, experiences and expectations and the role of media in their lives. Younger, culturally and linguistically diverse Australians are often the subject of mediafanned controversy about disaffection, ‘ethnic gangs’ and cultural isolation. While these controversies tend to be localised – Cronulla, Inala or Bankstown – Connecting Diversity tells a national and quite different story. This research builds upon the findings of the 2002 report, Living Diversity: Australia’s Multicultural Future, which challenged common assumptions about contemporary multicultural Australia. In an era of fragmenting media and assumed political apathy, Connecting Diversity further examines many of the findings of the earlier study, with a new focus on younger people, cultural identity and media use. Connecting Diversity reveals individual experiences and often contradictory ideas about media and diversity in Australia. Disjunctions appear to exist between an individual’s experience and their thoughts about Australia’s national identity. Multiculturalism is valued for broadening the appreciation of difference, yet this support can coexist with concerns about perceived segregation, usually ‘elsewhere’ in Australia. Younger people tend to be more comfortable with cultural difference than previous generations and cite their own diverse network of friends as one of the reasons for this. Even so, some describe experiences of racism that engender a feeling of exclusion from ‘mainstream’ society. In their everyday lives, social relationships are navigated through regular and familiar connections on the one hand, and experiences and expressions of disconnection on the other. Racism and tolerance may be expressed almost simultaneously. These disconnections are often managed through ‘practical tolerance',allowing them to negotiate these apparent contradictions. The connections can be based simultaneously on such things as work, family,religion, friendships or location. The result is a multilayered sense of personal belonging and community connection. A large number of respondents in these focus groups expressed frustration at the failings of media, especially news and current affairs coverage, yet spoke enthusiastically about the accessibility and range of media compared to what was available to previous generations. In their many forms, media remain a key ingredient of self-identification among younger Australians of culturally diverse backgrounds who are especially cynical about media and disillusioned by their perceived inability to influence issues that are important to them. These findings reveal that although they may be cynical about media messages, these younger Australians are looking for connection through media and are seeking ways to participate in meaningful ways. This raises questions about the possibilities for media to empower younger people to play a part in genuine cultural democracy. By capturing the attitudes of Australians of culturally diverse backgrounds under the age of 40, Connecting Diversity: Paradoxes of Multicultural Australia provides an insight into social trends and the generational and cultural changes that are now shaping Australia.
Resumo:
This paper investigates the use of visual artifacts to represent a complex adaptive system (CAS). The integrated master schedule (IMS) is one of those visuals widely used in complex projects for scheduling, budgeting, and project management. In this paper, we discuss how the IMS outperforms the traditional timelines and acts as a ‘multi-level and poly-temporal boundary object’ that visually represents the CAS. We report the findings of a case study project on the way the IMS mapped interactions, interdependencies, constraints and fractal patterns in a complex project. Finally, we discuss how the IMS was utilised as a complex boundary object by eliciting commitment and development of shared mental models, and facilitating negotiation through the layers of multiple interpretations from stakeholders.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
Using complex event rules for capturing dependencies between business processes is an emerging trend in enterprise information systems. In previous work we have identified a set of requirements for event extensions for business process modeling languages. This paper introduces a graphical language for modeling composite events in business processes, namely BEMN, that fulfills all these requirements. These include event conjunction, disjunction and inhibition as well as cardinality of events whose graphical expression can be factored into flow-oriented process modeling and event rule modeling. Formal semantics for the language are provided.
Resumo:
Facial expression is one of the main issues of face recognition in uncontrolled environments. In this paper, we apply the probabilistic linear discriminant analysis (PLDA) method to recognize faces across expressions. Several PLDA approaches are tested and cross-evaluated on the Cohn-Kanade and JAFFE databases. With less samples per gallery subject, high recognition rates comparable to previous works have been achieved indicating the robustness of the approaches. Among the approaches, the mixture of PLDAs has demonstrated better performances. The experimental results also indicate that facial regions around the cheeks, eyes, and eyebrows are more discriminative than regions around the mouth, jaw, chin, and nose.
Locally oriented crime prevention and the “partnership approach” : politics, practices and prospects
Resumo:
Why have multi-agency or "partnership" approaches to crime prevention and community safety been reported internationally with unfavorable results? Can groups and individuals from disparate government and non-government sectors work together to reduce or prevent crime? This article will address these and other questions by using developments in Belgium as its case study. In 1992, Belgium launched its "safety and crime prevention contracts", a series of locally based crime prevention initiatives which have attempted to contract federal, regional and local governments to a range of social and police oriented crime prevention endeavors. Traces the development of the Belgian crime prevention contracts and examines the difficulties experienced with "multi-agency crime prevention" and suggests that much of the political rhetoric in Belgium calling for local, community and intersectorial "partnerships" has, like several other countries including England and Wales, Canada, Australia and New Zealand, lacked clear practical expression. However, some promising initiatives indicate that this prevention approach may be capable of producing effective crime prevention and community safety outcomes. Further research is needed to describe these initiatives and analyze the conditions under which they are developed.
Resumo:
“The Relevance of Religion” is the title of a recent address delivered by The Honourable Chief Justice Murray Gleeson of the High Court of Australia.1 In making the point “about the continuing public importance of religion”, the Chief Justice referenced Lord Devlin’s contention that “no society has yet solved the problem of how to teach morality without religion”....