A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Embracing Process Compliance and Flexibility Through Behavioral Consistency Checking in ACM
[chapter]
2016
Lecture Notes in Business Information Processing
Our study is conducted using a practical ACM system for repair service management handling different customer requirements under diverse compliance and law regulations. ...
In this paper we report our experience in addressing this challenge by using model checking and runtime monitoring techniques for behavioral consistency checking that can handle both ACM aspects: support ...
Lessons Learned and Conclusion Our general finding in this study is that behavioral consistency checking of compliance rules has significantly enhanced the ACM solution by embracing flexibility and enforcing ...
doi:10.1007/978-3-319-42887-1_4
fatcat:x7z4k34qtrfm5nlcmlzqv42fzu
Systems Challenges for Trustworthy Embodied Systems
[article]
2022
arXiv
pre-print
When deploying embodied systems into a real-life context we face various engineering challenges, as it is crucial to coordinate the behavior of embodied systems in a beneficial manner, ensure their compatibility ...
, explorative, ever-evolving, largely non-predictable, and increasingly autonomous embodied systems in uncertain, complex, and unpredictable real-world contexts. ...
Ability to adapt and optimize situational behavior; to adapt internal models, goal management, and planning processes dynamically; and to acquire new knowledge through inductive and deductive reasoning ...
arXiv:2201.03413v2
fatcat:hwprg3zjhvfuro3etecx2t4qua
Proceedings of the Doctoral Consortium WI 2015
2015
Working Paper Series of the Institute of Business Management; 4
The result of this thesis provides practitioners with specific ITRs for motivated and non-motivated users in order to implement ITRs for the analyzed groups. ...
This might lead to a more energy efficient DB. ...
Papers with empirical setup concentrate on process virtualization in public services [18, 19] and airport check-in [20, 21] . ...
doi:10.25972/opus-11171
fatcat:gmtlmgmhgzckhhinsvt2ypq5qq
Institutional Bridging: How Conceptions of IT-Enabled Change Shape the Planning Process
2000
Journal of Management Information Systems
efficiency, and flexible organizational processes. ...
Coast is a pharmaceutical manufacturer and marketing operation, well known for an open and flexible management style and a history of constant organizational change. ...
doi:10.1080/07421222.2000.11045642
fatcat:a2ur76zae5ccrmeyopf2sp4gea
Armenia: Technical Assistance Report-Upgrading Fiscal Rules
2017
IMF Staff Country Reports
Typically, savings options are disputed by line ministries and rolled back through the budget process, which has also been the case in Armenia in the past. ...
International experience indicates that ERs have a better compliance record, in part due to the fact that they are relatively easy to monitor and are directly enforceable through the budget process (Cordes ...
Times series should be not only available over a long period, but also methodologically consistent and comparable over time. ...
doi:10.5089/9781484325551.002
fatcat:qzi6psgtxnbq5awivn7svjdp7u
From representations to computations
2007
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering - ESEC-FSE '07
What began as an internet-scale distributed hypermedia system is now a vast sea of shared and interdependent services. ...
Our investigation yields a set of extensions to REST, an architectural style called Computational REST (CREST), that not only offers additional design guidance, but pinpoints, in many cases, the root cause ...
To better understand why, we first recount our personal experiences building and repairing two web systems: mod_mbox, a service for mail archiving, and Subversion, a configuration management system. ...
doi:10.1145/1287624.1287660
dblp:conf/sigsoft/ErenkrantzGST07
fatcat:2ys6dpyzxzbhdgol5gzznvwpmu
A Survey of Cybersecurity of Digital Manufacturing
[article]
2020
arXiv
pre-print
A DM system consists of embedded electronics, sensors, actuators, control software, and inter-connectivity to enable the machines and the components within them to exchange data with other machines, components ...
therein, the plant operators, the inventory managers, and customers. ...
Gupta are supported in part by NYU Center for Cybersecurity, and R. Karri is also supported in part by NYU-AD Center for Cybersecurity. ...
arXiv:2006.05042v3
fatcat:j3gf62nh45h5bdj6fw6yycm5iy
Security issues in cloud environments: a survey
2013
International Journal of Information Security
managed by cloud hosting providers. ...
