955,447 research outputs found

    Using Distributed Ledger Technologies to Support Complex Supply Chains

    Get PDF
    The concept of blockchain, as part of distributed ledger technologies, has gained a lot of interest recently, especially in cryptocurrencies. With the addition of other technical capabilities, e.g., smart contracts and oracles, this interest has spread to other areas as well and affects a wide variety of business processes such as supply chain processes. However, in research, the wide variety of processes finds inadequate consideration to date. In this research paper, we provide an overview of the state of the art of distributed ledger technologies in supply chains and point out future research topics. Therefore, we conducted a structured literature review, systematized potential application areas in supply chain processes, and showed that research gaps exist. To address the research gaps, we derived open research questions, whereby conducting design studies to deal with the practical problems in the application areas plays a central role

    Block CUR: Decomposing Matrices using Groups of Columns

    Full text link
    A common problem in large-scale data analysis is to approximate a matrix using a combination of specifically sampled rows and columns, known as CUR decomposition. Unfortunately, in many real-world environments, the ability to sample specific individual rows or columns of the matrix is limited by either system constraints or cost. In this paper, we consider matrix approximation by sampling predefined \emph{blocks} of columns (or rows) from the matrix. We present an algorithm for sampling useful column blocks and provide novel guarantees for the quality of the approximation. This algorithm has application in problems as diverse as biometric data analysis to distributed computing. We demonstrate the effectiveness of the proposed algorithms for computing the Block CUR decomposition of large matrices in a distributed setting with multiple nodes in a compute cluster, where such blocks correspond to columns (or rows) of the matrix stored on the same node, which can be retrieved with much less overhead than retrieving individual columns stored across different nodes. In the biometric setting, the rows correspond to different users and columns correspond to users' biometric reaction to external stimuli, {\em e.g.,}~watching video content, at a particular time instant. There is significant cost in acquiring each user's reaction to lengthy content so we sample a few important scenes to approximate the biometric response. An individual time sample in this use case cannot be queried in isolation due to the lack of context that caused that biometric reaction. Instead, collections of time segments ({\em i.e.,} blocks) must be presented to the user. The practical application of these algorithms is shown via experimental results using real-world user biometric data from a content testing environment.Comment: shorter version to appear in ECML-PKDD 201

    Multi-agent system to assure the logical security of data in distributed information system

    Get PDF
    The increased availability of information as a whole became an important problem and threat for its security, especially security of sensitive and confidential information and that is why the necessity to assure the security of such data became undeniable. The developers of applications an information systems put more and more stress on the aspect of their security and safety. Development of information systems has to answer more and more to problems connected to federated data sources and problems of heterogeneous distributed information systems. It is necessary to propose the architecture for secure cooperation of such systems. The paper presents the practical application of concepts of multi-agent systems in domain of logical security of data in distributed information systems. The purpose of presented solution is to support the process management of IT project realization based on the software creation methodologies

    Artificial chemistry approach to exploring search spaces using artificial reaction network agents.

    Get PDF
    The Artificial Reaction Network (ARN) is a cell signaling network inspired representation belonging to the branch of A-Life known as Artificial Chemistry. It has properties in common with both AI and Systems Biology techniques including Artificial Neural Networks, Petri Nets, Random Boolean Networks and S-Systems. The ARN has been previously applied to control of limbed robots and simulation of biological signaling pathways. In this paper, multiple instances of independent distributed ARN controlled agents function to find the global minima within a set of simulated environments characterized by benchmark problems. The search behavior results from the internal ARN network, but is enhanced by collective activities and stigmergic interaction of the agents. The results show that the agents are able to find best fitness solutions in all problems, and compare well with results of cell inspired optimization algorithms. Such a system may have practical application in distributed or swarm robotics

    Enhancing Mobile Agent Security Level (Proposed Model)

    Get PDF
    Mobile agents are application design schemes for distributed systems that consist of mobile code ideology including Mobile agent software. In the last period mobile computing process had a vision that’s a set of execution code that’s move from platform to another in the heterogeneous network with an ability of carrying there result and updating them self-sate. This paper presents several enhancements on mobile agent security and provides generalized code protection. Several novel techniques are proposed to protect mobile agents in any environments and to describe and solve practical problems in the mobile agent system

    The Performance of Distributed Applications: A Traffic Shaping Perspective

    Get PDF
    Widely used in datacenters and clouds, network traffic shaping is a performance influencing factor that is often overlooked when benchmarking or simply deploying distributed applications. While in theory traffic shaping should allow for a fairer sharing of network resources, in practice it also introduces new problems: performance (measurement) inconsistency and long tails. In this paper we investigate the effects of traffic shaping mechanisms on common distributed applications. We characterize the performance of a distributed key-value store, big data workloads, and high-performance computing under state-of-the-art benchmarks, while the underlying network's traffic is shaped using state-of-the-art mechanisms such as token-buckets or priority queues. Our results show that the impact of traffic shaping needs to be taken into account when benchmarking or deploying distributed applications. To help researchers, practitioners, and application developers we uncover several practical implications and make recommendations on how certain applications are to be deployed so that performance is least impacted by the shaping protocols
    corecore