3,354 research outputs found
Results from a prototype chicane-based energy spectrometer for a Linear Collider
The International Linear Collider (ILC) and other proposed high energy e+e− machines aim to measure with unprecedented precision Standard Model quantities and new, not yet discovered phenomena. One of the main requirements for achieving this goal is a measurement of the incident beam energy with an uncertainty close to 10^(−4). This article presents the analysis of data from a prototype energy spectrometer commissioned in 2006-2007 in SLAC's End Station A beamline. The prototype was a 4-magnet chicane equipped with beam position monitors measuring small changes of the beam orbit through the chicane at different beam energies. A single bunch energy resolution close to 5·10^(−4) was measured, which is satisfactory for most scenarios. We also report on the operational experience with the chicane-based spectrometer and suggest ways of improving its performance
Predictive Monitoring of Business Processes
Modern information systems that support complex business processes generally
maintain significant amounts of process execution data, particularly records of
events corresponding to the execution of activities (event logs). In this
paper, we present an approach to analyze such event logs in order to
predictively monitor business goals during business process execution. At any
point during an execution of a process, the user can define business goals in
the form of linear temporal logic rules. When an activity is being executed,
the framework identifies input data values that are more (or less) likely to
lead to the achievement of each business goal. Unlike reactive compliance
monitoring approaches that detect violations only after they have occurred, our
predictive monitoring approach provides early advice so that users can steer
ongoing process executions towards the achievement of business goals. In other
words, violations are predicted (and potentially prevented) rather than merely
detected. The approach has been implemented in the ProM process mining toolset
and validated on a real-life log pertaining to the treatment of cancer patients
in a large hospital
Investigation of beam self-polarization in the future circular collider
The use of resonant depolarization has been suggested for precise beam energy
measurements (better than 100 keV) in the Future Circular Collider
(FCC-) for Z and WW physics at 45 and 80 GeV beam energy
respectively. Longitudinal beam polarization would benefit the Z peak physics
program; however it is not essential and therefore it will be not investigated
here. In this paper the possibility of self-polarized leptons is considered.
Preliminary results of simulations in presence of quadrupole misalignments and
beam position monitors (BPMs) errors for a simplified FCC- ring are
presented.Comment: 9 p
Extend Commitment Protocols with Temporal Regulations: Why and How
The proposal of Elisa Marengo's thesis is to extend commitment protocols to
explicitly account for temporal regulations. This extension will satisfy two
needs: (1) it will allow representing, in a flexible and modular way, temporal
regulations with a normative force, posed on the interaction, so as to
represent conventions, laws and suchlike; (2) it will allow committing to
complex conditions, which describe not only what will be achieved but to some
extent also how. These two aspects will be deeply investigated in the proposal
of a unified framework, which is part of the ongoing work and will be included
in the thesis.Comment: Proceedings of the Doctoral Consortium and Poster Session of the 5th
International Symposium on Rules (RuleML 2011@IJCAI), pages 1-8
(arXiv:1107.1686
Semantics for incident identification and resolution reports
In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical
briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from
semantic deficiencies, mainly due to ambiguity or different granularity levels of description and analysis. An approach to
face this problem is the use of semantic methodologies in order to provide better Knowledge Externalization from incident
protocols management. In this article, we propose a method based on semantic techniques for both, analyzing and specifying
(meta)security requirements on protocols used for solving security incidents. This would allow specialist getting better
documentation on their intangible knowledge about them.Ministerio de Economía y Competitividad TIN2013-41086-
Business Process Management Education in Academia: Status, challenges, and Recommendations
In response to the growing proliferation of Business Process Management (BPM) in industry and the demand this creates for BPM expertise, universities across the globe are at various stages of incorporating knowledge and skills in their teaching offerings. However, there are still only a handful of institutions that offer specialized education in BPM in a systematic and in-depth manner. This article is based on a global educators’ panel discussion held at the 2009 European Conference on Information Systems in Verona, Italy. The article presents the BPM programs of five universities from Australia, Europe, Africa, and North America, describing the BPM content covered, program and course structures, and challenges and lessons learned. The article also provides a comparative content analysis of BPM education programs illustrating a heterogeneous view of BPM. The examples presented demonstrate how different courses and programs can be developed to meet the educational goals of a university department, program, or school. This article contributes insights on how best to continuously sustain and reshape BPM education to ensure it remains dynamic, responsive, and sustainable in light of the evolving and ever-changing marketplace demands for BPM expertise
Proactive services ecosystem framework
Dissertation presented to obtain the degree of
Doctor in Electrical and Computer Engineering, specialization on Collaborative Enterprise NetworksCollaborative-Networks (CN) have experienced a fast evolution in the last two decades. The
collaboration among independent entities or professionals supported by Information and
Communication Technology (ICT) has attracted the research community to establish the
conceptual basis for this scientific discipline. Service Orientation has been one of the key selected paradigms for that conceptual basis. Nevertheless, the service concept itself does not have a common understanding in the Business and ICT worlds. In the former, client satisfaction,
resources management and business process models are some example concerns, whilst the later deals with interoperability, remote function calling or communication protocols.
If for example an enterprise provides some service, it may hire specialists to wrap such
service into web-services, expecting to reach worldwide potential new clients. In fact, nowadays Web Services and Service Oriented Architectures (SOA) are the technological elements most commonly used. However, these are passive elements in the sense they do not perform any action
towards pursuing business interests, which constitute a limiting factor from a business
perspective. Another approach for the above mentioned enterprise is to follow the Multi-Agent Systems (MAS) approach, as the pro-activity is a keyword in such contexts. Nevertheless, as MAS approaches are not so commonly used and not so robust yet, the worldwide potential set of new clients is reduced; which also constitutes an inhibitor factor from the business perspective.
This dissertation proposes a Pro-Active Services Ecosystem Framework, gathering
inspiration from both the SOA and MAS research areas, trying to bridge the business and ICT worlds through the base concepts for the creation of a Services’ Ecosystem where business services are represented in a pro-active manner towards pursuing business interests, like finding
collaboration opportunities or improving the chances each CN member has to see its services selected among competitors, for example. This work also includes a prototype system applied / validated in the area of a Professional Virtual Community of Senior Professionals
- …