the main role of Security Risk Analysis (SRA) is to identify the relevant vulnerabilities in order to put the organization in a better position to manage the faced uncertainties. In fact, SRA is achieved by a team of ...
详细信息
the main role of Security Risk Analysis (SRA) is to identify the relevant vulnerabilities in order to put the organization in a better position to manage the faced uncertainties. In fact, SRA is achieved by a team of different experts. In this work, we call the team by Security Analysis Team (SAT). Many SRA processes have been developed. However, despite their simplicity, the processes are not usually applied appropriately. the main limit of the existing process is the neglect of studying the interaction between the SAT members and their divergent skills. As a collective work, the degree of success of the SRA depends on the level of synergy produced by the SAT. To reach this synergy, some key concepts have to be established. the idea is not to avoid conflicts or to reach a consensus; but to prompt the team members interact in a constructive way. the objective of this work is first to develop an expert weighing process with relevant refinement techniques to reach reliable weights. In addition, we look for increasing the synergy of the SAT through SRA exercises. It could be guaranteed using dynamic criteria. Hence, the real contribution of an expert and its best moment of intensification are established. Within this context, this paper presents a model that proposes weighing experts' opinions. It selects the AHP as an appropriate tool, according to SRA requirements. It suggests some refinement approaches to avoid biases and to guaranty objective evaluation. It includes mathematical and psychological enrichment.
In the analysis of criminal behavior, a combination of biological, psychological and social aspects may be taken into account. Dynamical modeling methods developed in recent years often address biological, psychologic...
详细信息
In the analysis of criminal behavior, a combination of biological, psychological and social aspects may be taken into account. Dynamical modeling methods developed in recent years often address biological, psychological or social dynamical systems separately. this paper makes the first step in the development of an agent-based modeling approach for criminal behavior in which these aspects are integrated in one dynamical system. It is shown how within a certain (multi-agent) social context, biological factors, such as certain brain deviations, testosterone levels and serotonin levels, affect cognitive and emotional functioning in such a way that a crime is committed when the perceived opportunity is there. this paper presents one generic model for the behavior of violent offenders with parameters that can be set to obtain simulation traces for three known types of offenders.
Reliable contextual information should be generated to provide pervasive services to the occupant in smart spaces. this is difficult for several reasons. First, the number of ways to describe an event or an object is ...
详细信息
ISBN:
(纸本)9781424433032
Reliable contextual information should be generated to provide pervasive services to the occupant in smart spaces. this is difficult for several reasons. First, the number of ways to describe an event or an object is unlimited and there is no standard regarding granularity of context information in context classification schemes. Second, the quality of a given piece of contextual information is not guaranteed by uncertainty. In this paper, we propose a pragmatic context classification and a generalized contextmodeling scheme based on sensor fusion techniques. To make a pragmatic context classification, we introduce two approaches, "occupant-centered pragmatic approach" and "relation-dependency" approach. To improve the quality of given contextual information by reducing uncertainty, we introduce "state-space based sensor fusion modeling" as a generalized contextmodeling. Finally, we show an example within the applied scenario as an evidential network.
this paper is devoted a problem of development of a mathematical model for description of heat and mass transfer processes at crown forest fire initiation and spread. Mathematical model of forest fire was based on an ...
详细信息
ISBN:
(纸本)9789604741052
this paper is devoted a problem of development of a mathematical model for description of heat and mass transfer processes at crown forest fire initiation and spread. Mathematical model of forest fire was based on an analysis of experimental data and using concept and methods from reactive media mechanics. this study gives a two dimensional averaged mathematical setting and method of numerical Solution of a problem of a forest fire spread. the boundary-value problem is solved numerically usingthe method of splitting according to physical processes. It was based on numerical Solution of two dimensional Reynolds equations for the description Of turbulent flow taking into account for diffusion equations chemical components and equations of energy conservation for gaseous and condensed phases. In this context, a Study - mathematical modeling - of the conditions of forest fire spreading that would make it possible to obtain a detailed picture of the change in the velocity, temperature and component concentration fields with time, and determine as well as the limiting conditions of forest fire propagation is of interest..
Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems when business needs and technical solutions are closely aligned SOA-based systems can be so large and c...
