35,211 research outputs found
Recommended from our members
Investigating distributed simulation with COTS simulation packages: Experiences with Simul8 and the HLA
Commercial-off-the-shelf simulation packages (CSPs) are used widely in industry. Several research groups are currently working towards the creation of distributed simulation with these CSPs. The motivations to do this are various and are largely unproven as there are very few good examples of this kind of distributed simulation in practice. Our goal is therefore to create a distributed simulation environment using CSPs that will allow end users to make their own decisions as to whether this technology will be useful. This paper presents continuing research in creating such an environment using the CSP Simul8 and the High Level Architecture, the IEEE 1516 standard for distributed simulation. The scope of this paper is limited to the CSPI-PDG Type I Interoperability Reference Model
Programming patterns and development guidelines for Semantic Sensor Grids (SemSorGrid4Env)
The web of Linked Data holds great potential for the creation of semantic applications that can combine self-describing structured data from many sources including sensor networks. Such applications build upon the success of an earlier generation of 'rapidly developed' applications that utilised RESTful APIs. This deliverable details experience, best practice, and design patterns for developing high-level web-based APIs in support of semantic web applications and mashups for sensor grids. Its main contributions are a proposal for combining Linked Data with RESTful application development summarised through a set of design principles; and the application of these design principles to Semantic Sensor Grids through the development of a High-Level API for Observations. These are supported by implementations of the High-Level API for Observations in software, and example semantic mashups that utilise the API
Artefacts and Errors: Acknowledging Issues of Representation in the Digital: Imaging of Ancient Texts
It is assumed, in palaeography, papyrology and epigraphy, that a certain amount of
uncertainty is inherent in the reading of damaged and abraded texts. Yet we have
not really grappled with the fact that, nowadays, as many scholars tend to deal with
digital images of texts, rather than handling the texts themselves, the procedures for
creating digital images of texts can insert further uncertainty into the representation
of the text created. Technical distortions can lead to the unintentional introduction
of âartefactsâ into images, which can have an effect on the resulting representation. If
we cannot trust our digital surrogates of texts, can we trust the readings from them?
How do scholars acknowledge the quality of digitised images of texts? Furthermore,
this leads us to the type of discussions of representation that have been present in
Classical texts since Plato: digitisation can be considered as an alternative form of
representation, bringing to the modern debate of the use of digital technology in Classics
the familiar theories of mimesis (imitation) and ekphrasis (description): the conversion
of visual evidence into explicit descriptions of that information, stored in computer
files in distinct linguistic terms, with all the difficulties of conversion understood in the
ekphratic process. The community has not yet considered what becoming dependent
on digital texts means for the field, both in practical and theoretical terms. Issues of
quality, copying, representation, and substance should be part of our dialogue when
we consult digital surrogates of documentary material, yet we are just constructing
understandings of what it means to rely on virtual representations of artefacts. It is
necessary to relate our understandings of uncertainty in palaeography and epigraphy
to our understanding of the mechanics of visualization employed by digital imaging
techniques, if we are to fully understand the impact that these will have
Recommended from our members
A linked data compliant framework for dynamic and web-scale consumption of web services
The While Semantic Web Services (SWS) research aims at automating Web service tasks such as discovery, orchestration and execution, its take-up is very limited so far. This is due to several reasons, such as inherent complexity of existing SWS frameworks and the considerable costs involved in creating correct SWS descriptions. In addition, while semantics are in use to enable tasks such as discovery, interaction between service consumers, providers and brokering environments is still not supported by semantic message descriptions. On the other hand, the Linked Data approach has produced a set of established principles for sharing and describing data, such as RDF as representation language and the integral use of dereferencable URIs. In this paper we propose to apply those principles to expose Web services and Web APIs and introduce a framework in which service registries as well as services contribute to the automation of service discovery, and hence, workload is distributed more efficiently. This is achieved by developing a Linked Data compliant Web services framework with that communicate with semi-centralised registries but compute their suitability for a given request themselves. All communications among different framework components are using RDF-based message protocols including service input and output. This framework aims at optimizing load balance and performance by dynamically assembling services at run time in a massively distributed Web environment
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study
Passwords are still a mainstay of various security systems, as well as the
cause of many usability issues. For end-users, many of these issues have been
studied extensively, highlighting problems and informing design decisions for
better policies and motivating research into alternatives. However, end-users
are not the only ones who have usability problems with passwords! Developers
who are tasked with writing the code by which passwords are stored must do so
securely. Yet history has shown that this complex task often fails due to human
error with catastrophic results. While an end-user who selects a bad password
can have dire consequences, the consequences of a developer who forgets to hash
and salt a password database can lead to far larger problems. In this paper we
present a first qualitative usability study with 20 computer science students
to discover how developers deal with password storage and to inform research
into aiding developers in the creation of secure password systems
- âŠ