Filters








13,688 Hits in 5.4 sec

Principles of Elastic Processes

Schahram Dustdar, Yike Guo, Benjamin Satzger, Hong-Linh Truong
2011 IEEE Internet Computing  
The main issue here is to associate a service with a measurable quality and the cost function, which computes the resource requirement for a given quality, such as execution speed.  ...  In sensor networks, energy awareness is an essential property, and indeed a large body of research on energy-efficient sensor networks exists, mostly with a focus on routing, but also on energy-aware resource  ... 
doi:10.1109/mic.2011.121 fatcat:mxtormgakbhgtnhyhb6ritpwe4

An Ontology-Based Data Exploration Tool for Key Performance Indicators [chapter]

Claudia Diamantini, Domenico Potena, Emanuele Storti, Haotian Zhang
2014 Lecture Notes in Computer Science  
Based on this model and on reasoning capabilities, the tool provides functionalities for dynamic aggregation of data and computation of KPI values through the formula.  ...  Data produced by partners of a Virtual Enterprise are semantically annotated through a domain ontology in which KPIs are described together with their mathematical formulas.  ...  The authors wish to thank the Commission for its support and all the project partners for their contribution in the development of various ideas and concepts presented in this paper.  ... 
doi:10.1007/978-3-662-45563-0_45 fatcat:3t6qlhicwnegnk2ql2mcsw6rvm

Predictive Policing and the Platformization of Police Work

Simon Egbert
2019 Surveillance & Society  
This paper argues that because of its enablement of crime data analysis in general, predictive policing software will be an important incubator for datafied police work, especially when executed via data  ...  mining platforms, because it has made police authorities aware that the massive amounts of crime data they possess are quite valuable and can now be easily analyzed.  ...  Surveillance &Society 17(1/2) By speaking of an inbuilt function creep, I rephrase an expression from Nikolaus Pöchhacker who introduced the notion of "scripted function creep" with reference to big  ... 
doi:10.24908/ss.v17i1/2.12920 fatcat:lap3pf6xsjfehaywr6prrqz6ka

SHIFT-SPLIT

Mehrdad Jahangiri, Dimitris Sacharidis, Cyrus Shahabi
2005 Proceedings of the 2005 ACM SIGMOD international conference on Management of data - SIGMOD '05  
However, despite broad acceptance, some of its properties have not been fully explored and thus not exploited, particularly for two common forms of multidimensional decomposition.  ...  ., transformation of massive datasets, appending data, approximation of data streams and partial data reconstruction, leading to significant I/O cost reduction in all cases.  ...  Note, that although the asymptotic cost is high, the required SHIFT-SPLIT operations are very fast, which leads to fast execution times for expanding the domain of one dimension.  ... 
doi:10.1145/1066157.1066189 dblp:conf/sigmod/JahangiriSS05 fatcat:hpvl7qepqjhflkqxwumervbpje

QoE4CLOUD: A QoE-driven multidimensional framework for cloud environments

Emmanouil Kafetzakis, Harilaos Koumaras, Michail Alexandros Kourtis, Vaios Koumaras
2012 2012 International Conference on Telecommunications and Multimedia (TEMU)  
The ultimate target of any intelligent cloud management scheme should be the provision of a service at an adequate quality level, creating the need to introduce the notion of Quality of Experience (QoE  ...  Similarly, both Service/Platform Providers and End-Users wish to avoid the extra cost of this over-provisioning tactic and pay only per use, without having to statically reserve extra resources in advance  ...  Therefore, the existing service architectures should be expanded to include the virtual resources, described in terms of properties and functionalities [20] .  ... 
doi:10.1109/temu.2012.6294736 dblp:conf/temu/KafetzakisKKK12 fatcat:jnu35vhoofe5pgzopddx6qzvqq

A formal type-centric framework for verification and resource allocation in pervasive Sense-and-Respond systems

Michael Ocean, Assaf Kfoury, Azer Bestavros
2009 2009 ICSE Workshop on Model-Based Methodologies for Pervasive and Embedded Software  
notion of type safety.  ...  The type-system automatically infers data types that are annotated with a vector of type specific attributes and uses these annotations to establish and verify a range of resource constraints (bounds for  ...  Unlike other sized type systems our work tracks both an upper and lower size bound for data, defines a logical subtype relation for images capable of bounding computation, maintaining functional correctness  ... 
doi:10.1109/mompes.2009.5069135 dblp:conf/mompes/OceanKB09 fatcat:t74iylyo35epziietsryxxl6gi

Vertical Indexing for Moving Objects in Multifloor Environments

Sultan Alamri, David Taniar, Kinh Nguyen
2018 Mobile Information Systems  
The GMI-tree is based on two notions of distance, or equivalently, two notions of adjacency: one represents horizontal adjacency and the other represents vertical adjacency.  ...  Secondly, the relevant notion of locations of an object is cell based rather than an exact Euclidean coordinate.  ...  Conflicts of Interest Sultan Alamri now works at the College of Computing and Informatics, SEU, Saudi Arabia. e authors declare that there are no conflicts of interest regarding the publication of this  ... 
doi:10.1155/2018/4175298 fatcat:ypmg33uxwngktbmeg26ptiheva

