Synopsis: Ict: Computing:


Social Inclusion as Innovation.pdf

Retrieved 10.06.2013 from http://fundacaocafu. org. br/novo/index. php? n=1. 4. Fundação Gol de Letra.


Social innovation, an answer to contemporary societal challenges- Locating the concept in theory and practice.pdf

Concepts such as design in use and the appropriation work of users in information technology refer to practical efforts to make technologies work.


social network enhanced digital city management and innovation success- a prototype design.pdf

Digital Cities A digital city applies information technologies and virtual spaces to urban functions and activities (Caves & Walshok,

Garrison & Posey, 2006), easy-to-use environments, social computing, and services for collaboration and communication and how all these aspects of technology are needed to produce stable digital cities for everyone's benefit.

Characteristics and Processes, The DATA BASE for Advances in Information systems, Winter, 35,1, 65-79. Bucolo, S.,Ginn, S.,Gilbert, D,

. & Hayes, J. 2003), Transit Oriented Sustainable Urban Developments-Enhancing Community Consultation through Web Based Virtual Environments, Association for Computing Machinery Inc.,ACM Press, 271

Adopting Innovations in Information technology, Cities, 16 (1), 3-12. Churchill, E.,Girgensohn, A.,Nelson, L,

Digital Cities, Lecture Notes in Computer science 2362, Springer-verlag Berlin Heidelberg, 101-109. Granovetter, M.,(1976.

Experiences, Technologies and Future Perspectives Lecture Notes in Computer science, 1765, Springer-verlag. Kavassalis, P.,Lelis, S.,Rafea, M. & Haridi, S. 2004.

A Review of Municipally Owned Information Cities between the United states and Europe, Proceeding of International Association of Computer Information systems Pacific 2005 Conference, Taipei, Taiwan, May 19-21.

Wen-Bin Yu is an Assistant professor of Information science and Technology at the School of management and Information systems

Dr. Yu received his Phd in Computer science and Engineering from University of louisville. His research interests are in the fields of data/text mining, business process simulation, software agent applications,

Prashanth Kannan conducted research in the area of Social networking/Digital Cities and business innovations and received his MS degree in Computer sciences from University of missouri at Rolla.

An Examination of Internet Effectiveness for Non-work Activities Pruthikrai Mahatanankoon is an Assistant professor of Information systems at the School of Information technology at Illinois State university.

He received his Ph d. in Management Information systems from the Claremont Graduate University. He holds a Bachelor's degree in Computer engineering from King Mongkut's University of Technology Thonburi, Thailand, A m. S in Management Information systems,

and A m. S. in Computer science from Fairleigh Dickinson University. He has published various articles in academic book chapters, journals,

and conference proceedings. His current research interests focus upon Internet behaviors in the workplace, mobile commerce,

Tim Klaus is an Assistant professor of Management Information systems at Texas A&m University Corpus christi. He earned his Phd (Management Information systems) from University of South Florida and his MBA (Finance) and MS (Computer science) from Illinois State university.


social-innovation-mega-trends-to-answer-society-challenges-whitepaper.pdf

and cyber documents, the healthcare industry is poised for a radical change with information technology taking the forefront in research and development, diagnostics, and monitoring.

with information technology (IT) taking the forefront in research and development (R&d), diagnostics, and monitoring. Various innovations in the Healthcare industry are expected to revolutionise the medicine arena, with spending on healthcare segmentsmedical imaging, pharmaceuticals, medical devices


SouthEastRegionalAuthority120115 rural development programme.pdf

Sectoral programming, by its nature, will not allow for a meaningful evaluation of the achievement of balanced regional development.

unambiguous designation of the NUTS III Regions as the practical level for spatial programming in the new RDP.


Special Report-Eskills for growth-entrepreneurial culture.pdf

For example, it shows that the Department of computer science at the University of Sheffield is to establish a Computer science Ambassador Scheme for 45 secondary school pupils

which will deliver short‘hands on'courses in core computer science for pupils aged 14-15,

and students to engage with computer science in a fun way. Schaart said that the Commission has promoted rightly digitalisation and its adoption by society as one of the most important sources for growth and employment.

No image problem Higgins said that employers face a big challenge in communicating what sort of exciting job opportunities the industry is providing, especially since fewer people study computer science.

Less than 10%of app developers are female and only 20%of computing graduates each year are women.

Big data is a goldmine for companies Computer algorithms are better at diagnosing severe cancer than humans,

That's done by placing different algorithms onto these large amounts of data. Let me give you an example.

Google ran all the terms through an algorithm a way of making a calculation-that ranked the terms by how well they correlated with flu outbreaks.

It's a demonstrable fact that a computer algorithm is better at diagnosing severe cancer than a human.


SPRINGER_Digital Business Models Review_2013.pdf

values and networks and alliances. 2. 2 Why Digital Business models The role of information technology and its relationship to the business has shifted over the last 20 years.

We have progressively transitioned from a focus on the design of information systems, to the design of IT-enabled business processes,

The information systems discipline has explored and explicated many of these differences. One of its most important conclusions is that technology

Review and Synthesis into one fabric it no longer makes sense to talk about information technology as a tool


Standford_ Understanding Digital TechnologyGÇÖs Evolution_2000.pdf

even if the information technology revolution has the potential to significantly raise the rate of growth of total factor productivity (TFP) in the long run,

moreover, assume that investments embodying information technology earn only a normal private rate of return and do not yield significantly higher social rates of return due to externalities and other spillover effects.

and the private rates of return on this the new information technology and all of its networked applications. 4 Economists'reactions to questions concerning the anomalous slowdown of TFP growth

and thereby help us to resolve the information technology paradox, would be some quantitative evidence that the suspected upward bias in the aggregate output deflators has been getting proportionally larger over time.

