Filters








10,680 Hits in 4.6 sec

Resolving Architectural Mismatches of COTS Through Architectural Reconciliation [chapter]

Paris Avgeriou, Nicolas Guelfi
2005 Lecture Notes in Computer Science  
In this paper we propose an approach for resolving architectural mismatches, with the aid of architectural reconciliation.  ...  These have been tackled, so far, at the component level, through component adaptation techniques, but they also must be tackled at an architectural level of abstraction.  ...  Component adaptation techniques can be again enforced here, if it is necessary to adapt the behavior of COTS components. • Complete the JAM.  ... 
doi:10.1007/978-3-540-30587-3_34 fatcat:rpjz6q2yuvekdlgdypsloqbjam

Availability and Performance of the Adaptive Voting Replication

Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Goeschka
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
Replica consistency and data integrity (constraint consistency) are correctness criteria for data-centric distributed systems.  ...  Since this might impose replica conflicts and data integrity violations, different reconciliation policies are needed to re-establish correctness at repair time.  ...  Thus, a quorum scheme adapted to the size of the partition is applied. Tentative states are logged. Whether data integrity shall be enforced within a partition in degraded mode is configurable.  ... 
doi:10.1109/ares.2007.50 dblp:conf/IEEEares/OsraelFCG07 fatcat:aujypcdecnbqteqdn2whi3dg6q

Semantic-Chunks a middleware for ubiquitous cooperative work

Luís Veiga, Paulo Ferreira
2005 Proceedings of the 4th workshop on Reflective and adaptive middleware systems - ARM '05  
They require central reconciliation algorithms, and cannot be applied to commercial applications without further instrumentation.  ...  ., a semanticallyannotated document region with application relevance, that is promoted to a full-right entity w.r.t. consistency information and enforcement.  ...  Data consistency enforcement and update reconciliation techniques include: i) determining causality among updates performed on different replicas and epidemically propagated [21, 2] among different peers  ... 
doi:10.1145/1101516.1101522 dblp:conf/middleware/VeigaF05 fatcat:26gz4kipojhmrabffcdqiuuz5e

Blockchain: an EOM approach to reconciliation in banking

Vedapradha R, Hariharan Ravi
2021 Innovation & Management Review  
Financial analysis is the highest predictor of ROI when integrated with technology as the adapted Blockchain innovation in reconciliation is the most influencing factor in enhancing, improving ROI playing  ...  operational levels in assessing the significance of this technology on return on investment.Design/methodology/approachA structured questionnaire was designed to collect primary data using a stratified  ...  It improves the business process with quality risk management techniques and transparent data reporting to clients.  ... 
doi:10.1108/inmr-05-2020-0060 fatcat:7jzkkdpsnfhezbmjwtmhlv2mji

Handling probabilistic integrity constraints in pay-as-you-go reconciliation of data models

Nguyen Quoc Viet Hung, Matthias Weidlich, Nguyen Thanh Tam, Zoltán Miklós, Karl Aberer, Avigdor Gal, Bela Stantic
2019 Information Systems  
Effective utilisation and evolution of data models, therefore, calls for matching techniques that generate correspondences between their elements.  ...  We argue that such a setting calls for a probabilistic model of integrity constraints, for which satisfaction is preferred, but not required.  ...  They differ, though, in how they enforce this consistency. For example, schemas define data types, whereas ontologies use logical systems [1, 2] .  ... 
doi:10.1016/j.is.2019.04.002 fatcat:p5icszobofbbrl3axoxexss75i

A generic component for exchanging user models between web-based systems

Kees Van Der Sluijs, Geert-Jan Houben
2006 International Journal of Continuing Engineering Education and Life-Long Learning  
Educational web-based systems exemplify the increasing need for personalisation. Applications that adapt to individual users need a model of the user that contains as accurate data as possible.  ...  For a semantically effective user model exchange, GUC allows the configuration of a distributed management of mappings between user models.  ...  We support data reconciliation by again applying the OWL and SWRL techniques. For each application, rules can be defined that specify how to reconcile data in the case of a conflict.  ... 
doi:10.1504/ijceell.2006.008918 fatcat:retye3nzg5f23k6pszjiesrcxy

Data management research at the MITRE Corporation

Arnon Rosenthal, Len Seligman, Catherine McCollum, Barbara Blaustein, Bhavani Thuraisingham, Edward Lafferty
1995 SIGMOD record  
We would also like to thank Ron Haggarty, MITRE's Vice President for Research and Technology, for his committment to research in this area.  ...  ACKNOWLEDGMENTS The authors would like to thank Pamela Campbell, Linda Chambless, and Manette Lazear for providing ideas, project descriptions, and valuable feedback.  ...  In instance reconciliation, we focus on knowledge-based techniques for special domains (e.g., target sightings).  ... 
doi:10.1145/211990.212020 fatcat:hqb7wxnpenezlbdy6rk4bx3sme

Trustworthy Log Reconciliation for Distributed Virtual Organisations [chapter]