Conceptualising a multidimensional model of information communication and technology project complexity

Nazeer Joseph
2017 South African Journal of Information Management  
provided with a greater understanding of ICT project influences.  ...  The dimensions were mapped in a multidimensional model.Conclusion: The multidimensional model of ICT project complexity can be used by ICT project managers to more effectively manage projects as they are  ...  This element pays attention to project drive (time, cost and quality), resource and skills availability, experience with involved parties, Health, safety, security and environment (HSSE) awareness,  ... 
doi:10.4102/sajim.v19i1.825 fatcat:ohr3xq3alrfhxmrhvf2l5yxkyu

A Lightweight Multidimensional Index for Complex Queries over DHTs

Yuzhe Tang, Jianliang Xu, Shuigeng Zhou, Wang-Chien Lee, Dingxiong Deng, Yue Wang
2011 IEEE Transactions on Parallel and Distributed Systems  
We also conduct an extensive performance evaluation of m-LIGHT in comparison with several state-of-theart indexing schemes.  ...  In this paper, we study the problem of indexing multidimensional data in P2P networks based on distributed hash tables (DHTs).  ...  ACKNOWLEDGMENTS The work of Yuezhe Tang  ... 
doi:10.1109/tpds.2011.91 fatcat:hbbbkvf525hldbe3g52rlcpnoy

Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach [chapter]

Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Mehrotra
2007 Proceedings of the 2007 SIAM International Conference on Data Mining  
The resulting optimization problems have proven to be computationally intensive for data sets with large attribute-domains.  ...  Higher values of k denote higher level of privacy (smaller risk of disclosure).  ...  (i.e., expand further below). 2) Cost (cost function): Cost of the solution at a node n was used to prioritize the search. 3) LB/Cost (ratio of the lower bound and the cost): Similarly, the rationale  ... 
doi:10.1137/1.9781611972771.51 dblp:conf/sdm/HoreJM07 fatcat:jc3sfnvn4ncu7ct4zfhvhwroye

Synopses for query optimization

Raghav Kaushik, Jeffrey F. Naughton, Raghu Ramakrishnan, Venkatesan T. Chakravarthy
2005 ACM Transactions on Database Systems  
multidimensional histograms as the number of joins in the query grows.  ...  Database systems use precomputed synopses of data to estimate the cost of alternative plans during query optimization.  ...  We are not aware of any published work based on communication complexity that deals with such a notion of approximation.  ... 
doi:10.1145/1114244.1114251 fatcat:ra2ltwiecrctxiaew5fednogte

Enterprise resource planning: introduction

Kuldeep Kumar, Jos van Hillegersberg
2000 Communications of the ACM  
Jos van Hillegersberg (jvh@acm.org) is a member of the faculty in the Department of Information and Decision Sciences at Erasmus University and a component manager at AEGON bank in The Netherlands.  ...  Up until 1998, when the ERP phenomenon first appeared on the radar of the trade press, most IS academics were not aware of this revolutionary change.  ...  The current generation of ERP packages is based upon a traditional hierarchical, functional view of organizations.  ... 
doi:10.1145/332051.332063 fatcat:xmzvdl3iavb7tongki3abdytkm

Load Balancing in Cloud Computing: A Comprehensive Survey on Recent Techniques

2021 International Journal of Advanced Trends in Computer Science and Engineering  
Therefore, cloud computing has been one of the most promising technological advances in recent days. It aims to provide millions of consumers around the globe with smooth computing services.  ...  The problem of load balancing in the cloud has been linked to a large amount of research, recognizing its role and impact.  ...  processor's downtime properly reduces the execution cost.  ... 
doi:10.30534/ijatcse/2021/521022021 fatcat:yurjv5rhxzbzrazyafyhxtqwgu

Optimizing Analytical Queries over Semantic Web Sources [article]

Dilshod Ibragimov
2017 PhD series, Technical Faculty of IT and Design, ˜Aalborg=ålborgœ University  
For each of these alternative plans, we estimate execution costs (as described in the remainder of this section) and choose the plan with the minimum costs to execute the query.  ...  Also, the approach needs to be expanded to handle more complex queries e.g., with optional patterns or complex aggregation functions, those involving property paths and complex subqueries, etc.  ... 
doi:10.5278/vbn.phd.tech.00022 fatcat:5d2lmnicazgmze2qhe5cikowwm

Compressing Network Access Control Lists

A. X. Liu, E. Torng, C. R. Meiners
2011 IEEE Transactions on Parallel and Distributed Systems  
In terms of efficiency, ACL runs in seconds, even for large ACLs with thousands of rules.  ...  Second, we present a systematic approach for compressing multidimensional access control lists. Last, we conducted extensive experiments to evaluate ACL Compressor.  ...  The ACL Scheduling Problem In the ACL scheduling problem, the input consists of a universe of tasks to be executed where each task has a color and a cost. More formally: .  ... 
doi:10.1109/tpds.2011.114 fatcat:rgyevc2lprcbzkmkzdduxenrgq
« Previous Showing results 1 — 15 out of 13,688 results