New information technologies, and improved access to marketing data are indeed enabling faster, less costly product innovation,

It also is the case that subsequent investigations along the same lines have found that there were additional intangible investments that were correlatives of high information technology-intensity.

and the market valuation of computer-intensive firms for concluding that the diffusion of information technologies among large business firms has entailed substantial levels of intangible asset formation. 23 The latter,

if firms are to effectively exploit the enhanced capabilities of new information technologies. Thus, the narrow scope of conventional output measures may persist for some time in failing to register the relative rise of this form of asset production,

it is puzzling why more conventional indices of productivity in branches of industry that previously were regarded not to be"unmeasurable"have not been affected more positively by the advent of new information technologies.

while others are part of the learning investments being made by firms in formal and informal on the job knowledge acquisition about information technology. 14 performance of microprocessor components and for many applications,

In any case, it is expected now that a modern organization will provide reasonably sophisticated information technology as part of the office equipment to which every employee is entitled.

inescapable burden imposed by the very nature of the new information technology, and so destined to perpetuate itself as that technology become more and more elaborate?

Section 7). 15 4. 2 The general purpose computing trajectory, from mainframes to the PC revolution The widespread diffusion of the stored program digital computer is intimately related to the popularization of the personal computer as a"general purpose"technology for information processing,

and computation applications supported the birth of the minicomputer industry. These two developments provided the key trajectories for the birth of the personal computer.

The disappearance of task-based computing in favor of general purpose personal computers and general purpose

The revolutionaries had kept their promise that the PC would match the computing performance of the mainframes of yesteryear.

through the intermediation of personnel with appropriate information system access, receive an array of service quality improvements.

and hence elaborate a technological and organizational regime built around a new general purpose technology, the microelectronic digital computing engine--or, for simplicity, the computer.

and develop new methods for information system design. Firstly, a growing range of information technologies has become available that are purpose-built

and task-specific. Devices such as supermarket scanners were applied to a wide range of inventory and item tracking tasks

may be seen in the expansion of inter-organizational computing for the mass of transactions involving purchase ordering,

Information technology and the Productivity Miracle, Princeton university Department of economics Working Paper, May 1997. Boskin, M. J.,1996, Toward a More Accurate Measure of the Cost of living, Final Report to the Senator Finance committee from the Advisory Commission to Study the Consumer price index, pp. 1-97.

and Lorin Hitt, Information technology and Recent Changes in Work Organization Increase the Demand for Skilled labor, in M. Blair and T. Kochan, eds.,

and Lorin Hitt, Information technology, Workplace Organization and the Demand for Skilled labor: Firm-level Evidence, National Bureau of Economic Research:

and Lorin Hitt, Information technology as a Factor of Production: The Role of Differences Among Firms, Economics of Innovation and New Technology, 3 (3-4), pp. 183-99,1995.

Firm-Level Evidence Of high Returns to Information systems Spending, Management Science, April 1996. Brynjolfsson, Erik and Lorin Hitt, Information technology, Organization, and Productivity:

Evidence from Firmlevel, MIT Sloan School of management Working Paper, 1997. Brynjolfsson, Erik, and Lorin Hitt, Beyond Computation:

Information technology, Organizational Transformation and Business Performance, MIT Sloan School of management Working Paper, September 1998.25 Brynolfsson, Erik and S. Yang, The Intangible Costs and Benefits of Computer Investments:

Evidence from Financial Markets, Proceedings of the International Conference on Informational Systems, Atlanta, Ga.,December 1997 (Revised April 1999.

The‘Productivity Paradox'after Ten Years, Ch. 1 of Productivity and the Information technology Revolution, P. A. David and W. Edward Steinmueller, eds.

Cambridge university Press, 1997, pp. 433-63.26 Gordon, Robert J.,Monetary Policy in the Age of Information technology:

Lehr, William and Frank R. Lichtenberg, Information technology and Its Impact on Productivity: Firm-Level Evidence from Government and Private Data Sources, 1977-1993, Canadian Journal of Economics, 1998.


Survey on ICT and Electronic Commerce Use in Companies (SPAIN-Year 2013-First quarter 2014).pdf

%the risk of corporate security holes (31%)and the high price of Could Computing services (27.8%).

*Conversely, those companies in the Autonomous Cities of Ceuta and Melilla and those companies in the Autonomous Communities of Extremadura and Castilla-La Mancha had the lowest percentages of use of information technologies.(*


Survey regarding reistance to change in Romanian Innovative SMEs From IT Sector.pdf

54.9%of companies NACE code principal-6201 (Activities to develop custom software (softwareoriented client), 20.9%CAEN 6202 (consultancy activities information technology),

9. 9%-NACE code 6209 (Other information technology service activities), 10,9%-NACE 6311 (data processing, hosting and related activities), 1,


Targetspdf.pdf

%Most of the upgrades in European cable networks already took place by 2011, while VDSL coverage doubled in the last three years.


Tepsie_A-guide_for_researchers_06.01.15_WEB.pdf

Information systems Management 31 (3), S. 200 224. Knowing what works at the micro level As social innovation is an area of increasing interest


The 2013 EU Industrial R&D Investment Scoreboard.pdf

http://epp. eurostat. ec. europa. eu/statistics explained/index. php/Foreign direct investment statistics. 70 The 2013 EU Industrial R&d Scoreboard The two top investing countries

ii) different companies'information systems for measuring the costs associated with R&d processes; iii) different countries'fiscal treatment of costs.


The future internet.pdf

Lecture Notes in Computer science 6656 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis,

Information systems, University of Applied sciences Western Switzerland, Sierre, Switzerland henning. mueller@hevs. ch VI List of Editors Man-Sze Li IC Focus, London

The network of the future Cloud computing, Internet of services and advanced software engineering Internet-connected objects Trustworthy ICT Networked media

235 A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab...

as a ubiquitous and universal means for communication and computation, has been extraordinarily successful, there are still many unsolved problems and challenges some

Unification and higher degree of integration of the communication, storage, content and computation as the means of enabling change from capacity concerns towards increased and flexible capability with operation control.

The Towards In-Network Clouds in Future Internet chapter explores the architectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities,

The Future Internet as a global and common communication and distributed information system may be considered from various interrelated perspectives:

More investigations into the larger privacy and data protection ecosystem are required to overcome current limits of how current information systems deal with privacy and protection of information of users,

ACM SIGSOFT Software engineering Notes 17,4 (1992) 17 Papadimitriou, D.,et al. eds.):) Open Research Issues in Internet Congestion Control.

which take advantage of flexible sharing of available connectivity, computation, and storage resources. This paper aims to explore the architectural co-existence of new and legacy services and networks, via virtualisation of connectivity and computation resources and self management capabilities,

by fully integrating networking with cloud computing in order to create In-Network Clouds. It also presents the designs and experiments with a number of In-Network Clouds platforms

which take advantage of flexible sharing of available resources (e g. connectivity, computation, and storage resources). This paper aims to explore the architectural co-existence of new and legacy services and networks, via virtualisation of resources and self management capabilities,

which supports multiple computing clouds from different service providers operating on coexisting heterogeneous virtual networks

By decoupling service providers from infrastructure providers and by integrating computing clouds with virtual networks the In-Network clouds introduce flexibility for change.