Jun Ho Huh, John Lyle
2009 Lecture Notes in Computer Science  
Many log anonymisation techniques have been proposed to solve the latter issue [73, 102, 9] ; however, adapting such techniques and assuring that these anonymisation policies will be correctly enforced  ...  Although, FLAIM (and many other existing techniques) only provides anonymisation mechanisms suitable for basic log data structures like that of network logs.  ... 
doi:10.1007/978-3-642-00587-9_11 fatcat:4rn6r7ofereqdgoz4fmv4jsqnm

Reference reconciliation in complex information spaces

Xin Dong, Alon Halevy, Jayant Madhavan
2005 Proceedings of the 2005 ACM SIGMOD international conference on Management of data - SIGMOD '05  
Our reconciliation algorithm has three principal features. First, we exploit the associations between references to design new methods for reference comparison.  ...  Reference reconciliation is the problem of identifying when different references (i.e., sets of attribute values) in a dataset correspond to the same real-world entity.  ...  Acknowledgments We thank Anhai Doan, Pedro Domingos, Parag, and the anonymous reviewers for their insightful comments.  ... 
doi:10.1145/1066157.1066168 dblp:conf/sigmod/DongHMN05 fatcat:v2gdtw56ibgtvite37pfwjkkce

An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market

Aklilu Daniel Tesfamicael, Vicky Liu, Matthew McKague, William Caelli
2021 IEEE Access  
The proposed architectural design not only enhances data integrity and confidentiality but also enables the automatic execution of telephone call audit processes for auditors.  ...  This study uses the Clark-Wilson Integrity Model to verify metadata records' integrity at the systems where metadata are generated.  ...  Bob Maczkowiack for taking the time to review the manuscript. They sincerely appreciate his invaluable comments and editing work on this study.  ... 
doi:10.1109/access.2021.3122518 fatcat:xbuxsbz7g5e4zlcxhhbztn7inm

Parallel, fully automatic hp-adaptive 2d finite element package

M. Paszyński, J. Kurtz, L. Demkowicz
2006 Computer Methods in Applied Mechanics and Engineering  
The paper presents a description of par3Dhp -a 3D, parallel, fully automatic hp-adaptive finite element code for elliptic and Maxwell problems.  ...  The system constitutes an infrastructure for a class of parallel hp adaptive computations. Its modular structure allows for an independent parallelization of each component of the system.  ...  The authors are greatly indebted to Jason Kurtz for numerous discussions on the subject.  ... 
doi:10.1016/j.cma.2005.02.019 fatcat:fsec7uljevernkhsum7n7ojygu

Parallel, fully automatic hp-adaptive 3D finite element package

M. Paszyński, L. Demkowicz
2006 Engineering with Computers  
The paper presents a description of par3Dhp -a 3D, parallel, fully automatic hp-adaptive finite element code for elliptic and Maxwell problems.  ...  The system constitutes an infrastructure for a class of parallel hp adaptive computations. Its modular structure allows for an independent parallelization of each component of the system.  ...  The authors are greatly indebted to Jason Kurtz for numerous discussions on the subject.  ... 
doi:10.1007/s00366-006-0036-8 fatcat:t6gvtynorzeybig5sje4xsep2i

Quota enforcement for high-performance distributed storage systems

Kristal T. Pollack, Darrell D.E. Long, Richard A. Golding, Ralph A. Becker-Szendy, Benjamin Reed
2007 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)  
This is difficult for large, distributed systems, especially those used for highperformance computing applications, because resource allocation occurs on many nodes concurrently.  ...  We present a solution that has less than 0.2% performance overhead while the system is below saturation, compared with not enforcing quota at all.  ...  We focus on a distributed quota management technique that can be used for enforcing resource usage limits for systems such as these.  ... 
doi:10.1109/msst.2007.4367965 fatcat:knzgvvdelreqthdb6wh3myqypq

Information-centric pervasive healthcare platforms

Dirk Trossen, Dana Pavel, Kenneth Guild, Jean Bacon, Jatinder Singh
2010 Proceedings of the 4th International ICST Conference on Pervasive Computing Technologies for Healthcare  
These often impair the end user experience through failing along these boundaries or enforcing particular end user experiences at them, e.g., by providing single-device or single-network solutions.  ...  For this, we use aggregation techniques for well-known input sources, such as location and activity.  ...  As such, it provides a suitable point for policy enforcement.  ... 
doi:10.4108/icst.pervasivehealth2010.8768 dblp:conf/ph/TrossenPGBS10 fatcat:3aecokkmxfewriimkosrnovevu

A Survey of Mobile Transactions

Patricia Serrano-Alvarado, Claudia Roncancio, Michel Adiba
2004 Distributed and parallel databases  
Transaction support is crucial in mobile data management.  ...  Specific characteristics of mobile environments (e.g. variable bandwidth, disconnections, limited resources on mobile hosts) make traditional transaction management techniques no longer appropriate.  ...  Raffin for their help in reading this paper. We wish to thank the members of the NODS project (http://www-45 lsr.imag.fr/Les.Groupes/STORM/) for their feedbacks all along this research.  ... 
doi:10.1023/b:dapd.0000028552.69032.f9 fatcat:tohlptorcrbsxkgizqcnilsj6a
« Previous Showing results 1 — 15 out of 10,680 results