25 resultados para protected task execution
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Työssä mitattiin työilman TBEP- ja TEHP-pitoisuuksia siivousalalla (3 kohdetta) ja muovituoteteollisuudessa (2 kohdetta). Pitoisuutta ilmassa verrattiin työntekijöidenbiomonitorointinäytteistä analysoitujen 2-butoksietikkahapon (2-BAA) ja 2-etyyliheksaanihapon (2-EHA) pitoisuuteen. Tavoitteena oli biomonitoroin-timenetelmän soveltuvuuden selvittäminen altistumisen arvioinnissa sekä tarvittavien lisäsuojaus- ja torjunta-tarpeiden selvittäminen. Biomonitorointia sekoittavien tekijöiden (2-butoksietanoli ja 2-etyyli-1-heksanoli) pitoisuus mitattiin työntekijöidenhengitysilmasta kerätystä VOC-näytteestä. OVS-keräimiin kerätyt TBEP- ja TEHP-näytteet uutettiin ultraäänellä sopivalla liuottimella ja analysoitiin kaasukromatografisesti (GC). VOC-näytteet kerättiin Tenax GR ¿adsorbenttiin, irrotettiin keräimestä termodesorptiolla ja analysoitiin GC:lla. Biomonitorointinäytteiden (virtsa) 2-BAA- ja 2-EHA -pitoisuus analysoitiin myös GC:lla. Lattianvahauksen aikana siivoojien hengitysilmasta mitatuissa TBEP-näytteissä pitoisuudet vaihtelivat välillä 70 - 860 ng/m3 sekä VOC-näytteistä 88 %:sta löytyi2-butoksietanolia, jonka pitoisuus vaihteli välillä 3 - 1800 µg/m3. Virtsan 2-BAA:n pitoisuudet vaihtelivat välillä <0,3 - 26 mmol/mol kreatiniinia ollen korkeimmillaan 43 % toimenpiderajasta. Raskaana olevien toimenpideraja ylitettiin 30 % näytteistä. Muovituotetehtaissa TEHP-pitoisuus työntekijöiden hengitysilmassa oli alle määritysrajan (eli < 1 - < 3 ng/m3). Muovituotetehtaissa kerätyistä VOC-näytteistä 16 %:sta löydettiin 2-etyyli-1-heksanolia, jonka pitoisuus vaihteli välillä 90 - 100 µg/m3. Virtsan 2-EHA-pitoisuudet olivat välillä <0,1 - 0,2 mmol/mol kreatiniinia. Tulosten perusteella siivoojat altistuvat TBEP:lle ja 2-butoksietanolille lattianvahauksen yhteydessä, muttaaltistuminen ei ilman pitoisuuksien ja biomonitoroinnin tulosten mukaan aiheutaterveyshaittaa ainakaan yhden mahdollisen metaboliitin 2-BAA:n kautta. Pois lukien raskaana olevat työntekijät, joille 2-butoksietanolia sisältävän vahanpoistotuotteen käsitteleminen aiheuttaa mahdollista terveyshaittaa. Käytetyillä biomonitorointimenetelmillä ei voitu osoittaa altistumista tapahtuneen mitatuilla TBEP:n ja TEHP:n pitoi-suustasoilla. Metaboliareittien varmistamisen jälkeen on mahdollista tutkia toimivampaa menetelmää altistumisen arviointiin biomonitoroinnin avulla. Työntekijöiden suojautuminen niin muovituotetehtaissa kuin siivoustyössäkin mitattujen yhdisteiden osalta oli pääosin riittävää. Ainoastaan raskaana olevien työntekijöiden, jotka siivoustyössään altistuvat 2-butoksietanolille, suojaukseen tulisi kiinnittää huomiota.
