95 resultados para INFORMATION SCIENCE


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Devices, standards and software develop rapidly, but still often independently of each other. This creates problems in terms of content suitability on various devices. Also, in mobile environment, user and system-level applications must execute subject to a variety of resource constraints. In order to deal with these constraints, content adaptation is required. In this chapter, we justify the need of distributed cross media content adaptation and the potential of utilizing Web Services as the adaptation providers. We introduce request-driven context to complement constraint-driven and utility-driven approaches. We describe the request context mapping and propose a novel path&rsquo;s determination scheme for determining the optimal service proxies to facilitate the adaptation tasks. To better illustrate the disjoint portions in content passing between service proxies, two communication models were associated. Then, within Web Services, we explain the related protocols and socket connection between adaptation&rsquo;s services. We conclude with discussion regarding the strengths of the proposed architecture.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Sensor Networks have applications in diverse fields. They can be deployed for habitat modeling, temperature monitoring and industrial sensing. They also find applications in battlefield awareness and emergency (first) response situations. While unique addressing is not a requirement of many data collecting applications of wireless sensor networks, it is vital for the success of applications such as emergency response. Data that cannot be associated with a specific node becomes useless in such situations. In this work we propose a novel dynamic addressing mechanism for wireless sensor networks that are not location-aware. The scheme enables successful reuse of addresses in event-driven wireless sensor networks introducing minimal latencies and efficiently addressing packet loss. It also eliminates the need for network-wide Duplicate Address Detection (DAD) to ensure uniqueness of network level addresses.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Negotiation Support Systems (NSS) model the process of negotiation from basic template support to more sophisticated decision making support. The authors attempt to develop systems capable of decision support by suggesting possible solutions for the given dispute. Current Negotiation Support Systems primarily rely upon mathematical optimisation techniques and often ignore heuristics and other methods derived from practice. This chapter discusses the technology of several negotiation support systems in family law developed in their laboratory based on data collected and methods derived from practise. The chapter explores similarities and differences between systems the authors have created and demonstrates their latest development, AssetDivider.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter presents a comprehensive analysis of the current state of Building Information Modelling (BIM) in the Architecture, Engineering, Construction and Facility Management (AEC/FM) industry and a&nbsp; re-assessment of its role and potential contribution in the near future, given the apparent slow rate of adoption by the industry. The chapter analyses the readiness of the industry with respect to the (1) tools, (2) processes and (3) people to position BIM adoption in terms of current status and expectations<br />across disciplines. The findings are drawn from an ongoing research project funded by the Australian Cooperative Research Centre for Construction Innovation (CRC-CI) that aims at developing a technological, operational and strategic analysis of adopting BIM in the AEC/FM industry as a<br />collaboration platform.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Engineering asset management organisations (EAMOs) are increasingly motivated to implement business intelligence (BI) systems in response to dispersed information environments and compliance requirements. However, the implementation of a business intelligence (BI) system is a complex undertaking requiring considerable resources. Yet, so far, there are few defined critical success factors (CSFs) to which management can refer. Drawing on the CSFs framework derived from a previous Delphi study, a multiple-case design was used to examine how these CSFs could be implemented by five EAMOs. The case studies substantiate the construct and applicability of the CSFs framework. These CSFs are: committed management support and sponsorship, a clear vision and well-established business case, business-centric championship and balanced team composition, a business-driven and iterative develop ment approach, user-oriented change management, a business-driven, scalable and flexible technical framework, and sustainable data quality and integrity. More significantly, the study further reveals that those organisations which address the CSFs from a business orientation approach will be more likely to achieve better results.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper highlights characteristics pertaining to intranet development processes in large, complex organizations. Some key differences between traditional development processes and intranet developments are identified. An empirical case of corporate intranet development is used to illustrate these differences. In the light of this, a number of managerial considerations in terms of intranet design, implementation, costing and control are outlined.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Recursive Auto-Associative Memory (RAAM) has come to dominate connectionist investigations into representing compositional structure. Although an adequate model when dealing with limited data, the capacity of RAAM to scale-up to real-world tasks has been frequently questioned. RAAM networks are difficult to train (due to the moving target effect) and as such training times can be lengthy. Investigations into RAAM have produced many variants in an attempt to overcome such limitations. We outline how one such model ((S)RAAM) is able to quickly produce context-sensitive representations that may be used to aid a deterministic parsing process. By substituting a symbolic stack in an existing hybrid parser, we show that (S)RAAM is more than capable of encoding the real-world data sets employed. We conclude by suggesting that models such as (S)RAAM offer valuable insights into the features of connectionist compositional representations.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Information and communication technologies are thought by some to offer a new solution to world poverty.<br />It is argued that information and communication technologies (ICT) allow poor countries to &lsquo;leap-frog&rsquo;<br />traditional stages of development and become immediately engaged with the &lsquo;new economy&rsquo;. Such an<br />optimistic view requires appropriate government policies to facilitate this shift. Interventions required<br />would include improving access levels and quality of telecommunication and electricity infrastructure,<br />improved quality of education and numbers of those accessing education, and providing both direct<br />and indirect support to encourage local firms to become engaged with the global economy. Ironically,<br />these policies are consistent with current orthodox development policies currently pursued within the<br />&lsquo;traditional&rsquo; economy. This chapter therefore considers what exactly is new about ICT in terms of its<br />potential impact on the poor.