959 resultados para user generated services


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasing usage of Web Services has been result of efforts to automate Web Services discovery and interoperability. The Semantic Web Service descriptions create basis for automatic Web Service information management tasks such as discovery and interoperability. The discussion of opportunities enabled by service descriptions have arisen in recent years. The end user has been considered only as a consumer of services and information sharing occurred from one service provider to public in service distribution. The social networking has changed the nature of services. The end user cannot be seen anymore only as service consumer, because by enabling semantically rich environment and right tools, the end user will be in the future the producer of services. This study investigates the ways to provide for end users the empowerment to create service descriptions on mobile device. Special focus is given to the changed role of the end user in service creation. In addition, the Web Services technologies are presented as well as different Semantic Web Service description approaches are compared. The main focus in the study is to investigate tools and techniques to enable service description creation and semantic information management on mobile device.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Current advanced cloud infrastructure management solutions allow scheduling actions for dynamically changing the number of running virtual machines (VMs). This approach, however, does not guarantee that the scheduled number of VMs will properly handle the actual user generated workload, especially if the user utilization patterns will change. We propose using a dynamically generated scaling model for the VMs containing the services of the distributed applications, which is able to react to the variations in the number of application users. We answer the following question: How to dynamically decide how many services of each type are needed in order to handle a larger workload within the same time constraints? We describe a mechanism for dynamically composing the SLAs for controlling the scaling of distributed services by combining data analysis mechanisms with application benchmarking using multiple VM configurations. Based on processing of multiple application benchmarks generated data sets we discover a set of service monitoring metrics able to predict critical Service Level Agreement (SLA) parameters. By combining this set of predictor metrics with a heuristic for selecting the appropriate scaling-out paths for the services of distributed applications, we show how SLA scaling rules can be inferred and then used for controlling the runtime scale-in and scale-out of distributed services. We validate our architecture and models by performing scaling experiments with a distributed application representative for the enterprise class of information systems. We show how dynamically generated SLAs can be successfully used for controlling the management of distributed services scaling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Spring 2009 Map and User Imagery Services Newsletter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Fall 2009 Map and User Imagery Services Newsletter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Fall 2009 Map and User Imagery Services Newsletter; Vol. 3, issue 2.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Spring 2010 Map and User Imagery Services Newsletter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Fall 2012 Map and User Imagery Services Newsletter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Spring/Summer 2013 Map and User Imagery Services Newsletter.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Fall 2013 Map and User Imagery Services Newsletter

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Florida International University's Spring 2015 Maps and User Imagery Services Newsletter

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Within ecological research and environmental management, there is currently a focus on demonstrating the links between human well-being and wildlife conservation. Within this framework, there is a clear interest in better understanding how and why people value certain places over others. We introduce a new method that measures cultural preferences by exploring the potential of multiple online georeferenced digital photograph collections. Using ecological and social considerations, our study contributes to the detection of places that provide cultural ecosystem services. The degree of appreciation of a specific place is derived from the number of people taking and sharing pictures of it. The sequence of decisions and actions taken to share a digital picture of a given place includes the effort to travel to the place, the willingness to take a picture, the decision to geolocate the picture, and the action of sharing it through the Internet. Hence, the social activity of sharing pictures leaves digital proxies of spatial preferences, with people sharing specific photos considering the depicted place not only “worth visiting” but also “worth sharing visually.” Using South Wales as a case study, we demonstrate how the proposed methodology can help identify key geographic features of high cultural value. These results highlight how the inclusion of geographical user-generated content, also known as volunteered geographic information, can be very effective in addressing some of the current priorities in conservation. Indeed, the detection of the most appreciated nonurban areas could be used for better prioritization, planning, and management.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Incremental parsing has long been recognized as a technique of great utility in the construction of language-based editors, and correspondingly, the area currently enjoys a mature theory. Unfortunately, many practical considerations have been largely overlooked in previously published algorithms. Many user requirements for an editing system necessarily impact on the design of its incremental parser, but most approaches focus only on one: response time. This paper details an incremental parser based on LR parsing techniques and designed for use in a modeless syntax recognition editor. The nature of this editor places significant demands on the structure and quality of the document representation it uses, and hence, on the parser. The strategy presented here is novel in that both the parser and the representation it constructs are tolerant of the inevitable and frequent syntax errors that arise during editing. This is achieved by a method that differs from conventional error repair techniques, and that is more appropriate for use in an interactive context. Furthermore, the parser aims to minimize disturbance to this representation, not only to ensure other system components can operate incrementally, but also to avoid unfortunate consequences for certain user-oriented services. The algorithm is augmented with a limited form of predictive tree-building, and a technique is presented for the determination of valid symbols for menu-based insertion. Copyright (C) 2001 John Wiley & Sons, Ltd.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Dissertação apresentada como requisito parcial para obtenção do grau de Mestre em Estatística e Gestão de Informação

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Much of the attention around OERs has been on institutional projects which make explicit learning content available. These can be classified as 'big OER' but another form of OER is that of small scale, individually produced resources using web 2.0 type services, which are classified as 'little OER'. This paper examines some of the differences between the use of these two types of OER to highlight issues in open education. These include attitudes towards reputation, the intentionality of the resource, models of sustainability, the implicit affordances of resources and the context of their hosting sites.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.