Search results for "VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551"

showing 10 items of 29 documents

A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection

2014

Published version of a chapter in the book: Transactions on Computational Collective Intelligence XIV. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-662-44509-9_1 In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, with the frequency being constrained to support granularity requirements. Starting from a randomly or manually selected examplar itemset, a collective of Tsetlin automata based two-armed bandit players - one automaton for each item in the examplar - learns which items should be included in …

Finite-state machineVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Computational complexity theoryData stream miningComputer scienceNearest neighbor searchSearch engine indexingInformationSystems_DATABASEMANAGEMENTIntrusion detection systemcomputer.software_genreCardinalityAnomaly detectionData miningcomputer
researchProduct

Supporting fine-grained generative model-driven evolution

2010

Published version of an article in the journal: Software and Systems Modeling. Also available on SpringerLink:http://dx.doi.org/10.1007/s10270-009-0144-1 In the standard generative Model-driven Architecture (MDA), adapting the models of an existing system requires re-generation and restarting of that system. This is due to a strong separation between the modeling environment and the runtime environment. Certain current approaches remove this separation, allowing a system to be changed smoothly when the model changes. These approaches are, however, based on interpretation of modeling information rather than on generation, as in MDA. This paper describes an architecture that supports fine-gra…

Generative developmentARCHITECTUREInterpretation (logic)VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Traceabilitybusiness.industryComputer scienceEvolutionDistributed computingADAPTIVE OBJECT-MODELSLANGUAGESOFTWAREModel-driven developmentFRAMEWORKInterpretive developmentGenerative modelSoftwareDevelopment (topology)Modeling and SimulationModelling and SimulationArtificial intelligenceGenerative DesignArchitecturebusinessGenerative grammarJournal of Software and Systems Modelling
researchProduct

Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks

2010

Published version of an article from the journal : Science in China, Series F: Information Sciences. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11432-010-0096-7 In unattended wireless sensor networks (UWSNs), sensed data are stored locally or at designated nodes and further accessed by authorized collectors on demand. This paradigm is motivated by certain scenarios where historical or digest data (e.g., average temperature in a day), instead of real-time data, are of interest. The data are not instantly forwarded to a central sink upon sensing, thereby saving communication energy for transmission. Such a paradigm can also improve data survivability by m…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551General Computer Sciencebusiness.industryComputer scienceSecret sharingData integrityComputer data storageDistributed data storeDependabilityVerifiable secret sharingbusinessWireless sensor networkByzantine fault toleranceComputer networkScience China Information Sciences
researchProduct

Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game

2012

Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Bayesian learningVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Optimization problembusiness.industryComputer scienceGoore GameBayesian inferenceMulti-armed banditquality of service controldecentralized decision makingArtificial IntelligenceInfluence diagramResource allocationArtificial intelligencebandit problemswireless sensor networksbusinessWireless sensor networkOptimal decisionApplied Intelligence
researchProduct

A two-armed bandit based scheme for accelerated decentralized learning

2011

Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

Maritime data integration using standard ISO 15926

2010

Paper presented at the Twentieth (2010) International Offshore and Polar Engineering Conference. Also available on the Conference site: http://www.isope.org/publications/proceedings/ISOPE/ISOPE%202010/data/toc.htm The Oil & Gas industry is moving forward with Integrated Operations (IO). This includes a strong focus on data integration issues. There are different ways to achieve data integration, and ontology-based approaches have drawn much attention. For maritime data integration, the international standard ISO 15926 has been developed to integrate and represent the information in and across process plants. In this article, we follow the ontology-based approach and use the ISO 15926 standa…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

Using SIP Presence for Remote Service Awareness

2008

Residential networks usually protect its devices and services behind firewalls and use private IP addresses. Therefore, appliances within a residential network cannot be discovered and utilized from external networks by standardized technologies as UPnP. In this paper, we present our concept of “Service Presence”, based on the 3GPP Presence Service that makes the service presence information remotely discoverable.

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct

IT-sikkerhetspolicy for Integrerte operasjoner

2007

Masteroppgave i informasjons- og kommunikasjonsteknologi 2007 – Høgskolen i Agder, Grimstad Ved å benytte IKT i alle ledd i oljeindustrien, vil man oppnå hurtigere og bedre beslutninger, og med hjelp av sanntidsdata kan man integrere arbeidsprosesser på tvers av fag og mellom organisasjoner. Denne utviklingen blir i oljenæringen kalt Integrerte operasjoner (IO). Ved hjelp av IO kan operasjoner styres uavhengig av avstand og geografisk lokasjon. Det er satt inn store ressurser på dette feltet, og allerede i dag ser man vellykkede implementeringer av Integrerte operasjoner. Med Internett som en del av bærenettverket for data produsert i oljenæringen, vil trafikken i utgangspunktet være svært …

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IKT590VDP::Technology: 500::Marine technology: 580::Offshore technology: 581
researchProduct

Kunnskapsdeling gjennom historiefortelling : en casestudie av en smidig prosjektorganisasjon

2010

Masteroppgave i informasjonstudier- Universitetet i Agder 2010 Historier kan spille en viktig rolle for å oppnå effektiv kunnskapsdeling. Kunnskapsdeling både under og etter et IS-prosjekt er sentralt for å kunne utvikle en best mulig løsning for oppdragsgiver og for å unngå at feiltrinn gjentas i neste prosjekt. Hvilken form kunnskapen deles på, og hvorvidt den bidrar til læring og innsikt, kommer an på hvilken type kunnskap som ønskes delt og hvor godt formen den formidles på egner seg. Det er for eksempel stor forskjell på innsikt som kan formidles gjennom å lese en brukermanual utviklet for et ITsystem og den innsikt som kan formidles gjennom historiefortelling om bruken av systemet. De…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct

Personlighetstrekk og ytelse i IT-supportteam

2014

Masteroppgave informasjonssystemer- Universitetet i Agder, 2014 Kontekst: Personlighetstypetesting har i varierende grad blitt benyttet innen rekruttering og bemanningsbyråer. Slike tester er også innen forskning betraktet som instrumenter for å forutse individuell ytelse og teamytelse innenfor en rekke fagområder. Forskning har vist at også andre faktorer som motivasjon, arbeidsmiljø og aktiv bruk av målsetting påvirker ytelse generelt. Hensikt: Denne avhandlingen rapporterer resultatene fra en studie hvor vi har benyttet Five Factor Model (FFM) for å se på sammenhengen mellom personlighetstrekk og IT-supportteams ytelse. Metoder: Vi har benyttet en induktiv/kontekstbasert forskningstilnær…

VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551IS 501
researchProduct