Public services have their own principles and codes in order to address needs of general interest through the procurement of physical objects, information or services to various kinds of users. Characterized by a poli...
详细信息
ISBN:
(数字)9783319669267
ISBN:
(纸本)9783319669267;9783319669250
Public services have their own principles and codes in order to address needs of general interest through the procurement of physical objects, information or services to various kinds of users. Characterized by a political context and a dedicated legal framework, public services have also specific constraints and objectives. This communication shows how continuous improvement methods born in an industrial context could be adapted for addressing the specificity of public service, especially in the new context of "Smart Cities".
BYOD policies are informally specified using natural language. We show how the SP4BYOD language can help reduce ambiguity in 5 BYOD policies and link the specification of a BYOD policy to its implementation. Using a f...
详细信息
ISBN:
(数字)9783319584690
ISBN:
(纸本)9783319584690;9783319584683
BYOD policies are informally specified using natural language. We show how the SP4BYOD language can help reduce ambiguity in 5 BYOD policies and link the specification of a BYOD policy to its implementation. Using a formalisation of the 5 policies written in SP4BYOD, we make comparisons between them, and explore the delegation relationships within them. We identify that whilst policy acknowledgement is a key part of all 5 policies, this is not managed by existing MDM tools.
Stereo matching is a crucial step to extract depth information from stereo images. However, it is still challenging to achieve good performance in both speed and accuracy for various stereo vision applications. In thi...
详细信息
ISBN:
(数字)9783319671048
ISBN:
(纸本)9783319671048;9783319671031
Stereo matching is a crucial step to extract depth information from stereo images. However, it is still challenging to achieve good performance in both speed and accuracy for various stereo vision applications. In this contribution, a hardware-compatible stereo matching algorithm is proposed and its associated hardware implementation is also presented. The proposed algorithm can produce high-quality disparity maps with the combined use of the mini-census transform, segmentation-based adaptive support weight and effective refinement. Moreover, the proposed architecture is optimized as a fully pipelined and scalable hardware system. Implemented on an Altera Stratix-IV FPGA board, it can achieve 65 frames per second (fps) for 1024 x 768 stereo images and a 64 pixel disparity range. The proposed system is evaluated on the Middle-bury benchmark and the average error rate is 6.56%. The experimental results indicate that the accuracy is competitive with some state-of-the-art software implementations.
The implementation of internal reverse production process programs often involves significant allocations of capital and resources for the construction and implementation of all the steps in the process. But, what if ...
详细信息
ISBN:
(数字)9783319669267
ISBN:
(纸本)9783319669267;9783319669250
The implementation of internal reverse production process programs often involves significant allocations of capital and resources for the construction and implementation of all the steps in the process. But, what if we think of reverse production process as a service-based manufacturing network, in which all the activities are outsourced and the only thing that a manufacturing company needs in order to participate is an interface/service to "play" in that ecosystem. In this work we present an approach to implement reverse production process following a Service-Oriented Manufacturing paradigm by means of a virtual market supported by intelligent software agents.
Malicious third-party applications can leak personal data stored in the Android system by exploiting side channels. TaintDroid uses a dynamic taint analysis mechanism to control the manipulation of private data by thi...
详细信息
ISBN:
(数字)9783319584690
ISBN:
(纸本)9783319584690;9783319584683
Malicious third-party applications can leak personal data stored in the Android system by exploiting side channels. TaintDroid uses a dynamic taint analysis mechanism to control the manipulation of private data by third-party apps [9]. However, TaintDroid does not propagate taint in side channels. An attacker can exploit this limitation to get private data. For example, Sarwar et al. [2] present side channel class of attacks using a medium that might be overlooked by the taint-checking mechanism to extract sensitive data in Android system. In this paper, we enhance the TaintDroid system and we propagate taint in side channels using formal policy rules. To evaluate the effectiveness of our approach, we analyzed 100 free Android applications. We found that these applications use different side channels to transfer sensitive data. We successfully detected that 35% of them leaked private information through side channels. Also, we detected Sarwar et al. [2] side channel attacks. Our approach generates 9% of false positives. The overhead given by our approach is acceptable in comparison to the one obtained by TaintDroid (9% overhead).
Declining oil prices have made it necessary for oil and gas companies to scrutinize their operations and associated costs. The increase in data richness from the digitization of supply chain processes could help these...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
Declining oil prices have made it necessary for oil and gas companies to scrutinize their operations and associated costs. The increase in data richness from the digitization of supply chain processes could help these companies manage risks, and increase collaboration and profitability. This paper explores the challenges and opportunities for oil and gas industry in this context.
