A Study on Autonomous Cooperation between Things in Web of Things
|
|
- Madison Carter
- 8 years ago
- Views:
Transcription
1 A Study on Autonomous Coopertion etween Things in We of Things Jehk Yu, Hyunjoong Kng, Hyo-Chn Bng, MyungNm Be 2 Electronics nd Telecommunictions Reserch Institute, 38 Gjeongno, Yuseong-gu, Dejeon, , Kore {dzzng, knghj, ngs, mne}@etri.re.kr Astrct. Recently, the Internet of Things hs minly focused on estlishing connectivity in vriety of chllenging nd constrined network environments, nd the next logicl step will e focusing on the ppliction lyer on top network connectivity. We of Things plys criticl role in enling smrt things s eing first-clss citizens of the We. In this pper, we proposed we roker model on We of Thing tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, the model proposed ws so designed s to gurntee the mximum reliility y minimizing the informtion loss in mjor devices nd services. Keywords: Internet of Things, We of Things, Clssifiction of things, Device coopertion nd non-coopertion, We roker. Introduction The Internet of Things (IoT) is novel prdigm tht is rpidly gining ground in the scenrio of modern wireless telecommunictions. The sic ide of this concept is the pervsive presence round us of vriety of things or ojects such s Rdio- Frequency IDentifiction (RFID) tgs, sensors, ctutors, moile phones, etc. which, through unique ddressing schemes, re le to interct with ech other nd cooperte with their neighors to rech common gols [], [2]. With the generlity of the We, the Internet of Things is on the verge of experiencing mssive evolution. Indeed, strting from n Internet of nerly one hundred million computers, the We now turns to e n Internet of nerly 50 illions of things [3] presging trnsition from n Internet of Things to We of Things (). Some inititives re lredy offering things s We resources either coupling RFID reders to We sed infrstructure [3] or y directly inding We protocols onto physicl electronic crds prticipting in providing profusion of new, oject-enled, pplictions nd even the mens to msh them up together. Nevertheless, while pving the wy to novel pplictions through proves of concept, First uthor, 2 Corresponding uthor. SUComS 203, ASTL Vol. 26, pp. - 6, 203 SERSC 203
2 Proceedings, The 4th Interntionl Conference on Security-enriched Urn Computing nd Smrt Grid prcticl use of the We of Things () in lrge-scle deployment scheme still needs to e strengthened. We of Things plys criticl role in enling smrt things s eing first-clss citizens of the We. In this wy, we tools nd techniques cn e directly pplied to the rel world [4]. Gme Theory is discipline imed t modeling situtions in which decision mkers hve to mke specific ctions tht hve mutul, possily conflicting, nd consequences. Since then, the pplictions of gme re found in economics, politics, computer science, psychology nd sociology. In 950, John Nsh proved tht finite gmes lwys hve n equilirium point, t which ll plyers choose ctions which re est for them when given their opponents choices [5], [6]. In coopertive gme theory, the pyoffs of ech potentil group, or colition, cn e otined y the coopertion of its memers. On the other hnd, non-coopertive gme theory is concerned with the nlysis of the strtegic choices, the detils of the ordering nd the timing of plyers choices, which nd importnt to determine the outcome of gme. However, the relity is tht there is no efficient nd utonomous collortive technology etween things or services in we roker, which is core of. In this pper, we proposed we roker model on We of Thing tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, this model cn perform n efficient informtion opertion nd collortion etween devices through the coopertion etween unconstrined devices nd the coopertion etween constrined devices nd gtewys. It is expected tht the utonomous coopertion etween such devices will e ctively utilized in constructing environment. To stisfy this, gme theory of Nsh rgining solution (NBS) method y introducing system opertion nd performnce ws ttempting to mximize. In ddition, the model proposed ws so designed s to gurntee the mximum reliility y minimizing the informtion loss in mjor things or services. This pper is orgnized s follows. In Section 2, descries relted work nd the coopertive gme theory. In Section 3, the proposed coopertion model etween devise in We of Things is presented. Finlly, Section 4 discusses the conclusions nd future reserch directions. 2 Relted Work 2. The We of Things With the pulic interest of Internet of Things, the next logicl step will focus on the ppliction lyer on top of network connectivity, prticulrly We of Things. Tody, more nd more devices re uiquitously running round us. Trditionl communiction schemes mke use of heterogeneous protocols, softwre nd user interfces, mking hrd devices interction. Users would like to esily ccess pulic devices, whtever their implementtion choices [4]. In the pper, this glol devices interconnection is clled the Internet of Things. This does not refer to ny technology 2