详细信息
ISBN:
(纸本)9781605585598
Service-Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing enterprise systems when business needs and technical solutions are closely aligned SOA-based systems can be so large and complex, so the role of documentation as a means of conveying information about them is very important Unfortunately, there is currently little concrete guidance available on how to do so effectively. this workshop will explore he current state-of-the-art and state-of-the-practice in documenting SOA-based systems the goal is to learn from past experience in documenting other software-intensive systems, including the use of graphical documentation techniques relying on the Unified modeling Language (UML), but taking into account the unique features and challenges inherent in SOA-based systems (e.g, properly documenting issues related to governance). this workshop is the 7(th) in a series of events exploring graphical documentation in the context of system understanding.
context modelling approaches differ in what con cepts can be captured by application designers, in the expressive power of the context models, in the support they can provide for reasoning about context, and in the wa...
详细信息
the proceedings contain 136 papers. the topics discussed include: a dynamic platform for runtime adaptation;programmable presence virtualization for next-generation context-based applications;distributed policy resolu...
ISBN:
(纸本)9781424433049
the proceedings contain 136 papers. the topics discussed include: a dynamic platform for runtime adaptation;programmable presence virtualization for next-generation context-based applications;distributed policy resolution through negotiation in ubiquitous computing environments;noshake: content stabilization for shaking screens of mobile devices;a mobile product recommendation system interacting with tagged products;DTT: a distributed trust toolkit for pervasive systems;rationalexposure: a game theoretic approach to optimize identity exposure in pervasive computing environments;securing body sensor networks: sensor association and key management;persistent content-based information dissemination in hybrid vehicular networks;a classification and modeling of the quality of contextual information in smart spaces;and design and optimization of spatial organizations for context exchange and surveillance.
We propose ontology based knowledge modeling (OKM) that can support to provide the two-step personalized services for the end users using network knowledge. the two-step personalization services are consisted of servi...
详细信息
ISBN:
(纸本)9789896740108
We propose ontology based knowledge modeling (OKM) that can support to provide the two-step personalized services for the end users using network knowledge. the two-step personalization services are consisted of service recommendation step and contents recommendation step. To achieve this, in this paper, we classify network knowledge and build ontology to represent them including user profiles and user's preferences. Furthermore, we propose the efficient functions of learner and recommender. Learner makes the user service usage model which consists of {context, services} pairs. Recommender is consisted of service recommender and contents recommender for supporting two-step personalization.
these last years, in consequence of the various crises experienced by the world (mad-cow disease, Foot-and-mouth disease, dioxin-contaminated chicken, avian influenza), the product traceability has become the focus of...
详细信息
ISBN:
(纸本)9781424438075
these last years, in consequence of the various crises experienced by the world (mad-cow disease, Foot-and-mouth disease, dioxin-contaminated chicken, avian influenza), the product traceability has become the focus of interests of many researchers and decision makers. through this paper we present the broad outlines of our research works centered more precisely on the traceability in the field of goods transportation. We propose a modeling approach of freight data, the result of this modeling, is used in the form of a centralized database for the whole of the actors implied in the freight transportation, representing the hard core of an information system for the management of traceability data. To ensure the good performance of system and in order to feed our data base with lite goods transport chain data, we propose a according to an SOA architecture, based on an exchange of message between the various actors Of the freight transport chain.
Transaction-Level modeling (TLM) for systems-on-a-chip (SoCs) has become a standard in the industry, using SystemC. With SystemC/TLM, it is possible to develop an executable virtual prototype of a hardware platform, s...
详细信息
ISBN:
(纸本)9781605586274
Transaction-Level modeling (TLM) for systems-on-a-chip (SoCs) has become a standard in the industry, using SystemC. With SystemC/TLM, it is possible to develop an executable virtual prototype of a hardware platform, so that software developers can start writing code long before the actual chip is available. A hardware model in SystemC/TLM can be very abstract, compared to the detailed RTL model. It is clearly component-based, with guidelines defining how components should be designed for use in any TLM context. However, these guidelines are quite informal for the moment. In this paper, we establish a structural correspondence between functional SystemC/TLM models and a formal component-model for embedded systems called 42, for which we have defined a notion of control contract, and an execution mode for systems made of components' contracts. this is a way of formalizing the principles of functional SystemC/TLM. Moreover, it allows the combined use of SystemC/TLM components with 42 components. Demonstrating that such a combined use is possible is key to the adoption of formal components' definitions in the community of TLM users. Copyright 2009 ACM.
暂无评论