Together these distributed systems form a software-driven network control infrastructure that will run on top of all current networks (i e. fixed

These components could have direct interworking with control algorithms situated in the control plane of the Internet

This implies that the Orchestration Plane may use very local knowledge to deserve a real time control as well as a more global knowledge to manage some long-term processes like planning. 2. 3 Virtualisation Plane Overview Virtualisation hides the physical characteristics 14,16 of the computing

which virtual machines can be relocated dynamically to any physical node or server regardless of location, network,

the vspi and the vcpi (Virtualisation System Programming interface and Virtualisation Component Programming interface, respectively. A set of control loops is formed using the vspi and the vcpi,

Virtualisation Component Programming interface (vcpi. Each physical resource has associated an and distinct vcpi. The vcpi is fulfilling two main functions:

Full design and implementation of all software platforms are presented in 10. vcpi (Virtual Component Programming interface is the VP's main component dealing with the heterogeneity of virtual resources

and validated on 2 testbeds enabling experimentation with thousands of virtual machines: V3 UCL's Experimental Testbed located in London consisting of 80 cores with a dedicated 10 Gbits/s infrastructure

Autonomic service provisioning on In-Network Clouds (Service Computing Clouds. 4 Conclusion This work has presented the design of an open software networked infrastructure (In-Network Cloud) that enables the composition of fast and guaranteed services in an efficient manner,

which were described with the help of five abstractions and distributed systems the OSKMV planes: Virtualisation Plane (VP), Management Plane (MP), Knowledge Plane (KP), Service Plane (SP) and Orchestration Plane (OP). The resulting software-driven control network

and Sándor Imre Budapest University of Technology and Economics department of Telecommunications Mobile Communication and Computing Laboratory Mobile Innovation Centre Magyar Tudosok krt. 2, H-1117

the algorithms supporting dynamic mobility could also be distributed. Such integration is accomplished in 44 45 where authors introduce

computation's and storage's networks and services has been a clear trend in the Information and Communications technology (ICT) domain.

interrelation and unification of the communication, storage, content and computation substrata. Networking-awareness 4 challenges imply the consumer-facing

These designs about architecture for the federated reference model by functional blocks addresses the specification of mechanisms including models, algorithms, processes, methodologies and architectures.

Algorithms and processes to allow federation in enterprise application systems to visualize software components, functionality and performance.

Algorithms and processes to allow federated application management systems reconfigure or redeploy software components realizing autonomic application functionality.

From Autonomic Computing to Autonomic Networking: an Architectural Perspective. In: Proc. of 5th IEEE Workshop on Engineering of Autonomic and Autonomous Systems (EASE 2008),

in order to be identified uniquely by information systems. However the concept has grown into multiple dimensions, encompassing sensor networks able to provide real world intelligence or the goal-oriented autonomous collaboration of distributed objects via local wireless networks or global interconnections such as the Internet.

and its representation in the digital world of information systems, enabling what we refer to in part of the Future Internet Assembly (FIA) community as the so called Real world Internet (RWI).

and discovery (where a spatiotemporal extension of SPARQL stsparql-,is used to discover data sources from the Semsorgrid4env registry),

data access and query (where ontology-based and non-ontology-based query languages are provided to access data:

SPARQL-Stream and SNEEQL a declarative continuous query language over acquisition sensor networks, continuous streaming data,

and data integration (where the ontology-based SPARQL-Stream language is used to integrate data from heterogeneous and multimodal data sources).

or federated (peered) resource directory as a rendezvous point that stores resource descriptions SPARQL based query interface,

/PECES PERVASIVE Computing in Embedded systems, FP7, http://www. ict-peces. eu/Semsorgrid4env Semantic Sensor Grids for Rapid Application Development for Environmental Management, FP7

, users, contents, services, network resources, computing resources, device characteristics) via virtualization and data mining functionalities; the metadata produced in this way are then input of intelligent cognitive modules

which forces to keep algorithms and procedures, laying at different layers, independent one another. In addition, even in the framework of a given layer, algorithms and procedures dealing with different tasks are designed often independently one another.

These issues greatly simplify the overall design of the telecommunication networks and greatly reduce processing capabilities,

Nevertheless, a major limitation of this approach derives from the fact that algorithms and procedures are poorly coordinated one another,

The issues above claim for a stronger coordination between algorithms and procedures dealing with different tasks.

most of the algorithms and procedures embedded in the telecommunication networks are open-loop, i e. they are based on off-line"reasonable"estimation of network variables (e g. offered traffic), rather than on real-time measurements of such variables.

This claims for an evolution towards closed-loop algorithms and procedures which are able to properly exploit appropriate real-time network measurements.

and hence embedding technology-dependent algorithms and procedures, as well as from the large variety of heterogeneous Actors who are playing in the ICT arena.

this framework, on the one hand, is expected to embed algorithms and procedures which, leaving out of consideration the specificity of the various networks,

which serve as Cognitive Enabler input, coupled with a proper design of Cognitive Enabler algorithms (e g.,

, multiobjective advanced control and optimization algorithms), lead to cross-layer and cross-network optimization. The Cognitive Framework can exploit one or more of the Cognitive Enablers in a dynamic fashion:

In particular, the concentration of control functionalities in a single framework allows the adoption of algorithms

The concentration of the control functionalities in such Cognitive Enablers allows the adoption of multi-object algorithms and procedures

for the algorithms and rules embedded in the Cognitive Enablers, which are expected to remarkably improve efficiency.

