The integration of Web-Services, smart agents and "smart objects" enables enterprise innovation and competitiveness in a globalized economy. The paper proposes a multi view modelling framework that enables e...
详细信息
The paper proposes a new paradigm for the enterprise of the future, with respect to the requirements and the constraints it will be forced to face in order to progress and evolve. It is a paradigm which will take into...
详细信息
ISBN:
(纸本)9781467361408
The paper proposes a new paradigm for the enterprise of the future, with respect to the requirements and the constraints it will be forced to face in order to progress and evolve. It is a paradigm which will take into account not only the complex relations between enterprise components - human, material and informational, but also the integration enterprise-society will all its aspects. There are presented some of the main trends in the control and management of manufacturing systems, in order to enlighten the evolution of the concepts towards that of Cyber-Physical Systems, which is the core of the proposed paradigm. A generic model of the next generation of Manufacturing Systems will be introduced, based on the paradigm of Intelligent Cyber-Enterprise.
Developing algorithms for Ambient Intelligence (AmI) environments involves testing algorithms using both simulated environments and user data. This has been traditionally done with simulators. While there are several ...
详细信息
ISBN:
(纸本)9781467361408
Developing algorithms for Ambient Intelligence (AmI) environments involves testing algorithms using both simulated environments and user data. This has been traditionally done with simulators. While there are several datasets for Ambient Intelligence most of them have do not have an open format and a way to use them easily afterwards. We implement a software framework on top of an existing hardware platform for writing AmI applications that can also export a data dump consisting of heterogeneous sensor data matching several criteria from an AmI lab. Researchers using this framework can easily write AmI applications on top of shared datasets and easily test several algorithms against each other using real-world-data, a previously impossible endeavour.
This paper presents an alternative approach to classical box counting algorithm for fractal dimension estimation. Irrelevant data are eliminated from input sequences of the algorithm and a new fractal dimension, calle...
详细信息
This study presents a broad selection of methods and techniques for data transfers, starting with the TCP/IP protocol, its main enhancements, new non TCP protocols, and the class of applications and libraries able to ...
详细信息
ISBN:
(纸本)9781479907342
This study presents a broad selection of methods and techniques for data transfers, starting with the TCP/IP protocol, its main enhancements, new non TCP protocols, and the class of applications and libraries able to sustain massive bulk transfers in HBDP networks. Distinctive features and comparison based on performance, effectiveness, efficiency and fairness are emphasized in each case. As a result, a new research direction has been identified, regarding generalization of the pipeline inter-process communication mechanism at networking level, by making fast interconnections between pairs of data producer/consumer processes distributed over the Internet.
The increase in popularity of online services has generated interest in developing new algorithms to better protect user privacy. Some services defend individual user records by only releasing statistics like the numb...
详细信息
ISBN:
(纸本)9781467361149
The increase in popularity of online services has generated interest in developing new algorithms to better protect user privacy. Some services defend individual user records by only releasing statistics like the number of users that match certain criteria. If an attacker has access to side information, releasing such summaries can lead to privacy breaches where the records of a certain user are revealed. Differential privacy is a new technique which protects individual user records by altering the released statistics. Many services organize their data as a graph with the edge weights representing statistics. If such services are interested in releasing the information, they must do so in a privacy-preserving manner. We analyze how differential privacy can be used to protect such graph structures. We assess the quality of the released data in relation to the Dijkstra shortest path algorithm. Finally, we propose research directions to improve the performance of the released data.
The pipe programming paradigm is an important Unix innovation which lets processes filter data to obtain a desired output. Extending computation in an Internet distributed environment has led us to design so called lo...
详细信息
ISBN:
(纸本)9781467361408
The pipe programming paradigm is an important Unix innovation which lets processes filter data to obtain a desired output. Extending computation in an Internet distributed environment has led us to design so called long and large pipes which achieve high speed transfer rates between remotely interconnected processes. Our method combines, in a full-fledged client/server application, the use of classical pipes, as a mean of serializing data locally, with multiple parallel TCP connections which yield high bandwidth throughput. The application, called bbftpPRO, brings together the old fashioned techniques of file striping with the new data streaming algorithms at high transfer rates. It includes capabilities for easy traversal of networks protected by firewalls or NAT machines, split-TCP like path support, and last but not least, support for new transmission procedures at variable rate, adapted for multipath implementation at application level. Experimental results have proven the superiority of the proposed data transfer system. Both simple file transfers and arbitrary data streaming were done effectively, efficiently, in parallel, over wide area networks, between pairs of distributed processes connected via extended fast pipes. Our piped approach proved to be portable across heterogeneous systems and most suitable for data intensive computing applications requiring geographically distributed data.
For a class of multi-robot task allocation problems, a theoretical solution and its real time implementation are discussed in this work. The basic problem requires a team of mobile robots to gather randomly spread sam...
详细信息
For a class of multi-robot task allocation problems, a theoretical solution and its real time implementation are discussed in this work. The basic problem requires a team of mobile robots to gather randomly spread samples from an environment and deposit them to a storage facility. The proposed solution considers the environment as being abstracted to a weighted graph and randomly distributed samples in the nodes of this graph. Using a setup consisting of a platform on which mobile robots can move, a computer that controls the robots and an overhead camera that closes the loop between these devices, the real time implementation of the theoretical solution is tested. Experimental results of various sample distributions are conducted and the performance of the entire method is discussed.
This paper presents the main challenges in a cloud computing architecture relate to the security of the provided services. In the introduction section are described the factors that prove the cloud computing necessity...
详细信息
This paper presents the main challenges in a cloud computing architecture relate to the security of the provided services. In the introduction section are described the factors that prove the cloud computing necessity in the actual IT context. In order to achieve all these benefits, the enterprises experience stated an approach that ensures a smooth migration with optimal results. The first section ends with a synthesized process that explains the main steps that must be performed to move from traditional architecture to cloud computing services. When moving to on-demand services, the consumer can choose one of the available “flavors” of cloud computing services - these are described in Section 2. Despite all obvious advantages and benefits, there are also security challenges in cloud computing architecture structured by Cloud Security Alliance in [1]. The main security domains are mentioned in the third section while the forth section describes our approach that addresses the challenges in the communication between the on-premise and on-demand services.
This paper proposes a modern approach for the methodology that supports the measure the audience for outdoor poster advertising. The classic approach of conducting complex, limited and expensive studies about human da...
详细信息
This paper proposes a modern approach for the methodology that supports the measure the audience for outdoor poster advertising. The classic approach of conducting complex, limited and expensive studies about human daily routes, related just to a limited type of advertising poster may be enriched using the data that resides in the monitoring infrastructure of the cellular telecom operators over digital maps. Well segmented, this kind of data may reveal important features of the population activity at a large scale. Finally, the fine tuning options in analyzing this kind of data are discussed for future improvements.
暂无评论