216 Hits in 11.0 sec

Embracing Process Compliance and Flexibility Through Behavioral Consistency Checking in ACM [chapter]

Thanh Tran Thi Kim, Erhard Weiss, Christoph Ruhsam, Christoph Czepa, Huy Tran, Uwe Zdun
2016 Lecture Notes in Business Information Processing  
Our study is conducted using a practical ACM system for repair service management handling different customer requirements under diverse compliance and law regulations.  ...  In this paper we report our experience in addressing this challenge by using model checking and runtime monitoring techniques for behavioral consistency checking that can handle both ACM aspects: support  ...  Lessons Learned and Conclusion Our general finding in this study is that behavioral consistency checking of compliance rules has significantly enhanced the ACM solution by embracing flexibility and enforcing  ... 
doi:10.1007/978-3-319-42887-1_4 fatcat:x7z4k34qtrfm5nlcmlzqv42fzu

Systems Challenges for Trustworthy Embodied Systems [article]

Harald Rueß
2022 arXiv   pre-print
When deploying embodied systems into a real-life context we face various engineering challenges, as it is crucial to coordinate the behavior of embodied systems in a beneficial manner, ensure their compatibility  ...  , explorative, ever-evolving, largely non-predictable, and increasingly autonomous embodied systems in uncertain, complex, and unpredictable real-world contexts.  ...  Ability to adapt and optimize situational behavior; to adapt internal models, goal management, and planning processes dynamically; and to acquire new knowledge through inductive and deductive reasoning  ... 
arXiv:2201.03413v2 fatcat:hwprg3zjhvfuro3etecx2t4qua

Proceedings of the Doctoral Consortium WI 2015

Axel Winkelmann, Axel Winkelmann
2015 Working Paper Series of the Institute of Business Management; 4  
The result of this thesis provides practitioners with specific ITRs for motivated and non-motivated users in order to implement ITRs for the analyzed groups.  ...  This might lead to a more energy efficient DB.  ...  Papers with empirical setup concentrate on process virtualization in public services [18, 19] and airport check-in [20, 21] .  ... 
doi:10.25972/opus-11171 fatcat:gmtlmgmhgzckhhinsvt2ypq5qq

Institutional Bridging: How Conceptions of IT-Enabled Change Shape the Planning Process

2000 Journal of Management Information Systems  
efficiency, and flexible organizational processes.  ...  Coast is a pharmaceutical manufacturer and marketing operation, well known for an open and flexible management style and a history of constant organizational change.  ... 
doi:10.1080/07421222.2000.11045642 fatcat:a2ur76zae5ccrmeyopf2sp4gea

Armenia: Technical Assistance Report-Upgrading Fiscal Rules

International Monetary Fund.
2017 IMF Staff Country Reports  
Typically, savings options are disputed by line ministries and rolled back through the budget process, which has also been the case in Armenia in the past.  ...  International experience indicates that ERs have a better compliance record, in part due to the fact that they are relatively easy to monitor and are directly enforceable through the budget process (Cordes  ...  Times series should be not only available over a long period, but also methodologically consistent and comparable over time.  ... 
doi:10.5089/9781484325551.002 fatcat:qzi6psgtxnbq5awivn7svjdp7u

From representations to computations

Justin R. Erenkrantz, Michael Gorlick, Girish Suryanarayana, Richard N. Taylor
2007 Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering - ESEC-FSE '07  
What began as an internet-scale distributed hypermedia system is now a vast sea of shared and interdependent services.  ...  Our investigation yields a set of extensions to REST, an architectural style called Computational REST (CREST), that not only offers additional design guidance, but pinpoints, in many cases, the root cause  ...  To better understand why, we first recount our personal experiences building and repairing two web systems: mod_mbox, a service for mail archiving, and Subversion, a configuration management system.  ... 
doi:10.1145/1287624.1287660 dblp:conf/sigsoft/ErenkrantzGST07 fatcat:2ys6dpyzxzbhdgol5gzznvwpmu

A Survey of Cybersecurity of Digital Manufacturing [article]

Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T.S. Bukkapatanam, Nikhil Gupta, Ramesh Karri
2020 arXiv   pre-print
A DM system consists of embedded electronics, sensors, actuators, control software, and inter-connectivity to enable the machines and the components within them to exchange data with other machines, components  ...  therein, the plant operators, the inventory managers, and customers.  ...  Gupta are supported in part by NYU Center for Cybersecurity, and R. Karri is also supported in part by NYU-AD Center for Cybersecurity.  ... 
arXiv:2006.05042v3 fatcat:j3gf62nh45h5bdj6fw6yycm5iy

