This paper addresses web services for Internet of Things (IoT) applications. The research focus is on IoT applications for mobile monitoring and third party's database access. Both web services design aspects and ...
详细信息
This paper addresses web services for Internet of Things (IoT) applications. The research focus is on IoT applications for mobile monitoring and third party's database access. Both web services design aspects and deployment issues are studied. By synthesis of functional abstraction for configuration management and performance monitoring, an approach to design RESTful web services for mobile monitoring is suggested. In addition to traditional operations supported by Database Management Systems, web services' operations for subscription management and notifications about occurrences of specific data-related events, as well as operations for trust and security management are proposed in the context of third party's database access. Web services deployment issues concern the access control aimed to prevent from overloading. A formal method for a model-based load evaluation of SOA (Service Oriented Architecture) application server is suggested. The method takes into account the distributed server architecture and the processing of heterogeneous traffic. The SOA application server's utilization is evaluated by simulation.
PeCMan, the Personal Content Manager, is a content access gateway, aggregator, indexing, and sharing tool for all of a user's personally relevant content on the Internet, e.g., all the content a user has created, ...
详细信息
PeCMan, the Personal Content Manager, is a content access gateway, aggregator, indexing, and sharing tool for all of a user's personally relevant content on the Internet, e.g., all the content a user has created, content that was explicitly shared by others, or publicly available Internet content of specific interest. PeCMan aggregates access to multiple network-based storage systems, services, or other "objects" by their reference. Examples of such objects are photographs, music, e-mail, text documents, or any addressable object on the Internet. The aggregated storage acts as a virtual read-write drive in which PeCMan addresses individual objects by reference, typically encoded in uniform resource locators (URLs). To address content in Web applications such as Google Docs, Flickr, and You Tube, the URL is based on the corresponding applicationprogramming interface (API), while content on a user's home machine's disk is addressed via a locally installed software driver supporting Web-based distributed authoring and versioning (WebDAV). This paper describes the motivation, design, and implementation prototype of PeCMan. (C) 2010 Alcatel-Lucent.
Deals with the design and architecture of distribute and Internet-based computer music applications. Hypertext Markup Language; Graphical user interface; Client or server technology and distributed computing in comput...
详细信息
Deals with the design and architecture of distribute and Internet-based computer music applications. Hypertext Markup Language; Graphical user interface; Client or server technology and distributed computing in computer music.
Recently, advancements in Cyber-Physical Production Systems (CPPS) have facilitated the amalgamation of physical production processes with digital systems, culminating in an interconnected and efficient manufacturing ...
详细信息
Recently, advancements in Cyber-Physical Production Systems (CPPS) have facilitated the amalgamation of physical production processes with digital systems, culminating in an interconnected and efficient manufacturing environment. Measurement and sensing systems represent crucial components of CPPS, as they provide real-time data from physical systems and the surrounding environment to optimize production processes. Nevertheless, these systems' security is paramount, given that malware attacks can significantly undermine the accuracy and reliability of data acquired by CPPS. This paper proposes a comprehensive methodology for securing Industry 4.0 systems against cyber-attacks, involving three main sections: applicationprogramming Interface (API) deployment, cloud filtering, and intelligence and data processing. Deploying APIs in the sensor network facilitates data utilization and promotes data integrity and confidentiality. Cloud services filter data and create a new dataset for analysis and decision-making, while intelligence and data processing techniques are employed for malware detection and analysis. The methodology also uses a secure research laboratory for detailed malware analysis and encrypted multimedia channels for communication between security experts and researchers. The findings suggest that the reinforcement learning-based approach proposed in this study effectively identifies cyber-attacks in Industry 4.0 systems, and the diagram provides insights into the correlations between different performance metrics and how they relate to the agent's performance. The methodology offers robust protection against cyber-attacks and ensures the confidentiality and integrity of sensitive data.
When the authors asked users to test an API early in the development life cycle, the users' questions about how the API works and in what contexts turned out to be extremely helpful. Iterative API design and testi...
详细信息
When the authors asked users to test an API early in the development life cycle, the users' questions about how the API works and in what contexts turned out to be extremely helpful. Iterative API design and testing, along with feedback from real users, contribute to cleaner design and a more helpful reference manual.
With the rapid drilling of deep wells, cementing operations encounter new and more complex challenges due to harsh environments. To improve the use and selection of CaO-type expanding cements, a series of measurements...
