Search results for "VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551"
showing 10 items of 29 documents
A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection
2014
Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …
Supporting fine-grained generative model-driven evolution
2010
Published version of an article in the journal: Software and Systems Modeling. Also available on SpringerLink:http://dx.doi.org/10.1007/s10270-009-0144-1 In the standard generative Model-driven Architecture (MDA), adapting the models of an existing system requires re-generation and restarting of that system. This is due to a strong separation between the modeling environment and the runtime environment. Certain current approaches remove this separation, allowing a system to be changed smoothly when the model changes. These approaches are, however, based on interpretation of modeling information rather than on generation, as in MDA. This paper describes an architecture that supports fine-gra…
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
2010
Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…
Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game
2012
Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …
A two-armed bandit based scheme for accelerated decentralized learning
2011
Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …
Maritime data integration using standard ISO 15926
2010
Paper presented at the Twentieth (2010) International Offshore and Polar Engineering Conference. Also available on the Conference site: http://www.isope.org/publications/proceedings/ISOPE/ISOPE%202010/data/toc.htm The Oil & Gas industry is moving forward with Integrated Operations (IO). This includes a strong focus on data integration issues. There are different ways to achieve data integration, and ontology-based approaches have drawn much attention. For maritime data integration, the international standard ISO 15926 has been developed to integrate and represent the information in and across process plants. In this article, we follow the ontology-based approach and use the ISO 15926 standa…
Using SIP Presence for Remote Service Awareness
2008
Residential networks usually protect its devices and services behind firewalls and use private IP addresses. Therefore, appliances within a residential network cannot be discovered and utilized from external networks by standardized technologies as UPnP. In this paper, we present our concept of “Service Presence”, based on the 3GPP Presence Service that makes the service presence information remotely discoverable.
IT-sikkerhetspolicy for Integrerte operasjoner
2007
Masteroppgave i informasjons- og kommunikasjonsteknologi 2007 – Høgskolen i Agder, Grimstad Ved å benytte IKT i alle ledd i oljeindustrien, vil man oppnå hurtigere og bedre beslutninger, og med hjelp av sanntidsdata kan man integrere arbeidsprosesser på tvers av fag og mellom organisasjoner. Denne utviklingen blir i oljenæringen kalt Integrerte operasjoner (IO). Ved hjelp av IO kan operasjoner styres uavhengig av avstand og geografisk lokasjon. Det er satt inn store ressurser på dette feltet, og allerede i dag ser man vellykkede implementeringer av Integrerte operasjoner. Med Internett som en del av bærenettverket for data produsert i oljenæringen, vil trafikken i utgangspunktet være svært …
Kunnskapsdeling gjennom historiefortelling : en casestudie av en smidig prosjektorganisasjon
2010
Masteroppgave i informasjonstudier- Universitetet i Agder 2010 Historier kan spille en viktig rolle for å oppnå effektiv kunnskapsdeling. Kunnskapsdeling både under og etter et IS-prosjekt er sentralt for å kunne utvikle en best mulig løsning for oppdragsgiver og for å unngå at feiltrinn gjentas i neste prosjekt. Hvilken form kunnskapen deles på, og hvorvidt den bidrar til læring og innsikt, kommer an på hvilken type kunnskap som ønskes delt og hvor godt formen den formidles på egner seg. Det er for eksempel stor forskjell på innsikt som kan formidles gjennom å lese en brukermanual utviklet for et ITsystem og den innsikt som kan formidles gjennom historiefortelling om bruken av systemet. De…
Personlighetstrekk og ytelse i IT-supportteam
2014
Masteroppgave informasjonssystemer- Universitetet i Agder, 2014 Kontekst: Personlighetstypetesting har i varierende grad blitt benyttet innen rekruttering og bemanningsbyråer. Slike tester er også innen forskning betraktet som instrumenter for å forutse individuell ytelse og teamytelse innenfor en rekke fagområder. Forskning har vist at også andre faktorer som motivasjon, arbeidsmiljø og aktiv bruk av målsetting påvirker ytelse generelt. Hensikt: Denne avhandlingen rapporterer resultatene fra en studie hvor vi har benyttet Five Factor Model (FFM) for å se på sammenhengen mellom personlighetstrekk og IT-supportteams ytelse. Metoder: Vi har benyttet en induktiv/kontekstbasert forskningstilnær…