979 resultados para sino-centric


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Application service provider models represent an alternative to in-house information systems and are gaining favor within the hospitality industry: The models, which place technical system components at a remote site, are described as server-centric. ASPs allow hospitality management to share investment dollars, system costs, and technical staff expenditure with an ASP operator, thereby concentrating on providing enhanced guest services. Although considered a viable alternative to in-house processing, not everyone agrees this is a favorable trend.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern software applications are becoming more dependent on database management systems (DBMSs). DBMSs are usually used as black boxes by software developers. For example, Object-Relational Mapping (ORM) is one of the most popular database abstraction approaches that developers use nowadays. Using ORM, objects in Object-Oriented languages are mapped to records in the database, and object manipulations are automatically translated to SQL queries. As a result of such conceptual abstraction, developers do not need deep knowledge of databases; however, all too often this abstraction leads to inefficient and incorrect database access code. Thus, this thesis proposes a series of approaches to improve the performance of database-centric software applications that are implemented using ORM. Our approaches focus on troubleshooting and detecting inefficient (i.e., performance problems) database accesses in the source code, and we rank the detected problems based on their severity. We first conduct an empirical study on the maintenance of ORM code in both open source and industrial applications. We find that ORM performance-related configurations are rarely tuned in practice, and there is a need for tools that can help improve/tune the performance of ORM-based applications. Thus, we propose approaches along two dimensions to help developers improve the performance of ORM-based applications: 1) helping developers write more performant ORM code; and 2) helping developers configure ORM configurations. To provide tooling support to developers, we first propose static analysis approaches to detect performance anti-patterns in the source code. We automatically rank the detected anti-pattern instances according to their performance impacts. Our study finds that by resolving the detected anti-patterns, the application performance can be improved by 34% on average. We then discuss our experience and lessons learned when integrating our anti-pattern detection tool into industrial practice. We hope our experience can help improve the industrial adoption of future research tools. However, as static analysis approaches are prone to false positives and lack runtime information, we also propose dynamic analysis approaches to further help developers improve the performance of their database access code. We propose automated approaches to detect redundant data access anti-patterns in the database access code, and our study finds that resolving such redundant data access anti-patterns can improve application performance by an average of 17%. Finally, we propose an automated approach to tune performance-related ORM configurations using both static and dynamic analysis. Our study shows that our approach can help improve application throughput by 27--138%. Through our case studies on real-world applications, we show that all of our proposed approaches can provide valuable support to developers and help improve application performance significantly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Content Centric Network (CCN) is a proposed future internet architecture that is based on the concept of contents name instead of the hosts name followed in the traditional internet architecture. CCN architecture might do changes in the existing internet architecture or might replace it completely. In this paper, we present modifications to the existing Domain Name System (DNS) based on the CCN architecture requirements without changing the existing routing architecture. Hence the proposed solution achieves the benefits of both CCN and existing network infrastructure (i.e. content based routing, independent of host location, caching and content delivery protocols).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent paradigms in wireless communication architectures describe environments where nodes present a highly dynamic behavior (e.g., User Centric Networks). In such environments, routing is still performed based on the regular packet-switched behavior of store-and-forward. Albeit sufficient to compute at least an adequate path between a source and a destination, such routing behavior cannot adequately sustain the highly nomadic lifestyle that Internet users are today experiencing. This thesis aims to analyse the impact of the nodes’ mobility on routing scenarios. It also aims at the development of forwarding concepts that help in message forwarding across graphs where nodes exhibit human mobility patterns, as is the case of most of the user-centric wireless networks today. The first part of the work involved the analysis of the mobility impact on routing, and we found that node mobility significance can affect routing performance, and it depends on the link length, distance, and mobility patterns of nodes. The study of current mobility parameters showed that they capture mobility partially. The routing protocol robustness to node mobility depends on the routing metric sensitivity to node mobility. As such, mobility-aware routing metrics were devised to increase routing robustness to node mobility. Two categories of routing metrics proposed are the time-based and spatial correlation-based. For the validation of the metrics, several mobility models were used, which include the ones that mimic human mobility patterns. The metrics were implemented using the Network Simulator tool using two widely used multi-hop routing protocols of Optimized Link State Routing (OLSR) and Ad hoc On Demand Distance Vector (AODV). Using the proposed metrics, we reduced the path re-computation frequency compared to the benchmark metric. This means that more stable nodes were used to route data. The time-based routing metrics generally performed well across the different node mobility scenarios used. We also noted a variation on the performance of the metrics, including the benchmark metric, under different mobility models, due to