Transmodality is the partitioning of an image into regions that are expected to present a better entropy using different coding schemes, depending on their structural density, at constant bandwidth. In this paper we p...
详细信息
ISBN:
(数字)9783319223483
ISBN:
(纸本)9783319223483;9783319223476
Transmodality is the partitioning of an image into regions that are expected to present a better entropy using different coding schemes, depending on their structural density, at constant bandwidth. In this paper we present the transmodality of video stream. Our contribution is a transmoder module that includes various different optimized video codecs and implements the concept of transmodality on a set of video streams. We evaluate our proposal in the context of cloud gaming, using an optimized remote rendering chain and several games. A per game adaptation allows an optimal refinement of video encoding parameters, including both quantization and modality parameters. Our algorithm shows comprehensive results by saving up to 2% of bandwidth for the same PSNR in comparison with the state-of-the-art video encoding baselines.
The main aim of this paper is to develop some methods and technologies of information support for university scientific knowledge management. It examines the concept of knowledge management and life-cycle processes of...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
The main aim of this paper is to develop some methods and technologies of information support for university scientific knowledge management. It examines the concept of knowledge management and life-cycle processes of university scientific knowledge. On-To-Knowledge methodology is used as the basis for the university knowledge management. Text Mining and Semantic Web technologies are used to develop the ontological information model and to process information resources. Some models and methods are explored to carry out the monitoring of university research schools development. The model of a specialist which reflects the level of research activity productivity and overall scientific activity evaluation has been described. The ontology based information model is used to form a specialist's professional competence in different areas. The approach to university scientific school identification based on the university academic community clustering by their common interests and the concept of university scientific knowledge semantic portal have been presented.
Today, it is a challenging task to keep a service application running over the internet safe and secure. Based on a collection of security requirements, a so-called golden configuration can be created for such an appl...
详细信息
ISBN:
(数字)9783319158952
ISBN:
(纸本)9783319158952;9783319158945
Today, it is a challenging task to keep a service application running over the internet safe and secure. Based on a collection of security requirements, a so-called golden configuration can be created for such an application. When the application has been configured according to this golden configuration, it is assumed that it satisfies these requirements, that is, that it is safe and secure. This assumption is based on the best practices that were used for creating the golden configuration, and on assumptions like that nothing out-of-the-ordinary occurs. Whether the requirements are actually violated, can be checked on the traces that are left behind by the configured service application. Today's applications typically log an enormous amount of data to keep track of everything that has happened. As such, such an event log can be regarded as the ground truth for the entire application: A security requirement is violated if and only if it shows in the event log. This paper introduces the ProMSecCo tool, which has been built to check whether the security requirements that have been used to create the golden configuration are violated by the event log as generated by the configured service application.
The emergence of cloud computing as a major trend in the IT industry signifies that corporate users of this paradigm are confronted with the challenge of securing their systems in this new environment. An important as...
详细信息
ISBN:
(数字)9783319192437
ISBN:
(纸本)9783319192437;9783319192420
The emergence of cloud computing as a major trend in the IT industry signifies that corporate users of this paradigm are confronted with the challenge of securing their systems in this new environment. An important aspect of that, includes the secure migration of an organization's legacy systems, which run in data centers that are completely controlled by the organization, to a cloud infrastructure, which is managed outside the scope of the client's premises and may even be to-tally off-shore. This paper makes two important contributions. Firstly, it presents a process (SMiLe2Cloud) and a framework that supports secure migration of corporate legacy systems to the cloud. We propose a process based on a continuous improvement cycle that starts with a Knowledge Discovery Meta-Model (KDM) set of models from which a security model for legacy system migration to the cloud is derived. Secondly, it provides a set of clauses (derived from the models) for security cloud providers and custom security cloud controls.
Background: Aspect-Oriented Requirements Engineering (AORE) is a research field that aims to provide appropriate strategies for identification, modularization and composition of crosscutting concerns (also called earl...
