45,297 research outputs found

    Logic Programming Applications: What Are the Abstractions and Implementations?

    Full text link
    This article presents an overview of applications of logic programming, classifying them based on the abstractions and implementations of logic languages that support the applications. The three key abstractions are join, recursion, and constraint. Their essential implementations are for-loops, fixed points, and backtracking, respectively. The corresponding kinds of applications are database queries, inductive analysis, and combinatorial search, respectively. We also discuss language extensions and programming paradigms, summarize example application problems by application areas, and touch on example systems that support variants of the abstractions with different implementations

    An Approach to Transform Public Administration into SOA-based Organizations

    Get PDF
    Nowadays, Service-Oriented Architectures (SOA) is widely spread in private organizations. However, when transferring this knowledge to Public Administration, it is realized that it has not been transformed in terms of its legal nature into organizations capable to operate under the SOA paradigm. This fact prevents public administration bodies from offering the efficient services they have been provided by different boards of governments. A high-level framework to perform this transformation is proposed. Taking it as starting point, an instance of a SOA Target Meta-Model can be obtained by means of an iterative and incremental process based on the analysis of imperatives and focused on the particular business context of each local public administration. This paper briefly presents a practical experience consisting in applying this process to a Spanish regional public administration.Junta de Andalucía TIC-578

    Guidance on area inspections, from September 2010

    Get PDF
    "This guidance explains how inspectors will apply Estyn’s Common Inspection Framework to area inspections. The guidance is in two parts. The first part on carrying out inspections applies to all area inspections. The second part on making judgements is for area inspections that are concerned with Learning Pathways 14-19 in a single local authority area." - Introduction

    Prioritization of Strategies to Overcome Barriers for Cleaner and Energy Efficient Alternatives in Urban Transportation - Multi-criteria Approach

    Get PDF
    Adoption of cleaner and energy efficient technologies (CEETs) in urban transport experiences certain barriers and deriving a set of policies to remove/reduce barrier in the case of Delhi and Mumbai transport systems was attempted in this study. A set of policy alternatives and measures (PAMs) were identified for each barrier and a pool of barriers PAMs for all barriers were identified which were finally analysed for their potential based on 4 important criteria namely administrative costs, financial burden, human resource benefits, administrative backup and political acceptability. Based on aggregated multi-criteria assessment, the policy of distinct colouring scheme for alternate fuel vehicles (AFVs) stood first followed by awareness campaigns to the drivers, training programs to the workers, single window/priority check points, financial incentives and task force to carry out check. To realize the completeness, potential of PAMs in handling barriers was analysed considering not only a set of criteria but also their potential in handling more than one barrier. In overall ranking, policy to develop partnerships among major stakeholders and awareness campaigns to the drivers showed highest potential in removing barriers for the adoption of CEETs. Based on the ranking under both approaches a set of seven policy measures and alternatives were selected to remove barriers to CEETS and they are partnership between the Government, public sector undertakings and private actors in proving better infrastructure; Financial incentives like free or priority parking, separate lanes for alternative fuel vehicles and free inspection and maintenance; Task force to carry our checks; Heavy fines on defaulters; Distinct colour coding for AFVs; Demonstration of AFVs and their advantages; and Awareness campaigns to drivers. This set of PAMs would be able to control all seven pre-identified barriers to the adoption of CEETs in Delhi and Mumbai urban transportation systems.Barriers, CEETs, multi-criteria, policy analysis, urban transport

    CERN openlab Whitepaper on Future IT Challenges in Scientific Research

    Get PDF
    This whitepaper describes the major IT challenges in scientific research at CERN and several other European and international research laboratories and projects. Each challenge is exemplified through a set of concrete use cases drawn from the requirements of large-scale scientific programs. The paper is based on contributions from many researchers and IT experts of the participating laboratories and also input from the existing CERN openlab industrial sponsors. The views expressed in this document are those of the individual contributors and do not necessarily reflect the view of their organisations and/or affiliates

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    Dynamic Trust Federation in Grids

    No full text
    Grids are becoming economically viable and productive tools. Grids provide a way of utilizing a vast array of linked resources such as computing systems, databases and services online within Virtual Organizations (VO). However, today’s Grid architectures are not capable of supporting dynamic, agile federation across multiple administrative domains and the main barrier, which hinders dynamic federation over short time scales is security. Federating security and trust is one of the most significant architectural issues in Grids. Existing relevant standards and specifications can be used to federate security services, but do not directly address the dynamic extension of business trust relationships into the digital domain. In this paper we describe an experiment in which we highlight those challenging architectural issues and we will further describe how the approach that combines dynamic trust federation and dynamic authorization mechanism can address dynamic security trust federation in Grids. The experiment made with the prototype described in this paper is used in the NextGRID project for the definition of requirements for next generation Grid architectures adapted to business application need
    corecore