详细信息
With the rapid drilling of deep wells, cementing operations encounter new and more complex challenges due to harsh environments. To improve the use and selection of CaO-type expanding cements, a series of measurements have been made. Calcium oxide is used as an expanding agent to overcome contraction as cement slurry sets. Cement systems selection was based on their performances indicated by expansion tendency, consistency behaviour, lime reactivity at 60degreesC and atmospheric pressure. and autoclave-cured cement paste properties. Slurries were prepared using different mixing methods (API standards and an in-house procedure) to help choose appropriate slurry designs for wide field applications. Expansion and consistency tests were carried out in High Pressure-High Temperature devices at 60, M 90 and 120degreesC and 120 MPa. Mix waters of different salinities and sulphur contents were used to prepare cement slurries. It is shown that the expanding influence of CaO becomes significant when the temperature is higher than 60degreesC, but less than 80degreesC;salt content of 20-30 % by weight of water;lime concentration of 12.5%, Gel and shear strengths of 150 Pa and 4 MPa, respectively and cement expansion greater than 4 % give sufficient tightness and seal, to stop gas migration in boreholes.
applicationprogramming interface (API)-related questions are increasingly posted and discussed by developers in popular question and answer forums, such as Stack Overflow. However, their extremely long resolution tim...
详细信息
applicationprogramming interface (API)-related questions are increasingly posted and discussed by developers in popular question and answer forums, such as Stack Overflow. However, their extremely long resolution time seriously delays the working schedules of developers. Despite researchers have investigated how to automatically resolve API-related questions by recommending correct APIs for them, there is still much room for additional improvement. In this paper, we propose a novel approach of recommending APIs for API-related questions based on API specifications and historical resolved questions (RASH). Given a new API-related question, RASH recommends APIs for it guided by two central observations. First, the more lexically similar the functional description in an API's specification is to the new question, the more likely that the API can resolve the new question. Second, the APIs that have resolved more historical similar questions can also help to resolve the new question. To verify the effectiveness of RASH, we construct and publish a corpus containing 1234 API-related questions with their correct APIs from Stack Overflow, and conduct extensive experiments over it. The experimental results show that RASH is relatively stable and robust to a different quality of questions. In addition, RASH hits nearly 70% correct APIs and outperforms the state-of-the-art approach by 15.64% when recommending 15 APIs for each question.
This article provides an overview of the work that W3C and IETF are doing toward defining a framework, protocols, and application programming interfaces that will provide real-time interactive voice, video, and data i...
详细信息
This article provides an overview of the work that W3C and IETF are doing toward defining a framework, protocols, and application programming interfaces that will provide real-time interactive voice, video, and data in web browsers and other applications. The article explains how media and data will flow in a peer-to-peer style directly between two web browsers. This explains the protocols used to transport and secure the encrypted media, traverse NATs and firewalls, negotiate media capabilities, and provide identity for the media.
application programming interfaces (API) are exposed to developers in order to reuse software libraries. API directives are natural-language statements in API documentation that make developers aware of constraints an...
详细信息
application programming interfaces (API) are exposed to developers in order to reuse software libraries. API directives are natural-language statements in API documentation that make developers aware of constraints and guidelines related to the usage of an API. This paper presents the design and the results of an empirical study on the directives of API documentation of object-oriented libraries. Its main contribution is to propose and extensively discuss a taxonomy of 23 kinds of API directives.
Cloud Computing paradigm represents an opportunity for users to reduce costs and increase the efficiency, providing an alternative way of using services and computational resources. It represents both a technology for...
详细信息
Cloud Computing paradigm represents an opportunity for users to reduce costs and increase the efficiency, providing an alternative way of using services and computational resources. It represents both a technology for using computing infrastructures in a more efficient way, as well as a business model for selling computing resources. The possibility of dynamically acquire and use services and resources on the base of an on-demand, self-service, and pay-by-use business model, implies incredible flexibility in terms of management, which is otherwise hard to address. On the other hand, because of this flexibility, cyber attacks represent a serious danger, which can compromise performance and availability of the services provided to Cloud consumers. In this paper, we propose an open-source framework for designing distributed Intrusion Detection System for multiple Cloud vendor infrastructures. The proposed framework provides applicationprogramming Interface and tools to develop multiple probes, which can be dynamically deployed as a distributed architecture. It enables to collect security information at different Cloud architectural levels, which can be used to perform event correlation and diagnosis analysis of intrusion in the Cloud-based systems.
暂无评论