A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Quantification of Residential Land Use Characteristics from an Impact Generation Potential Perspective
2015
Indian Journal of Science and Technology
For this an expert survey was performed to integrate the various characteristics of residential land use in an urban area of a large city. ...
The study was conducted in an Indian Urban context where there is multiplicity in scale of residential development and socioeconomic back ground of people. ...
For this an expert survey was conducted to elicit required information to formulate the same for an urban area of a large city. ...
doi:10.17485/ijst/2015/v8i1/84016
fatcat:cu3a25spujbq3l6h5a2reisgfa
Quantification of Residential Land Use Characteristics from an Impact Generation Potential Perspective
2015
Indian Journal of Science and Technology
For this an expert survey was performed to integrate the various characteristics of residential land use in an urban area of a large city. ...
The study was conducted in an Indian Urban context where there is multiplicity in scale of residential development and socioeconomic back ground of people. ...
For this an expert survey was conducted to elicit required information to formulate the same for an urban area of a large city. ...
doi:10.17485/ijst/2015/v8i28/84016
fatcat:gapbxtjzofdyddxvjo5efh3tce
A Framework for Automated Identification of Attack Scenarios on IT Infrastructures
2012
PIK - Praxis der Informationsverarbeitung und Kommunikation
Namely, we define an extensible framework which uses public vulnerability databases to identify probable multi-step attacks in an IT infrastructure, and provide recommendations in the form of patching ...
In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT infrastructure. ...
These structures can be used in an automated solution to check security of an IT infrastructure. ...
doi:10.1515/pik-2012-0005piko.2012.35.1.25
fatcat:rpvuepgxavcfxii3ykw4jtiwna
A Framework for Automated Identification of Attack Scenarios on IT Infrastructures
2012
PIK - Praxis der Informationsverarbeitung und Kommunikation
Namely, we define an extensible framework which uses public vulnerability databases to identify probable multi-step attacks in an IT infrastructure, and provide recommendations in the form of patching ...
In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT infrastructure. ...
These structures can be used in an automated solution to check security of an IT infrastructure. ...
doi:10.1515/pik-2012-0005
fatcat:xnet5mcw4bdrlpifpnp7p7lyai
Automated verification of virtualized infrastructures
2011
Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11
We consider first the static case where the topology of the virtual infrastructure is fixed and demonstrate that our platform allows for the declarative specification of a large class of properties. ...
problems in different contexts. ...
We thank Piotr Filipiuk for support on the SuccintSolver. ...
doi:10.1145/2046660.2046672
dblp:conf/ccs/BleikertzGM11
fatcat:fwo2gkviqrh5hevhigd74g2aye
The evolution of monitoring system: the INFN-CNAF case study
2017
Journal of Physics, Conference Series
In the paper, the CNAF monitoring infrastructure and its related components are hereafter described: Sensu as monitoring router, InfluxDB as time series database to store data gathered from sensors, Uchiwa ...
Over the past two years, the operations at CNAF, the ICT center of the Italian Institute for Nuclear Physics, have undergone significant changes. ...
, and ephemeral infrastructure at scale (i.e. public, private, and hybrid clouds). ...
doi:10.1088/1742-6596/898/9/092029
fatcat:4xyxk2sntvh57fvn3ahvmrreuu
Modelling and Verification of Large-Scale Sensor Network Infrastructures
2018
2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS)
Large-scale wireless sensor networks (WSN) are increasingly deployed and an open question is how they can support multiple applications. ...
The key question we address is how to verify that application requirements are met, individually and collectively, and can continue to be met, in the context of large-scale, evolving network and device ...
We also thank Greg Jackson for providing the dataset collected from the microclimate WSN deployment in the Queen Elizabeth Olympic Park. ...
doi:10.1109/iceccs2018.2018.00016
dblp:conf/iceccs/SevegnaniKCM18
fatcat:dzm6ct2c5nfmxpvl2a53poccyi
BIOSTIRLING-4SKA : A cost effective and efficient approach for a new generation of solar dish-Stirling plants based on storage and hybridization; An Energy demo project for Large Scale Infrastructures",
[article]
2018
arXiv
pre-print
supply for many infrastructures, including future sustainable large scientific infrastructures. ...
storage at the industrial scale. ...