Security issues in cloud environments: a survey

Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio
2013 International Journal of Information Security  
managed by cloud hosting providers.  ...  It addresses several key topics, namely vulnerabilities, threats and attacks, proposing a taxonomy for their classification.  ...  A VM-to-VMM attack consists in gaining access to the underlying VMM through a legitimately running VM managed by that VMM, an attack named VM escape [100] .  ... 
doi:10.1007/s10207-013-0208-7 fatcat:55o67epb6zfspchxuzvuduzr4a

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
All advertising in ACM Media publications is at the discretion of ACM and is intended to provide financial support for the various activities and services for ACM members.  ...  ACM Media Advertising Policy Communications of the ACM and other ACM Media publications accept advertising in both print and electronic formats.  ...  The authors find that, surprisingly, their filter-based gist is rather good at predicting the number of instances of a given object category that might be present in the scene, as well as their likely  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

Domain-independent planning for services in uncertain and dynamic environments

Eirini Kaldeli, Alexander Lazovik, Marco Aiello
2016 Artificial Intelligence  
Things have not developed as planned since, and at the end, I am still undecided whether he has been a constructive or distracting influence on my PhD.  ...  Following the thread that has lead me to pursuing a PhD, I ultimately find my parents, Rozina and Christophoros, who have always encouraged me to learn more.  ...  The solving process proceeds through a combination of consistency techniques and search (branching) algorithms.  ... 
doi:10.1016/j.artint.2016.03.002 fatcat:ezhqok2ew5a3vjqbcyf5n53uti

Explainable Software for Cyber-Physical Systems (ES4CPS): Report from the GI Dagstuhl Seminar 19023, January 06-11 2019, Schloss Dagstuhl [article]

Joel Greenyer, Malte Lochau, Thomas Vogel
2019 arXiv   pre-print
The seminar was concerned with the challenge that for future Cyber-Physical Systems (CPS), it will become increasingly relevant to explain their behavior (past, current, and future behavior, why a certain  ...  action was taken, how a certain goal can be achieved, etc.) to users, engineers, and other stakeholders.  ...  (GI, German Society for Informatics) and Schloss Dagstuhl for partially funding this seminar.  ... 
arXiv:1904.11851v1 fatcat:r2r5ac6hmnel3f6weiynjwunni

A Unified Approach to Architecture Conformance Checking

Andrea Caracciolo, Mircea Filip Lungu, Oscar Nierstrasz
2015 2015 12th Working IEEE/IFIP Conference on Software Architecture  
This implies investigating and managing all possible edge cases, updating references and maintaining the system in a generally consistent state.  ...  Tool-specific notations are indirectly supported through a well coordinated generative process partially managed by adapters.  ... 
doi:10.1109/wicsa.2015.11 dblp:conf/wicsa/CaraccioloLN15 fatcat:p7645eykmfgc3aopopwwmwplu4

D3.1 – State-of-the-Art and Market Analysis Report

ASSIST-IoT Consortium
2021 Zenodo  
Document with main results of SotA review and stakeholders and market analysis carried out.  ...  The function of the edge gateway will in many cases consist of sending data in batches to the cloud and edge computing for data processing, running AI and ML algorithms to predict future behavior.  ...  flexible cell management.  ... 
doi:10.5281/zenodo.6705158 fatcat:xote6pjzubcvxo4aqxxbraooxi

Conclusion: What Next for Privacy Seals? [chapter]

Rowena Rodrigues
2018 Privacy and Data Protection Seals  
management, click-through, check box, telephone, keypress, traditional signature or other mechanisms.  ...  Seal subscribers may have to designate one or more persons in the enterprise to check compliance with subscribed standards and manage its scheme related obligations.  ...  GAPP criterion 10.2.3 specifies a compliance review (a review and documentation of compliance with privacy policies and procedures, commitments and applicable laws, regulations, service-level agreements  ... 
doi:10.1007/978-94-6265-228-6_9 fatcat:mpex6asr7bcwnmu7bazvkyblje

Virtual Organization Clusters: Self-provisioned clouds on the grid

Michael A. Murphy, Sebastien Goasguen
2010 Future generations computer systems  
Walt Ligon, and Prof. Robert Geist have assisted in the process by dedicating their time and expertise to reviewing and aiding in the improvement of my research and its presentation.  ...  Throughout the process of researching Virtual Organization Clusters and preparing this work, I have been privileged to work with a team of graduate and undergraduate students, who have assisted in the  ...  Bcfg2 accommodates changes over time through integration with Subversion repositories and other change management tools, improving flexibility [40].  ... 
doi:10.1016/j.future.2010.02.011 fatcat:x6nwjn3c5jhnbfcuzeexdkz22a
« Previous Showing results 1 — 15 out of 216 results