the differences in the node mobility governing rules of the models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides information on the morphology and occurrence of extant diatoms of the family Asterolampraceae and Azpeitia species of the southernmost Brazilian continental shelf and slope waters in the Southwestern Atlantic Ocean (28 - 34°S), under the influence of Tropical, Subtropical, Subantarctic Waters, terrestrial discharges from La Plata River and Lagoa dos Patos lagoon. Plankton was sampled (20 µm net; vertical hauls) at the same 27 stations in winter 2005 and summer 2007. Among Asterolampraceae, Asteromphalus flabellatus was the most frequent species (57% of samples) observed mainly in winter samples (92%) in Subtropical Shelf Water but also under the influence of La Plata River plume (salinity <35). Lower frequencies were observed for Asterolampra marylandica, Asteromphalus elegans, Asteromphalus heptactis and Spatangidium arachne. Four species of Azpeitia were observed: A. barronii and A. neocrenulata for the first time in the South Atlantic Ocean while A. africana and A. nodulifer had already been registered in equatorial and southern areas of Brazil. All Azpeitia species were rare (19%) in offshore samples (100-200 m depth. Remarks on the morphology based on light and scanning electron microcopy observations are provided along with their distribution in the study area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Individuals living in highly networked societies publish a large amount of personal, and potentially sensitive, information online. Web investigators can exploit such information for a variety of purposes, such as in background vetting and fraud detection. However, such investigations require a large number of expensive man hours and human effort. This paper describes InfoScout, a search tool which is intended to reduce the time it takes to identify and gather subject centric information on the Web. InfoScout collects relevance feedback information from the investigator in order to rerank search results, allowing the intended information to be discovered more quickly. Users may still direct their search as they see fit, issuing ad-hoc queries and filtering existing results by keywords. Design choices are informed by prior work and industry collaboration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The continuous flow of technological developments in communications and electronic industries has led to the growing expansion of the Internet of Things (IoT). By leveraging the capabilities of smart networked devices and integrating them into existing industrial, leisure and communication applications, the IoT is expected to positively impact both economy and society, reducing the gap between the physical and digital worlds. Therefore, several efforts have been dedicated to the development of networking solutions addressing the diversity of challenges associated with such a vision. In this context, the integration of Information Centric Networking (ICN) concepts into the core of IoT is a research area gaining momentum and involving both research and industry actors. The massive amount of heterogeneous devices, as well as the data they produce, is a significant challenge for a wide-scale adoption of the IoT. In this paper we propose a service discovery mechanism, based on Named Data Networking (NDN), that leverages the use of a semantic matching mechanism for achieving a flexible discovery process. The development of appropriate service discovery mechanisms enriched with semantic capabilities for understanding and processing context information is a key feature for turning raw data into useful knowledge and ensuring the interoperability among different devices and applications. We assessed the performance of our solution through the implementation and deployment of a proof-of-concept prototype. Obtained results illustrate the potential of integrating semantic and ICN mechanisms to enable a flexible service discovery in IoT scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fondo Margaritainés Restrepo

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Paper presented by Charlotte Sieber-Gasser at the African IEL Network Conference, 5th-6th of May 2011, The Mandela Institute, Johannesburg (South Africa) Sino-African trade has seen a fifty-fold increase in the years 1999 to 2008. China became the second most important trading partner for the African economy and already overtook the US as the most important trading partner in some African regions. However, all of this trade is taking place independent from legal regulation by a preferential or other trade agreement. Interestingly, Sino-African trade has seen particular increase in countries that have agreed to tied aid arrangements with China. Taking a closer look at these tied aid arrangements (the so-called Angola-Model) reveals, that some aspects might indeed have a positive effect on Sino-African trade in general. Several grey areas might potentially conflict with WTO-law. However, tied aid is excluded from the GATS, the GATT, and the GPA – in other words, it is outside the sphere of WTO-law. The paper analyses three critical aspects of the Angola-Model version of tied aid with reference to WTO-law, and elaborates the importance of regulating trade-distorting aspects of modern tied aid.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Paper presented by Charlotte Sieber-Gasser at the 5th Annual TRAPCA Conference, Arusha (Tanzania), 25-26 November 2010. Despite the increasing volume of trade between China and African countries, not one single conventional free trade agreement (FTA) or economic partnership agreement (EPA) has yet been signed between an African country and China. Initially, Sino-African trade relations were to a very large extent centred on investments secured through bilateral investment agreements (BITs). The more recent Chinese investments on the African continent, however, are more informally based on FDI contracts with the state at the receiving end and a government-owned private company as the investor, or loosely attached to loans commonly known under term ‘the Angola-Model’. This rather unusual basis for economic integration and development assistance, outside the trodden path of free trade agreements and ODA, requires further analysis in order to understand how the current legal framework between China and the African continent impacts economic development and national sovereignty, and what kind of distributive consequences it may have.