A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A System to Build Distributed Multivariate Models and Manage Disparate Data Sharing Policies: Implementation in the Scalable National Network for Effectiveness Research
2015
JAMIA Journal of the American Medical Informatics Association
To build multivariate data analysis for centralized networks, transfer of patient-level data to a central computation resource is necessary. ...
The authors implemented distributed multivariate models for federated networks in which patient-level data is kept at each site and data exchange policies are managed in a study-centric manner. ...
We thank Michael Kahn, Patrick Ryan, Christian Reich, and Lisa Schilling for collaborative efforts related to data modeling. ...
doi:10.1093/jamia/ocv017
pmid:26142423
pmcid:PMC4639714
fatcat:c6uxmebmdfe2pgso2bgmeh4eci
Linked open data of bibliometric networks: analytics research for personalized library services
2019
Library hi tech
We are happy to deliver this edition to the Library High Tech academic communities. We want to thank the editor in chief of LHT, Professor Michelle M. ...
and commitment in this project. ...
of data used for evidence-based policy making. ...
doi:10.1108/lht-03-2019-277
fatcat:3u52wa4gkrfmtb7aw57iunfbei
Autonomic Wireless Sensor Networks: A Systematic Literature Review
2014
Journal of Sensors
Autonomic computing (AC) is a promising approach to meet basic requirements in the design of wireless sensor networks (WSNs), and its principles can be applied to efficiently manage nodes operation and ...
, and self-protection; (ii) the selected studies use different approaches for managing the dynamic behavior of middleware systems for WSN, such as policy-based reasoning, context-based reasoning, feedback ...
Finally, S1 applies a hybrid approach relying on policy-based and context-based approach. ...
doi:10.1155/2014/782789
fatcat:mumywjxxx5batlkpvogvdni6mu
Governance and innovation in public sector services: The case of the digital library
2016
Government Information Quarterly
as a New Public Management phase to the emergence of a Networked Governance approach in the specific case of Roskilde University Library. ...
This model is then applied to a longitudinal case study of the digitalization of Roskilde University Library. The theoretical and empirical analysis yields four main results. ...
Management mode of governance towards a (tentative) Networked Governance approach has affected innovation in the examined case of library services. ...
doi:10.1016/j.giq.2016.04.005
fatcat:tg45srqtbjcbdjp6vampaoiax4
Informetrics on social network mining: research, policy and practice challenges
2020
Library hi tech
Gao (2019) construct the social network prediction model based on data mining and link prediction analysis. ...
In this special issue, Priya and Ch (2019) designed a novel hybrid semantic similarity measure (HSSM)-based ontology merging using formal concept analysis and semantic similarity measure. ...
doi:10.1108/lht-06-2020-279
fatcat:2qjizca2r5fmrawkjalpivgf7q
Pathsift: A Library for Separating the Effects of Topology, Policy, and Protocols on IP Routing
2012
Proceedings of the Fifth International Conference on Simulation Tools and Techniques
In this paper we present Pathsift, a Python library for generating and comparing sets of paths, designed to permit the exploration of high-level routing policies. ...
Predicting the impact of input changes is extremely difficult; thus, network designers must not only decide what policies to deploy, but also must encode those policies in a low-level configuration and ...
ACKNOWLEDGMENTS The authors would like to thank Dr. Santanu Das (U.S. Office of Naval Research) for funding that partially supported this work. The authors would also like to thank Dr. ...
doi:10.4108/icst.simutools.2012.247758
dblp:conf/simutools/RamachandranS12
fatcat:5qakwlfj5vg6lej5wbyzokd5qu
Object oriented modeling and decision support for supply chains
2004
European Journal of Operational Research
Since different decision problems in supply chains entail different approaches to be used for modeling and problem solving, there is a need for a unified approach to modeling supply chains so that any ...
DESSCOM has two major components: (1) DESSCOM-MODEL, a modeling infrastructure comprising a library of carefully designed generic objects for modeling supply chain elements and dynamic interactions among ...
Acknowledgements This research was supported in part by a Ministry of Human Resources Development grant on Competitive Manufacturing Systems. ...
doi:10.1016/s0377-2217(02)00806-8
fatcat:sdme3xkgsvc3vlg7f5hwmavswy
Conflict Prevention Via Model-Driven Policy Refinement
[chapter]
2006
Lecture Notes in Computer Science
This approach enables policy enforcement to be cognisant of application specific constraints, thereby resulting in a more trustworthy and dependable policy based management system. ...
