Much research has been done on integrated use of ISO management system standards. Integrated use of management systems is identified to have shared values of varied integration impacts on resources efficiency building...
详细信息
Much research has been done on integrated use of ISO management system standards. Integrated use of management systems is identified to have shared values of varied integration impacts on resources efficiency building and sustainable development of business processes. However, little research has been done on integrated use of business continuity management systems (BCMS), records management systems (RMS) and knowledge management systems (KMS). This paper proposes a holistic integration management approach for collaboration, optimization and innovation of the three management systems through mapping/building/operationalizing cycle for supply of efficiency building strategy to the dynamic accumulation, sharing, and exchanges of memory, evidence and knowledge of organization.
In recent years, many scientists have done some work in monitoring the fog, and achieved fruitful results. Now we want to conduct more in-depth study. In this paper, we utilize MODTRAN to simulate the relationship bet...
详细信息
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ...
详细信息
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental properties. In this paper, the trustworthiness of a trusted process is discussed in terms of privilege, data-operated integrity, functional and logic correctness, self-integrity, availability and trusted interactions. A trusted process definition is then given which summarizes the fundamental properties of a trusted process as a theoretical foundation for researching and enforcing the trusted process mechanism. A prototype of a trusted process mechanism is implemented in a secure operating system based on Linux, with the trustworthiness of the trusted process assured in many ways to improve and extende the original trust mechanisms in Linux.
Implementing runtime integrity measurement in an acceptable way is a big challenge. We tackle this challenge by developing a framework called Patos. This paper discusses the design and implementation concepts of our o...
详细信息
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Seco...
详细信息
Poor quality and harsh condition can result in faulty and outlier data in sampling data of sensor nodes. So we need median query to reflect average level of monitoring region. First, we put forward HMA algorithm. Second, we extend HMA algorithm and put forward HFMA algorithm. In HFMA, We only need collect data inside filter and aggregate influence coefficient during sampling period. Base station can compute median result according to the sample data inside filter and influence coefficient aggregation value. Experimental results have shown that HFMA outperforms Naive algorithm and HMA algorithm and can prolong the lifetime of sensor network.
Electronic records management (ERM) is fundamental to good governance, business efficiency and effectiveness of e-government in networking and digital society. However, government authorities in China has faced many c...
详细信息
Electronic records management (ERM) is fundamental to good governance, business efficiency and effectiveness of e-government in networking and digital society. However, government authorities in China has faced many challenges in managing electronic records. A study of ERM in e-government strategy in other countries would be significant to support development of ERM in Chinese e-government strategy. As little is known from literature on the status of electronic records management in e-government strategy, this paper selects U.S, New Zealand and UK for case study by means of collecting and analyzing publications, laws, regulations and policies relevant to both electronic records management and e-government strategy. The author first analyzes status of ERM in e-government strategy and then discusses models and driving forces of their existences. The result of the study revealed that electronic records are managed as national assets, resources and trusted information in the e-government strategy. Driven by core business of e-government in different country, there are different approaches to ERM in e-government strategy. The implications of the study is that, to position ERM in e-government strategy, it is significant to provide a strategic approach to ERM for shared agenda by both government authorities and records management professionals. The findings intended to be of use to both the effective e-government strategy and good ERM for dynamic, interactive and proactive citizen-centered services across domains and time dimensions.
Facing limitations of existing systems for process integrity measurement, we put forward a method with its prototype system PDIMS to measure process runtime integrity. Based on structure of process and format of execu...
详细信息
Facing limitations of existing systems for process integrity measurement, we put forward a method with its prototype system PDIMS to measure process runtime integrity. Based on structure of process and format of executable file, PDIMS anatomizes the codepage layout of runtime process. Combining OS mechanisms and modern CPU's support for code execution, PDIMS catches and measures code page in the kernel when it executes. PDIMS depends on CPU's non-executable bit to detect code execution and on the binary format of executables of the process as criterion to verify code modifications in kernel. PDIMS provides trustworthy information about whether a running process is modified. PDIMS introduces less than 4% overhead to OS.
Nowadays mainstream RDF Repository Systems are based on RDBMS. The SPARQL query engine translates a SPARQL query into a SQL one, and then the RDBMS executes the SQL query. However the RDBMS optimizers, which usually a...
详细信息
Nowadays mainstream RDF Repository Systems are based on RDBMS. The SPARQL query engine translates a SPARQL query into a SQL one, and then the RDBMS executes the SQL query. However the RDBMS optimizers, which usually assume that columns are statistically independent, often underestimate the selectivity of conjunctive predicates and choose a bad query execution plan. It is important for query optimizers to detect correlations among properties. We propose a way of computing property correlations based on ontology itself in order to improve the execution performance of the SQL translated from SPARQL statement queries.
One of the major limitations of current search engines is that users could not quickly locate what they want if the input query is too general. Some existing techniques try to cluster web search results into groups so...
详细信息
One of the major limitations of current search engines is that users could not quickly locate what they want if the input query is too general. Some existing techniques try to cluster web search results into groups so as to user's quick browsing. In this paper, we present a new approach to categorize the web search results by using YAGO ontology. It utilizes the YAGO ontology to automatically generate categories for the user's specific query and classify the search results into appropriate categories. Our experimental results indicate that our method is feasible and effectiveness.
What-if analysis can provide more meaningful information than classical OLAP. Multi-scenario hypothesis based on historical data needs efficient what-if data view support. In general, delta table for what-if analysis ...
详细信息
暂无评论