详细信息
ISBN:
(数字)9783319223483
ISBN:
(纸本)9783319223483;9783319223476
Background: Aspect-Oriented Requirements Engineering (AORE) is a research field that aims to provide appropriate strategies for identification, modularization and composition of crosscutting concerns (also called early-aspects). Several AORE approaches have been developed recently, with different features, strengths and limitations. Goals: the aim of this paper is threefold: (i) cataloguing existing AORE approaches based on the activities encompassed by them;(ii) describing what types of techniques have been used by these approaches for "Concern Identification and Classification" - a bottleneck activity;and (iii) identifying which are the most used means of publication of AORE-based studies and how it has been the progress of these studies over the years. Results: we have selected and analyzed 60 (sixty) papers and among them, we identified 38 (thirty-eight) AORE distinct approaches. Some interesting results are: (i) few approaches lead to "Conflict Identification and Resolution", an activity responsible for discovering and treating the mutual influence between different concerns existing in a software;(ii) there is a lack of evaluation studies about already existing AORE approaches;(iii) the most productive research institutions on AORE in the world are located in Lancaster (UK) and Nova Lisboa (Portugal);among other.
Children nowadays start using Internet earlier and earlier. This has gained attention of scholars in various disciplines such as psychology, sociology, and media. Concerns about children's online safety have incre...
详细信息
ISBN:
(纸本)9783319217833;9783319217826
Children nowadays start using Internet earlier and earlier. This has gained attention of scholars in various disciplines such as psychology, sociology, and media. Concerns about children's online safety have increased but information Systems (IS) research on this area is still scarce despite of the fact that information security is an established research field within IS research. In this paper we review the existing research on children's online activities and related threats and risks, as well as initiatives to achieve online safety. We identify gaps in current research, such as lack of qualitative studies and research related to young children, and lack of research addressing the effectiveness of educational initiatives. We also argue that IS research should contribute to this research field for example by studying children's information security and privacy related behavior, as good information security skills lay the groundwork for privacy, the cornerstone for online safety.
Interoperability, as one of the key competition factors for modern enterprises, describes the ability to establish partnership activities in an environment of unstable market. In some terms, interoperability determine...
详细信息
ISBN:
(纸本)9783662471579;9783662471562
Interoperability, as one of the key competition factors for modern enterprises, describes the ability to establish partnership activities in an environment of unstable market. In some terms, interoperability determines the future of enterprises;so, improving enterprises' interoperability turns to be a research focus. "Sharing data among heterogeneous partners" is one of the most basic common interoperability problems, which requires a general methodology to serve. Model transformation, which plays a key role in model-driven engineering, provides a possible solution to data sharing problem. A general model transformation methodology, which could shield traditional model transformation practices' weaknesses: low reusability, contains repetitive tasks, involves huge manual effort, etc., is an ideal solution to data sharing problem. This paper presents a general model transformation methodology "combining semantic check measurement and syntactic check measurement into refined model transformation processes" and the mechanism of using it to serve interoperability's data sharing issue.
The Enterprise Architecture (EA) provides a holistic view of an enterprise and seeks to align the business and IT. As the change in the business goals and strategies of an enterprise is inevitable, managing the evolut...
详细信息
ISBN:
(纸本)9783319291338;9783319291321
The Enterprise Architecture (EA) provides a holistic view of an enterprise and seeks to align the business and IT. As the change in the business goals and strategies of an enterprise is inevitable, managing the evolution of the EA is a key challenge for modern enterprises. Furthermore, the EA metrics are instrumental in quantitatively measuring the progress of an enterprise towards its goals. The retrospective analysis of the EA metrics empower practitioners to take informed decisions while planning and selecting efficient alternatives to achieve the envisioned goal. The tool support for the EA metric analysis is still in its infancy. In this paper, we propose a model-based approach to capture the temporal aspects of the EA metrics and extend a model-based expression language to compute the EA metrics at any point of time in the past. This allows the visualization of the evolution of the EA metrics and as a consequence the evolution of the EA.
To continuously deliver value both in short-term and long-term, a key goal for large product lines companies is to combine Agile Software Development with the continuous development and management of software architec...
详细信息
ISBN:
(纸本)9783319186122;9783319186115
To continuously deliver value both in short-term and long-term, a key goal for large product lines companies is to combine Agile Software Development with the continuous development and management of software architecture. We have conducted interviews involving several roles at 3 sites from 2 large companies employing Agile. We have identified current architect roles and gaps in the practices employed at the organizations. From such investigation, we have developed an organizational framework, CAFFEA, for Agile architecting, including roles, teams and practices.
暂无评论