125,970 research outputs found
The Invisible Forest: Conservation Easement Databases and the End of the Clandestine Conservation of Natural Lands
Olmsted talks about invisible forest refers to forest lands -- and, for that matter, any other land types -- protected by a perpetual conservation easement, the existence and location of which are concealed from the public, whether deliberately or because of the opaque nature of the easement process. Because easements, like other forms of deeds, must be recorded at the local land registry or recorder\u27s office, they can never be made undiscoverable. But, despite the efforts of some states and conservation organizations to compile conservation easement data for public consumption, there are few functional systems that comprehensively track and provide easy access to conservation easement data
A Taxonomy of Self-configuring Service Discovery Systems
We analyze the fundamental concepts and issues in service
discovery. This analysis places service discovery in the context of distributed
systems by describing service discovery as a third generation
naming system. We also describe the essential architectures and the
functionalities in service discovery. We then proceed to show how service
discovery fits into a system, by characterizing operational aspects.
Subsequently, we describe how existing state of the art performs service
discovery, in relation to the operational aspects and functionalities, and
identify areas for improvement
Recommended from our members
A monitoring approach for runtime service discovery
Effective runtime service discovery requires identification of services based on different service characteristics such as structural, behavioural, quality, and contextual characteristics. However, current service registries guarantee services described in terms of structural and sometimes quality characteristics and, therefore, it is not always possible to assume that services in them will have all the characteristics required for effective service discovery. In this paper, we describe a monitor-based runtime service discovery framework called MoRSeD. The framework supports service discovery in both push and pull modes of query execution. The push mode of query execution is performed in parallel to the execution of a service-based system, in a proactive way. Both types of queries are specified in a query language called SerDiQueL that allows the representation of structural, behavioral, quality, and contextual conditions of services to be identified. The framework uses a monitor component to verify if behavioral and contextual conditions in the queries can be satisfied by services, based on translations of these conditions into properties represented in event calculus, and verification of the satisfiability of these properties against services. The monitor is also used to support identification that services participating in a service-based system are unavailable, and identification of changes in the behavioral and contextual characteristics of the services. A prototype implementation of the framework has been developed. The framework has been evaluated in terms of comparison of its performance when using and when not using the monitor component
Mapping Sex Offender Addresses: The Utility of the Alaska Sex Offender Registry as a Research Data Base
The registration of sex offenders was part of a national effort to enhance public safety by permitting law enforcement officials to track the location of convicted sex offenders after their release. All fifty states have enacted legislation requiring persons convicted of various sex-related offenses to register with law enforcement agencies; many states also grant public access to all or a portion of their registries. This document reports on the Alaska Statistical Analysis Center's efforts to improve data accuracy in the Alaska Sex Offender Registry, maintained by the Alaska State Troopers, and to assess the registry's utility as a research tool.Bureau of Justice Statistics, Grant No. 1999-RU-RX-K006Background of the Project /
Research Methodology /
Results /
Utility: Spatial Justice Research /
APPENDICES /
A. Alaskaās Sex Offender Registration Law /
B. Establishment of a Central Registry of Sex Offenders in Alaska /
C. Definitions of Offenses for which Convicted Persons Must Register as Sex Offenders in Alask
Semantic annotation, publication, and discovery of Java software components: an integrated approach
Component-based software development has matured into standard practice in software engineering. Among the advantages of reusing software modules are lower costs, faster development, more manageable code, increased productivity, and improved software quality. As the number of available software components has grown, so has the need for effective component search and retrieval. Traditional search approaches, such as keyword matching, have proved ineffective when applied to software components. Applying a semantically- enhanced approach to component classification, publication, and discovery can greatly increase the efficiency of searching and retrieving software components. This has been already applied in the context of Web technologies, and Web services in particular, in the frame of Semantic Web Services research. This paper examines the similarities between software components and Web services and adapts an existing Semantic Web Service publication and discovery solution into a software component annotation and discovery tool which is implemented as an Eclipse plug-in
Pathways: Augmenting interoperability across scholarly repositories
In the emerging eScience environment, repositories of papers, datasets,
software, etc., should be the foundation of a global and natively-digital
scholarly communications system. The current infrastructure falls far short of
this goal. Cross-repository interoperability must be augmented to support the
many workflows and value-chains involved in scholarly communication. This will
not be achieved through the promotion of single repository architecture or
content representation, but instead requires an interoperability framework to
connect the many heterogeneous systems that will exist.
We present a simple data model and service architecture that augments
repository interoperability to enable scholarly value-chains to be implemented.
We describe an experiment that demonstrates how the proposed infrastructure can
be deployed to implement the workflow involved in the creation of an overlay
journal over several different repository systems (Fedora, aDORe, DSpace and
arXiv).Comment: 18 pages. Accepted for International Journal on Digital Libraries
special issue on Digital Libraries and eScienc
The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss
We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more efficiently in maintaining consistency, with shorter latency, not relying on lower network layers for robustness and therefore functions correctly on a simple lightweight protocol stack
- ā¦