3,923 research outputs found
Peer-to-Peer Intrusion Detection Systeme fĂŒr den Schutz sensibler IT-Infrastrukturen
Vortrag der GI-Jahrestagung: Sicherheit in komplexen, vernetzten Umgebungen, Workshop im Rahmen der Jahrestagung 2005 der Gesellschaft fĂŒr Informatik Informatik LIVE!, 19. - 22. September 2005 in Bonn, Deutschlan
Innovative Informatikanwendungen : Informatik 2003 ; 29. September - 2. Oktober 2003 in Frankfurt am Main
Tagungsprogramm INFORMATIK 2003 Innovative Informatikanwendungen. 33. Jahrestagung der Gesellschaft fĂŒr Informatik e.V. (GI) 29. September bis 2. Oktober 2003 Frankfurt am Mai
The âMobility-Mâ-framework for Application of Mobile Technology in Business Processes
In order to provide a structural framework for the application of mobile technology in business processes that can serve as a basis for understanding the organizational impacts of mobile technologies, we present a model, the âMobility-Mâ. It puts the technology and the business processes in context with each other by using the theory of informational added values. The aim is to facilitate and visualize the use of mobile technologies according to their potential benefits and effects. This model and its graphical representation significantly enhance the orientation within the introduction of mobile business processes.
SciRecSys: A Recommendation System for Scientific Publication by Discovering Keyword Relationships
In this work, we propose a new approach for discovering various relationships
among keywords over the scientific publications based on a Markov Chain model.
It is an important problem since keywords are the basic elements for
representing abstract objects such as documents, user profiles, topics and many
things else. Our model is very effective since it combines four important
factors in scientific publications: content, publicity, impact and randomness.
Particularly, a recommendation system (called SciRecSys) has been presented to
support users to efficiently find out relevant articles
Processes, Roles and Their Interactions
Taking an interaction network oriented perspective in informatics raises the
challenge to describe deterministic finite systems which take part in networks
of nondeterministic interactions. The traditional approach to describe
processes as stepwise executable activities which are not based on the
ordinarily nondeterministic interaction shows strong centralization tendencies.
As suggested in this article, viewing processes and their interactions as
complementary can circumvent these centralization tendencies.
The description of both, processes and their interactions is based on the
same building blocks, namely finite input output automata (or transducers).
Processes are viewed as finite systems that take part in multiple, ordinarily
nondeterministic interactions. The interactions between processes are described
as protocols.
The effects of communication between processes as well as the necessary
coordination of different interactions within a processes are both based on the
restriction of the transition relation of product automata. The channel based
outer coupling represents the causal relation between the output and the input
of different systems. The coordination condition based inner coupling
represents the causal relation between the input and output of a single system.
All steps are illustrated with the example of a network of resource
administration processes which is supposed to provide requesting user processes
exclusive access to a single resource.Comment: In Proceedings IWIGP 2012, arXiv:1202.422
Normalization And Matching Of Chemical Compound Names
We have developed ChemHits (http://sabio.h-its.org/chemHits/), an application which detects and matches synonymic names of chemical compounds. The tool is based on natural language processing (NLP) methods and applies rules to systematically normalize chemical compound names. Subsequently, matching of synonymous names is achieved by comparison of the normalized name forms. The tool is capable of normalizing a given name of a chemical compound and matching it against names in (bio-)chemical databases, like SABIO-RK, PubChem, ChEBI or KEGG, even when there is no exact name-to-name-match
IT-Supported Management of Mass Casualty Incidents: The e-Triage Project
Emergencies arise out of disasters and are characterized by limited resources in terms of medical personnel and infrastructure, underlining the importance of mobilizing regional, supra-regional and/or international help to the affected regions. Effective deployment of this help is crucial, but only possible if a common operational picture among authorities, coordination centers, and staff working in the field is developed as quickly as possible. Since mass casualty incidents (MCIs) normally overwhelm the regularly available rescue resources (rescue personnel, transport vehicles, hospital capacity, etc.), a particularly effective crisis management has to be applied. In general, for co-ordination centers it is a challenge to get an immediate and accurate situation overview (i.e. number of victims, injury categories and their location). Indeed, triage and registration performed at different places by different teams maintaining different lists are indubitably an error-prone approach. Furthermore, it can happen that all later attempts to track the way of single patient, their attendants and transport vehicles are not very
successful, although this could be of key interest in scenarios with nuclear, biological or chemical hazards.
Within the e-Triage project, which is sponsored by the German Federal Ministry of Education and Research, an integrated concept for electronic registration of affected persons is under development
TIPPtool: Compositional Specification and Analysis of Markovian Performance Models
In this short paper we briefly describe a tool which is based on a Markovian stochastic process algebra. The tool offers both model specification and quantitative model analysis in a compositional fashion, wrapped in a userfriendly graphical front-end
Comparing paedophile activity in different P2P systems
Peer-to-peer (P2P) systems are widely used to exchange content over the
Internet. Knowledge on paedophile activity in such networks remains limited
while it has important social consequences. Moreover, though there are
different P2P systems in use, previous academic works on this topic focused on
one system at a time and their results are not directly comparable.
We design a methodology for comparing \kad and \edonkey, two P2P systems
among the most prominent ones and with different anonymity levels. We monitor
two \edonkey servers and the \kad network during several days and record
hundreds of thousands of keyword-based queries. We detect paedophile-related
queries with a previously validated tool and we propose, for the first time, a
large-scale comparison of paedophile activity in two different P2P systems. We
conclude that there are significantly fewer paedophile queries in \kad than in
\edonkey (approximately 0.09% \vs 0.25%).Comment: Submitte
- âŠ