Today, we observe a continuous expansion in the use of Internet technologies, mainly Web services, for electronic B2B transactions. this has triggered an increase in the number of companies' Web services registrie...
详细信息
ISBN:
(纸本)9783642280818
Today, we observe a continuous expansion in the use of Internet technologies, mainly Web services, for electronic B2B transactions. this has triggered an increase in the number of companies' Web services registries. In this context, Web service discovery can be a cumbersome task for a service requester and a costly one for a discovery system. To deal withthis issue, one obvious solution is to group Web service registries into communities. Due to the dynamic nature of services oriented environments, such an organization should be managed to maintain its organizational consistency. In this paper, we specify the needed management operations to ensure the communities consistency during a registry/community life-cycle. To test the feasibility of our management approach, we simulate a network of registry communities and develop a community manager.
Role-Based Access Control (RBAC) remains one of the most popular authorization control mechanisms. Workflow is a business flow composed of several related tasks. these tasks are interrelated and context-dependent duri...
详细信息
this paper presents a generic methodology for the use of PFM within the context of bridge loading for the fatigue design and assessment of steel railway bridges and provides detailed guidance on how to use the propose...
详细信息
ISBN:
(纸本)9780415621243
this paper presents a generic methodology for the use of PFM within the context of bridge loading for the fatigue design and assessment of steel railway bridges and provides detailed guidance on how to use the proposed methodology in order to carry out a PFM-based fatigue assessment. the problem is set in a probabilistic context to take into account material, loading as well as modeling uncertainties. Guidance is given on how to calibrate a constant amplitude PFM analysis against an S-N curve. Finally, as a case study, a cracked welded bridge detail is considered and its time-dependent fatigue reliability is established
this paper presents a neural approach for modeling lexical vagueness. A three layers self-organizing feature maps is used to modelingthe lexical vagueness with semantic context. the experimental results show that our...
详细信息
ISBN:
(纸本)9781467308946
this paper presents a neural approach for modeling lexical vagueness. A three layers self-organizing feature maps is used to modelingthe lexical vagueness with semantic context. the experimental results show that our approach is more appropriate than traditional vagueness modeling approaches.
the proceedings contain 79 papers. the topics discussed include: building semantic hierarchies faithful to image semantics;combining image-level and segment-level models for automatic annotation;multi-layer local grap...
ISBN:
(纸本)9783642273544
the proceedings contain 79 papers. the topics discussed include: building semantic hierarchies faithful to image semantics;combining image-level and segment-level models for automatic annotation;multi-layer local graph words for object recognition;content-based video description for automatic video genre categorization;towards category-based aesthetic models of photographs;scene signatures for unconstrained news video stories;visual vocabulary optimization with spatial context for image annotation and classification;do-it-yourself eye tracker: low-cost pupil-based eye tracker for computer graphics applications;on video recommendation over social network;workflow activity monitoring using dynamics of pair-wise qualitative spatial relations;scalable mobile-to-mobile video communications based on an improved WZ-to-SVC transcoder;and sensor-based analysis of user generated video for multi-camera video remixing.
Analog circuit design is often based on a large number of simulations which strongly depends on the mastery of CAD tools and competence of the designer. In this context, the automated design of analog architectures be...
详细信息
Analog circuit design is often based on a large number of simulations which strongly depends on the mastery of CAD tools and competence of the designer. In this context, the automated design of analog architectures becomes a necessity of design to solve the problem of simulation time. More importantly, accelerating the design cycle of the analog block, taking into account many constraints and finally formalizing the experience of analogiciens designers. In this paper we present a method for modelingthe performance parameters of analog architectures, this is for the optimization of optimal sizing of transistors constituting the circuit to achieve the desired characteristics. this work is done following a modeling of the functioning of the Operational Amplifier using mathematical formulation software “Maxima”. the formulation is based on the SPICE level 1 model of the MOS transistor. Finally, the elaboration of the model is developed under MATLAB. the proposed method is presented and applied to the modeling and design of a Folded Cascode bulk driven OTA using a 0.35μm CMOS technology. Simulations with Cadence Spectrum are presented and compared with manual calculations and also to numerical calculations that have shown the effectiveness of the proposed methodology. then, we determine the optimal parameters of the operational amplifier, which accord, maximum, to the desired specifications.