3 A Study on Autonomous Coopertion etween Things in We of Things nor ny network structure, ut only to the ide of interconnecting ojects s well s we interconnect computers with the Internet. Use of the We s the pltform hosting nd exposing connected ojects, cn e explined y multiple technologicl nd usiness enefits, few of which including deployment, high vilility nd verstility, use of stndrdized communiction protocols nd the ecosystem creted thnks to We 2.0 prdigm. A thing ecomes Internet-enled if it is ssocited with networking cpility, which uniquely identifies it on the Internet (refer to Fig. ()). Tody, devices such s sensors, street lights, electric meters, nd ccess crds re lredy networked nd ccessed on the Internet; even IP-connected pcemkers re used to monitor the helth of ptients [7]. A thing ecomes We-enled when it is ugmented with We server (refer to Fig. ()) so tht it cn expose its functionl nd non-functionl cpilities on the We through HTTP. Reserchers hve lredy successfully emedded tiny We servers on resource-constrined things, mking We-enled things relity. Definitely, there is scope for REST in the re of We services, dvnces in REST sed We service rchitectures is propgting the strction of physicl things s services on the We. This trend gives rise to the possiilities of wrpping things in the physicl world s We services (refer to Fig. (c)). THING THING THING WEB SERCIVE SOAP/ REST INTERNET CONNECTION INTERNET CONNECTION WEB SERVER HTTP INTERNET CONNECTION WEB SERVER HTTP () Internet Enled Thing () We Enled Thing Fig.. Connecting things on the We (c) Thing s We Service 2.2 A Survey of Gme Theory Gme Theory is discipline imed t modeling situtions in which decision mkers hve to mke specific ctions tht hve mutul, possily conflicting, nd consequences. John Von Neumnn nd O. Morgenstern hve developed clssicl theory of two-person zero-sum gmes in their ook [5] Theory of Gmes nd Economic Behvior. Since then, the pplictions of Gme re found in economics, politics, computer science, psychology nd sociology. In 950, John Nsh proved tht finite gmes lwys hve n equilirium point, t which ll plyers choose ctions which re est for them when given their opponents choices [6]. In the 950s nd 960s, Gme Theory ws extended nd developed theoreticlly nd pplied to prolems of wr nd politics. Since the 970s, it hs creted revolution in economic theory. Moreover, it hs found pplictions in sociology nd psychology, nd found links with evolution nd iology. At the end of the 990s, Gme Theory hs een used in the design of uctions for llocting rights to the use of the electromgnetic spectrum nds to the moile telecommunictions industry. 3
4 Proceedings, The 4th Interntionl Conference on Security-enriched Urn Computing nd Smrt Grid The rgining prolem of the coopertive gme theory cn e descried s follows [6], [8]. Let k =,2,..., K e the set of plyers, nd S e closed nd K convex suset of R to represent the set of fesile pyoff lloctions tht the plyers cn get if they ll work together. Let U e the miniml pyoff k -person i rgining prolem. Given the cooperte things, we cn prove tht our prolem is two-person rgining prolem. First, we use S to represent the set of fesile pyoff lloctions for user i, i.e., S _ i { ( ) } i = U i U i = U i p i, m, n, m 0, n 0, m + n. () Then, the set of fesile pyoff lloctions tht the two plyers cn get when they work together is S { U = ( U, U ) U S, U }. (2) = S From the definition of the rgining prolem, we know tht S should e close 2 nd convex suset of R. Since it is ovious tht S is closed, we only need to prove tht S is convex, which mens for ny 0 θ, if U = ( U, U ) S nd 2 U ( U, U ), θ U + ( - θ ) U S. By simple derivtion, we cn get = S 2 θ U LW θ U M f γ α β + (, ) + ( - ) = [ ( )( - - ) ( ) ] (3) 2 p where α = θ m + ( - θ ) m, nd β = θ n - ( - θ ) n. Becuse m, m, n, n 0, m + n, +, Thus, ( ) θ U m n nd 0 θ, it is esy to derive - θ U = + S α 0, β 0, + β. f γ AF α (4). We cn lso prove y the sme method tht θ U + ( - θ ) U = S. Therefore, θ U + ( - θ ) U S, nd S is convex. This wy, we hve proved tht the gme etween users in our system is indeed two-person rgining prolem. β 3 The utonomous coopertion model etween things in In coopertive gme theory, when nlyzing the k-person rgining prolem, the coopertive solution should stisfy four xioms i.e., fesiility, preto efficiency, symmetry, invrince to liner trnsformtion, nd independence of irrelevnt lterntives. In this pper, we proposed to mximize system-wide performnce using Nsh rgining solution (NBS). Nsh showed tht there exists unique solution f stisfying the xioms of the ove, nd it tkes the following form * * ( ) ( ) ( )( ). u, v = f S, d = mx u - d v - d 2 ( u, v ) S (5) 4