It addresses several key topics, namely vulnerabilities, threats and attacks, proposing a taxonomy for their classification. ...
A VM-to-VMM attack consists in gaining access to the underlying VMM through a legitimately running VM managed by that VMM, an attack named VM escape [100] . ...
doi:10.1007/s10207-013-0208-7
fatcat:55o67epb6zfspchxuzvuduzr4a
Chasing the AIDS virus
2010
Communications of the ACM
All advertising in ACM Media publications is at the discretion of ACM and is intended to provide financial support for the various activities and services for ACM members. ...
ACM Media Advertising Policy Communications of the ACM and other ACM Media publications accept advertising in both print and electronic formats. ...
The authors find that, surprisingly, their filter-based gist is rather good at predicting the number of instances of a given object category that might be present in the scene, as well as their likely ...
doi:10.1145/1666420.1666440
fatcat:o2qllqh4tzhh5dzgvnjewl52vq
Domain-independent planning for services in uncertain and dynamic environments
2016
Artificial Intelligence
Things have not developed as planned since, and at the end, I am still undecided whether he has been a constructive or distracting influence on my PhD. ...
Following the thread that has lead me to pursuing a PhD, I ultimately find my parents, Rozina and Christophoros, who have always encouraged me to learn more. ...
The solving process proceeds through a combination of consistency techniques and search (branching) algorithms. ...
doi:10.1016/j.artint.2016.03.002
fatcat:ezhqok2ew5a3vjqbcyf5n53uti
Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, January 06-11 2019, Schloss Dagstuhl
[article]
2019
arXiv
pre-print
The seminar was concerned with the challenge that for future Cyber-Physical Systems (CPS), it will become increasingly relevant to explain their behavior (past, current, and future behavior, why a certain ...
action was taken, how a certain goal can be achieved, etc.) to users, engineers, and other stakeholders. ...
(GI, German Society for Informatics) and Schloss Dagstuhl for partially funding this seminar. ...
arXiv:1904.11851v1
fatcat:r2r5ac6hmnel3f6weiynjwunni
A Unified Approach to Architecture Conformance Checking
2015
2015 12th Working IEEE/IFIP Conference on Software Architecture
This implies investigating and managing all possible edge cases, updating references and maintaining the system in a generally consistent state. ...
Tool-specific notations are indirectly supported through a well coordinated generative process partially managed by adapters. ...
doi:10.1109/wicsa.2015.11
dblp:conf/wicsa/CaraccioloLN15
fatcat:p7645eykmfgc3aopopwwmwplu4
D3.1 – State-of-the-Art and Market Analysis Report
2021
Zenodo
Document with main results of SotA review and stakeholders and market analysis carried out. ...
The function of the edge gateway will in many cases consist of sending data in batches to the cloud and edge computing for data processing, running AI and ML algorithms to predict future behavior. ...
flexible cell management. ...
doi:10.5281/zenodo.6705158
fatcat:xote6pjzubcvxo4aqxxbraooxi
Conclusion: What Next for Privacy Seals?
[chapter]
2018
Privacy and Data Protection Seals
management, click-through, check box, telephone, keypress, traditional signature or other mechanisms. ...
Seal subscribers may have to designate one or more persons in the enterprise to check compliance with subscribed standards and manage its scheme related obligations. ...
GAPP criterion 10.2.3 specifies a compliance review (a review and documentation of compliance with privacy policies and procedures, commitments and applicable laws, regulations, service-level agreements ...
doi:10.1007/978-94-6265-228-6_9
fatcat:mpex6asr7bcwnmu7bazvkyblje
Virtual Organization Clusters: Self-provisioned clouds on the grid
2010
Future generations computer systems
Walt Ligon, and Prof. Robert Geist have assisted in the process by dedicating their time and expertise to reviewing and aiding in the improvement of my research and its presentation. ...
Throughout the process of researching Virtual Organization Clusters and preparing this work, I have been privileged to work with a team of graduate and undergraduate students, who have assisted in the ...
Bcfg2 accommodates changes over time
through integration with Subversion repositories and other change management tools, improving
flexibility [40]. ...
doi:10.1016/j.future.2010.02.011
fatcat:x6nwjn3c5jhnbfcuzeexdkz22a
« Previous
Showing results 1 — 15 out of 216 results