827 resultados para Sharing Ink
Resumo:
Current methods and tools that support Linked Data publication have mainly focused so far on static data, without considering the growing amount of streaming data available on the Web. In this paper we describe a case study that involves the publication of static and streaming Linked Data for bike sharing systems and related entities. We describe some of the challenges that we have faced, the solutions that we have explored, the lessons that we have learned, and the opportunities that lie in the future for exploiting Linked Stream Data.
Resumo:
Data-related properties of the activities involved in a service composition can be used to facilitate several design-time and run-time adaptation tasks, such as service evolution, distributed enactment, and instance-level adaptation. A number of these properties can be expressed using a notion of sharing. We present an approach for automated inference of data properties based on sharing analysis, which is able to handle service compositions with complex control structures, involving loops and sub-workflows. The properties inferred can include data dependencies, information content, domain-defined attributes, privacy or confidentiality levels, among others. The analysis produces characterizations of the data and the activities in the composition in terms of minimal and maximal sharing, which can then be used to verify compliance of potential adaptation actions, or as supporting information in their generation. This sharing analysis approach can be used both at design time and at run time. In the latter case, the results of analysis can be refined using the composition traces (execution logs) at the point of execution, in order to support run-time adaptation.
Resumo:
Empirical Software Engineering (ESE) replication researchers need to store and manipulate experimental data for several purposes, in particular analysis and reporting. Current research needs call for sharing and preservation of experimental data as well. In a previous work, we analyzed Replication Data Management (RDM) needs. A novel concept, called Experimental Ecosystem, was proposed to solve current deficiencies in RDMapproaches. The empirical ecosystem provides replication researchers with a common framework that integrates transparently local heterogeneous data sources. A typical situation where the Empirical Ecosystem is applicable, is when several members of a research group, or several research groups collaborating together, need to share and access each other experimental results. However, to be able to apply the Empirical Ecosystem concept and deliver all promised benefits, it is necessary to analyze the software architectures and tools that can properly support it.
Resumo:
Conferencia por invitación, impartida el 31 d mayo de 2014 en el Workshop on Language Technology Service Platforms: Synergies, Standards, Sharing at LREC2014
Resumo:
This paper discusses a model based on the agency theory to analyze the optimal transfer of construction risk in public works contracts. The base assumption is that of a contract between a principal (public authority) and an agent (firm), where the payment mechanism is linear and contains an incentive mechanism to enhance the effort of the agent to reduce construction costs. A theoretical model is proposed starting from a cost function with a random component and assuming that both the public authority and the firm are risk averse. The main outcome of the paper is that the optimal transfer of construction risk will be lower when the variance of errors in cost forecast, the risk aversion of the firm and the marginal cost of public funds are larger, while the optimal transfer of construction risk will grow when the variance of errors in cost monitoring and the risk aversion of the public authority are larger
Resumo:
A unique gene, RBP-MS, spanning over 230 kb in the human chromosome 8p11-12 near the Werner syndrome gene locus is described. The single-copy RBP-MS gene is alternatively spliced, resulting in a family of at least 12 transcripts (average length of 1.5 kb). Nine different types of cDNAs that encode an RNa-binding motif at the N terminus and helix-rich sequences at the C terminus have been identified thus far. Among the 16 exons identified, four 5'-proximal exons contained sequences homologous to the RNA-binding domain of Drosophila couch potato gene. Northern blot analysis showed that the RBP-MS gene was expressed strongly in the heart, prostate, intestine, and ovary, and poorly in the skeletal muscle, spleen, thymus, brain, and peripheral leukocytes. The possible role of this gene in RNA metabolism is discussed.
Resumo:
Interleukin (IL) 2 signaling requires the dimerization of the IL-2 receptor beta (IL-2R beta) and common gamma (gamma c) chains. The gamma is also a component of the receptors for IL-4, IL-7, and IL-9. To assess the extent and role of the receptor signal transducing system utilizing the gamma c chain on human intestinal epithelial cells, the expression of gamma c, IL-2R beta, and receptor chains specific for IL-4, IL-7, and IL-9 was assessed by reverse transcription-coupled PCR on human intestinal epithelial cell lines and on isolated primary human intestinal epithelial cells. Caco-2, HT-29, and T-84 cells were found to express transcripts for the gamma c and IL-4R chains constitutively. IL-2R beta chain expression was demonstrated in Caco-2 and HT-29 but not in T-84 cells. None of the cell lines expressed mRNA for the IL-2R alpha chain. After stimulation with epidermal growth factor for 24 h Caco-2, HT-29, and T-84 cells expressed transcripts for IL-7R. In addition, Caco-2 and HT-29 cells expressed mRNA for the IL-9R. Receptors for IL-2, IL-4, IL-7, and IL-9 on intestinal epithelial cells lines appeared to be functional; stimulation with these cytokines caused rapid tyrosine phosphorylation of proteins. The relevance of the observations in intestinal epithelial cell lines for intestinal epithelial function in vivo was supported by the demonstration of transcripts for gamma c, IL-2R beta, IL-4R, IL-7R, and IL-9R in primary human intestinal epithelial cells.
Resumo:
To provide more efficient and flexible alternatives for the applications of secret sharing schemes, this paper describes a threshold sharing scheme based on exponentiation of matrices in Galois fields. A significant characteristic of the proposed scheme is that each participant has to keep only one master secret share which can be used to reconstruct different group secrets according to the number of threshold values.
Resumo:
These days as we are facing extremely powerful attacks on servers over the Internet (say, by the Advanced Persistent Threat attackers or by Surveillance by powerful adversary), Shamir has claimed that “Cryptography is Ineffective”and some understood it as “Cryptography is Dead!” In this talk I will discuss the implications on cryptographic systems design while facing such strong adversaries. Is crypto dead or we need to design it better, taking into account, mathematical constraints, but also systems vulnerability constraints. Can crypto be effective at all when your computer or your cloud is penetrated? What is lost and what can be saved? These are very basic issues at this point of time, when we are facing potential loss of privacy and security.
Resumo:
Drawing by Charles Bulfinch of proposed plans for University Hall which were later rejected. Includes sketches of the front exterior view of the University Hall, and separate floor plans for the ground and second floors. Bulfinch designed a ground floor with a chapel and four dining halls each holding 100 students, a second floor with a gallery in the chapel and three rooms over the dining halls for public examinations and meetings of the Corporation and Overseers; and a basement under the halls intended for a kitchen under the dining halls and recitation rooms under the chapel.
Resumo:
taʼlīf Muḥammad ibn Muḥammad al-Ṣaghīr al-Shinjīṭī al-Tashītī ; bi-taṣḥīḥ wa-muqābalat Abī ʻAbd Allāh Muḥammad Gannūn.
Resumo:
In 2013 the European Council for the first time since long will deal with European defence. An excellent opportunity: to move key Pooling & Sharing projects to the implementation stage in the short term, and to launch a permanent and structured approach to the development of European military capabilities for the long term.