Filters








162,873 Hits in 5.7 sec

A System to Build Distributed Multivariate Models and Manage Disparate Data Sharing Policies: Implementation in the Scalable National Network for Effectiveness Research

Daniella Meeker, Xiaoqian Jiang, Michael E. Matheny, Claudiu Farcas, Michel D'Arcy, Laura Pearlman, Lavanya Nookala, Michele E. Day, Katherine K. Kim, Hyeoneui Kim, Aziz Boxwala, Robert El-Kareh (+4 others)
2015 JAMIA Journal of the American Medical Informatics Association  
To build multivariate data analysis for centralized networks, transfer of patient-level data to a central computation resource is necessary.  ...  The authors implemented distributed multivariate models for federated networks in which patient-level data is kept at each site and data exchange policies are managed in a study-centric manner.  ...  We thank Michael Kahn, Patrick Ryan, Christian Reich, and Lisa Schilling for collaborative efforts related to data modeling.  ... 
doi:10.1093/jamia/ocv017 pmid:26142423 pmcid:PMC4639714 fatcat:c6uxmebmdfe2pgso2bgmeh4eci

Linked open data of bibliometric networks: analytics research for personalized library services

Miltiadis D. Lytras, Saeed-Ul Hassan, Naif Radi Aljohani
2019 Library hi tech  
We are happy to deliver this edition to the Library High Tech academic communities. We want to thank the editor in chief of LHT, Professor Michelle M.  ...  and commitment in this project.  ...  of data used for evidence-based policy making.  ... 
doi:10.1108/lht-03-2019-277 fatcat:3u52wa4gkrfmtb7aw57iunfbei

Autonomic Wireless Sensor Networks: A Systematic Literature Review

Jesús M. T. Portocarrero, Flávia C. Delicato, Paulo F. Pires, Nadia Gámez, Lidia Fuentes, David Ludovino, Paulo Ferreira
2014 Journal of Sensors  
Autonomic computing (AC) is a promising approach to meet basic requirements in the design of wireless sensor networks (WSNs), and its principles can be applied to efficiently manage nodes operation and  ...  , and self-protection; (ii) the selected studies use different approaches for managing the dynamic behavior of middleware systems for WSN, such as policy-based reasoning, context-based reasoning, feedback  ...  Finally, S1 applies a hybrid approach relying on policy-based and context-based approach.  ... 
doi:10.1155/2014/782789 fatcat:mumywjxxx5batlkpvogvdni6mu

Governance and innovation in public sector services: The case of the digital library

Ada Scupola, Antonello Zanfei
2016 Government Information Quarterly  
as a New Public Management phase to the emergence of a Networked Governance approach in the specific case of Roskilde University Library.  ...  This model is then applied to a longitudinal case study of the digitalization of Roskilde University Library. The theoretical and empirical analysis yields four main results.  ...  Management mode of governance towards a (tentative) Networked Governance approach has affected innovation in the examined case of library services.  ... 
doi:10.1016/j.giq.2016.04.005 fatcat:tg45srqtbjcbdjp6vampaoiax4

Informetrics on social network mining: research, policy and practice challenges

Mu-Yen Chen, Chien-Hsiang Liao, Edwin David Lughofer, Erol Egrioglu
2020 Library hi tech  
Gao (2019) construct the social network prediction model based on data mining and link prediction analysis.  ...  In this special issue, Priya and Ch (2019) designed a novel hybrid semantic similarity measure (HSSM)-based ontology merging using formal concept analysis and semantic similarity measure.  ... 
doi:10.1108/lht-06-2020-279 fatcat:2qjizca2r5fmrawkjalpivgf7q

Pathsift: A Library for Separating the Effects of Topology, Policy, and Protocols on IP Routing

Vijay Ramachandran, Dow Street
2012 Proceedings of the Fifth International Conference on Simulation Tools and Techniques  
In this paper we present Pathsift, a Python library for generating and comparing sets of paths, designed to permit the exploration of high-level routing policies.  ...  Predicting the impact of input changes is extremely difficult; thus, network designers must not only decide what policies to deploy, but also must encode those policies in a low-level configuration and  ...  ACKNOWLEDGMENTS The authors would like to thank Dr. Santanu Das (U.S. Office of Naval Research) for funding that partially supported this work. The authors would also like to thank Dr.  ... 
doi:10.4108/icst.simutools.2012.247758 dblp:conf/simutools/RamachandranS12 fatcat:5qakwlfj5vg6lej5wbyzokd5qu

Object oriented modeling and decision support for supply chains

S Biswas, Y Narahari
2004 European Journal of Operational Research  
Since different decision problems in supply chains entail different approaches to be used for modeling and problem solving, there is a need for a unified approach to modeling supply chains so that any  ...  DESSCOM has two major components: (1) DESSCOM-MODEL, a modeling infrastructure comprising a library of carefully designed generic objects for modeling supply chain elements and dynamic interactions among  ...  Acknowledgements This research was supported in part by a Ministry of Human Resources Development grant on Competitive Manufacturing Systems.  ... 
doi:10.1016/s0377-2217(02)00806-8 fatcat:sdme3xkgsvc3vlg7f5hwmavswy