Aeolian sediment transport is a fundamental process redistributing sediment, nutrients, and contaminants in dryland ecosystems. Over time frames of centuries or longer, horizontal sediment fluxes and associated rates ...
详细信息
Aeolian sediment transport is a fundamental process redistributing sediment, nutrients, and contaminants in dryland ecosystems. Over time frames of centuries or longer, horizontal sediment fluxes and associated rates of contaminant transport are likely to be influenced by succession, disturbances, and changes in climate, yet models of horizontal sediment transport that account for these fundamental factors are lacking, precluding in large part accurate assessment of human health risks associated with persistent soil-bound contaminants. We present a simple model based on empirical measurements of horizontal sediment transport (predominantly saltation) to predict potential contaminant transport rates for recently disturbed sites such as a landfill cover. Omnidirectional transport is estimated within vegetation that changes using a simple Markov model that simulates successional trajectory and considers three types of short-term disturbances (surface fire, crown fire, and drought-induced plant mortality) under current and projected climates. the model results highlight that movement of contaminated soil is sensitive to vegetation dynamics and increases substantially (e.g., > fivefold) when disturbance and/or future climate are considered. the time-dependent responses in horizontal sediment fluxes and associated contaminant fluxes were sensitive to variability in the timing of disturbance, with longer intervals between disturbance allowing woody plants to become dominant and crown fire and drought abruptly reducing woody plant cover. Our results, which have direct implications for contaminant transport and landfill management in the specific context of our assessment, also have general relevance because they highlight the need to more fully account for vegetation dynamics, disturbance, and changing climate in aeolian process studies. (C) 2011 Published by Elsevier B.V.
RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an application level intrusion detection system for applications implemented withthe Ruby on Rails framework. It is aimed at detecting attacks again...
详细信息
RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an application level intrusion detection system for applications implemented withthe Ruby on Rails framework. It is aimed at detecting attacks against data in the context of web applications. this anomaly based IDS focuses on the modeling of the application profile in the absence of attacks (called normal profile) using invariants. these invariants are discovered during a learning phase. then, they are used to instrument the web application at source code level, so that a deviation from the normal profile can be detected at run-time. this paper illustrates on simple examples how the approach detects well known categories of web attacks that involve a state violation of the application, such as SQL injections. Finally, an assessment phase is performed to evaluate the accuracy of the detection provided by the proposed approach.
this paper proposes a multi-dimensional framework approach to defining the System of Interest (SOI) for System of Systems (SoS). A number of dimensions are described in detail, enabling development of a more comprehen...
详细信息
this paper proposes a multi-dimensional framework approach to defining the System of Interest (SOI) for System of Systems (SoS). A number of dimensions are described in detail, enabling development of a more comprehensive model that illustrates the relationships between these dimensions in SoS. the resultant framework model is evaluated using 2 practical case studies in the domains of Defence and ICT to indicate the applicability and suitability of the proposed approach. the potential benefits of the framework are described within the context of the case studies, in conjunction withthe limitations of this initial framework. A brief description of intended further research is provided giving some insight into future development of the framework.
this paper discusses a problem with current Systems modelling techniques when applied to Systems-of-Systems (SoS) - namely that in the SoS case, the composition and boundary of the SoS is often only defined transientl...
详细信息
this paper discusses a problem with current Systems modelling techniques when applied to Systems-of-Systems (SoS) - namely that in the SoS case, the composition and boundary of the SoS is often only defined transiently and that a System may also form part of several SoSs simultaneously. therefore there is no longer a simple mapping from an operational view of requirements to the system of systems which enact the required capabilities. this calls into question whether current modelling methods and capability-based procurement paradigms are sufficiently dynamic and flexible to cover future SoS architectures. the paper discusses the attributes required of a modelling approach which attempts to address this problem.
暂无评论