6) The modularity of the Cognitive Manager functionalities allows their ranging from very simple SW/HW/computing implementations,

trading-off the advantages achieved in terms of efficiency with the entailed additional SW/HW/computation complexity.

which are worthwhile with respect to the increased SW/HW/computing complexity. The following section shows an example of application of the above-mentioned concepts.

it has been implemented to perform technology independent resource management algorithms (e g.,, layer 2 path selection), in order to guarantee that flow's Qos requirements are satisfied during the transmission of its packets over the network.

In particular, a Connection Admission Control algorithm, a Path selection algorithm and a Load Balancing algorithm has been considered in our tests.

453 MHZ Broadcom Processor with 8 MB Flash memory and 64 MB RAM; a WAN port and four LAN up to 1 Gigabit/s) and cross-compiled the code,

the algorithms the Cognitive Enabler will be based on, have all to be selected carefully case by case;

information systems, software engineering and semantic web. In the technology area one of the most commonly used definitions is from Tom Gruber,

and Semantic web languages (RDF, RDFS, DAML+OIL, OWL SPARQL, GRDDL, RDFA, SHOE AND SKOS), among others 13.

The following OWL sample code shows one use case example for distributed programming, where the application entity with title Master-USP-1 sends its needs to the Service Layer.

comment>Example of the Entity Title Model to support distributed programming needs.</</rdfs: comment><Has need rdf:

Thing>By this semantic information, the Service and Data link layers can support the distributed programming communication using different approaches,

Information technology-Open Systems Interconnection-Application Layer Structure. Recommendation X. 207-ISO/IEC 9545: 1993 (1993) 17 Lacy, L.:

27th Brazilian Symposium on Computer networks and Distributed systems-SBRC (2009) 23 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

Distributed systems Ontology. In: IEEE/IFIP New Technologies, Mobility and Security Conference (2009) 24 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

Network Headers Optimization for Distributed Programming. In: 9th International Information and Telecommunication Technologies Symposium (2010) 26 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

IEEE International Conference on Peer-to-peer Computing P2p 2010, Delft, The netherlands (August 2010) 7. Bindal, R.,Cao, P.,Chan, W.,Medval, J

26th IEEE International Conference on Distributed computing Systems, Montreal, Canada (June 2006) Assessment of Economic Management of Overlay Traffic:

9th International Conference on Peer-to-peer Computing (P2p'09), Seattle, USA (September 2009) 9. The Smoothit Project:

MPTCP is an extension for end-hosts it doesn't require an upgrade to the routing system;

The operator upgrades its traffic management box so that it drops Conex traffic with a lower probability.

Only one party has to upgrade, ie the combined CDN-ISP. The Content providers and consumers don't know about Conex.

Therefore the ISP needs to upgrade two things. Firstly its traffic management box: it needs to do occasional auditing spot-checks,

There is no need to coordinate end users all having to upgrade. Every user can immediately use the new (virtualised) software,

Information systems Journal 14 (3), 265 294 (2004) 5. Katz, M.,Shapiro, C.:Technology Adoption in the Presence of Network Externalities.

Stability of end-to-end algorithms for joint routing and rate control. Computer Communication Review 35,2 (2005) 20.

when introducing new information systems into organizations, suggests an iterative approach to studying complex and problematic real-world situations (called systems)

and a novel con 156 C. Kalogiros et al. gestion control algorithm that gives the right incentives to users of bandwidth intensive applications.

16th Annual Symposium on Theoretical Aspects of Computer science 1999, pp. 404 413 (1999) 13. MOBITHIN project:

Cloud computing, for instance, is built on shared resources and computing environments, offering virtualized environments to individual tenants

while executing them on shared physical storage and computation resources. The concept of Platform-as-a-service provides joint development and execution environments for software and services,

The authors propose security support in programming and execution environments for services, and suggest using rigorous models through all phases of the SDLC, from requirements engineering to model-based penetration testing.

and Sasu Tarkoma2 1 Helsinki Institute for Information technology HIIT/Aalto University School of Science and Technology, Espoo, Finland {Kari.

routing algorithm, reachability, and Qos for the publication and may support transport abstraction specific policies such as replication and persistence for data-centric communication.

5th international workshop on Software engineering and middleware, pp. 98 105 (2005) 8. Merkle, R.:Secrecy, authentication,

and the opportunity for establishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering,

however, we are now witnessing the emergence of new and unprecedented models for service-oriented computing for the Future Internet:

from requirements over architecture and design to the composition and/or programming of working solutions.

both from a general perspective and from a security perspective for security-critical software systems. 4 Security Support in Programming Environments Security Support in Programming Environments is not new;

and (3) a broad range of programming technologies will be used to develop the actual software and systems.

The search for security support in programming environments has to take this context in account.

The requirements and architectural blueprints that will be produced in earlier stages of the software engineering process cannot deliver the expected security value

Supporting security requirements in the programming code level requires a comprehensive approach. The service creation means must be improved

as well as programming new services from scratch using a state-of-the-art programming language. The service creation context will typically aim for techniques

Secure Service Programming Many security vulnerabilities arise from programming errors that allow an exploit. Future Internet will further reinforce the prominence of highly distributed and concurrent applications,

Lock-free wait-free algorithms for common software abstractions (queues, bags, etc. are one of the most effective approaches to exploit multi-core parallelism.

These algorithms are hard to design and prove correct, error-prone to program, and challenging to debug.

Adherence to Programming Principles and Best-Practices. Programming support must include methods to ensure the adherence of a particular program to well-known programming principles or best-practices in secure software development.

Emphasis will be put on language extensions that guarantee adherence to best-practices and verified design patterns that can be used during development.

Obviously the security support in programming environments that must be delivered will be essential to incept a transverse methodology that enables to manage assurance throughout the software and service development life cycle (SDLC.

Security policies can be implemented correctly by construction through a rigorous secure programming discipline. Internet applications can be validated through testing.

Complementing activities are related to secure programming. This strand addresses a comprehensive solution for program verification,

run-time verification must complement programming-level verification and testing in order to provide the final assurance that the latter cannot deliver,

Metrics can be used directly for computing risks (e g.,, probability of threat occurrence) or indirectly (e g.,

secure programming as well as assurance and the relation to each of these ingredients must be investigated. During security requirements engineering risk analysis facilitates the identification of relevant requirements.

and the opportunity for firmly establishing a discipline for engineering secure Future Internet Services, typically based on research in the areas of software engineering, security engineering and of service engineering.