Conflict Prevention Via Model-Driven Policy Refinement [chapter]

Steven Davy, Brendan Jennings, John Strassner
2006 Lecture Notes in Computer Science  
This approach enables policy enforcement to be cognisant of application specific constraints, thereby resulting in a more trustworthy and dependable policy based management system.  ...  This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment.  ...  Acknowledgements The authors would like to take this opportunity to thank the anonymous reviewers for their useful comments and feedback on the paper.  ... 
doi:10.1007/11907466_18 fatcat:vtwbwekaobczdcbctpg5ygkkga

An autonomic architecture to manage Ubiquitous Computing networks and applications

John Strassner, Sven van der Meer, Brendan Jennings, Miguel Ponce de Leon
2009 2009 First International Conference on Ubiquitous and Future Networks  
A machine-understandable representation of business and network concepts, along with an ability to negotiate services and functionality to serve competing interests of users and applications in a domain  ...  Given the vast diversity in programming models and languages for representing operational and management data, a common knowledge representation is needed that enables the communication of not just static  ...  The architecture is conceptually similar to a programmable grid, except that our architecture uses a model-based approach [12] [15] [17] to build reusable libraries of behavior that are then matched  ... 
doi:10.1109/icufn.2009.5174296 fatcat:4jnz2ormkfgp3ksnodf7frudlm

Advanced logistics analysis capabilities environment

Steven E. Saylor, James K. Dailey
2010 Proceedings of the 2010 Winter Simulation Conference  
This paper presents an approach for modeling supply chain networks and logistics operations using a custom developed supply chain modeling library wholly integrated into a general purpose commercial off  ...  The current approach has been used to model supply chain management systems, manufacturing and assembly, aircraft fleet availability and performance-based logistics. 1 2138 978-1-4244-9864-2/10/$26.00  ...  This non-item based simulation approach has been implemented by Phelps, Parsons, and Siprelle (2002) in prior modeling methodologies.  ... 
doi:10.1109/wsc.2010.5678859 dblp:conf/wsc/SaylorD10 fatcat:wf4ov6utjjbxph2l37jicbhshy

Networked Resources, Assessment and Collection Development

Sue Samson, Sebastian Derry, Holly Eggleston
2004 The journal of academic librarianship  
into four models of determining library network statistics and performance measures.  ...  However, this method is consistent with models used in other academic libraries and provides comparable data across all resources. 3, 4 In order to gather this data for the databases that were not yet  ... 
doi:10.1016/j.acalib.2004.07.005 fatcat:dksmkedldjflri2zkhdjxoy3ky

Page 611 of Library & Information Science Abstracts Vol. , Issue 9 [page]

1993 Library & Information Science Abstracts  
Describes this approach, based on a number of UWE’s interrelated policies and involving: professional management practices involving genuine staff participation; purposeful staffing policies that work  ...  Examines a case study of the University of the West of England, Bristol (UWE), which examines the degree to which a ‘new modelapproach can help an academic library secure growth.  ... 

Towards HTTPS Everywhere on Android: We Are Not There Yet

Andrea Possemato, Yanick Fratantonio
2020 USENIX Security Symposium  
In recent years, Google has developed a number of security mechanisms for Android apps, ranging from multiple KeyStores to the recent introduction of the new Network Security Policy, an XML-based configuration  ...  As a last contribution, we propose a new extension of the Network Security Policy, so to allow app developers to embed problematic ad libraries without the need to weaken the security of their entire app  ...  Acknowledgements We would like to thank our shepherd Ben Andow for his help in significantly improving this paper, and all the anonymous reviewers for their constructive feedback.  ... 
dblp:conf/uss/PossematoF20 fatcat:uaunnunxkzaajptykofvdknod4

A security policy oracle

Varun Srivastava, Michael D. Bond, Kathryn S. McKinley, Vitaly Shmatikov
2011 SIGPLAN notices  
Comparing software implementations for consistency is a new approach to discovering "deep" bugs in them.  ...  Multiple API implementations are proliferating due to cloud-based software services and standardization of library interfaces.  ...  Acknowledgments Thanks to Andrew John Hughes for his generous help with verifying Classpath bugs and for feedback on the paper text; Sam Guyer for useful discussions about static analysis; and the anonymous  ... 
doi:10.1145/1993316.1993539 fatcat:57rls5e6v5e5vn2qddgou4mgl4

A security policy oracle

Varun Srivastava, Michael D. Bond, Kathryn S. McKinley, Vitaly Shmatikov
2012 SIGPLAN notices  
Comparing software implementations for consistency is a new approach to discovering "deep" bugs in them.  ...  Multiple API implementations are proliferating due to cloud-based software services and standardization of library interfaces.  ...  Acknowledgments Thanks to Andrew John Hughes for his generous help with verifying Classpath bugs and for feedback on the paper text; Sam Guyer for useful discussions about static analysis; and the anonymous  ... 
doi:10.1145/2345156.1993539 fatcat:f52et4a7zjbn3lvmdnhjwtiuey
« Previous Showing results 1 — 15 out of 162,873 results