14,691 research outputs found

    Complex Event Processing (CEP)

    Get PDF
    Event-driven information systems demand a systematic and automatic processing of events. Complex Event Processing (CEP) encompasses methods, techniques, and tools for processing events while they occur, i.e., in a continuous and timely fashion. CEP derives valuable higher-level knowledge from lower-level events; this knowledge takes the form of so called complex events, that is, situations that can only be recognized as a combination of several events. 1 Application Areas Service Oriented Architecture (SOA), Event-Driven Architecture (EDA), cost-reductions in sensor technology and the monitoring of IT systems due to legal, contractual, or operational concerns have lead to a significantly increased generation of events in computer systems in recent years. This development is accompanied by a demand to manage and process these events in an automatic, systematic, and timely fashion. Important application areas for Complex Event Processing (CEP) are the following

    Special Libraries, April 1917

    Get PDF
    Volume 8, Issue 4https://scholarworks.sjsu.edu/sla_sl_1917/1003/thumbnail.jp

    Parallel Architectures for Planetary Exploration Requirements (PAPER)

    Get PDF
    The Parallel Architectures for Planetary Exploration Requirements (PAPER) project is essentially research oriented towards technology insertion issues for NASA's unmanned planetary probes. It was initiated to complement and augment the long-term efforts for space exploration with particular reference to NASA/LaRC's (NASA Langley Research Center) research needs for planetary exploration missions of the mid and late 1990s. The requirements for space missions as given in the somewhat dated Advanced Information Processing Systems (AIPS) requirements document are contrasted with the new requirements from JPL/Caltech involving sensor data capture and scene analysis. It is shown that more stringent requirements have arisen as a result of technological advancements. Two possible architectures, the AIPS Proof of Concept (POC) configuration and the MAX Fault-tolerant dataflow multiprocessor, were evaluated. The main observation was that the AIPS design is biased towards fault tolerance and may not be an ideal architecture for planetary and deep space probes due to high cost and complexity. The MAX concepts appears to be a promising candidate, except that more detailed information is required. The feasibility for adding neural computation capability to this architecture needs to be studied. Key impact issues for architectural design of computing systems meant for planetary missions were also identified

    New Data on Armadillos (Xenarthra: Dasypodidae) for Central Patagonia, Argentina

    Get PDF
    Armadillos represent the most diverse family of xenarthrans. Although many studies have been done on these mammals, several topics, such as their local distribution, natural history, behavioral ecology and conservation, remain poorly known. Chaetophractus villosus and Zaedyus pichiy are the most common armadillos in extra-Andean Patagonia, a vast area in southern Argentina and Chile that encompasses different ecosystems and has been modified by human activities, mainly by sheep grazing. In this work we present new data on the distribution, natural history, conservation, and ecology of C. villosus and Z. pichiy from central Patagonia (Chubut and Río Negro provinces, Argentina). We registered 60 localities for C. villosus and 35 for Z. pichiy that confirm their presence in wide sectors of central Patagonia. Furthermore, we confirmed that these two armadillo species suffer high rates of mortality due to their use as a protein source, hunting by dogs, road traffic, and poisoning, among others. We conclude that their populations are at risk of overexploitation and local extinction. The basic knowledge provided here will be a first step towards the conservation of these characteristic Patagonian mammals.Fil: Abba, Agustin Manuel. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - La Plata. Centro de Estudios Parasitológicos y de Vectores. Universidad Nacional de La Plata. Facultad de Ciencias Naturales y Museo. Centro de Estudios Parasitológicos y de Vectores; ArgentinaFil: Nabte, Marcela Janina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Centro Nacional Patagónico; ArgentinaFil: Udrizar Sauthier, Daniel Edgardo. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Centro Nacional Patagónico; Argentin

    Internet Reference Sources for Computing and Computer Science: A Selected Guide

    Get PDF
    Computing and computer science bibliographic databases, bibliographies, dictionaries, encyclopedias, directories, and guides, along with finding aids for technical reports, online books, and book reviews are listed and described. Subscription-based sources as well as free alternatives are covered. Resources are listed for all levels of computing ability including faculty and professionals, graduate students, undergraduates, and general users

