In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various project...
详细信息
In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various projects world-wide to demonstrate the comprehensiveness of the taxonomy. The taxonomy not only highlights the similarities and differences of state-of-the-art technologies utilized in autonomic application management from the perspective of Grid computing, but also identifies the areas that require further research initiatives.
This paper tries to give an overview of the rising concerns raised by the issue of privacy protection that is associated with the European Data Retention Directive. After relating this risk to the requirements as stat...
详细信息
This paper tries to give an overview of the rising concerns raised by the issue of privacy protection that is associated with the European Data Retention Directive. After relating this risk to the requirements as stated in the European Data Protection Directive, an approach for a security-integrated view on the design of information systems is discussed. The paper then finishes with an outlook on the possible impact on IT governance.
Goals are an essential attitude of proactive agents described with mentalistic attitudes. Nonetheless, in the literature no well agreed-upon definition of the term goal has arisen so far. In this paper it is argued th...
详细信息
Current solutions to communication in mobile ad hoc networks (MANETs) are based on the use of IP addresses. These approaches identify the nodes involved in data transmission through the same type of address used in tr...
详细信息
Pervasive computing aims to unobtrusively embed computersystems into everyday life environments to enrich the user experience without demanding the user's explicit attention. For pervasive computing to be minimal...
详细信息
Searching for information in large rather unstructured real-world data sets is a difficult task, because the user expects immediate responses as well as high-quality search results. Today, existing search engines, lik...
详细信息
ISBN:
(纸本)9783642041426
Searching for information in large rather unstructured real-world data sets is a difficult task, because the user expects immediate responses as well as high-quality search results. Today, existing search engines, like Google, apply a keyword-based search, which is handled by indexed-based lookup and subsequent ranking algorithms. This kind of search is able to deliver many search results in a short time, but fails to guarantee that only relevant data is presented. The main reason for the low search precision is the lack of understanding of the system for the original user intention of the search. In the system presented in this paper, the search problem is tackled within a closed domain, which allows semantic technologies to be used. Concretely, a multi-agent system architecture is presented, which is capable of interpreting a key-words based search for the car component domain. Based on domain specific ontologies the search is analyzed and directed towards the interpreted intentions. Consequently, the search precision is increased leading to a substantial improvement of the user search experience. The system is currently in beta state and it is planned to roll out the functionality in near future at the car component online market-place ***.
Theme/UML is an existing approach to aspect-oriented modelling that supports the modularisation and composition of concerns, including crosscutting ones, in design. To date, its lack of integration with model-driven e...
详细信息
The embedded and mobile computing market with its wide range of innovations is expected to remain growing in the foreseeable future. Recent developments in the embedded computing technology offer more performance ther...
详细信息
ISBN:
(纸本)9781605584645
The embedded and mobile computing market with its wide range of innovations is expected to remain growing in the foreseeable future. Recent developments in the embedded computing technology offer more performance thereby facilitating applications of unprecedented utility. Open systems, such as Linux, provide access to a huge software base. Nevertheless, these systems have to coexist with critical device infrastructure that insists on stringent timing and security properties. In this paper, we will present a capability-based software architecture, featuring enforceable security policies. The architecture aims to support current and future requirements of embedded computing systems, such as running versatile third-party applications on general purpose and open operatingsystems side by side with security sensitive programs. Copyright 2009 ACM.
This paper describes an approach to enhance flexibility in Aspect Oriented Software Development that targets black box software components. To this end, a new model which we call Primitive Components is presented. The...
详细信息
The globalisation of our society leads to an increasing need for spontaneous communication. However, the development of such applications is a tedious and error-prone process. This results from the fact that in genera...
详细信息
暂无评论