Filters








764 Hits in 13.5 sec

Can Multi-Agents Wake Us from IC Design Productivity Nightmare? [chapter]

Peter van Staa, Christian Sebeke
2007 Lecture Notes in Computer Science  
Based on Internet Public Registries Visited by Clusters of Software Agents p. 281 Applications A Multiagent Control System for Shop Floor Assembly p. 293 MagentaToolkit: A Set of Multi-agent  ...  Approach in Distributed Control Systems Designing p. 257 Design and Implementation of Adaptive Agents for Complex Manufacturing Systems p. 269 Dynamic Configuration and Management of e-Supply Chains  ... 
doi:10.1007/978-3-540-74481-8_2 fatcat:teicxmob2naw3isqb2yjlyqzgq

Highly Available Location-Based Services in Mobile Environments [chapter]

Peter Ibach, Matthias Horbank
2005 Lecture Notes in Computer Science  
We show how to use Web Services standards for propagation, discovery, and composition of location-based services in mobile environments.  ...  The achieved interoperability allows for context-aware on-demand service composition making the composite service highly available and resilient to environmental dynamics and uncertainties.  ...  chain management.  ... 
doi:10.1007/978-3-540-30225-4_10 fatcat:jrdw4q3isffgpn4j2m4f5alrkq

Barriers to supply chain information integration: SMEs adrift of eLands

C HARLAND, N CALDWELL, P POWELL, J ZHENG
2007 Journal of Operations Management  
Differences between firms in supply chains and between supply chains are examined.  ...  The literature extols the potential benefits of supply chain integration and the crucial role of integrated eBusiness to deliver those benefits.  ...  Harland et al. (2001) show that there are two dimensions that have substantial impact on how firms attempted to manage the process of creation and operation of supply networks-the degree of dynamics,  ... 
doi:10.1016/j.jom.2007.01.004 fatcat:tj37gtfofzgzpbn2tio35qhjau

Grid middleware in China

Yongwei Wu, Chunming Hu, Li Zha, Song Wu
2007 International Journal of Web and Grid Services  
Globus Toolkit by Globus Alliance includes software services and libraries for many components, such as distributed security, resource management, monitoring and discovery, and data management (Ghalem  ...  XtreemOS supported by the European Commission's IST programme is an open source grid operating system with native support for VO and capable of running on a wide range of underlying platforms, from clusters  ...  Acknowledgements This work is supported by the ChinaGrid project of the Ministry of Education of China, Natural Science Foundation of China (90412006, 90412011, 60573110, 90612016, 60673152, 60673174)  ... 
doi:10.1504/ijwgs.2007.015421 fatcat:uwiohil54fgzpohjqxrfzm37m4

Framework for Computation Offloading in Mobile Cloud Computing

Dejan Kovachev, Ralf Klamma
2012 International Journal of Interactive Multimedia and Artificial Intelligence  
ACKNOWLEDGMENT This work is supported by the Excellence Initiative of German National Science Foundation (DFG) within the research cluster Ultra High-Speed Mobile Information and Communication (UMIC) and  ...  ACKNOWLEDGMENT The authors would like to thank Professors Omer Rana and José Cardoso e Cunha for the initial ideas on pattern and service abstractions, which ultimately conduced to this work.  ...  of documents, books and publications via HTTP on the Internet.  ... 
doi:10.9781/ijimai.2012.171 fatcat:zeqxsym4f5ashmjkiivje2uoau

Network Organization and Governance [chapter]

2018 CRC Handbook of Modern Telecommunications  
Some of these systems are exter nal to e-commerce organizations and implemented by the partners. Supply chain management: Most emerging e-commerce companies are not vertically integrated.  ...  B2B e-commerce deals with one business providing products and services to another business typically as a part of the supply chain or as an enabler of business processes.  ...  Sometimes, the HP BTO software core meets the requirements, but it needs telecom-specific configurations, such as using an SID-based data model.  ... 
doi:10.1201/9781420078084-9 fatcat:eyixyd27nzbmthwoqybadgqz2e

Table of Contents

2019 2019 International Conference on Advancements in Computing (ICAC)  
In this paper, we present machine learning and deep learning-based E-police system to enhance public safety and support law enforcement.  ...  The Dynamic Bandwidth Management System consisted of 89% accuracy rate on the hybrid module of Linear Regression and Decision Trees while the Quota Management System (QMS) provided an accuracy rate of  ... 
doi:10.1109/icac49085.2019.9129879 fatcat:gm5mw7qn5ncoxjr6klcl3x4uju

