236,167 research outputs found
Pengines: Web Logic Programming Made Easy
When developing a (web) interface for a deductive database, functionality
required by the client is provided by means of HTTP handlers that wrap the
logical data access predicates. These handlers are responsible for converting
between client and server data representations and typically include options
for paginating results. Designing the web accessible API is difficult because
it is hard to predict the exact requirements of clients. Pengines changes this
picture. The client provides a Prolog program that selects the required data by
accessing the logical API of the server. The pengine infrastructure provides
general mechanisms for converting Prolog data and handling Prolog
non-determinism. The Pengines library is small (2000 lines Prolog, 150 lines
JavaScript). It greatly simplifies defining an AJAX based client for a Prolog
program and provides non-deterministic RPC between Prolog processes as well as
interaction with Prolog engines similar to Paul Tarau's engines. Pengines are
available as a standard package for SWI-Prolog 7.Comment: To appear in Theory and Practice of Logic Programmin
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity
people and get access to their personal information. Phishing is a somehow
complex method that has recently been considered by internet thieves.The
present study aims to explain phishing, and why an organization should deal
with it and its challenges of providing. In addition, different kinds of this
attack and classification of security approaches for organizational and lay
users are addressed in this article. Finally, the CERT strategy is presented to
deal with phishing and studying some anti-phishing
A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture
In the recent years, many solutions for Vehicle to Vehicle (V2V)
communication were proposed to overcome failure problems (also known as dead
ends). This paper proposes a novel framework for V2V failure recovery using
Device-to-Device (D2D) communications. Based on the unified Intelligent
Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve
V2V dead ends failure recovery delays. This new paradigm of hybrid V2V-D2D
communications overcomes the limitations of traditional V2V routing techniques.
According to NS2 simulation results, the proposed hybrid model decreases the
end to end delay (E2E) of messages delivery. A complete comparison of different
D2D use cases (best & worst scenarios) is presented to show the enhancements
brought by our solution compared to traditional V2V techniques.Comment: 6 page
Surveys on Electronic Money
This paper investigates the views of electronic money operators and innovators on the possibilities and implications of e-money, especially with respect to replacing central bank money as well as technical issues regarding e-money, its implications for the financial industry and central banking. This has been done using surveys of major e-money innovators and operators, based on the assumption that these operators and innovators are likely to shape the future framework for e-money schemes. It seems that innovators and operators are quite confident about the future of e-money â despite problems and obstacles surrounding current testing â and that central banksâ monopoly of the issuance of money as a medium of exchange will no longer be unchallenged.electronic money; financial regulation; central banks; financial innovation
An architecture for autonomic web service process planning
Web service composition is a technology that has received
considerable attention in the last number of years. Languages and tools to aid in the process of creating composite web services have been received specific attention. Web service composition is the process of linking single web services together in order to accomplish more complex tasks. One area of web service composition that has not received as much attention is the area of dynamic error handling and re-planning, enabling autonomic composition. Given a repository of service descriptions and a task to complete, it is possible for AI planners to automatically create a plan that will achieve this goal. If however a service in the plan is unavailable or erroneous the plan will fail. Motivated by this problem, this paper suggests autonomous re-planning as a means to overcome dynamic problems. Our solution involves automatically recovering from faults and creating a context-dependent alternate plan
Access to Water in the Slums of the Developing World
The text and data in this publication may be reproduced as long as the source is cited. Reproductions for commercial purposes are forbiddenThe discussion reveals the failure of public policies as well as markets to provide satisfactory solutions to the problems of access to a safe, affordable and continuous water supply. In many countries, especially those in Sub-Saharan Africa, access to safe water through household connections declined in the 1990s. Achievements in access rates in many Asian and African economies are the due to widespread use of public water points such as public standpipes and kiosks. These sources are important, but doubtless the quality of access to water with these facilities is unsatisfactory since they involve greater effort by households, involving queuing, carrying water and lacking continuous access. A substantial proportion of urban dwellers in developing countries, especially in unplanned settlements, rely on a wide range of small-scale providers whose services are vital in the absence of alternatives. Their services, however, are often inferior to those provided by the formal network. Invariably, the water charges of alternative sources are higher than those for supply from the public network.Final Published versio
- âŠ