Proceedings of the 22nd Annual Symposium on Foundations of Computer science, WASHINGTON DC, USA, pp. 350 357.

Irm enforcement of java stack inspection. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, WASHINGTON DC, USA, pp. 246 255.

Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference, WASHINGTON DC, USA, p. 253.

Integrating Security and Software engineering: Advances and Future Vision, IDEA (2006) 13. Group, O.:Security design pattern technical guide, http://www. opengroup. org/security/gsp. htm 14.

A programming model for concurrent object-oriented programs. ACM Trans. Program. Lang. Syst. 31,1 1 (2008), doi:

Computer science Review 4 (2), 81 99 (2010) 19. Le Guernic, G.,Banerjee, A.,Jensen, T.,Schmidt, D. A.:

they are no longer the result of programming components in the traditional meaning but are built by composing services that are distributed over the network

Towards Formal Validation of Trust and Security in the Internet of Services 195 Second, SOAS are also distributed systems,

and our main motivation is to take into account the security policies while computing an orchestration. The AVANTSSAR Platform, for example, implements an idea presented in 11 to automatically generate a mediator.

This allows for the use of classical automated first-order reasoning techniques, in particular resolution or fixed-point computations of static analysis. Thanks to the over-approximation,

Though the use of FM would promote a more secure development environment, a variety of practical and cultural reasons lead the industrial world to perceive FM approaches as being expensive in terms of time

and (iii) the differences between formal languages and models and those used in industrial design and development environments (e g.,

, BPMN, Java, ABAP. The problem is how to make new, efficient methodologies and technologies accessible and readily exploitable, benefitting industry designers and developers.

and migrated to the selected development environments. A concrete example is the industry migration of the AVANTSSAR Platform to the SAP environment.

Journal of Logic and Algebraic Programming 70 (1), 96 118 (2007) 20. Marconi, A.,Pistore, M.:

Proceedings of the 18th IEEE Symposium on Foundations of Computer science, pp. 46 57. IEEE Computer Society Press, Los Alamitos (1977) 26.

and service-oriented access to virtualized computing, data storage and network resources as well as higher level services.

the SNIA Cloud storage Technical Working group or the OGF Open Clouds Computing Interface Working group. Trust and security are regarded often as an afterthought in this context,

inter alia with regard to upgrades and patches, quick procurement services, avoidance of vendor lock ins, and legacy modernization 18.

and networks are understood well and technologies such as virtual machines, vlans, or SANS provide isolation. Sharing resources such as operating systems, middleware,

While an enterprise customer may own a virtual machine (Machine-level isolation), this machine may use a database server (Middleware isolation)

, trusted computing 21 or computations on outsourced data 20. Trustworthy Clouds Underpinning the Future Internet 215 3. 3 Failures of the Cloud Management Systems Due to the highly automated nature of the cloud management systems

Another source of failure stems from the fact that large-scale computing clouds are built often using low-cost commodity hardware that fails (relatively) often.

Cryptographers have designed schemes such as homomorphic encryption 9 that allow verifiable computation on encrypted data. However, the proposed schemes are too inefficient

A more practical solution is to use Trusted Computing to verify correct policy enforcement 6. Trusted computing instantiation as proposed by the Trusted Computing Group (TCG) uses secure hardware to allow a stakeholder

Hence, a computing cloud may use the services of a storage cloud. Unlike local data centers residing in a single country

Trustworthy Clouds Underpinning the Future Internet 219 5 Outlook The Path Ahead Cloud computing is not new it constitutes a new outsourcing delivery model that aims to be closer to the vision of true utility computing.

Proceedings of the 2010 IEEE 30th International Conference on Distributed computing Systems Workshops, WASHINGTON DC, USA. ICDCSW'10, pp. 77 81.

outsourcing computation without outsourcing control. In: ACM Workshop on Cloud computing Security (CCSW'09), pp. 85 90.

Proceedings of the 41st annual ACM symposium on Theory of computing, Bethesda, MD, USA. STOC'09, pp. 169 178.

Proceedings of the 4th International Workshop on Large scale Distributed systems and Middleware, Z urich, Switzerland. LADIS'10, pp. 12 17.

Token-Based Cloud computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency. In: Acquisti, A.,Smith, S.,Sadeghi, A r. eds.

Proceedings of the 3rd international conference on Trust and trustworthy computing, Berlin, Germany, June 21-23,2010.

In the cloud users and businesses can buy computing resources (e g.,, servers, services, applications) provided by the cloud

IEEE International Workshop on Policies for Distributed systems and Networks, pp. 22 29 (2010) 5. Karjoth, G.,Schunter, M.,Waidner, M.:

Proceedings of the 2006 international workshop on Software engineering for secure systems. SESS'06, New york, NY, USA, pp. 51 58.

extensible access control markup language (xacml) version 3. 0, extensible access control markup language (xacml) version 3. 0, oasis (August 2008) 9. Shostack, A.,Syverson, P.:

and Resource Allocation Algorithms on the Federated Environment of Panlab reports on experiments needing to directly interact with the environment during runtime,

and solutions for a significant upgrade of the federated testbed environment that was used. The chapter by Zseby et al. entitled Multipath Routing Experiments in Federated Testbeds demonstrates the practical usefulness of federation and virtualisation in heterogeneous testbeds.

The Author (s). This article is published with open access at Springerlink. com. A Use-Case on Testing Adaptive Admission Control and Resource Allocation Algorithms on the Federated Environment of Panlab Christos

and Spyros Denazis Electrical and Computer engineering department, University of Patras, Rio, Patras 26500, Greece tranoris@ece. upatras. gr, yrz@anche. no, sdena@upatras. gr

This paper presents a use case where an adaptive resource allocation algorithm was tested utilizing Panlab's infrastructure.

As a result of this use case a new feature for Panlab was developed called Federation Computing Interface (FCI) API

i) to run the experiment by moving a designed algorithm from a simulating environment to near production besteffort environment

As a result to accomplish the needs of this experiment was the development of a new feature of Panlab's framework called Federation Computing Interface (FCI) API.

and how Panlab framework is able by means of Federation Computing Interface API to managed resource.