5 A Study on Autonomous Coopertion etween Things in We of Things The solution to the following mximiztion prolem is then given y N α i u,..., u = f S, d = mx ( u - d ). (6) N i i ( u, v ) S i = * * ( ) ( ) In this pper, we proposed we roker model on tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of NBS coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, this model cn perform n efficient informtion opertion nd collortion etween devices through the coopertion etween unconstrined devices nd the coopertion etween constrined devices nd gtewys. In this pper, we proposed devices coopertion system in We roker is composed of four modules: Applictions Service Lyer RESTful Interfce Service Profile Mngement Service Mngement Service Profile Repository Service Profile Service Control Service Composition Device Lyer Device Mngement Device ID Mngement Device Control Device Coopertion sed on NBS Device # Device #2 Device #3 Device #N Constrined Things Unconstrined Things Fig. 2. The utonomous coopertion model etween things in ) Service Profile Mngement module stores the profile informtion of ll services provided through roker. Minly the type of service, service provider informtion, such s the service nme is stored. Service control lock nd service composition lock serch or through the Service is utilized when comined. 2) Service Mngement module runs the ctul service, serch, registrtion nd deletion is performed. In ddition, the ppliction to request the services of roker in the to get the first module. In ddition, service composition lock y two or more existing services to provide new services to crete nd perform the role. 3) Device ID Mngement module stores the physicl device IDs s well s the gent IDs elonging to those devices. It lso stores su-network types nd service loction informtion. 5
6 Proceedings, The 4th Interntionl Conference on Security-enriched Urn Computing nd Smrt Grid 4) As function to mnge the resources of ctul devices, Device Mngement module contins the privilege informtion of control, registrtion, deletion, ccess nd execution for the devices. It lso includes device coopertion lock using NBS of gme theory in order to perform utonomous coopertion etween devices. 4 Conclusion nd future work In this pper, we proposed we roker model on We of Thing tht cn perform collortion nd efficient opertion with vrious devices. This model is designed on the sis of coopertive gme theory so tht it my perform utonomous coopertion mong devices. In ddition, this model cn perform n efficient informtion opertion nd collortion etween devices through the coopertion etween unconstrined devices nd the coopertion etween constrined devices nd gtewys. It is expected tht the utonomous coopertion etween such devices will e ctively utilized in constructing environment. In this pper, in order to stisfy, gme theory of Nsh rgining solution (NBS) method y introducing system opertion nd performnce ws ttempting to mximize. For the future work, we re plnning to develop prototype system sed on the proposed mechnism for things nd pplictions coopertion in We roker. Acknowledgments. This work ws supported y Electronics nd Telecommunictions Reserch Institute (ETRI) grnt funded y the Kore government [3ZC30, Development of USN/ Convergence Pltform for Internet of Relity Service Provision]. References. Atzori, L., Ier, A., Morito, G.: The Internet of Things: A survey. J Computer Networks. 54, 5, (200) 2. Chenzhou, Y., Shen, W.J., Sun, W., Hu, G., Sun, X.Z.: Active Linked Dt for Humn Centric Semntic We of Things. In: 202 IEEE Interntionl Conference on Green Computing nd Communictions, pp (202) 3. Christophe, B.: Semntic Profiles to Model the "We of Things". In: 20 Seventh Interntionl Conference on Semntics, Knowledge nd Grid, pp (20) 4. Duquennoy, S., Grimud, G., Vndewlle, J. J.: The We of Things: Interconnecting Devices with High Usility nd Performnce. In: Interntionl Conference on Emedded Softwre nd Systems, pp (2009) 5. Neumn, J.V., Morgenstern, O.: Theory of Gmes nd Economic Behvior, Princeton University Press, (947) 6. Slly, H.A., Rfie, M.: A survey of Gme Theory using Evolutionry Algorithms. In: 200 Interntionl Symposium in Informtion Technology, pp (200) 7. Mthew, S.S., Atif, Y., Sheng, Q.Z., Mmr, Z.: We of Things: Description, Discovery nd Integrtion. In: 20 Interntionl Conference on Internet of Things nd 4th Interntionl Conference on Cyer, Physicl nd Socil Computing, pp (20) 8. Rsmusen, E.: Gmes nd Informtion. Blckwell, Oxford, U.K. (989) 6
Reasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationAll pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationRevisions published in the University of Innsbruck Bulletin of 18 June 2014, Issue 31, No. 509
