14,780 research outputs found

    Technic and Collaboration Breakdown Structures: Drivers of collaborative problem solving approaches in a supply chain context

    Get PDF
    Problem Solving Methodologies have been par excellence a cornerstone element of the firms’ strategy on achieving effective continuous improvement. But the enterprise evolution towards an extended environment characterized by network-based organization has radically changed the problem solving paradigms. This paper aims to propose a generic and collaborative methodology addressing more complex and distributed problems, dealing with Supply Chain issues and having a key role as a driver for building global competitive advantages and create superior performances at a Supply Chain level

    Using genetic algorithms to generate test sequences for complex timed systems

    Get PDF
    The generation of test data for state based specifications is a computationally expensive process. This problem is magnified if we consider that time con- straints have to be taken into account to govern the transitions of the studied system. The main goal of this paper is to introduce a complete methodology, sup- ported by tools, that addresses this issue by represent- ing the test data generation problem as an optimisa- tion problem. We use heuristics to generate test cases. In order to assess the suitability of our approach we consider two different case studies: a communication protocol and the scientific application BIPS3D. We give details concerning how the test case generation problem can be presented as a search problem and automated. Genetic algorithms (GAs) and random search are used to generate test data and evaluate the approach. GAs outperform random search and seem to scale well as the problem size increases. It is worth to mention that we use a very simple fitness function that can be eas- ily adapted to be used with other evolutionary search techniques

    A human factors approach to analysing military command and control

    No full text
    This paper applies the Event Analysis for Systemic Teamwork (EAST) method to an example of military command and control. EAST offers a way to describe system level 'emergent properties' that arise from the complex interactions of system components (human and technical). These are described using an integrated methods approach and modelled using Task, Social and Knowledge networks. The current article is divided into three parts: a brief description of the military command and control context, a brief description of the EAST method, and a more in depth presentation of the analysis outcomes. Numerous findings emerge from the application of the method. These findings are compared with similar analyses undertaken in civilian domains, where Network Enabled Capability (NEC) is already in place. The emergent properties of the military scenario relate to the degree of system reconfigurability, systems level Situational Awareness (SA), team-working and the role of mediating technology. It is argued that the EAST method can be used to offer several interesting perspectives on designing and specifying NEC capability in military context

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.
    • 

    corecore