412 Hits in 4.9 sec

Standardization in cyber-physical systems: The ARUM case

Paulo Leitao, Jose Barbosa, Maria-Eleftheria Ch. Papadopoulou, Iakovos S. Venieris
2015 2015 IEEE International Conference on Industrial Technology (ICIT)  
A special attention is devoted to the efforts to develop a standardcompliant service-oriented multi-agent system solution within the ARUM project.  ...  the new ones.  ...  ACKNOWLEDGMENT The research leading to these results has received funding from the European Union Seventh Framework Programme FP7 ARUM project, under grant agreement n° 314056.  ... 
doi:10.1109/icit.2015.7125539 dblp:conf/icit2/LeitaoBPV15 fatcat:3kmp2syksrclnprqegzukxekxy

Identity And Privacy Services

Harry Katzan, Jr.
2010 Journal of Service Science  
<span style="mso-spacerun: yes;">&nbsp; </span>Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  ...  the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  ...  We would like to use analytics to combine the information from K 1 and K 2 so as to obtain a composite picture of the situation.  ... 
doi:10.19030/jss.v3i2.365 fatcat:7olrdwrf2bfvbga2n3x4l2neem

Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap [article]

Somali Chaterji, Parinaz Naghizadeh, Muhammad Ashraful Alam, Saurabh Bagchi, Mung Chiang, David Corman, Brian Henz, Suman Jana, Na Li, Shaoshuai Mou, Meeko Oishi, Chunyi Peng (+5 others)
2019 arXiv   pre-print
An optimally designed system is resilient to both unique attacks and recurrent attacks, the latter with a lower overhead.  ...  ), and the overall complexity of real-world systems.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
arXiv:2001.00090v1 fatcat:zaybw5wyfbayhcu34q2douctme

Distributed Technology-Sustained Pervasive Applications [article]

Kim J.L. Nevelsteen
2016 arXiv   pre-print
This dissertation uses multiple iterations of the method framework for Design Science for the design and development of three software system architectures.  ...  Pervasive games are known to make use of 'non-standard input devices' and with the rise of the Internet of Things (IoT), pervasive applications can be expected to move beyond games.  ...  Acknowledgements List of Publications The following papers, referred to in the text by their Roman numerals, are included in this thesis.  ... 
arXiv:1604.02892v1 fatcat:4s4bd6jy7vch3itxanzieif724

Surge capacity mechanical ventilation

Richard D Branson, Jay A Johannigman, Elizabeth L Daugherty, Lewis Rubinson
2008 Respiratory care  
Concern over the difficulties of treating large numbers of patients with respiratory failure is exceeded only by our lack of experience on which to base decisions.  ...  Matching the degree of respiratory impairment anticipated from the most likely mass casualty scenarios allows conclusions to be drawn regarding the performance characteristics of ventilators required for  ...  The authors report no other conflicts of interest related to the content of this paper.  ... 
pmid:18173862 fatcat:6ro727akonel7npjiuzdnm6oqi

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
warriors with post-traumatic brain injury, stress, or loss of memory (i.e. the Restoring Active Memory (RAM) funding opportunity), as well as new neurotechnology-based capabilities (e.g. the Systems-Based  ...  The budget request details the proposed investments $80 million to develop new sets of tools for imaging and analytics of neural and synaptic brain activities that will improve diagnosis and care of wounded  ...  -Initiate investigation of communications protocols for the multi-optical sensor to interact with other systems and platforms.  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

Neurons, viscose fluids, freshwater polyp hydra-and self-organizing information systems

F. Heylighen, C. Gershenson, S. Staab, G.W. Flake, D.M. Pennock, D.C. Fain, D. De Roure, K. Aberer, Wei-Min Shen, O. Dousse, P. Thiran
2003 IEEE Intelligent Systems  
Acknowledgments This work was supported (in part) by the National Competence Center in Research on Mobile Information and Communication Systems, which the Swiss National Science Foundation supports under  ...  This work is partially supported by research grants from the Airforce Office of Scientific Research.  ...  Users will benefit most if work on creating the Semantic Web coevolves with work on tools for data-driven analysis of the self-organized Web.  ... 
doi:10.1109/mis.2003.1217631 fatcat:qm2r6vmijrcc7f742j4oivfgui

Riding the Digital Product Life Cycle Waves towards a Circular Economy

Ramesh Subramoniam, Erik Sundin, Suresh Subramoniam, Donald Huisingh
2021 Sustainability  
The authors made recommendations about the importance of improved product design, reduced processing costs and increased use of remanufactured products based upon data on returns to manufacturers and service  ...  This paper contributes to research by providing a framework of a digitized product life cycle integrated with the business process phases including remanufacturing and supported with real-world case studies  ...  They documented the increasing influence of technology on the supply chain such as web applications for e-commerce, the use of videos for online selling, and increased use of mobile applications for managing  ... 
doi:10.3390/su13168960 fatcat:hrah7adwezdlnaoprit4jaoacq