Plese note: The following curriculum is for informtion purposes only nd not leglly inding. The leglly inding version is pulished in the pertinent University of Innsruck Bulletins. Originl version pulished
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationUNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics STRATEGIC SECOND SOURCING IN A VERTICAL STRUCTURE
UNVERSTY OF NOTTNGHAM Discussion Ppers in Economics Discussion Pper No. 04/15 STRATEGC SECOND SOURCNG N A VERTCAL STRUCTURE By Arijit Mukherjee September 004 DP 04/15 SSN 10-438 UNVERSTY OF NOTTNGHAM Discussion
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More information2 Workload and duration of the Program 3 Courses 4 Types of course units and number of participants
The English version of the consolidted curriculum for the "Bchelor Progrm in Mngement nd Economics" is not leglly inding nd is for informtionl purposes only. The leglly inding text which regultes the different
More informationTool Support for Feature-Oriented Software Development
Tool Support for Feture-Oriented Softwre Development FetureIDE: An Eclipse-Bsed Approch Thoms Leich leich@iti.cs.unimgdeurg.de Sven Apel pel@iti.cs.unimgdeurg.de Lur Mrnitz mrnitz@cs.unimgdeurg.de ABSTRACT
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationNote: Principal version Modification Amendment Equivalence list Consolidated version from October 1 2014
Note: The following curriculum is consolidted version. It is leglly non-inding nd for informtionl purposes only. The leglly inding versions re found in the University of Innsruck Bulletins (in Germn).
More informationSmall Businesses Decisions to Offer Health Insurance to Employees
Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults
More informationT H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607
More informationResearch of Flow Allocation Optimization in Hybrid Software Defined Networks Based on Bi-level Programming
Reserch of Flow Alloction Optimiztion in Hybrid Softwre Defined Netwo Bsed on Bi-level Progrmming Abstrct Lulu Zho, Mingchun Zheng b School of Shndong Norml Univeity, Shndong 250014, Chin fryrlnc@163.com,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationInnovative and applied research on big data platforms of smart heritage
Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge
More informationIn addition, the following elements form an integral part of the Agency strike prevention plan:
UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes
More informationIFC3 India-Android Application Development
IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationCurriculum for the Master Program in Business Education at the University of Innsbruck School of Management
The English version of the curriculum for the Mster Progrm in Business Eduction is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationHP Application Lifecycle Management
HP Appliction Lifecycle Mngement Softwre Version: 11.00 Tutoril Document Relese Dte: Novemer 2010 Softwre Relese Dte: Novemer 2010 Legl Notices Wrrnty The only wrrnties for HP products nd services re set
More informationSoftware Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning
Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More informationQoS Framework for SIP Signalling
QoS Frmework for SIP Signlling Alexnder A. Kist nd Richrd J. Hrris RMIT University Melourne BOX 2476V, Victori 3001, Austrli Emil: kist@ieee.org, richrd@ctt.rmit.edu.u ABSTRACT The Session Initition Protocol
More informationIntellio Video System 25
Intellio Video System 3 Video mngement softwre Min fetures streming Developed for Intellio smrtcmers Multi-megpixel network video recording Amplitude sed udio recording Monitoring 2 30 cmers per worksttion
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationLearner-oriented distance education supporting service system model and applied research
SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationCurriculum for the Master Program in Strategic Management at the University of Innsbruck School of Management
The English version of the curriculum for the Mster Progrm in Strtegic Mngement is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University
More informationCombined Liability Insurance. Information and Communication Technology Proposal form
Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y
More information2 Admission requirements 3 Duration of the program 4 Courses 5 Types of course units and number of participants
The English version of the curriculum for the Mster Progrm in Bnking nd Finnce is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished in the University
More informationFacilitating Rapid Analysis and Decision Making in the Analytical Lab.
Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires
More informationIaaS Configuration for Virtual Platforms
IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To
More informationArchitecture and Data Flows Reference Guide
Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationPerformance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationHow To Improve Network Performance
Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network
More informationResearch Article An RFID-Based Tracing and Tracking System for the Fresh Vegetables Supply Chain
Interntionl Journl of Antenns nd Propgtion Volume 2013, Article ID 531364, 15 pges http://dx.doi.org/10.1155/2013/531364 Reserch Article An RFID-Bsed Trcing nd Trcking System for the Fresh Vegetbles Supply
More informationEfficient load-balancing routing for wireless mesh networks
Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,
More informationTotal Data Protection for Sensitive Data Wherever It May Flow
Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationAllocation Strategies of Virtual Resources in Cloud-Computing Networks
RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,
More informationand thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
More informationThe Journal of Systems and Software
The Journl of Systems nd Softwre xxx (2008) xxx xxx Contents lists ville t ScienceDirect The Journl of Systems nd Softwre journl homepge: www.elsevier.com/locte/jss Energy-efficient rel-time oject trcking
More informationDEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.
Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER
More informationApplying SDN/OpenFlow in Virtualized LTE to support Distributed Mobility Management (DMM)
Applying SDN/OpenFlow in Virtulized LTE to support Distriuted Moility Mngement (DMM) Mortez Krimzdeh, Luc Vltulin, Georgios Krginnis Deprtment of Computer Science nd the Electricl Engineering, University
More informationQoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification
C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of
More informationFAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
More informationEuropean Convention on Certain International Aspects of Bankruptcy
Europen Trety Series - No. 136 Europen Convention on Certin Interntionl Aspects of Bnkruptcy Istnul, 5.VI.1990 Premle The memer Sttes of the Council of Europe, signtories hereto, Considering tht the im
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More informationModular Generic Verification of LTL Properties for Aspects
Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte
More informationHow To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
More informationWireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones
Wireless Wkeups Revisited: Energy Mngement for VoIP over Wi-Fi Smrtphones Yuvrj Agrwl, Rnveer Chndr,AlecWolmn, Prmvir Bhl, Kevin Chin, Rjesh Gupt Microsoft Reserch, Microsoft Corportion, University of
More informationDynamic TDMA Slot Assignment in Ad Hoc Networks
Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of
More informationCurriculum for the Master Program in Accounting, Auditing and Taxation at the University of Innsbruck School of Management
The English version of the curriculum for the Mster Progrm in Accounting, Auditing nd Txtion is not leglly inding nd is for informtionl purposes only. The legl sis is regulted in the curriculum pulished
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationYour duty, however, does not require disclosure of matter:
Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or
More informationApplication of Analytical Hierarchy Process (AHP) Technique To Evaluate and Selecting Suppliers in an Effective Supply Chain
Appliction of Anlyticl Hierrchy Process (AHP) Technique To Evlute nd Selecting Suppliers in n Effective Supply Chin Shhroodi 1*, Kmbiz, Industril Mngement Deprtment, Islmic Azd University (Rsht Brnch),
More informationENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)
ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems
More informationLinear Programming in Database
9 Liner Progrmming in Dtse Akir Kwguchi nd Andrew Ngel Deprtment of Computer Science, The City College of New York. New York, New York United Sttes of Americ Keywords: liner progrmming, simple method,
More informationLower Bound for Envy-Free and Truthful Makespan Approximation on Related Machines
Lower Bound for Envy-Free nd Truthful Mespn Approximtion on Relted Mchines Lis Fleischer Zhenghui Wng July 14, 211 Abstrct We study problems of scheduling jobs on relted mchines so s to minimize the mespn
More informationASG Techniques of Adaptivity
ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny
More informationHealth Information Systems: evaluation and performance of a Help Desk
536 Digitl Helthcre Empowering Europens R. Cornet et l. (Eds.) 2015 Europen Federtion for Medicl Informtics (EFMI). This rticle is published online with Open Access by IOS Press nd distributed under the
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationKofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
More informationSection 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
More informationReputation management for distributed service-oriented architectures
Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive
More informationPsychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013
Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl
More informationIndustrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen
Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More information