Resumo:
Tässä diplomityössä esitellään ohjelmistotestauksen ja verifioinnin yleisiä periaatteita sekä käsitellään tarkemmin älypuhelinohjelmistojen verifiointia. Työssä esitellään myös älypuhelimissa käytettävä Symbian-käyttöjärjestelmä. Työn käytännön osuudessa suunniteltiin ja toteutettiin Symbian-käyttöjärjestelmässä toimiva palvelin, joka tarkkailee ja tallentaa järjestelmäresurssien käyttöä. Verifiointi on tärkeä ja kuluja aiheuttava tehtävä älypuhelinohjelmistojen kehityssyklissä. Kuluja voidaan vähentää automatisoimalla osa verifiointiprosessista. Toteutettu palvelin automatisoijärjestelmäresurssien tarkkailun tallentamalla tietoja niistä tiedostoon testien ajon aikana. Kun testit ajetaan uudestaan, uusia tuloksia vertaillaan lähdetallenteeseen. Jos tulokset eivät ole käyttäjän asettamien virherajojen sisällä, siitä ilmoitetaan käyttäjälle. Virherajojen ja lähdetallenteen määrittäminen saattaa osoittautua vaikeaksi. Kuitenkin, jos ne määritetään sopivasti, palvelin tuottaa hyödyllistä tietoa poikkeamista järjestelmäresurssien kulutuksessa testaajille.
Resumo:
3G SGSN (3rd Generation Serving GPRS Support Node) onUMTS (Universal Mobile Telecommunications System) pakettiverkon verkkoelementti, joka toimii linkkinä ulkoisen verkon(kuten Internet) ja radioverkon välillä. 3G SGSN ylläpitää tilaajan tietoja ja paikannustietoja päätelaitteen liikkuessa verkon sisällä ja välittää myös dataa ulkoisen verkon ja mobiilipäätelaitteen välillä. Tämän diplomityön aiheena on 3G SGSN toiminnallisuus-testauksen automatisointi. Työssä kehitetään 3G SGSN toiminnallisuustestaukseen soveltuva testauksen automatisointijärjestelmä Linux-ympäristössä AuTS (Automated Test Sequences)-automatisointityökalulla. Kehitystyöhön kuuluu järjestelmän suunnittelu ja toteutus. Toteutettu automatisointijärjestelmä suorittaa 3G SGSN toiminnallisuustestauksen istunnon- ja liikkuvuudenhallinnan testitapauksia.Suoritettujen testitapausten tuloksista luodaan HTML (Hypertext Markup Language)-raportti, joka sisältää tiedot ja analyysit suoritetuista testitapauksista sekä linkit testitapausten lokitietoihin. Hyvä automatisointi vaatii suunnittelua, jossa huomioidaan käytettävyys ja ylläpidettävyys. Näihin ominaisuuksiin on toteutuksessa kiinnitetty erityistä huomiota. Lopputuloksena saatiin toimiva automatisointijärjestelmä, joka osoittaa automatisoinnin tuovan huomattavia etuja toiminnallisuustestauksen tehokkuuteen. Työssä käsitelläänmyös ohjelmistotestausta sekä testauksen automatisointia ja niiden periaatteita.
Resumo:
This thesis attempts to find whether scenario planning supports the organizational strategy as a method for addressing uncertainty. The main issues are why, what and how scenario planning fits in organizational strategy and how the process could be supported to make it more effective. The study follows the constructive approach. It starts with examination of competitive advantage and the way that an organization develops strategy and how it addresses the uncertainty in its operational environment. Based on the conducted literature review, scenario methods would seem to provide versatile platform for addressing future uncertainties. The construction is formed by examining the scenario methods and presenting suitable support methods, which results in forming of the theoretical proposition for supporter scenario process. The theoretical framework is tested in laboratory conditions, and the results from the test sessions are used a basis for scenario stories. The process of forming the scenarios and the results are illustrated and presented for scrutiny
Resumo:
1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.
