159,667 research outputs found

    SPAWN: Service Provision in Ad-hoc Wireless Networks

    Get PDF
    The increasing ubiquity of wireless mobile computing platforms has opened up the potential for unprecedented levels of communication, coordination and collaboration among mobile computing devices, most of which will occur in an ad hoc, on-demand manner. This paper describes SPAWN, a middleware supporting service provision in ad-hoc wireless networks. The aim of SPAWN is to provide the software resources on mobile devices that facilitate electronic collaboration. This is achieved by applying the principles of service oriented computing (SOC), an emerging paradigm that has seen success in wired settings. SPAWN is an adaptation and extension of the Jini model of SOC to ad-hoc networks. The key contributions of SPAWN are (1) a completely decentralized service advertisement and request system that is geared towards handling the unpredictability and dynamism of mobile ad-hoc networks, (2) an automated code management system that can fetch, use and dispose of binaries on an on-demand basis, (3) a mechanism supporting the logical mobility of services, (4) an upgrade mechanism to extend the life cycle of services, and (5) a lightweight security model that secures all interactions, which is essential in an open environment. We discuss the software architecture, a Java implementation, sample applications and an empirical evaluation of the system

    Construction informatics in Turkey: strategic role of ICT and future research directions

    Get PDF
    Construction Informatics deals with subjects ranging from strategic management of ICTs to interoperability and information integration in the construction industry. Studies on defining research directions for Construction Informatics have a history over 20 years. The recent studies in the area highlight the priority themes for Construction Informatics research as interoperability, collaboration support, intelligent sites and knowledge sharing. In parallel, today it is widely accepted in the Architecture/Engineering/Construction (AEC) industry that ICT is becoming a strategic asset for any organisation to deliver business improvement and achieve sustainable competitive advantage. However, traditionally the AEC industry has approached investing in ICT with a lack of strategic focus and low level of priority to the business. This paper presents a recent study from Turkey that is focused on two themes. The first theme investigates the strategic role of ICT implementations from an industrial perspective, and explores if organisations within the AEC industry view ICT as a strategic resource for their business practice. The second theme investigates the ‘perspective of academia’ in terms of future research directions of Construction Informatics. The results of the industrial study indicates that ICT is seen as a value-adding resource, but a shift towards the recognition of the importance of ICT in terms of value adding in winning work and achieving strategic competitive advantage is observed. On the other hand, ICT Training is found to be the theme of highest priority from the academia point of view

    Construction informatics in Turkey: strategic role of ICT and future research directions

    Get PDF
    Construction Informatics deals with subjects ranging from strategic management of ICTs to interoperability and information integration in the construction industry. Studies on defining research directions for Construction Informatics have a history over 20 years. The recent studies in the area highlight the priority themes for Construction Informatics research as interoperability, collaboration support, intelligent sites and knowledge sharing. In parallel, today it is widely accepted in the Architecture/Engineering/Construction (AEC) industry that ICT is becoming a strategic asset for any organisation to deliver business improvement and achieve sustainable competitive advantage. However, traditionally the AEC industry has approached investing in ICT with a lack of strategic focus and low level of priority to the business. This paper presents a recent study from Turkey that is focused on two themes. The first theme investigates the strategic role of ICT implementations from an industrial perspective, and explores if organisations within the AEC industry view ICT as a strategic resource for their business practice. The second theme investigates the ‘perspective of academia’ in terms of future research directions of Construction Informatics. The results of the industrial study indicates that ICT is seen as a value-adding resource, but a shift towards the recognition of the importance of ICT in terms of value adding in winning work and achieving strategic competitive advantage is observed. On the other hand, ICT Training is found to be the theme of highest priority from the academia point of view

    Towards Automating the Construction & Maintenance of Attack Trees: a Feasibility Study

    Full text link
    Security risk management can be applied on well-defined or existing systems; in this case, the objective is to identify existing vulnerabilities, assess the risks and provide for the adequate countermeasures. Security risk management can also be applied very early in the system's development life-cycle, when its architecture is still poorly defined; in this case, the objective is to positively influence the design work so as to produce a secure architecture from the start. The latter work is made difficult by the uncertainties on the architecture and the multiple round-trips required to keep the risk assessment study and the system architecture aligned. This is particularly true for very large projects running over many years. This paper addresses the issues raised by those risk assessment studies performed early in the system's development life-cycle. Based on industrial experience, it asserts that attack trees can help solve the human cognitive scalability issue related to securing those large, continuously-changing system-designs. However, big attack trees are difficult to build, and even more difficult to maintain. This paper therefore proposes a systematic approach to automate the construction and maintenance of such big attack trees, based on the system's operational and logical architectures, the system's traditional risk assessment study and a security knowledge database.Comment: In Proceedings GraMSec 2014, arXiv:1404.163

    Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1

    Get PDF
    This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. Part 2: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines

    Advanced Techniques for Assets Maintenance Management

    Get PDF
    16th IFAC Symposium on Information Control Problems in Manufacturing INCOM 2018 Bergamo, Italy, 11–13 June 2018. Edited by Marco Macchi, László Monostori, Roberto PintoThe aim of this paper is to remark the importance of new and advanced techniques supporting decision making in different business processes for maintenance and assets management, as well as the basic need of adopting a certain management framework with a clear processes map and the corresponding IT supporting systems. Framework processes and systems will be the key fundamental enablers for success and for continuous improvement. The suggested framework will help to define and improve business policies and work procedures for the assets operation and maintenance along their life cycle. The following sections present some achievements on this focus, proposing finally possible future lines for a research agenda within this field of assets management

    Aligning a Service Provisioning Model of a Service-Oriented System with the ITIL v.3 Life Cycle

    Get PDF
    Bringing together the ICT and the business layer of a service-oriented system (SoS) remains a great challenge. Few papers tackle the management of SoS from the business and organizational point of view. One solution is to use the well-known ITIL v.3 framework. The latter enables to transform the organization into a service-oriented organizational which focuses on the value provided to the service customers. In this paper, we align the steps of the service provisioning model with the ITIL v.3 processes. The alignment proposed should help organizations and IT teams to integrate their ICT layer, represented by the SoS, and their business layer, represented by ITIL v.3. One main advantage of this combined use of ITIL and a SoS is the full service orientation of the company.Comment: This document is the technical work of a conference paper submitted to the International Conference on Exploring Service Science 1.5 (IESS 2015

    A cost engine system for estimating whole-life cycle cost of long-term digital preservation activities

    Get PDF
    This research paper presents a cost engine system that estimates the whole life cycle cost of long-term digital preservation (LTDP) activities using cloud-based technologies. A qualitative research methodology has been employed and the activity based costing (ABC) technique has been used to develop the cost model. The unified modelling language (UML) notation and the object oriented paradigm (OOP) are utilised to design the architecture of the software system. In addition, the service oriented architecture (SOA) style has been used to deploy the function of the cost engine as a web service in order to ensure its accessibility over the web. The cost engine is a module that is part of a larger digital preservation system and has been validated qualitatively through experts’ opinion. Its benefits are realised in the accurate and detailed estimation of cost for companies wishing to employ LTDP activities
    • …
    corecore