This paper describes an approach for application specific conflict prevention based on model-driven refinement of policies prior to deployment. ...
Acknowledgements The authors would like to take this opportunity to thank the anonymous reviewers for their useful comments and feedback on the paper. ...
doi:10.1007/11907466_18
fatcat:vtwbwekaobczdcbctpg5ygkkga
An autonomic architecture to manage Ubiquitous Computing networks and applications
2009
2009 First International Conference on Ubiquitous and Future Networks
A machine-understandable representation of business and network concepts, along with an ability to negotiate services and functionality to serve competing interests of users and applications in a domain ...
Given the vast diversity in programming models and languages for representing operational and management data, a common knowledge representation is needed that enables the communication of not just static ...
The architecture is conceptually similar to a programmable grid, except that our architecture uses a model-based approach [12] [15] [17] to build reusable libraries of behavior that are then matched ...
doi:10.1109/icufn.2009.5174296
fatcat:4jnz2ormkfgp3ksnodf7frudlm
Advanced logistics analysis capabilities environment
2010
Proceedings of the 2010 Winter Simulation Conference
This paper presents an approach for modeling supply chain networks and logistics operations using a custom developed supply chain modeling library wholly integrated into a general purpose commercial off ...
The current approach has been used to model supply chain management systems, manufacturing and assembly, aircraft fleet availability and performance-based logistics. 1 2138 978-1-4244-9864-2/10/$26.00 ...
This non-item based simulation approach has been implemented by Phelps, Parsons, and Siprelle (2002) in prior modeling methodologies. ...
doi:10.1109/wsc.2010.5678859
dblp:conf/wsc/SaylorD10
fatcat:wf4ov6utjjbxph2l37jicbhshy
Networked Resources, Assessment and Collection Development
2004
The journal of academic librarianship
into four models of determining library network statistics and performance measures. ...
However, this method is consistent with models used in other academic libraries and provides comparable data across all resources. 3, 4 In order to gather this data for the databases that were not yet ...
doi:10.1016/j.acalib.2004.07.005
fatcat:dksmkedldjflri2zkhdjxoy3ky
Page 611 of Library & Information Science Abstracts Vol. , Issue 9
[page]
1993
Library & Information Science Abstracts
Describes this approach, based on a number of UWE’s interrelated policies and involving: professional management practices involving genuine staff participation; purposeful staffing policies that work ...
Examines a case study of the University of the West of England, Bristol (UWE), which examines the degree to which a ‘new model’ approach can help an academic library secure growth. ...
Towards HTTPS Everywhere on Android: We Are Not There Yet
2020
USENIX Security Symposium
In recent years, Google has developed a number of security mechanisms for Android apps, ranging from multiple KeyStores to the recent introduction of the new Network Security Policy, an XML-based configuration ...
As a last contribution, we propose a new extension of the Network Security Policy, so to allow app developers to embed problematic ad libraries without the need to weaken the security of their entire app ...
Acknowledgements We would like to thank our shepherd Ben Andow for his help in significantly improving this paper, and all the anonymous reviewers for their constructive feedback. ...
dblp:conf/uss/PossematoF20
fatcat:uaunnunxkzaajptykofvdknod4
A security policy oracle
2011
SIGPLAN notices
Comparing software implementations for consistency is a new approach to discovering "deep" bugs in them. ...
Multiple API implementations are proliferating due to cloud-based software services and standardization of library interfaces. ...
Acknowledgments Thanks to Andrew John Hughes for his generous help with verifying Classpath bugs and for feedback on the paper text; Sam Guyer for useful discussions about static analysis; and the anonymous ...
doi:10.1145/1993316.1993539
fatcat:57rls5e6v5e5vn2qddgou4mgl4
A security policy oracle
2012
SIGPLAN notices
Comparing software implementations for consistency is a new approach to discovering "deep" bugs in them. ...
Multiple API implementations are proliferating due to cloud-based software services and standardization of library interfaces. ...
Acknowledgments Thanks to Andrew John Hughes for his generous help with verifying Classpath bugs and for feedback on the paper text; Sam Guyer for useful discussions about static analysis; and the anonymous ...
doi:10.1145/2345156.1993539
fatcat:f52et4a7zjbn3lvmdnhjwtiuey
« Previous
Showing results 1 — 15 out of 162,873 results