A Use-Case on Testing Adaptive Admission Control 239 2 Use Case Description In order for one to test an adaptive admission control and resource allocation algorithm,

and resource usage in virtual machines. Fig. 1. The setup for testing the algorithm The adaptive admission control

and resource allocation algorithm is applied to succeed in specific target of network metrics, like round trip time and throughput.

This will be done by deploying a proxy-like control component for admission control and using Xen server technology to regulate CPU usage.

During this scenario the adaptive admission control and resource allocation algorithm is tested against network metrics, like round trip time and throughput.

During the setup, the researcher wants to test http proxy software written in C programming language that implements an admission algorithm.

The algorithm, which is located at the proxy unit, needs to monitor the CPU usage of the Web application and Database machines.

Then the algorithm should be able to set new CPU capacity limits on both resources.

Additionally the algorithm should be able to start and stop the work load generators on demand. 3 Technical Environment, Testbed Implementation and Deployment From the requirements of the use case,

and monitor resources within the C algorithm. So the resources need to provide monitoring and provisioning mechanisms.

-Linux machines for the RUBIS based work load generators-A Linux machine for the hosting the algorithm unit,

capable of compiling C and Java software-Linux machines for running XEN server where on top will run the RUBIS Web app

and database The final user needs to provide the algorithm under test. He will just login to the Proxy Unit,

all the components are managed based on Virtual machines by a XEN server. The implemented RAS instantiate all these Virtual machines and configure the internal components according to end-user needs.

The work load generator exposes parameters such as: used IP for the testbed, memory, hard disk size, number of clients, ramp up time for the requests and a parameter used during the execution of the experiment called Action

RADL's textual syntax aims to be easier to describe a RA than code in Java or other target language.

For example the RUBIS clients need to know about the IP of the proxy which hosts the algorithm.

and Operating the Experiment The scenario during the experiment utilizes the Federation Computing Interface (FCI) API that Panlab provides 5. Federation Computing Interface (FCI) is an API for accessing resources of the federation.

Fig. 5. Designing the algorithm to operate resources during execution In our testing scenario there is a need to configure resources

Figure 5 displays this condition where the System Under Test (SUT) is our algorithm. FCI automatically creates all the necessary code that the end user can then inject inside the algorithm's code.

The end-user needs just to ender his credentials in order 244 C. Tranoris, P Giacomin, and S. Denazis FCI to generate the necessary wrapper classes

An example is given in the following code listing in Java://an example Java federation program public class Main {public static void main (String args){/An example for VCT:

the java listing displays how we can access the resources of this VCT. FCI creates a java class,

called academic07()that we can instantiate in order to get access to the resources. Additionally, for each resource that participates in the VCT java classes are able to provide access.

For example the command myvct. getuop rubis cl 91(.set-ACTION("start";"starts the RUBIS client of the rubis cl 91 resource.

()is able to give back the CPU usage of the database resource. 5 Conclusions The results of running an experiment in Panlab are encouraging in terms of moving the designed algorithms from simulating environments to near production environments.

What is really attractive is that such algorithms can be tested in a best-effort environment with real connectivity issues that cannot be performed easily in simulation environments.

although not comparable currently with similar approaches are really encouraging in terms of moving the designed algorithms from simulating environments to near production environments.

What is really attractive is that such algorithms can be tested in a best-effort environment with real connectivity issues that cannot be performed easily in simulation environments.

net/trac/wiki/RADL 5. Federation Computing Interface (FCI), http://trac. panlab. net/trac/wiki/FCI Multipath Routing Slice Experiments in Federated

, Institute of Computer science, Wuerzburg, Germany, thomas. zinner christian. schwartz phuoc. trangia@informatik. uni-wuerzburg. de 3 University of Vienna,

This is a Java based platform that manipulates two independent entities, the first is ITGSEND process that undertakes the traffic generation

Resource Adapter Description Language (RADL) 9 was used to generate source code for each Resource Adaptor (RA), where, for example,

Testing End-to-end Self-Management in a Wireless Future Internet Environment 265 Fig. 4. Decision-making algorithm for configuration action selection Simple Fig. 4 presents

Fig. 5. Decision making algorithm for configuration action selection Advanced 266 A. Kousaridas et al. The above figure (Fig. 5) illustrates the advanced version of the scheme presented above.

/ITG/index. php 9. Resource Adapter Description Language, http://trac. panlab. net/trac/wiki/RADL Part V:

and computation, there are still many unsolved problems and challenges some of which have basic aspects. Many of these aspects could not have been foreseen

promoted mainly by the necessity of support interoperability between heterogeneous, complex and distributed systems, while it should remain open for further and continuous improvement without the necessity of another disruptive modification in the future.

Real world Internet (2009), http://rwi. future-internet. eu/index. php/Position paper 5. Afuah, A.,Tucci, C. L.:

Proceedings of the 2nd International Conference on Autonomic Computing and Communication systems, pp. 1 6 (2008) 21.

The autonomic computing edge: Can you CHOP UP autonomic computing? IBM Corporation (2008) 30. Prehofer, C.,Bettstetter, C.:

Self-organization in Communication Networks: Principles and Design Paradigms. IEEE Communications Magazine 43 (7), 78 85 (2005) 31.

in order to evaluate the proposed algorithm and strengthen the proof of concept. Finally, the article concludes with key findings

Pervasive and Mobile Computing 2, 65 84 (2006) 6. Chen, H.,Wu, H.,Tzeng, N.:

5 Nextworks 6 Athens Information technology 7 SAP Research 8 Poznan Supercomputing and Networking Center 9 INRIA 10 University of Essex 11 Universiteit van

Indeed, IT resources are processing data that should be transferred from the user's premises or from the data repository to the computing resources.

The network's service outages and hostile hacks have received significant attention lately due to society's high dependency on information systems.

A company hosts an Enterprise Information system externally on a Cloud rented from a Softwareas-a-Service (Saas) provider.

where distributed computing and storage resources are scaled automatically up and down, with guaranteed high-capacity network connectivity. The enhanced Network Control Plane (NCP+)proposed in our architecture (Fig. 1) offers integrated mechanisms for Network+IT Provisioning Services (NIPS) through the on-demand and seamless provisioning of optical and IT resources.