National Park (NP) Monitoring and Management is dealing with dozens of different data where the provenience of the data is as manifold as the fields covered in the monitoring process. International, national, and fede...
详细信息
ISBN:
(纸本)9783319899350;9783319899343
National Park (NP) Monitoring and Management is dealing with dozens of different data where the provenience of the data is as manifold as the fields covered in the monitoring process. International, national, and federal responsibility is found as well as NGO databases, crowd sourcing applications or dedicated field surveys in R&D - activities of single research groups. Environmental software systems are intelligent pencils to manage, analyse and visualize the environmental-but also the administrative data coming from the different sources mentioned. The paper emphazises different fields of activity in NP monitoring and management and is presenting software systems in use in the NP Hunsruck-Hochwald (Germany). In general, the software systems used are mostly highly adopted to the individual needs of a NP. This depends on specific landscape, features, or the research focus in the park, to name but a few. The software solutions are realized as a customization of standard software products, or, as individual software packages, designed and developed according to the special requirements of the fields of activity in a dedicated park. Regarding the future developments, there will be no significant changes: the heterogeneity of the data and software used will be similar as it was in the past or it is recently. Because of the long-lasting perspective in NP research and management, one important action the NP administration should focus on: a proper documentation of methods, datasets, publications and information systems targeting the NP, to make monitoring and management activities transparent, accessible and ready for future re-use.
Firms need comprehensive knowledge and understanding of the opportunities available in the market by creating supply market intelligence (SMI). SMI can facilitate in finding the best partners and combination of capabi...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
Firms need comprehensive knowledge and understanding of the opportunities available in the market by creating supply market intelligence (SMI). SMI can facilitate in finding the best partners and combination of capabilities within collaborative networks (CN). However, despite of its evident managerial relevance, SMI is still little researched topic. Simultaneously, big data analytics (BDA) has developed rapidly, becoming vital for businesses across industries. The objective of this paper is recognizing the importance of SMI and opportunities of BDA through qualitative research. The data derives from two focus group discussions of 75 purchasing professionals and six qualitative interviews of BDA experts. This research contributes to our understanding of the opportunities of BDA in creating systematic SMI to reinforce strategic collaboration, and to the understanding of knowledge as a strategic resource for forming strategic CN. Collaborative big data intelligence creates value through, for instance, creating transparency in business processes and discovering market changes.
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interconnected networks, placing them at risk of cyber attack. ICS networks are typically monitored by an Intrusion Detectio...
详细信息
ISBN:
(数字)9783319584690
ISBN:
(纸本)9783319584690;9783319584683
Industrial Control Systems (ICSs) are moving from dedicated communications to Ethernet-based interconnected networks, placing them at risk of cyber attack. ICS networks are typically monitored by an Intrusion Detection System (IDS), however traditional IDSs do not detect attacks which disrupt the control flow of an ICS. ICSs are unique in the repetition and restricted number of tasks that are undertaken. Thus there is the opportunity to use Process Mining, a series of techniques focused on discovering, monitoring and improving business processes, to detect ICS control flow anomalies. In this paper we investigate the suitability of various process mining discovery algorithms for the task of detecting cyber attacks on ICSs by examining logs from control devices. Firstly, we identify the requirements of this unique environment, and then evaluate the appropriateness of several commonly used process discovery algorithms to satisfy these requirements. Secondly, the comparison was performed and validated using ICS logs derived from a case study, containing successful attacks on industrial control systems. Our research shows that the Inductive Miner process discovery method, without the use of noise filtering, is the most suitable for discovering a process model that is effective in detecting cyber-attacks on industrial control systems, both in time spent and accuracy.
Over recent years, in a wide range of countries, grassroots initiatives have emerged aimed at overcoming the limits of the mainstream agro-business system. These initiatives aim at improving farmers' access to loc...
详细信息
ISBN:
(数字)9783319651514
ISBN:
(纸本)9783319651514
Over recent years, in a wide range of countries, grassroots initiatives have emerged aimed at overcoming the limits of the mainstream agro-business system. These initiatives aim at improving farmers' access to local and regional markets and consumers' access to fresh local produce. Among these initiatives, Food Hubs have emerged as a promising way to improve local food supply systems. They represent collaborative networks of producers and consumers that aggregate, distribute, and market local food products. ICTs enable these collaborative networks by allowing information exchange among their actors and by providing collaborative tools that allow quick co-ordination between members of the network. The paper aims to analyse how the adoption of ICTs have fostered the development of new, initiatives oriented at establishing local food networks and to reconnect producers and consumers. The study will present results from the analysis of two food-hub initiatives based in South West England, which are adopting informative systems to support their activities and to implement novel business models: Stroudco Food Hub and Dean Forest Food Hub.
暂无评论