987 resultados para INFORMATION SCIENCE


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper highlights characteristics pertaining to intranet development processes in large, complex organizations. Some key differences between traditional development processes and intranet developments are identified. An empirical case of corporate intranet development is used to illustrate these differences. In the light of this, a number of managerial considerations in terms of intranet design, implementation, costing and control are outlined.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The Recursive Auto-Associative Memory (RAAM) has come to dominate connectionist investigations into representing compositional structure. Although an adequate model when dealing with limited data, the capacity of RAAM to scale-up to real-world tasks has been frequently questioned. RAAM networks are difficult to train (due to the moving target effect) and as such training times can be lengthy. Investigations into RAAM have produced many variants in an attempt to overcome such limitations. We outline how one such model ((S)RAAM) is able to quickly produce context-sensitive representations that may be used to aid a deterministic parsing process. By substituting a symbolic stack in an existing hybrid parser, we show that (S)RAAM is more than capable of encoding the real-world data sets employed. We conclude by suggesting that models such as (S)RAAM offer valuable insights into the features of connectionist compositional representations.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Information and communication technologies are thought by some to offer a new solution to world poverty.<br />It is argued that information and communication technologies (ICT) allow poor countries to &lsquo;leap-frog&rsquo;<br />traditional stages of development and become immediately engaged with the &lsquo;new economy&rsquo;. Such an<br />optimistic view requires appropriate government policies to facilitate this shift. Interventions required<br />would include improving access levels and quality of telecommunication and electricity infrastructure,<br />improved quality of education and numbers of those accessing education, and providing both direct<br />and indirect support to encourage local firms to become engaged with the global economy. Ironically,<br />these policies are consistent with current orthodox development policies currently pursued within the<br />&lsquo;traditional&rsquo; economy. This chapter therefore considers what exactly is new about ICT in terms of its<br />potential impact on the poor.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Seismic data gathered from the Hydrocarbon Exploration and Discovery Operation is essential to identify possible hydrocarbon existence in a geologically surveyed area. However, the discovery operation takes a long time to be completed and computational processing of the acquired data is often delayed. Hydrocarbon exploration may end up needlessly covering an area without any hydrocarbon traces due to lack of immediate feedback from geophysical experts. This feedback can only be given when the acquired seismic data is computationally processed, analysed and interpreted. In response, we propose a comprehensive model to facilitate Hydrocarbon Exploration and Discovery Operation using encryption, decryption, satellite transmission and clouds. The model details the logical design of Seismic Data Processing (SDP) that exploits clouds and the ability for geophysical experts to provide on-line decisions on how to progress the hydrocarbon exploration operation at a remote location. Initial feasibility assessment was carried out to support our model. The SDP, data encryption and encryption for the assessment were carried out on a private cloud. The assessment shows that the overall process of hydrocarbon exploration from data acquisition, satellite data transmission through to SDP could be executed in a short time and at low costs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques.&nbsp;The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This book focuses on network management and traffic engineering for Internet and distributed computing technologies, as well as present emerging technology trends and advanced platform

Relevância:

60.00% 60.00%

Publicador:

Resumo:

It is paramount to provide seamless and ubiquitous access to rich contents available online to interested users via a wide range of devices with varied characteristics. Recently, a service-oriented content adaptation scheme has emerged to address this content-device mismatch problem. In this scheme, content adaptation functions are provided as services by third-party providers. Clients pay for the consumed services and thus demand service quality. As such, negotiating for the QoS offers, assuring negotiated QoS levels and accuracy of adapted content version are essential. Any non-compliance should be handled and reported in real time. These issues elevate the management of service level agreement (SLA) as an important problem. This chapter presents prior work, important challenges, and a framework for managing SLA for service-oriented content adaptation platform.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

&pound;-negotiation handles negotiation over the Internet without human supervision and has shown effectiveness in concluding verifiable and more favorable agreements in a reasonably short time. In this chapter, the authors discuss the negotiation 5ystem and its components with particular emphasis on negotiation strategies. A negotiation strategy defines strategic tactics, which advise on the proper action to select from a set of possible actions that optimizes negotiation outcomes. A strategy should integrate negotiation goals and reactive attitudes. Usually, a fixed strategy is implemented during the course of negotiation regardless ofsignificant decision-makingfactors including market status, opponent :S profile, or eagerness for a negotiated goods/service. The chapter presents the main negotiation strategies and outlines the different decision-makingfactors that should be considered. A strategy uses a utility function to evaluate the offer of an opponent and advises on the generation of a counter offer or the best interaction. The authors finally discuss different utility functions presented in the literature.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This chapter examines a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The chapter proposes a high level managerial framework, which is designed to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. The findings and results of an industry focus group are presented in support of the developed framework for SCADA industry acceptance.<br />

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter will focus upon the impact of Generation F - the Facebook Generation - and their attitudes to security. The chapter is based around discussing the loss of data, the prevention approaches and enforcement policies that are currently being investigated, and the implications that this has upon the modern, working environment. The changing landscape of work presents the issue of the Need to Know against the modern, working practises of Need to Share, a conflict that needs to be resolved as a matter of urgency. Many hold the view that it would be wrong to return to the Cold War scenario, however the modern position of Need to Share leads to a steadily rising fear of Information Insecurity. Accepting this situation means that working practises within large organisations need to be reviewed without ignoring the benefits of the new and emerging technologies and yet still be vigilant with regards to Information security.<br />