The path computation is performed by dedicated PCES that implements enhanced computation algorithms able to combine both network

In case of inefficiency of the underlying infrastructure, the control plane is able to request the upgrade or downgrade of the virtual resources,

thereby addressing challenge#4. We evaluated an energy efficient routing algorithm (due to space limitations, the detailed algorithm is not 318 P. Vicat-Blanc et al.

Fig. 6. Number of activated fibers. Fig. 7. Number of activated data centers. shown here) from a networked IT use case:

Simulation results (see Fig. 4-6) indicate that our proposed algorithm can decrease the energy consumption by 10%compared to schemes where only IT infrastructure is considered and up to 50%when taking only the network into account

and Reality of Delivering Computing as the 5th Utility. In: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, WASHINGTON DC, USA.

CCGRID'09, p. 1. IEEE Computer Society Press, Los Alamitos (2009), doi: 10.1109/CCGRID. 2009.97 20 Mintotalpower:

A Path Computation Element (PCE)- Based Architecture. RFC 4655 (Informational)( Aug 2006), http://www. ietf. org/rfc/rfc4655. txt 6. Handley, M.:

but cloud computing is acknowledged generally to be the provision of IT capabilities, such as computation, data storage and software on-demand, from a shared pool, with minimal interaction or knowledge by users.

-Infrastructure as a service offering resources such as a virtual machine or storage services. -Platform as a service providing services for software vendors such as a software development platform

so that other resources can be discovered. 6 See http://www. internet-of-services. com/index. php?

Software services could potentially be selected by choosing a virtual machine template which contains pre-loaded applications,

whose role is to carry out the creation of the new virtual machines which constitute the service along with monitoring and reporting for that service.

SMS wrappers deployed in the application server of the corresponding virtual machine has to connect and execute different tasks with core mobile network systems that are behind Telefónica Software Delivery Platform (SDP).

Journal of Internet Engineering 4 (1)( 2010), http://www. jie-online. org/ojs/index. php/jie/issue/view/8 3. Miller, B.:

The autonomic computing edge: Can you CHOP UP autonomic computing? Whitepaper IBM developerworks (March 2008), http://www. ibm. com/developer works/autonomic/library/ac-edge4/4. Theilmann, W.,Winkler, U

.,Happe, J.,Magrans de Abril, I.:Managing on-demand business applications with hierarchical service level agreements.

This work uses OWL as formal language for this communication as the OWL was adopted by a considerable number of initiatives

The FINLAN ontology supports the network communication used by the Autoi vcpi (Virtual Component Programming interface) 13,

Based on the Autoi Java open source, in the ANPI demo, the ANPISDD class is prepared to use the IP and TCP (port 43702) protocols.

as in the following sample code extracted from the ANPISDD. java code. 348 E. Santos et al. public class ANPISDD extends Thread {private Serversocket server;

allowing the facilities in its use in different programming languages, since the methods proposed would be available at the operating system level. 4 Conclusions This paper has presented the FINLAN ontology works in a collaboration perspective with some Future Internet projects.

Distributed systems Ontology. In: IEEE/IFIP New Technologies, Mobility and Security Conference (2009) 8 Pereira, J. H. S.,Kofuji, S. T.,Rosa, P. F.:

using standards (RDF*,SPARQL). 4. Include links to other URIS, so that they can discover more things. 1 http://developer. zemanta. com/2 http://www. internet-of-services. com/index. php?

id=288&l=0 3 http://www. internet-of-services. com/index. php? id=260&l=0 Fostering a Relationship between Linked Data and the Internet of Services 353 RDF (Resource Description Framework) is a simple data model for semantically describing resources on the Web.

Binary properties interlink terms forming a directed graph. These terms as well as the properties are described by using URIS.

SPARQL is a query language for RDF data which supports querying diverse data sources, with the results returned in the form of a variable-binding table,

Web services provide means for the development of open distributed systems based on decoupled components, by overcoming heterogeneity

and on service discovery algorithms to provide a generic semantic service registry able to support advanced discovery over both Web APIS

of describing accepted/expected messages using SPARQL graph patterns. While this is a design decision, it aims at the greatest familiarity and ease for Linked Data developers.

The authors of 26 use the SPARQL query language to formulate user goals, and to define the pre-and post-conditions of SAWSDL-based service descriptions, which to some degree, at least conceptually,

Although, the use of SPARQL is similar across different proposals, how the patterns are exploited again offers alternative,

defined again as SPARQL CONSTRUCT queries. Work is ongoing on graph pattern-based discovery and process definition and execution. 22 http://linkedservices. org 23 http://groups google. com/group/linkeddataandservices/24 Currently that the graph patterns contained in this request,

IEEE Int'l Conference on Services Computing, July 2010, pp. 602 609 (2010) 6. Berners-Lee, T.:

Journal of Universal Computer science 16 (13), 1694 1719 (2010) 11. Maleshkova, M.,Pedrinaci, C.,Domingue, J.:

IEEE Internet Computing 12 (5), 13 15 (2008) 16. Phuoc, D. L.,Polleres, A.,Hauswirth, M.,Tummarello, G.,Morbidoni, C.:

Semantic Service Discovery using SAWSDL and SPARQL. In: 4th Int'l Conference on Semantics, Knowledge and Grid, December 2008, pp. 205 212 (2008) Part VII:

Special algorithms are needed to reduce the amount of processing of MANE in the data plane based on deep analysis of the first packets of a flow

The evaluation algorithm considers the user flow characteristics CAN policies and present network conditions. In order to attain the required flexibility,

and traffic filtering rules by executing security related algorithms over information gathered by the monitoring subsystem.

and ensuring a satisfactory level of Qos for the end users (by appropriating resources to network upgrades etc).

Engineering and Computer science, Queen Mary University of London, Mile end, London E1 4ns, United kingdom {Naeem.

and prioritized in our proposed system 4. 1 Piece Picking Policy The proposed solution is a variation of the"Give-To-Get"algorithm 8,

Engineering and Computer science Queen Mary University of London, UK {qianni. zhang, ebroul. izquierdo}@ elec. qmul. ac. uk Abstract.

