Along with the increasing diversity of educational markup languages there is a strong need for flexible integration of such content into learning platforms. Therefore, we have identified four basic mechanisms: plain l...
详细信息
Ontology merging systems enable the reusability and interoperability of existing knowledge. Ideally, they allow their users to specify which characteristics the merged ontology should have. In prior work, we have iden...
详细信息
This paper argues for strong notions of Object Schizophrenia (OS) and Object Schizophrenia Problem (OSP) and makes subtle distinction between them. It presents how OSP can occur in modeling ispart- of and is-role-of r...
详细信息
Real-time collaborative Web applications allow a multitude of users to concurrently work on a shared document. Especially in business contexts it is often necessary to be able to precisely define and restrict who is a...
详细信息
ISBN:
(纸本)9781450324694
Real-time collaborative Web applications allow a multitude of users to concurrently work on a shared document. Especially in business contexts it is often necessary to be able to precisely define and restrict who is allowed to edit which data field of such a shared document. Existing solutions for enforcing such access control restrictions typically rely on a central service, the policy decision point. However, for use cases with unreliable or limited connectivity, such as mobile devices, a permanent connection to this centralized policy decision point can not be guaranteed. To address this problem, we present a novel approach that includes methods for client-side enforcement of access control constraints for offline users, and merging of offline changes, that enables users to edit such access constrained shared documents offline. We propose a generic conflict detection and resolution approach that attempts to resolve merge conflicts that are inherent to access constrained documents automatically while prioritizing online users and maximizing the number of filled out data fields in a document. In addition, we discuss and evaluate our approach via a prototype implementation. Copyright 2014 ACM.
Applications like weather forecasting and prediction, health-care monitoring, habitat monitoring, tsunami-warning systems, demand integration of Wireless Sensor Networks (WSNs) with grids. The issues that need to be a...
详细信息
Restoration or protection switching mechanisms are triggered by link or node failures to redirect traffic over backup paths. These paths then carry the normal and the backup traffic which may lead to overload and ther...
详细信息
ISBN:
(纸本)3540699619
Restoration or protection switching mechanisms are triggered by link or node failures to redirect traffic over backup paths. These paths then carry the normal and the backup traffic which may lead to overload and thereby to quality of service (QoS) violations, i.e. to excessive packet loss and delay. In this paper, we present a method to assess the potential overload of the links due to network failures. We calculate the complementary cumulative distribution function (CCDF) of the relative load for each link in the network. We discuss various performance measures that condense this information to a single value per link which is suitable for a link ranking. This helps to identify weak spots of the network and to appropriately upgrade the bandwidth of links although they are not overloaded during normal operation. We implemented the concept in a software tool which helps network providers to anticipate the potential overload in their networks prior to failures and intended modifications (new infrastructure, new routing, new customers,) and to take appropriate actions.
Indoor energy consumption can be understood by breaking overall power consumption down into individual components and appliance activations. The classification of components of energy usage is known as load disaggrega...
详细信息
The coded communications using non-coherent orthogonal modulation and capacity-approaching binary channel codes namely low-density parity check code (LDPC) and turbo code are investigated in this paper with the focus ...
详细信息
ISBN:
(纸本)9781450332774
The coded communications using non-coherent orthogonal modulation and capacity-approaching binary channel codes namely low-density parity check code (LDPC) and turbo code are investigated in this paper with the focus on the main three characteristic effects of an underwater channel, namely, multi-path propagation, Doppler spread and ambient noise. Additionally, a new method was implemented and tested successfully to identify and eliminate the highamplitude noise from the received dataset.
Real-time collaborative Web applications allow multiple users to concurrently work on a shared document. In addition to popular use cases, such as collaborative text editing, they can also be used for form-based busin...
详细信息
The Java messaging service (JMS) is a means to organize communication among distributed applications according to the publish/subscribe principle. If the subscribers install filter rules on the JMS server, JMS can be ...
详细信息
ISBN:
(纸本)9783800729456
The Java messaging service (JMS) is a means to organize communication among distributed applications according to the publish/subscribe principle. If the subscribers install filter rules on the JMS server, JMS can be used as a message routing platform, but it is not clear whether its message throughput is sufficiently high to support large-scale systems. In this paper, we investigate the capacity of the high performance JMS server implementation by Fiorano. In contrast to other studies, we focus on the message throughput in the presence of filters and show that filtering reduces the performance significantly. We also present a model that describes the service time for a single message depending on the number of installed filters and validate it by measurements. This model helps to forecast the system throughput for specific application scenarios.
暂无评论