236,167 research outputs found

    Pengines: Web Logic Programming Made Easy

    Full text link
    When developing a (web) interface for a deductive database, functionality required by the client is provided by means of HTTP handlers that wrap the logical data access predicates. These handlers are responsible for converting between client and server data representations and typically include options for paginating results. Designing the web accessible API is difficult because it is hard to predict the exact requirements of clients. Pengines changes this picture. The client provides a Prolog program that selects the required data by accessing the logical API of the server. The pengine infrastructure provides general mechanisms for converting Prolog data and handling Prolog non-determinism. The Pengines library is small (2000 lines Prolog, 150 lines JavaScript). It greatly simplifies defining an AJAX based client for a Prolog program and provides non-deterministic RPC between Prolog processes as well as interaction with Prolog engines similar to Paul Tarau's engines. Pengines are available as a standard package for SWI-Prolog 7.Comment: To appear in Theory and Practice of Logic Programmin

    CERT strategy to deal with phishing attacks

    Full text link
    Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain phishing, and why an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and classification of security approaches for organizational and lay users are addressed in this article. Finally, the CERT strategy is presented to deal with phishing and studying some anti-phishing

    A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture

    Full text link
    In the recent years, many solutions for Vehicle to Vehicle (V2V) communication were proposed to overcome failure problems (also known as dead ends). This paper proposes a novel framework for V2V failure recovery using Device-to-Device (D2D) communications. Based on the unified Intelligent Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve V2V dead ends failure recovery delays. This new paradigm of hybrid V2V-D2D communications overcomes the limitations of traditional V2V routing techniques. According to NS2 simulation results, the proposed hybrid model decreases the end to end delay (E2E) of messages delivery. A complete comparison of different D2D use cases (best & worst scenarios) is presented to show the enhancements brought by our solution compared to traditional V2V techniques.Comment: 6 page

    Surveys on Electronic Money

    Get PDF
    This paper investigates the views of electronic money operators and innovators on the possibilities and implications of e-money, especially with respect to replacing central bank money as well as technical issues regarding e-money, its implications for the financial industry and central banking. This has been done using surveys of major e-money innovators and operators, based on the assumption that these operators and innovators are likely to shape the future framework for e-money schemes. It seems that innovators and operators are quite confident about the future of e-money – despite problems and obstacles surrounding current testing – and that central banks’ monopoly of the issuance of money as a medium of exchange will no longer be unchallenged.electronic money; financial regulation; central banks; financial innovation

    An architecture for autonomic web service process planning

    Get PDF
    Web service composition is a technology that has received considerable attention in the last number of years. Languages and tools to aid in the process of creating composite web services have been received specific attention. Web service composition is the process of linking single web services together in order to accomplish more complex tasks. One area of web service composition that has not received as much attention is the area of dynamic error handling and re-planning, enabling autonomic composition. Given a repository of service descriptions and a task to complete, it is possible for AI planners to automatically create a plan that will achieve this goal. If however a service in the plan is unavailable or erroneous the plan will fail. Motivated by this problem, this paper suggests autonomous re-planning as a means to overcome dynamic problems. Our solution involves automatically recovering from faults and creating a context-dependent alternate plan

    Access to Water in the Slums of the Developing World

    Get PDF
    The text and data in this publication may be reproduced as long as the source is cited. Reproductions for commercial purposes are forbiddenThe discussion reveals the failure of public policies as well as markets to provide satisfactory solutions to the problems of access to a safe, affordable and continuous water supply. In many countries, especially those in Sub-Saharan Africa, access to safe water through household connections declined in the 1990s. Achievements in access rates in many Asian and African economies are the due to widespread use of public water points such as public standpipes and kiosks. These sources are important, but doubtless the quality of access to water with these facilities is unsatisfactory since they involve greater effort by households, involving queuing, carrying water and lacking continuous access. A substantial proportion of urban dwellers in developing countries, especially in unplanned settlements, rely on a wide range of small-scale providers whose services are vital in the absence of alternatives. Their services, however, are often inferior to those provided by the formal network. Invariably, the water charges of alternative sources are higher than those for supply from the public network.Final Published versio
    • 

    corecore