Business automation continues to be a strategic target for IT investment. However, business automation involves inherent challenges, such as system integration issues. Service-Oriented Architecture (SOA) and business-...
详细信息
Business automation continues to be a strategic target for IT investment. However, business automation involves inherent challenges, such as system integration issues. Service-Oriented Architecture (SOA) and business-to-business (B2B) integration standards are two approaches used for creating business automation solutions. In this paper a systematic literature analysis is conducted to explore the integration concepts in these two approaches. The objective of the study is to characterize the integration issues in these approaches, and to synthesize the findings into characteristics of so called service-oriented B2B integration. From the literature it is concluded that the SOA approach emphasizes support for dynamic business processes within an enterprise, while the B2B standards approach focuses on pre-defined semantic descriptions of business data that is exchanged between business partners. Thus, a service-oriented B2B integration environment is conceptualized where the B2B standards are used to strengthen the semantic interoperability, while dynamic business process implementations are enabled through the SOA approach.
Intervention analysis is the common method to reveal relationships between objects in human as well as biological society. Data mining research community is just starting to pay attention to intervention analysis. As ...
详细信息
Intervention analysis is the common method to reveal relationships between objects in human as well as biological society. Data mining research community is just starting to pay attention to intervention analysis. As the traditional association rules are not successful at measuring intervention, this paper tries to mining intervention rules from time series data of sub-complex system. The main contributions of this study include: (1) introduces a new concept of intervention rules. It can quantitatively detect at what scale, how intensive and how long the intervention does make sense; (2) conduct wavelet transform on time series. The decomposition scale can denotes the intervention scale; (3) proposes a new concept named directional correlation to measure intervention intensity; (4) calculates the intervention intensity between time series data with different time delays. The time delay can uncover after how long the intervention takes place; (5) conducts experiments on real datasets. The results show that intervention rules do exist at different decomposition scale of the original data. Moreover, the number of rules discovered by multi-scale analyzing methods is always 4 or 5 times more than those found by single scale methods. And the stability of rules discovered by the improved multi-scale mining algorithm MMIR* is always 100%, while the stability of rules discovered by the basic multi-scale mining algorithm MMIR fluctuate around 70%.
This paper presents a grid frame composed of a preprocessing database server and PC nodes. It divides the whole database into different parts for different PC nodes, where the corresponding data are stored. The server...
详细信息
This paper presents a grid frame composed of a preprocessing database server and PC nodes. It divides the whole database into different parts for different PC nodes, where the corresponding data are stored. The server is responsible for the clients' interaction, order partition and management of the whole grid. It implements the parallel database in grid. The paper calculates the execution time of the operation in parallel database. It deduces the formula of the speedup, considering the network and the data interaction. The method derives the maximum of the speedup by calculating its limit in ideal state. Then for the fixed database size, with the number of grid processor nodes growing and the complexity of the database operation increasing, the speedup of this grid frame achieves its maximum value.
In an open distributed environment, protection of sensitive files and data becomes more difficult. Traditional access control mechanisms are not suitable for such dynamic environment. Trust can be an effective approac...
详细信息
In an open distributed environment, protection of sensitive files and data becomes more difficult. Traditional access control mechanisms are not suitable for such dynamic environment. Trust can be an effective approach to solve the access control problem. In this paper, by considering fuzziness and uncertainty of trust, we propose a trust quantification algorithm based on grey fuzzy comprehensive evaluation method. Then we present an access control model based on trust quantification. Simulation results show that our mechanism is suitable for dynamic access control in distributed environment.
Load balancing is an important factor, which influences the performance of DNMS (distributed network management system). In this paper, a two-layer load balancing scheme is proposed for DNMS based on the latest resear...
详细信息
ISBN:
(纸本)9781424459278;9780769539690
Load balancing is an important factor, which influences the performance of DNMS (distributed network management system). In this paper, a two-layer load balancing scheme is proposed for DNMS based on the latest research works on physical topology. In the scheme, the management tasks are distributed to a number of stations for reducing the burden of center management station, the processing time of every station is balanced to almost equal for fairness and the management tasks are allocated to nearest station for saving bandwidth. Experiments show, compared with the centralized methods and general distributed method, it works stably and save over 26 percent of bandwidth occupied by management data in the testing network. This scheme has been used in an actual application.
A DNA computing model for solving graph vertex coloring problem is proposed in this article. To illustrate the capability of the DNA computing model, a 3-colorable graph with 61 vertices was constructed as an example....
详细信息
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. M...
详细信息
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. Most such systems assume benign fault model which can't depict the malicious actions. The goal of Byzantine Fault Tolerance protocol (BFT for short) is to mask the malicious behaviors and it has been proved that some new proposed BFTs are suitable to support practical applications. But these BFTs still lack in robustness, a simple fault injection may cause significantly decrease in throughput or run in low throughput without violating the BFT safety property. We propose a new robustness-oriented BFT named Nova. Experiments show Nova has comparable throughput as PBFT in normal case and behave stably under the malicious attack. Compared with other BFTs, Nova can support practical applications more effectively.
Recent advances in the application field increasingly demand the use of wireless camera sensor networks (WCSNs), for which localization is a crucial task to enable various location-based services. Most of the existing...
详细信息
Recent advances in the application field increasingly demand the use of wireless camera sensor networks (WCSNs), for which localization is a crucial task to enable various location-based services. Most of the existing localization approaches for WCSNs are essentially interactive, i.e. require the interaction among the nodes throughout the localization process. As a result, they are costly to realize in practice, vulnerable to sniffer attacks, inefficient in energy consumption and computation. In this paper we propose LISTEN, a non-interactive localization approach. Using LISTEN, every camera sensor node only needs to silently listen to the beacon signals from a mobile beacon node and capture a few images until determining its own location. We design the movement trajectory of the mobile beacon node, which guarantees to locate all the nodes successfully. We have implemented LISTEN and evaluated it through extensive experiments. The experimental results demonstrate that it is accurate, efficient, and suitable for WCSNs that consist of low-end camera sensors.
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza...
详细信息
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimization obtained, the robust schedule is more stable in execution. The vast majority of the researches on robust scheduling concentrate on the development of the robustness and stabilization with an optimization target that minimizes makespan. However, other optimization targets are needed in reality, and in this paper, we introduce another optimization target that maximizes the payload of the machine, which can reflect the capacity of machine. This work applies a two-step way to achieve a robust schedule. A baseline schedule in the deterministic environment is generated first, which pursues standard optimization criterions, and then the temporal buffers are inserted into the baseline schedule which make the schedule absorb some level of unexpected disruption without rescheduling. According to the payload of each machine which should be close to the maximum at any time in execution, we can get each size of the temporal buffers inserted into the different operations. An extensive experiment is used to show the relative performance of the proposed robust schedule. It is shown that the schedule is robust and stable under the stochastic disturbance coupling with minimal makespan tardiness and symmetry payload.
暂无评论