Search results for " computing"
showing 10 items of 2075 documents
MODIS-Based Monthly LST Products over Amazonia under Different Cloud Mask Schemes
2016
One of the major problems in the monitoring of tropical rainforests using satellite imagery is their persistent cloud coverage. The use of daily observations derived from high temporal resolution sensors, such as Moderate Resolution Imaging Spectroradiometer (MODIS), could potentially help to mitigate this issue, increasing the number of clear-sky observations. However, the cloud contamination effect should be removed from these results in order to provide a reliable description of these forests. In this study the available MODIS Land Surface Temperature (LST) products have been reprocessed over the Amazon Basin (10 N–20 S, 80 W–45 W) by introducing different cloud masking schemes. The mont…
Ontology-based annotation and retrieval of services in the cloud
2014
Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …
IT e CSR: Green computing e cloud computing al servizio delle aziende responsabili
2011
The Human Context of Information Systems
2005
In its past, IS research has focused on IT and the organizations that use IT. Human issues have been studied in HCI and the Human Factor Studies of MIS. Yet recently a new wave of attention has emerged to focus more explicitly on issues rising from the human context of information systems. Studies in this area are still scattered, but there seems to exist a common paradigmatic orientation in their basic assumptions of human beings and their interaction. The end-users of information systems should be seen holistically as physical, cognitive, emotional, and social beings, whose communication is rich and uses multiple media. These views add to and improve our understanding of information and k…
Multiple UAV cooperative path planning via neuro-dynamic programming
2004
In this paper, a team of n unmanned air-vehicles (UAVs) in cooperative path planning is given the task of reaching the assigned target while i) avoiding threat zones ii) synchronizing minimum time arrivals on the target, and iii) ensuring arrivals coming from different directions. We highlight three main contributions. First we develop a novel hybrid model and suit it to the problem at hand. Second, we design consensus protocols for the management of information. Third, we synthesize local predictive controllers through a distributed, scalable and suboptimal neuro-dynamic programming (NDP) algorithm.
Towards a Better Understanding of the Dynamics of Platform as a Service Business Models
2014
Platform as a Service (PaaS) solutions are changing the way software is produced, distributed, used, and priced. However, there has been little research into understanding the dynamics of PaaS business models and how these business models should be designed to establish a flourishing ecosystem around these platforms. Using design science research (DSR) we first identified the main design elements of PaaS business models as well as their relationships by investigating 24 PaaS providers. The resulting classification scheme as well as the qualitative systems dynamics model (in form of a causal loop diagram (CLD)) facilitates a better understanding of the adoption dynamics of PaaS business mode…
Security and privacy in the Internet of Things: Current status and open issues
2014
The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…
Information Security and Privacy in Medical Application Scenario
2010
This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.
Security and privacy in the cloud a long-term view
2011
In this paper we analyze security and privacy aspects of the cloud. We take a long-term view since the scope of privacy is potentially the lifetime of the privacy subject. We investigate trust issues and privacy aspects for cloud service users, using subjective logic as a primary tool. We also present promising solution for credible privacy in a cloud environment.
Technical Briefing: Hands-On Session on the Development of Trustworthy AI Software
2021
Following various real-world incidents involving both purely digital and cyber-physical Artificial Intelligence (AI) systems, AI Ethics has become a prominent topic of discussion in both research and practice, accompanied by various calls for trustworthy AI systems. Failures are often costly, and many of them stem from issues that could have been avoided during development. For example, AI ethics issues, such as data privacy are currently highly topical. However, implementing AI ethics in practice remains a challenge for organizations. Various guidelines have been published to aid companies in doing so, but these have not seen widespread adoption and may feel impractical. In this technical …