Resumo:
This study considered the current situation of biofuels markets in Finland. The fact that industry consumes more than half of the total primary energy, widely applied combined heat and power production and a high share of solid biomass fuels in the total energy consumption are specific to the Finnish energy system. Wood is the most important source of bioenergy in Finland, representing 21% of the total energy consumption in 2006. Almost 80% of the wood-based energy is recovered from industrial by-products and residues. Finland has commitment itself to maintaining its greenhouse gas emissions at the 1990 level, at the highest, during the period 2008–2012. The energy and climate policy carried out in recent years has been based on the National Energy and Climate introduced in 2005. The Finnish energy policy aims to achieve the target, and a variety of measures are taken to promote the use of renewable energy sources and especially wood fuels. In 2007, the government started to prepare a new long-term (up to the year 2050) climate and energy strategy that will meet EU’s new targets for the reduction of green house gas emissions and the promotion of renewable energy sources. The new strategy will be introduced during 2008. The international biofuels trade has a substantial importance for the utilisation of bioenergy in Finland. In 2006, the total international trading of solid and liquid biofuels was approximately 64 PJ of which import was 61 PJ. Most of the import is indirect and takes place within the forest industry’s raw wood imports. In 2006, as much as 24% of wood energy was based on foreignorigin wood. Wood pellets and tall oil form the majority of export streams of biofuels. The indirect import of wood fuels increased almost 10% in 2004–2006, while the direct trade of solid and liquid biofuels has been almost constant.
Resumo:
This thesis deals with a hardware accelerated Java virtual machine, named REALJava. The REALJava virtual machine is targeted for resource constrained embedded systems. The goal is to attain increased computational performance with reduced power consumption. While these objectives are often seen as trade-offs, in this context both of them can be attained simultaneously by using dedicated hardware. The target level of the computational performance of the REALJava virtual machine is initially set to be as fast as the currently available full custom ASIC Java processors. As a secondary goal all of the components of the virtual machine are designed so that the resulting system can be scaled to support multiple co-processor cores. The virtual machine is designed using the hardware/software co-design paradigm. The partitioning between the two domains is flexible, allowing customizations to the resulting system, for instance the floating point support can be omitted from the hardware in order to decrease the size of the co-processor core. The communication between the hardware and the software domains is encapsulated into modules. This allows the REALJava virtual machine to be easily integrated into any system, simply by redesigning the communication modules. Besides the virtual machine and the related co-processor architecture, several performance enhancing techniques are presented. These include techniques related to instruction folding, stack handling, method invocation, constant loading and control in time domain. The REALJava virtual machine is prototyped using three different FPGA platforms. The original pipeline structure is modified to suit the FPGA environment. The performance of the resulting Java virtual machine is evaluated against existing Java solutions in the embedded systems field. The results show that the goals are attained, both in terms of computational performance and power consumption. Especially the computational performance is evaluated thoroughly, and the results show that the REALJava is more than twice as fast as the fastest full custom ASIC Java processor. In addition to standard Java virtual machine benchmarks, several new Java applications are designed to both verify the results and broaden the spectrum of the tests.
Resumo:
This study considered the current situation of solid and liquid biomass fuels in Finland. The fact that industry consumes more than half of the total primary energy, widely applied combined heat and power production and a high share of solid biomass fuels in the total energy consumption are specific to the Finnish energy system. Wood is the most important source of bioenergy in Finland, representing 20% of the total energy consumption in 2007. Almost 80% of the woodbased energy is recovered from industrial by-products and residues. As a member of the European Union, Finland has committed itself to the Union’s climate and energy targets, such as reducing its overall emissions of green house gases to at least 20% below 1990 levels by 2020, and increasing the share of renewable energy in the gross final consumption. The renewable energy target approved for Finland is 38%. The present National Climate and Energy Strategy was introduced in November 2008. The strategy covers climate and energy policy measures up to 2020, and in brief thereafter, up to 2050. In recent years, the actual emissions have exceeded the Kyoto commitment and the trend of emissions is on the increase. In 2007, the share of renewable energy in the gross final energy consumption was approximately 25% (360 PJ). Without new energy policy measures, the final consumption of renewable energy would increase to 380 PJ, which would be approximately only 31% of the final energy consumption. In addition, green house gas emissions would exceed the 1990 levels by 20%. Meeting the targets will need the adoption of more active energy policy measures in coming years. The international trade of biomass fuels has a substantial importance for the utilisation of bioenergy in Finland. In 2007, the total international trading of solid and liquid biomass fuels was approximately 77 PJ, of which import was 62 PJ. Most of the import is indirect and takes place within the forest industry’s raw wood imports. In 2007, as much as 21% of wood energy was based on foreign-origin wood. Wood pellets and tall oil form the majority of export streams of biomass fuels. The indirect import of wood fuels peaked in 2006 to 61 PJ. The foreseeable decline in raw wood import to Finland will decrease the indirect import of wood fuels. In 2004– 2007, the direct trade of solid and liquid biomass fuels has been on a moderate growth path. In 2007, the import of palm oil and export of bio-diesel emerged, as a large, 170 000 t/yr biodiesel plant came into operation in Porvoo.