Big Provenance Stream Processing for Data Intensive Computations

Isuru Suriarachchi, Sachith Withana, Beth Plale
2018 2018 IEEE 14th International Conference on e-Science (e-Science)  
Axis2 Web Service Channel: When Komadu is deployed as a Web Service on top of Axis2, a service client can be used to communicate with the server using the SOAP messaging protocol.  ...  When the number of stream partitions increases, a multi-level solution may lead to better throughput as the parallelism of the system can be further increased.  ...  of the WSO2 Application Server (May 2010 to July 2012), a Java runtime for hosting Web Services and Web Applications. • Implemented lazy loading for tenants and services in WSO2 Stratos (Platform as a  ... 
doi:10.1109/escience.2018.00039 dblp:conf/eScience/SuriarachchiWP18 fatcat:xrkgn66wkzhyxm2z6duattyqdy

Processpatching, Defining New Methods in aRtD

Anne Nigten
2009 Leonardo: Journal of the International Society for the Arts, Sciences and Technology  
system called the Remembrance Agent.  ...  The user can 'fly' through this cloud and open the media objects by clicking on them.  ...  Part of the exchange on Data Perception would seem to be some critical analysis on just what we are being presented with, along with an attempt to fly with, and harness, the unexpected. 361 How much  ... 
doi:10.1162/leon.2009.42.5.478 fatcat:kjfy6uktcfaabamfkrovvyczbe

Axiomatic Cloud Computing Architectural Design

John Thomas, Pam Mantri, A. Liu, J.T. Foley, E.C.N. Puik
2019 MATEC Web of Conferences  
The Axiomatic Designer is uniquely positioned in designing for the de-novo situations that the fat-tailed distributions expose.  ...  (KA|h|H), Stigmergy, Complex Adaptive Systems (CAS), Cynefin, Boyd's OODA-Loop Theory of asymmetric fast-transients, Axiomatic-Maturity-Diagram (AMD), as well as Weick's Loose-Coupling approach to help  ...  As was the case with Boyd (who had hands-on experience flying sorties in the Korean war), the cloud architect needs to have hands-on experience in all facets of the cloud.  ... 
doi:10.1051/matecconf/201930100024 fatcat:wxy73lm4zfgnpcvgt5ucg3bfxi

Pattern-based segmentation of digital documents

Angelo Di Iorio
2008 ACM SIGWEB Newsletter  
The point is that such a normalized document expresses the same fundamental information of the original one, in a simple, clear and unambiguous way.  ...  It is compared with other languages and proposals, in order to clarify its role and objectives. Finally, I present some systems built upon these ideas.  ...  System of Manufacture".  ... 
doi:10.1145/1350502.1350505 fatcat:jjczizjwjfbi7ovtznqrmanlsq

D2.1 Use Cases, Technical And Business Requirements

Carlos Parada, Francisco Fontes, Isabel Borges, Omer Gurewitz, Philip Eardley, Okung Ntofon, Andy Reid, Giuseppe Bianchi, Nicola Blefari Melazzi, Pierpaolo Loreti, Claudio Pisa, Stefano Salsano (+24 others)
2018 Zenodo  
This document presents use cases and requirements for a "superfluid" network, which is one that will have the ability to instantiate services on-the-fly, run them anywhere in the network (core, aggregation  ...  The report includes a comprehensive set of 23 use cases, covering themes such as wireless access, mobile edge computing and on-the-fly monitoring.  ...  SDN control agent For monitoring and control management purpose, the wireless Fronthaul system will implement agents to be able to communicate with the SDN controller node and meets on-demand adaptation  ... 
doi:10.5281/zenodo.1219356 fatcat:4cayudykg5g77bahiwksv5q26y

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
The empirical results revealed that the proposed system is effective when tested with test bed which is based on distributed technology such as web services.  ...  The architecture of the proposed system is compromising of human activities and also automated activities and it is essentially a service oriented system.  ...  help given to us in the completion of our project titled, 'Video Watermarking scheme based on DWT and PCA for copyright protection'.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

An approach for pipelining nested collections in scientific workflows

Timothy M. McPhillips, Shawn Bowers
2005 SIGMOD record  
Acknowledgments The author sincerely thanks Georg Gottlob and Nicola Leone, who worked with him on these issues since 1999, when they jointly defined the notion of hypertree decompositions.  ...  We are grateful to Scott Grafton of the Dartmouth Brain Imaging Center, and to Jens Voeckler, Doug Scheftner, Ewa Deelman, Carl Kesselman, and the entire Virtual Data System team for discussion, guidance  ...  Individual wrappers can be defined for each source, e.g., for an existing on-line legacy system, an existing data production system, etc.  ... 
doi:10.1145/1084805.1084809 fatcat:sgtpcat7vzc3veb4dx2jgskpte
« Previous Showing results 1 — 15 out of 412 results