A Survey on Internet of Things Architectures

P.P. Ray
2016 EAI Endorsed Transactions on Internet of Things  
Directly or indirectly, the presented architectures propose to solve real-life problems by building and deployment of powerful Internet of Things notions.  ...  Internet of Things is a platform where every day devices become smarter, every day processing becomes intelligent, and every day communication becomes informative.  ...  Supply Chain Management and industry Supply Chain Management (SCM) may be defined as the flow of goods and services while including the movement and storage of raw materials, work-in-process inventory,  ... 
doi:10.4108/eai.1-12-2016.151714 fatcat:j3bkbm27wvaljederetofsgc2m

A survey on Internet of Things architectures

P.P. Ray
2018 Journal of King Saud University: Computer and Information Sciences  
Directly or indirectly, the presented architectures propose to solve real-life problems by building and deployment of powerful Internet of Things notions.  ...  Internet of Things is a platform where every day devices become smarter, every day processing becomes intelligent, and every day communication becomes informative.  ...  Supply Chain Management and industry Supply Chain Management (SCM) may be defined as the flow of goods and services while including the movement and storage of raw materials, work-in-process inventory,  ... 
doi:10.1016/j.jksuci.2016.10.003 fatcat:cwf3kjaddncupb5eqv7fr25y2a

Bluetooth Hacking: A Case Study

Dennis Browning, Gary Kessler
2009 Journal of Digital Forensics, Security and Law  
ACKNOWLEDGEMENTS The authors would like to acknowledge "Higher Education Authority" (HEA) and "Irish Research Council for Science, Engineering and Technology" for providing funding that made this research  ...  ACKNOWLEDGEMENTS The authors would like to acknowledge "Higher Education Authority" (HEA) and "Irish Research Council for Science, Engineering and Technology" for providing funding that made this research  ...  As internet grows so does internet based fraud. What is interesting is that fraud is spreading into once reliable supply chain area.  ... 
doi:10.15394/jdfsl.2009.1058 fatcat:cm7mvnadpzdthhitft5boixn5i

HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle

Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi
2017 International Journal of Information Security  
To monitor the web-based attack cycle for effective detection and prevention, we propose a monitoring system called HoneyCirculator based on a honeytoken, which actively leaks bait credentials and lures  ...  The adversary may also try to compromise public websites owned by individual users by impersonating the website administrator using the stolen credentials.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecomm ons.org/licenses/by/4.0/), which permits unrestricted use, distribution  ... 
doi:10.1007/s10207-017-0361-5 fatcat:ra746vp4ajgebg67crolzbxds4

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgments The authors would like to acknowledge the valuable suggestions of the anonymous reviewers.  ...  Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  If e is subject-traces-all, then from any of its members, D, one can find a chain to e by doing forward search.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

A forensic acquisition and analysis system for IaaS

Saad Alqahtany, Nathan Clarke, Steven Furnell, Christoph Reich
2015 Cluster Computing  
As a result of the analysis of literature, it is found that it would be difficult, if not impossible, to perform an investigation and discovery in the cloud environment without relying on cloud service  ...  Cloud computing is a promising next-generation computing paradigm that offers significant economic benefits to both commercial and public entities.  ...  By using agent-based acquisition, all cloud-management data (e.g.  ... 
doi:10.1007/s10586-015-0509-x fatcat:c7sz6snrjjd7lot6cxmq6ljyjy

A Survey on Intrusion Detection Systems for Fog and Cloud Computing

Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska
2022 Future Internet  
user actions, all of which are based on the use of established rules for cloud computing.  ...  The paper focuses on a Software-as-a-Service (SaaS) and intrusion detection, which provides an effective and resilient system structure for users and organizations.  ...  Intrusion Detection in SDN for Fog and Cloud Computing Software-defined networking manages networks that aim to provide dynamic, programmability, and efficient network configuration to enhance network  ... 
doi:10.3390/fi14030089 fatcat:wxlz2xeduzdpvbyf63rwosal7e

D2.1 Use Cases, Technical And Business Requirements

Carlos Parada, Francisco Fontes, Isabel Borges, Omer Gurewitz, Philip Eardley, Okung Ntofon, Andy Reid, Giuseppe Bianchi, Nicola Blefari Melazzi, Pierpaolo Loreti, Claudio Pisa, Stefano Salsano (+24 others)
2018 Zenodo  
The report includes a comprehensive set of 23 use cases, covering themes such as wireless access, mobile edge computing and on-the-fly monitoring.  ...  It is an output of the Superfluidity collaborative research project.  ...  SDN control agent For monitoring and control management purpose, the wireless Fronthaul system will implement agents to be able to communicate with the SDN controller node and meets on-demand adaptation  ... 
doi:10.5281/zenodo.1219356 fatcat:4cayudykg5g77bahiwksv5q26y
« Previous Showing results 1 — 15 out of 764 results