Radioastronomical Large Scale Infrastructures Large sensor-based science infrastructures for radio astronomy like the SKA will be among the most intensive data-driven projects in the world, facing very ...
arXiv:1712.03029v3
fatcat:j6j2hmcbqjc3pfkxaqjo3hyrti
An Extensible Open-Source Compiler Infrastructure for Testing
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we report on an extensible, open-source compiler infrastructure called ROSE, which is currently in development at Lawrence Livermore National Laboratory. ...
Testing forms a critical part of the development process for large-scale software, and there is growing need for automated tools that can read, represent, analyze, and transform the application's source ...
Department of Energy (DOE) project to develop an open-source compiler infrastructure for optimizing large-scale (on the order of a million lines or more) DOE applications [1, 2] . ...
doi:10.1007/11678779_9
fatcat:z3rj2wecm5g2jktnkr3cmcrvnq
Aspects of Data-Intensive Cloud Computing
[chapter]
2010
Lecture Notes in Computer Science
Driven by several economic and technological enablers, Cloud Computing is going to change the way we have to design, maintain and optimise large-scale data-intensive software systems in the future. ...
In this paper we focus on the opportunities and restrictions of current Cloud solutions regarding the data model of such software systems. ...
Until recently this is the typical setting for large-scale data-intensive applications as described in Sect. 1. ...
doi:10.1007/978-3-642-17226-7_4
fatcat:stofj23w6je4zphzw7mxepwgjy
An SOA-based Framework for Instrument Management for Large-scale Observing Systems (USArray Case Study)
2006
2006 IEEE International Conference on Web Services (ICWS'06)
Guided by this framework, we developed web services, custom workflow applications, and an integrated user interface of monitors and controls for managing instruments in large-scale sensor network observing ...
Large-scale observing systems are poised to become the dominant means of study for a variety of natural phenomena. ...
Site Manager screenshot In managing large-scale sensor deployments, USArray administrators have expressed the need for integration with geographical information systems for visually checking the overall ...
doi:10.1109/icws.2006.29
dblp:conf/icws/CotofanaDSTFEV06
fatcat:6b2p7lupfzch7p3jwvxrflxb6u
A service-oriented modeling and simulation framework for rapid development of distributed applications
2006
Simulation modelling practice and theory
The distinct features of the framework include a modeling and specification language, dynamic model checking for completeness and consistency, automated code generation from the specification, simulation ...
The paper presents a service-oriented distributed modeling and simulation framework that supports the development and evaluation of large scale distributed systems such as network-centric and system-of-systems ...
The specification is then model checked to determine if it is complete and consistent. Test cases to be used in testing phase are generated during the Completeness and Consistency (C&C) analyses. ...
doi:10.1016/j.simpat.2005.10.005
fatcat:reek3le235dixdqo4s6sonvqvq
PKI Security in Large-Scale Healthcare Networks
2010
Journal of medical systems
Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures. ...
In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide ...
Healthcare multi-domain PKI infrastructures deployed for large-scale networks consisting of many Certification Authorities should keep low complexity of the certificate path processing. ...
doi:10.1007/s10916-010-9573-1
pmid:20827570
fatcat:tudz2e4zfva57crd73bx2ziygq
BLEBeacon: A Real-Subject Trial Dataset from Mobile Bluetooth Low Energy Beacons
[article]
2019
arXiv
pre-print
The data were collected during an IRB (Institutional Review Board forhe Protection of Human Subjects in Research) approved one-month trial. ...
The focus is on presenting a real-life realization of a location-aware sensing infrastructure, that can provide insights for smart sensing platforms, crowd-based applications, building management, and ...
The authors are grateful to Mahdi Inaya and Michael Meli for carrying out the system deployment and installation, the NC State ECE Department for allowing us to host the trial in the EBII building, and ...
arXiv:1802.08782v2
fatcat:pjzfoieryveddlckvfxkjwj2ky
Developing Electronic Data Methods Infrastructure to Participate in Collaborative Research Networks
2014
eGEMs
This case study describes the infrastructure and process developed by an integrated health delivery system to successfully prepare and submit a complex data set to a large national collaborative network ...
Lessons Learned: We found that a structured process with documentation was key to maintaining communication, timelines, and quality in a large-scale data submission to a national collaborative network. ...
The findings and conclusions in this document are those of the authors, who are responsible for its content, and do not necessarily represent the views of the High Value Healthcare Collaborative. ...
doi:10.13063/2327-9214.1126
pmid:25848600
pmcid:PMC4371420
fatcat:ajuqmcjjyjffxgzd2fviiblexe
« Previous
Showing results 1 — 15 out of 231,120 results