3,923 research outputs found

    Peer-to-Peer Intrusion Detection Systeme fĂŒr den Schutz sensibler IT-Infrastrukturen

    Get PDF
    Vortrag der GI-Jahrestagung: Sicherheit in komplexen, vernetzten Umgebungen, Workshop im Rahmen der Jahrestagung 2005 der Gesellschaft fĂŒr Informatik Informatik LIVE!, 19. - 22. September 2005 in Bonn, Deutschlan

    Innovative Informatikanwendungen : Informatik 2003 ; 29. September - 2. Oktober 2003 in Frankfurt am Main

    Get PDF
    Tagungsprogramm INFORMATIK 2003 Innovative Informatikanwendungen. 33. Jahrestagung der Gesellschaft fĂŒr Informatik e.V. (GI) 29. September bis 2. Oktober 2003 Frankfurt am Mai

    The “Mobility-M”-framework for Application of Mobile Technology in Business Processes

    Get PDF
    In order to provide a structural framework for the application of mobile technology in business processes that can serve as a basis for understanding the organizational impacts of mobile technologies, we present a model, the „Mobility-M“. It puts the technology and the business processes in context with each other by using the theory of informational added values. The aim is to facilitate and visualize the use of mobile technologies according to their potential benefits and effects. This model and its graphical representation significantly enhance the orientation within the introduction of mobile business processes.

    SciRecSys: A Recommendation System for Scientific Publication by Discovering Keyword Relationships

    Full text link
    In this work, we propose a new approach for discovering various relationships among keywords over the scientific publications based on a Markov Chain model. It is an important problem since keywords are the basic elements for representing abstract objects such as documents, user profiles, topics and many things else. Our model is very effective since it combines four important factors in scientific publications: content, publicity, impact and randomness. Particularly, a recommendation system (called SciRecSys) has been presented to support users to efficiently find out relevant articles

    Processes, Roles and Their Interactions

    Full text link
    Taking an interaction network oriented perspective in informatics raises the challenge to describe deterministic finite systems which take part in networks of nondeterministic interactions. The traditional approach to describe processes as stepwise executable activities which are not based on the ordinarily nondeterministic interaction shows strong centralization tendencies. As suggested in this article, viewing processes and their interactions as complementary can circumvent these centralization tendencies. The description of both, processes and their interactions is based on the same building blocks, namely finite input output automata (or transducers). Processes are viewed as finite systems that take part in multiple, ordinarily nondeterministic interactions. The interactions between processes are described as protocols. The effects of communication between processes as well as the necessary coordination of different interactions within a processes are both based on the restriction of the transition relation of product automata. The channel based outer coupling represents the causal relation between the output and the input of different systems. The coordination condition based inner coupling represents the causal relation between the input and output of a single system. All steps are illustrated with the example of a network of resource administration processes which is supposed to provide requesting user processes exclusive access to a single resource.Comment: In Proceedings IWIGP 2012, arXiv:1202.422

    Normalization And Matching Of Chemical Compound Names

    Get PDF
    We have developed ChemHits (http://sabio.h-its.org/chemHits/), an application which detects and matches synonymic names of chemical compounds. The tool is based on natural language processing (NLP) methods and applies rules to systematically normalize chemical compound names. Subsequently, matching of synonymous names is achieved by comparison of the normalized name forms. The tool is capable of normalizing a given name of a chemical compound and matching it against names in (bio-)chemical databases, like SABIO-RK, PubChem, ChEBI or KEGG, even when there is no exact name-to-name-match

    IT-Supported Management of Mass Casualty Incidents: The e-Triage Project

    Get PDF
    Emergencies arise out of disasters and are characterized by limited resources in terms of medical personnel and infrastructure, underlining the importance of mobilizing regional, supra-regional and/or international help to the affected regions. Effective deployment of this help is crucial, but only possible if a common operational picture among authorities, coordination centers, and staff working in the field is developed as quickly as possible. Since mass casualty incidents (MCIs) normally overwhelm the regularly available rescue resources (rescue personnel, transport vehicles, hospital capacity, etc.), a particularly effective crisis management has to be applied. In general, for co-ordination centers it is a challenge to get an immediate and accurate situation overview (i.e. number of victims, injury categories and their location). Indeed, triage and registration performed at different places by different teams maintaining different lists are indubitably an error-prone approach. Furthermore, it can happen that all later attempts to track the way of single patient, their attendants and transport vehicles are not very successful, although this could be of key interest in scenarios with nuclear, biological or chemical hazards. Within the e-Triage project, which is sponsored by the German Federal Ministry of Education and Research, an integrated concept for electronic registration of affected persons is under development

    TIPPtool: Compositional Specification and Analysis of Markovian Performance Models

    Get PDF
    In this short paper we briefly describe a tool which is based on a Markovian stochastic process algebra. The tool offers both model specification and quantitative model analysis in a compositional fashion, wrapped in a userfriendly graphical front-end

    Comparing paedophile activity in different P2P systems

    Full text link
    Peer-to-peer (P2P) systems are widely used to exchange content over the Internet. Knowledge on paedophile activity in such networks remains limited while it has important social consequences. Moreover, though there are different P2P systems in use, previous academic works on this topic focused on one system at a time and their results are not directly comparable. We design a methodology for comparing \kad and \edonkey, two P2P systems among the most prominent ones and with different anonymity levels. We monitor two \edonkey servers and the \kad network during several days and record hundreds of thousands of keyword-based queries. We detect paedophile-related queries with a previously validated tool and we propose, for the first time, a large-scale comparison of paedophile activity in two different P2P systems. We conclude that there are significantly fewer paedophile queries in \kad than in \edonkey (approximately 0.09% \vs 0.25%).Comment: Submitte
    • 

    corecore