This position paper describes the challenges related to federated enterprise search over heterogeneous product information sources. It focuses on the aspect of finding relevant information sources w.r.t. the user'...
详细信息
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation...
详细信息
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation of an adaptive lighting environment is made in the domain of office work. For evaluation, experts from the domains of human-system interaction, activity and context recognition, and system architecture design are interviewed. Contributions are made with regard to the implementation of the adaptive lighting in office environments and an evaluation method that is in line with the interdisciplinary approach. From the evaluation method insights in the fields of human-computer interaction, activity and context recognition and system architecture and (wireless) networking and in topics that span across these fields are gained.
Rang-Instaneous-Doppler (RID) processing is widely used in ISAR imaging of maneuvering target and acceptable image can be achieved when the amplitude modulation effect of scatterers echoes can be neglected during inte...
详细信息
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ...
详细信息
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an algebraic method to attack the candidate dragon signature algorithm. The attack borrows the basic idea of the attack due to Kipnis and Shamir, and utilizes the underlying algebraic structure of the candidate dragon signature algorithm over the extension field to derive a way to enable the variable Y be viewed as a fixed value. The attack recovers the private keys efficiently when the parameters are n≤2s and D=[logq^d]≤3.
According to the Internet of Services vision, composite services are created by composing services to complex business processes. The relationships between services in a composition are defined by Service Level Agreem...
详细信息
This position paper describes the challenges related to federated enterprise search over heterogeneous product information sources. It focuses on the aspect of finding relevant information sources w.r.t. the user'...
详细信息
This position paper describes the challenges related to federated enterprise search over heterogeneous product information sources. It focuses on the aspect of finding relevant information sources w.r.t. the user's information need and identifies core research questions with regards to the design and implementation of a potential solution, based on Semantic Web techniques.
Service compositions build new services by orchestrating a set of existing services. In the Internet of Services there may be many functional similar services, but with different Quality of Service (QoS). Thus a signi...
详细信息
Service compositions build new services by orchestrating a set of existing services. In the Internet of Services there may be many functional similar services, but with different Quality of Service (QoS). Thus a significant research problem in service compositions is how to select the composition's composite services that the overall QoS of the composition is being maximized. This paper summarizes, classifies and evaluates major research efforts in this area and gives an overview about further open research questions.
We study single and multi-wavelength clock recovery functionality based on a fabry-pérot filter followed by a quantum-dot SOA at 40 Gb/s and we demonstrate its performance for various pseudo-random binary sequenc...
详细信息
According to the Internet of Services vision, composite services are created by composing services to complex business processes. The relationships between services in a composition are defined by Service Level Agreem...
详细信息
According to the Internet of Services vision, composite services are created by composing services to complex business processes. The relationships between services in a composition are defined by Service Level Agreements (SLAs). Managing composite SLAs is a complex task which is currently performed manually. In this paper we present an approach for automating the management of composite SLAs by exploiting the explicit knowledge about dependencies between composed services. We define a formal model for representing a set of dependencies. A set of algorithms exploits this information to automate tasks of composite SLA management. These tasks are the validation of SLAs during negotiation, the evaluation of SLA renegotiation requests and the evaluation of SLA violations with regard to their effects on other services. We have validated our approach based on a logistics scenario. We present results with respect to performance and a set of test cases demonstrating the added value of dependency information based automated SLA management.
In order to achieve self-adaptation to run-time environment and self-management of Web service composition, an extended hierarchical Petri net is presented to reflect the feasible configuration scheme of composite ser...
详细信息
暂无评论