While linking low-level features to mid-level concepts are relatively easy to solve using the well-defined algorithms in the state-of-the-art

and are extracted using algorithms with reasonable performance. The rest of this chapter is organised as follows: Section 2 gives a review on the state-of-the-art techniques on context reasoning for multimedia retrieval task;

or content descriptors that can be computed automatically by current machines and algorithms, and the richness,

Fig. 1. Semantic inference work flow One important feature in this module is that the Bayesian network model is constructed automatically using a learning approach based on K2 algorithm 8,

In this algorithm, a Bayesian network is created by starting with an empty network and iteratively adding a directed arc to a given node from each parent node.

Due to the scope of this paper, we give only a brief introduction to K2 algorithm here.

If the reader is interested in more details about this algorithm, please refer to 8. Then in the inference stage,

Modelling and inference in this case were carried out using the K2 algorithm. The proposed approach was tested on a large size video dataset.

The first topic concerns the resources of telecom operators and service providers such as networks, switching, computing and data cen 404 Part VIII:

One of the key developments in this respect is the use of advanced communication and computing infrastructure as part of the Smart Grid.

and focuses on heavy computing services dedicated to data centers powered completely by green energy, from a large abundant reserve of natural resources in Canada, Europe and the US.

Future Internet, Future Enterprise Systems, component-based software engineering, COTS, SOA, MAS, smart objects, FINES, FINER. 1 Introduction In recent years, software

and similar emerging forms of distributed, open computing will push forward new forms of innovation such as,

New business requirements that current software engineering practices do not seem to meet. Therefore we need to orientate the research towards new ES architectures and development paradigms

To this end, the ICT domain needs to push forward the implementation of future ES development environments,

Such development environments will be based on an evolution of MDA, being able to separate the specification and development of the (i) strategic business logic from the (ii) specific business operations and,

interfaces will foster new development environments conceived for business experts to directly intervene in the development process.

from Cloud computing to Social media, to Service-oriented Computing, from Business Process Engineering to semantic technologies and mash-up.

Traditionally, the software engineering community has devoted great attention to design approaches, methods and tools, supporting the idea that large software systems can be created starting from independent,

This technical area is referred often to as Component Based Software engineering (CBSE. The basic idea of software componentization is quite the same as software modularization,

CBSE distinguishes the process of"component development"from that of"system development with components 9. CBSE laid the groundwork for the Object oriented Programming (OOP) paradigm that in a short time imposed itself over the preexisting modular software development techniques.

Such an issue may seem trivial to ICT people (they need a given computation to take place;

Future Internet Enterprise Systems 411 In summary, Web services were introduced essentially as a computation resource,

and remotely manage computing resources: this approach aims at delivering scalable IT resources over the Internet,

On the FINES development environment (see Fig. 3), FINERS are represented visually in a 3d space that models the enterprise reality (i e.,

The computational resources of a FINES are maintained in the Computing Cloud, and are linked recursively to compose complex FINERS starting from simpler ones.

and operational, will enjoy a fully distributed computing power, where computation will be performed directly by enterprise components,

mainly positioned in the enterprise itself of in the Cloud (typically, in case of intangible entities).

and maintaining large scale computing solutions simply interacting with a familiar (though technologically enhanced) business reality.

Business & Information systems Engineering 1 (5), 341 342 (2009) 3. Chesbrough, H.:Open Innovation: The new Imperative for Creating

Proceedings of the 2008 international workshop on Software engineering for adaptive and self-managing systems (2008) 8. Villa, F.,Athanasiadis,

27th International Conference on Information technology Interfaces (ITI), Cavtat, Croatia, IEEE, Los Alamitos (2005) 10. Nierstrasz, O.,Gibbs, S.,Tsichritzis, D.:

Tech Rep. MIT Laboratory for Computer science (2003), http://www. isi. edu/newarch/15. Tselentis, G.,et al.

the heaviest computing services are dedicated to virtual data centers powered completely by green energy from a large abundant reserve of natural resources,

Research projects following this direction have focused on microprocessor design, computer design, power-on-demand architectures and virtual machine consolidation techniques.

many computing centers are not so close to green energy sources. Thus, green energy distributed network is an emerging technology,

such as hand-held devices, home PCS), the heaviest computing services will be dedicated to data centers powered completely by green energy.

electrical energy is treated by an inverter/charger in order to produce an appropriate output current for computing and networking devices.

then pushes Virtual machines (VMS) or software virtual routers from the hub to a sun or wind node (spoke node) when power is available.

The VMS are used to run user applications, particularly heavy-computing services. Based on this testbed network, experiments and research are performed targeting cloud management algorithms and optimization of the intermittently-available renewable energy sources.

The cloud management solution developed in order to run the GSN enables the control of a large number of devices of different layers.

which is a new software platform specific for dealing with the delivery of computing infrastructure 5. Figure 3 compares the layered architecture of the GSN with a general architecture of a cloud comprising four layers.

and iv) Turning off computing resources at the original node. Indeed, solutions for the migration of simple applications have been provided by many ICT operators in the market.

The whole network is considered as a set of clouds of computing resources which is managed using the Iaas Framework 5. The Iaas Framework include four main components:

OSGI (Open Services Gateway initiative) is a Java framework for remotely deployed service applications, which provides high reliability, collaboration, large scale distribution and wide-range of device usage.

Whilst most of cloud management solutions in the market focus particularly on computing resources, Iaas Framework components can be used to build network virtualized tools 6 10,

innovation and globalisation 6. The World Foundation for Smart Communities advocated the use of information technology to 434 H. Schaffers et al. meet the challenges of cities within a global knowledge economy 7. However,

It focuses on the latest advancements in mobile and pervasive computing, wireless networks, middleware and agent technologies as they become embedded into the physical spaces of cities.

simulation results can only give very limited information about the feasibility of an algorithm or a protocol in the field.

and Internet researchers to validate their cutting-edge technologies (protocols, algorithms, radio interfaces, etc.).Several use cases are currently under detailed analysis for their experimental deployment taking into account relevant criteria from local and regional authorities.

Real world Internet (RWI) Session, FIA meeting, Prague (May 2009), http://rwi. future-internet. eu/index. php/RWISESSION PRAGUE 13. COM:

IEEE PERVASIVE computing, April-June (2007) 18. Panlab Project, Pan European Laboratory Infrastructure Implementation, http://www. panlab. net/fire. html 19.


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011