8,692 research outputs found

    A Review of integrity constraint maintenance and view updating techniques

    Get PDF
    Two interrelated problems may arise when updating a database. On one hand, when an update is applied to the database, integrity constraints may become violated. In such case, the integrity constraint maintenance approach tries to obtain additional updates to keep integrity constraints satisfied. On the other hand, when updates of derived or view facts are requested, a view updating mechanism must be applied to translate the update request into correct updates of the underlying base facts. This survey reviews the research performed on integrity constraint maintenance and view updating. It is proposed a general framework to classify and to compare methods that tackle integrity constraint maintenance and/or view updating. Then, we analyze some of these methods in more detail to identify their actual contribution and the main limitations they may present.Postprint (published version

    Distributed Interactive Simulation Baseline Study: Phase 1-FY96

    Get PDF

    Knowledge Representation Concepts for Automated SLA Management

    Full text link
    Outsourcing of complex IT infrastructure to IT service providers has increased substantially during the past years. IT service providers must be able to fulfil their service-quality commitments based upon predefined Service Level Agreements (SLAs) with the service customer. They need to manage, execute and maintain thousands of SLAs for different customers and different types of services, which needs new levels of flexibility and automation not available with the current technology. The complexity of contractual logic in SLAs requires new forms of knowledge representation to automatically draw inferences and execute contractual agreements. A logic-based approach provides several advantages including automated rule chaining allowing for compact knowledge representation as well as flexibility to adapt to rapidly changing business requirements. We suggest adequate logical formalisms for representation and enforcement of SLA rules and describe a proof-of-concept implementation. The article describes selected formalisms of the ContractLog KR and their adequacy for automated SLA management and presents results of experiments to demonstrate flexibility and scalability of the approach.Comment: Paschke, A. and Bichler, M.: Knowledge Representation Concepts for Automated SLA Management, Int. Journal of Decision Support Systems (DSS), submitted 19th March 200

    The future of social is personal: the potential of the personal data store

    No full text
    This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response to the pressing problem of the autonomy of the data subject, and the asymmetry of power between the subject and large scale service providers/data consumers. Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately what individuals require in order to preserve their autonomy in a data-driven world of large aggregators. Six challenges towards realising the PDS vision are set out: the requirement to store data for long periods; the difficulties of managing data for individuals; the need to reconsider the regulatory basis for third-party access to data; the need to comply with international data handling standards; the need to integrate privacy-enhancing technologies; and the need to future-proof data gathering against the evolution of social norms. The open experimental PDS platform INDX is introduced and described, as a means of beginning to address at least some of these six challenges

    Prioritizing Public- Private Partnership Models for Public Hospitals of Iran Based on Performance Indicators

    Get PDF
    Background: The present study was conducted to scrutinize Public- Private Partnership (PPP) models in public hospitals of different countries based on performance indicators in order to se-lect appropriated models for Iran hospitals.Methods: In this mixed (quantitative-qualitative) study, systematic review and expert panel hasbeen done to identify varied models of PPP as well as performance indicators. In the second stepwe prioritized performance indicator and PPP models based on selected performance indicatorsby Analytical Hierarchy process (AHP) technique. The data were analyzed by Excel 2007 andExpert Choice11 software’s.Results: In quality – effectiveness area, indicators like the rate of hospital infections(100%), hospital accidents prevalence rate (73%), pure rate of hospital mortality (63%), patientsatisfaction percentage (53%), in accessibility equity area indicators such as average inpatientwaiting time (100%) and average outpatient waiting time (74%), and in financial – efficiency area,indicators including average length of stay (100%), bed occupation ratio (99%), specific incometo total cost ratio (97%) have been chosen to be the most key performance indicators. In the prioritizationof the PPP models clinical outsourcing, management, privatization, BOO (build, own,operate) and non-clinical outsourcing models, achieved high priority for various performance indicatorareas.Conclusion: This study had been provided the most common PPP options in the field of public hospitals and had gathered suitable evidences from experts for choosing appropriate PPP option for public hospitals. Effect of private sector presence in public hospital performance, based on which PPP options undertaken, will be different

    Evaluation of Current Automated Civil Engineer System Non-Appropriated Funds Project Programming Procedures

    Get PDF
    It is essential that businesses continually improve their automated information systems (AIS) to support the changing needs of the organization. The Air Force civil engineering organization is no exception since they have drastically improved their Automated Civil Engineer System (ACES) through end user support since its implementation in 2000. However, there are many problems associated with the non-appropriated funds (NAF) project programming business rules within ACES. These problem areas were not addressed until recently when an integrated process team met and proposed numerous changes to how NAF programming is accomplished in ACES. This research effort, through a web-based survey, focuses on the perceived benefits of these proposed changes from a base-level programming perspective. It also investigated current programming procedures that might affect how well the proposed changes are implemented along with NAF and ACES training issues. Descriptive statistics were used to answer the research questions using survey responses from a sample size of 35 base-level programmers. The results indicated that programmers agree or strongly agree that the majority of proposed IPT changes will be beneficial in improving NAF programming in ACES-PM. However, several potential problems areas might surface, due to current programming procedures at base-level, when these changes are implemented into ACES. Automatic email notifications on project status, electronic attachments to the project file, and use of non ACES-PM templates are all areas of concern brought up in this research effort

    Accident causation and pre-accidental driving situations. Part 2. In-depth accident causation analysis

    Get PDF
    WP2 of the European Project TRACE is concerned with “Types of Situations” to analyse the causation of road traffic accidents from the pre-accidental driving situation point of view. Four complementary situations were defined: stabilized situations, intersection, specific manoeuvre and degradation scenario. To reach this objective, the analysis is based on a common methodology composed on 3 steps: the “descriptive analysis” which from general statistics will allow to identify among the studied situations those them relevant and to give their characteristics, the “in-depth analysis” allowing to obtain accident causes from the generic description of the problems identified in the previous step and the risk analysis identifying the risk of being involved in an accident taking into account the results obtained from the ‘in–depth’ level. This report is dedicated to the identification of the accident causes analysed for the pre-accidental driving situation point of view, i.e. the circumstances in which the driver is involved just prior the accident. This analysis has been conducted from the scenarios identified for each type of situation during the descriptive analysis realized in a first part (Report D2.1: Accident causation and pre-accidental driving situations. Part 1. Overview and general statistics). These results are based on the study of disaggregated data (in-depth accidents collection databases) available via WP8 in TRACE. With the identification of the main causes and contributing factor, the aspect related to the human functional failure has been taken into account. This innovative concept studied in TRACE WP5, has been used here in order to have a more complete overview of the problems in working on each road users involved in the accident and not only on the whole accident

    Let a Thousand Policy-Flowers Bloom

    Get PDF
    corecore