    Visualising the Logs of Shenandoah Garbage Collection Algorithm

    Get PDF
    Käesoleva lõputöö eesmärgiks on Red Hati uue mälukoristusalgoritmi Shenandoah logide parseri implementeerimine avatud lähtekoodiga projekti GCViewer raames. Lisaeesmärgiks on anda ülevaade Java mälukoristuse abstraktsioonist.Lõputöö koosneb kahest osast - esimeses osas uuritakse süvendatult prügikoristuse abstraktsiooni Javas ning selle erinevaid implementatsioone, logisüsteemi plaanitavaid muudatusi Java 9 ning teises osas kirjeldatakse parseri implementeerimist ja selle valideerimist.Töö käigus loodi eelmainitud Shenandoah parser, valideeriti see, ning tehti pull request selle GCVieweri projekti lisamiseks.The aim of the current thesis is to implement a Garbage Collection log parser for Red Hat’s Garbage Collection algorithm Shenandoah by extending an open-source project GCViewer. Additional aim is to take a further look into the Garbage Collection in Java. The thesis is split into two main parts. The first part describes the background of Garbage Collection in Java and upcoming changes to the logging system in Java 9. The second part covers the implementation and the validation of the parser.The intended Shenandoah parser was implemented, validated, and a pull request to add it to GCViewer project was created

    Willingness to Pay for Drinking Water and Sanitation Availability in Indonesia

    Get PDF
    When sustainability of access and quality, is the primary concern, water and saniatioan should be considered as economic goods. Therefore, we need more accurate information on the amount of people’s willingness to pay. This study attemp to (i) identify the effects of drinking water supply and home sanitation on the rent price of a house, (ii) calculating the value of marginal implicit price (marginal willingness to pay) for drinking water and sanitation, and (iii) examine factors that affects the availability of drinking water supply and sanitation. Using the hedonic price model, we conclude that: (i) the availability of water piped facilities or pump water affect rent price of houses in urban areas, while the availability of toilet facilitated with septic tank influences rent price of houses both in urban and rural areas; (ii) garbage handlings through collection by authorized agency influences rent price of houses both in urban and rural areas, (iii) the WTP for piped facilities or pumped water in urban area is Rp. 6,850 per month, while the WTP for toilet facilitated with septic tank is Rp. 15,800, and the WTP for garbage collection is Rp. 11,950 per month. The logistic model approach revealed that households’ economic and social conditions such as age, number of family members, breadwinner’s education, and expenditure per capita influence the availability of drinking water facilities in the form of piped water or pumped water, sanitation facilities in the form of toilet with septic tank, and garbage handling facilities. Human capital or the level of education is very crucial in the possibilities of ownership of drinking water and sanitation facilities.access to drinking water and sanitation, Willingness to pay, hedonic price model, logistic model

    Automatic Metadata Generation using Associative Networks

    Full text link
    In spite of its tremendous value, metadata is generally sparse and incomplete, thereby hampering the effectiveness of digital information services. Many of the existing mechanisms for the automated creation of metadata rely primarily on content analysis which can be costly and inefficient. The automatic metadata generation system proposed in this article leverages resource relationships generated from existing metadata as a medium for propagation from metadata-rich to metadata-poor resources. Because of its independence from content analysis, it can be applied to a wide variety of resource media types and is shown to be computationally inexpensive. The proposed method operates through two distinct phases. Occurrence and co-occurrence algorithms first generate an associative network of repository resources leveraging existing repository metadata. Second, using the associative network as a substrate, metadata associated with metadata-rich resources is propagated to metadata-poor resources by means of a discrete-form spreading activation algorithm. This article discusses the general framework for building associative networks, an algorithm for disseminating metadata through such networks, and the results of an experiment and validation of the proposed method using a standard bibliographic dataset

    THE IMPACT OF PROGRAMMING LANGUAGES ON THE SOFTWARE’S SECURITY

    Get PDF
    Security is usually defined as the ability of a system to protect itself against accidental or deliberate intrusion1. Ensuring integrity, confidentiality, availability, and accountability requirements even in the presence of a determined, malicious opponent is essential for computer security. Sensitive data has to be manipulated and consulted by authorized users only (integrity, confidentiality). Furthermore, the system should resist “denial of service” attacks that attempt to render it unusable (availability). Also the system has to ensure the inability to deny the ownership of prior actions (accountability).security
    corecore