Resumo:
The purpose of this dissertation is to examine the dynamics of the socio-technical system in the field of ageing. The study stems from the notion that the ageing of the population as a powerful megatrend has wide societal effects, and is not just a matter for the social and health sector. The central topic in the study is change: not only the age structures and structures of society are changing, but also at the same time there is constant development, for instance, in technologies, infrastructures and cultural perceptions. The changing concept of innovation has widened the understanding of innovations related to ageing from medical and assistive technological innovations to service and social innovations, as well as systemic innovations at different levels, which means the intertwined and co-evolutionary change in technologies, structures, services and thinking models. By the same token, the perceptions of older people and old age are becoming more multi-faceted: old age is no longer equated to illnesses and decline, but visions of active ageing and a third age have emerged, which are framed by choices, opportunities, resources and consumption in later life. The research task in this study is to open up the processes and mechanisms of change in the field of ageing, which are studied as a complex, multi-level and interrelated socio-technical system. The question is about co-effective elements consisting of macro-level landscape changes, the existing socio-technical regime (the rule system, practices and structures) and bottom-up niche-innovations. Societal transitions do not account for the things inside the regime alone, or for the long-term changes in the landscape, nor for the radical innovations, but for the interplay between all these levels. The research problem is studied through five research articles, which offer micro-level case studies to macro-level phenomenon. Each of the articles focus on different aspects related to ageing and change, and utilise various datasets. The framework of this study leans on the studies of socio-technical systems and multi-level perspective on transitions mainly developed by Frank Geels. Essential factors in transition from one socio-technological regime to another are the co-evolutionary processes between landscape changes, regime level and experimental niches. Landscape level changes, like the ageing of the population, destabilise the regime in the forms of coming pressures. This destabilization offers windows for opportunity to niche-innovations outside or at fringe of the regime, which, through their breakthrough, accelerate the transition process. However, the change is not easy because of various kinds of lock-ins and inertia, which tend to maintain the stability of the regime. In this dissertation, a constructionist approach of society is applied leaning mainly to the ideas of Anthony Giddens’ theory of structuration, with the dual nature of structures. The change is taking place in the interplay between actors and structures: structures shape people’s practices, but at the same time these practices constitute and reproduce social systems. Technology and other material aspects, as part of socio-technical systems, and the use of them, also take part in the structuration process. The findings of the study point out that co-evolutionary and co-effective relationships between economic, cultural, technological and institutional fields, as well as relationships between landscape changes, changes in the local and regime-level practices and rule systems, are a very complex and multi-level dynamic socio-technical phenomenon. At the landscape level of ageing, which creates the pressures and triggers to the regime change, there are three remarkable megatrends: demographic change, changes in the global economy and the development of technologies. These exert pressures to the socio-technical regime, which as a rule system is experiencing changes in the form of new markets and consumer habits, new ways of perceiving ageing, new models of organising the health care and other services and as new ways of considering innovation and innovativeness. There are also inner dynamics in the relationships between these aspects within the regime. These are interrelated and coconstructed: the prevailing perceptions of ageing and innovation, for instance, reflect the ageing policies, innovation policies, societal structures, organising models, technology and scientific discussion, and vice versa. Technology is part of the inner dynamics of the sociotechnological regime. Physical properties of the artefacts set limitations and opportunities with regard to their functions and uses. The use of and discussion about technology, contributes producing and reproducing the perceptions of old age. For societal transition, micro-level changes are also needed, in form of niche-innovations, for instance new services, organisational models or new technologies, Regimes, as stabilitystriven systems, tend to generate incremental innovations, but radically new innovations are generated in experimental niches protected from ‘normal’ market selection. The windows of opportunity for radical novelties may be opened if the circumstances are favourable for instance by tensions in the socio-technical regime affected by landscape level changes. This dissertation indicates that a change is taking place, firstly, in the dynamic interactionbetween levels, as a result of purposive action and governance to some extent. Breaking the inertia and using the window of opportunity for change and innovation offered by dynamics between levels, presupposes the actors’ special capabilities and actions such as dynamic capabilities and distance management. Secondly, the change is taking place the socio-technological negotiations inside the regime: interaction between technological and social, which is embodied in the use of technology. The use of technology includes small-level contextual scripts that also participate in forming broader societal scripts (for instance defining old age at the society level), which in their turn affect the formation of policies for innovation and ageing. Thirdly, the change is taking place by the means of active formation of the multi-actor innovation networks, where the role of distance management is crucial to facilitate the communication between actors coming from different backgrounds as well as to help the niches born outside the regime to utilise the window of opportunity offered by regime destabilisation. This dissertation has both theoretical and practical contributions. This study participates in the discussion of action-oriented view on transition by opening up of the socio-technological, coevolutionary processes of the multi-faceted phenomenon of ageing, which has lacked systematic analyses. The focus of this study, however, is not on the large-scale coordination and governance, but rather on opening up the incremental elements and structuration processes, which contribute to the transition little by little, and which can be affected to. This increases the practical importance of this dissertation, by highlighting the importance of very tiny, everyday elements in the change processes in the long run.
