Filtry
wszystkich: 34
Wyniki wyszukiwania dla: SERVICE SELECTION
-
Comparison and Analysis of Service Selection Algorithms
PublikacjaIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Interoperability Constraints in Service Selection Algorithms
PublikacjaIn Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...
-
Extending Service Selection Algorithms with Interoperability Analysis
PublikacjaApplication development by integration of existing, atomic services reduces development cost and time by extensive reuse of service components. In Service Oriented Architecture, there exist alternative versions of services supplying the same functionality but differing in Quality of Service (QoS) attributes, which enables developers to select services with optimal QoS. Existing algorithms of service selection focus on the formal...
-
Ontology Oriented Approach to Service Selection and Invocation in Complex Context Analysis
PublikacjaContext-aware applications running in the intelligent space are taken into account and their execution in the service oriented environment is considered. It has been presented where and how SOA services can be utilized during their execution: to analyze current context of the application and to support execution of strictly determined actions suitable for that context. The proposed mechanism of context-aware service selection and...
-
A JEE-based modelling and execution environment for workflow applications with just-in-time service selection
PublikacjaArtykuł prezentuje model scenariusza z dynamicznym wyborem usług do wykonania zadań scenariusza. Adekwatność rozwiązania została zaprezentowana dla zastosowań naukowych i biznesowych w warunkach kiedy dostępność usług się zmienia i usługi powinny być wybierane w trakcie działania scenariusza a nie przed jego rozpoczęciem. Pokazano, że dla scenariusza naukowego z powtarzalnymi symulacjami, algorytm dobiera usługi, aby zminimalizować...
-
Criteria for evaluation and selection of the best offer for the Contract Engineer service
PublikacjaThe purpose of the legal regulations regarding public procurement in EU countries is to ensure effective funds' spending. When assessing and selecting the best offer, the contracting entities have at their disposal many different criteria, including non-price criteria. Their proper selection and application is necessary to ensure the high quality of the ordered product, delivery or service. Making an order for intellectual services,...
-
How to provide fair service for V2I communications in VANETs?
PublikacjaIn this paper, we focus on fairness issues of Vehicle-to-Infrastructure (V2I) communications. In particular, we show that under a common technique of selection of RSUs by OBUs based on the received signal strength, a vast variability of a number of OBUs connected to RSUs can be observed leading to inefficient/unfair service provided by RSUs. To overcome this problem, we propose an algorithm for RSU selection called RSEL to obtain...
-
Evaluation of Workflow Runtime Platforms in Service Composition
PublikacjaTypically, workflow applications are constructed from basic functionalities that may be realized by alternative services deployed in heterogeneous runtime platforms. Depending on workflow structure and selection of services, the applications differ in attributes such as price, Quality of Service (QoS) and others. In the paper, we propose a method of evaluation of workflow runtime platforms using Data Envelopment Analysis. We present...
-
Grade of service determination methodology in IP networks with SIP protocol
PublikacjaAlthough Grade of Service is very important in VoIP providers evaluation, We wasn't able to find any paper regarding the topic of measuring GoS variables for IP networks utilizing SIP, which are defined like for PSTN/ISDN/GSM networks (post-selection delay, answering delay, release delay, or probability of end-to-end blocking). Due to the lack of research in this field, it was necessary to start from defining measures and cover...
-
Technologies for deodorization of malodorous gases
PublikacjaThere is an increasing number of citizens’complaints about odor nuisance due to production or service activity. High socialawareness imposes pressure on entrepreneurs and service providers forcing them to undertake effective steps aimed at minimi-zation of the effects of their activity, also with respect to emission of malodorous substances. The article presents informationabout various technologies used for gas deodorization....
-
BeesyCluster as Front-End for High Performance Computing Services
PublikacjaThe paper presents the BeesyCluster system as a middleware allowing invocation of services on high performance computing resources within the NIWA Centre of Competence project. Access is possible through both WWW and SOAP Web Service interfaces. The former allows non-experienced users to invoke both simple and complex services exposed through easyto-use servlets. The latter is meant for integration of external applications with...
-
Parallelization of Compute Intensive Applications into Workflows based on Services in BeesyCluster
PublikacjaThe paper presents an approach for modeling, optimization and execution of workflow applications based on services that incorporates both service selection and partitioning of input data for parallel processing by parallel workflow paths. A compute-intensive workflow application for parallel integration is presented. An impact of the input data partitioning on the scalability is presented. The paper shows a comparison of the theoretical...
-
Reputacja i zaufanie w systemach teleinformatycznych z podmiotami anonimowymi podejście dynamiczne
PublikacjaAbstrakcją współczesnego systemu teleinformatycznego jest system wieloagentowy z autonomicznymi, racjonalnymi i wirtualnie anonimowymi agentami wchodzącymi we wzajemne interakcje dla wymiany usług. W referacie uzasadniono konieczność projektowania dla niego podsystemu budowy reputacji i zaufania oraz odpowiednich analiz w ujęciu dynamicznym. Dokonano przeglądu motywacyjnie zgodnych mechanizmów uczciwego raportowania usług oraz...
-
Knowledge management approaches among KIBS companies and their determinants – case study analysis
PublikacjaThis paper aims to present knowledge management (KM) approaches manifested by knowledge intensive business service (KIBS) companies together with their potential determinants (company size, type of services offered, and organizational structure). In particular, two types of approaches have been selected and examined, i.e. emergent KM approach and deliberate KM approach. Indeed, although KM approaches have been abundantly investigated...
-
Integration of Services into Workflow Applications
PublikacjaDescribing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow Applications presents a concise approach to the integration of loosely coupled services into workflow applications. It discusses key challenges related to the integration of distributed systems and proposes solutions, both in terms of theoretical aspects such as models and workflow scheduling algorithms, and technical...
-
Semantic Integration of Heterogeneous Recognition Systems
PublikacjaComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
Probabilistic Methods in Reliability Assessment of Engineering Lightweight Structures
PublikacjaThe paper considers the probability-based analysis of structural safety measures. Two different numerical examples of representative lightweight structures are considered – a submerged truss tower supporting an offshore platform, and an overhead power line support truss tower. On the basis of these examples, the importance of a motivated selection of analysis method and a proper choice of the number of important variables is shown....
-
Evaluation of organic coating systems for corrosion protection of industrial equipment using impedance spectroscopy
PublikacjaThe high economic impact of corrosion can be reduced by enhanced corrosion management and prevention based on appropriate means. This applies in particular to the protection of structures with organic protective coatings. Steel is subject to corrosion that reduces its service life and leads to destruction in most severe cases. The application of paints to metallic objects for corrosion control has been known for a long time and...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublikacjaZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...