Search results for " computing"

showing 10 items of 2075 documents

MODIS-Based Monthly LST Products over Amazonia under Different Cloud Mask Schemes

2016

One of the major problems in the monitoring of tropical rainforests using satellite imagery is their persistent cloud coverage. The use of daily observations derived from high temporal resolution sensors, such as Moderate Resolution Imaging Spectroradiometer (MODIS), could potentially help to mitigate this issue, increasing the number of clear-sky observations. However, the cloud contamination effect should be removed from these results in order to provide a reliable description of these forests. In this study the available MODIS Land Surface Temperature (LST) products have been reprocessed over the Amazon Basin (10 N–20 S, 80 W–45 W) by introducing different cloud masking schemes. The mont…

Information Systems and Management010504 meteorology & atmospheric sciencesLand surface temperatureAmazon rainforestbusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyRainforest01 natural sciencesComputer Science ApplicationsSpatial ecologyHigh temporal resolutionEnvironmental scienceSatellite imageryModerate-resolution imaging spectroradiometerbusiness021101 geological & geomatics engineering0105 earth and related environmental sciencesInformation SystemsRemote sensingData
researchProduct

Ontology-based annotation and retrieval of services in the cloud

2014

Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …

Information Systems and ManagementCloud computing securitybusiness.industryComputer scienceServices computingCloud computingcomputer.software_genreManagement Information SystemsWorld Wide WebSemantic gridUtility computingGrid computingArtificial IntelligenceInformation and Communications TechnologySemantic computingOntologyThe InternetSemantic Web StackWeb servicebusinesscomputerSemantic WebSoftwareKnowledge-Based Systems
researchProduct

IT e CSR: Green computing e cloud computing al servizio delle aziende responsabili

2011

Information Technology Cloud Computing
researchProduct

The Human Context of Information Systems

2005

In its past, IS research has focused on IT and the organizations that use IT. Human issues have been studied in HCI and the Human Factor Studies of MIS. Yet recently a new wave of attention has emerged to focus more explicitly on issues rising from the human context of information systems. Studies in this area are still scattered, but there seems to exist a common paradigmatic orientation in their basic assumptions of human beings and their interaction. The end-users of information systems should be seen holistically as physical, cognitive, emotional, and social beings, whose communication is rich and uses multiple media. These views add to and improve our understanding of information and k…

Information managementCognitive scienceHuman resource management systemKnowledge managementComputer sciencebusiness.industryInformation architectureInformation technologyInformation qualityInformation mappingHuman-centered computingManagement information systemsGroup information managementInformation and Communications TechnologyPersonal information managementInformation systemInformation technology architecturebusinessProceedings of the 38th Annual Hawaii International Conference on System Sciences
researchProduct

Multiple UAV cooperative path planning via neuro-dynamic programming

2004

In this paper, a team of n unmanned air-vehicles (UAVs) in cooperative path planning is given the task of reaching the assigned target while i) avoiding threat zones ii) synchronizing minimum time arrivals on the target, and iii) ensuring arrivals coming from different directions. We highlight three main contributions. First we develop a novel hybrid model and suit it to the problem at hand. Second, we design consensus protocols for the management of information. Third, we synthesize local predictive controllers through a distributed, scalable and suboptimal neuro-dynamic programming (NDP) algorithm.

Information managementEngineeringbusiness.industryDistributed computingSynchronizingControl engineeringUnmanned air-vehicles (UAV)Task (project management)Dynamic programmingModel predictive controlDistributed algorithmScalabilityNeuro-dynamic programmingMotion planningbusinessNeuro-dynamic programming; Unmanned air-vehicles (UAV)
researchProduct

Towards a Better Understanding of the Dynamics of Platform as a Service Business Models

2014

Platform as a Service (PaaS) solutions are changing the way software is produced, distributed, used, and priced. However, there has been little research into understanding the dynamics of PaaS business models and how these business models should be designed to establish a flourishing ecosystem around these platforms. Using design science research (DSR) we first identified the main design elements of PaaS business models as well as their relationships by investigating 24 PaaS providers. The resulting classification scheme as well as the qualitative systems dynamics model (in form of a causal loop diagram (CLD)) facilitates a better understanding of the adoption dynamics of PaaS business mode…

Information managementta113Process managementComputer scienceArtifact-centric business process modelbusiness.industryManagement scienceCloud computingBusiness process modelingBusiness modelSoftwareUnified Modeling Languagebusinesscomputercomputer.programming_language
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct

Security and privacy in the cloud a long-term view

2011

In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.

Information privacyCloud computing securityScope (project management)Privacy by DesignComputer sciencebusiness.industryPrivacy softwareData_MISCELLANEOUSInternet privacyCloud computingComputer securitycomputer.software_genreTerm (time)ComputingMilieux_COMPUTERSANDSOCIETYSubjective logicbusinesscomputer2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)
researchProduct

Technical Briefing: Hands-On Session on the Development of Trustworthy AI Software

2021

Following various real-world incidents involving both purely digital and cyber-physical Artificial Intelligence (AI) systems, AI Ethics has become a prominent topic of discussion in both research and practice, accompanied by various calls for trustworthy AI systems. Failures are often costly, and many of them stem from issues that could have been avoided during development. For example, AI ethics issues, such as data privacy are currently highly topical. However, implementing AI ethics in practice remains a challenge for organizations. Various guidelines have been published to aid companies in doing so, but these have not seen widespread adoption and may feel impractical. In this technical …

Information privacyComputer sciencebusiness.industryCyber-physical systemTrusted ComputingSoftware maintenanceSoftware prototypingGeneralLiterature_MISCELLANEOUSSession (web analytics)Engineering managementComputingMethodologies_PATTERNRECOGNITIONbusinessDesign methodsAgile software development2021 IEEE/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
researchProduct