Resumo:
Formal methods provide a means of reasoning about computer programs in order to prove correctness criteria. One subtype of formal methods is based on the weakest precondition predicate transformer semantics and uses guarded commands as the basic modelling construct. Examples of such formalisms are Action Systems and Event-B. Guarded commands can intuitively be understood as actions that may be triggered when an associated guard condition holds. Guarded commands whose guards hold are nondeterministically chosen for execution, but no further control flow is present by default. Such a modelling approach is convenient for proving correctness, and the Refinement Calculus allows for a stepwise development method. It also has a parallel interpretation facilitating development of concurrent software, and it is suitable for describing event-driven scenarios. However, for many application areas, the execution paradigm traditionally used comprises more explicit control flow, which constitutes an obstacle for using the above mentioned formal methods. In this thesis, we study how guarded command based modelling approaches can be conveniently and efficiently scheduled in different scenarios. We first focus on the modelling of trust for transactions in a social networking setting. Due to the event-based nature of the scenario, the use of guarded commands turns out to be relatively straightforward. We continue by studying modelling of concurrent software, with particular focus on compute-intensive scenarios. We go from theoretical considerations to the feasibility of implementation by evaluating the performance and scalability of executing a case study model in parallel using automatic scheduling performed by a dedicated scheduler. Finally, we propose a more explicit and non-centralised approach in which the flow of each task is controlled by a schedule of its own. The schedules are expressed in a dedicated scheduling language, and patterns assist the developer in proving correctness of the scheduled model with respect to the original one.
Resumo:
Social tagging evolved in response to a need to tag heterogeneous objects, the automated tagging of which is usually not feasible by current technological means. Social tagging can be used for more flexible competence management within organizations. The profiles of employees can be built in the form of groups of tags, as employees tag each other, based on their familiarity of each other’s expertise. This can serve as a replacement for the more traditional competence management approaches, which usually become outdated due to social and organizational hurdles, and obsolete data. These limitations can be overcome by people tagging, as the information revealed by such tags is usually based on most recent employee interaction and knowledge. Task management as part of personal information management aims at the support of users’ individual task handling. This can include collaborating with other individuals, sharing one’s knowledge, both functional and process-related, and distributing documents and web resources. In this context, Task patterns can be used as templates that collect information and experience around tasks associated to it during run time, facilitating agility. The effective collaboration among contributors necessitates the means to find the appropriate individuals to work with on the task, and this can be made possible by using social tagging to describe individual competencies. The goal of this study is to support finding and tagging people within task management, through the effective exploitation of the work/task context. This involves the utilization of knowledge of the workers’ expertise, nature of the task/task pattern and information available from the documents and web resources attached to the task. Vice versa, task management provides an excellent environment for social tagging due to the task context that already provides suitable tags. The study also aims at assisting users of the task management solution with the collaborative construction of light-weight ontology by inferring semantic relations between tags. The thesis project aims at an implementation of people finding & tagging within the java application for task management that consumes web services, which provide the required ontology for the organization.
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014