Spelling suggestions: "subject:"dataprocessing"" "subject:"datas’processing""
121 |
Erster Deutscher IPv6 GipfelMeinel, Christoph, Sack, Harald, Bross, Justus January 2008 (has links)
Inhalt:
KOMMUNIQUÉ
GRUßWORT
PROGRAMM
HINTERGRÜNDE UND FAKTEN
REFERENTEN: BIOGRAFIE & VOTRAGSZUSAMMENFASSUNG
1.) DER ERSTE DEUTSCHE IPV6 GIPFEL AM HASSO PLATTNER INSTITUT IN POTSDAM
- PROF. DR. CHRISTOPH MEINEL
- VIVIANE REDING
2.) IPV6, ITS TIME HAS COME
- VINTON CERF
3.) DIE BEDEUTUNG VON IPV6 FÜR DIE ÖFFENTLICHE VERWALTUNG IN DEUTSCHLAND
- MARTIN SCHALLBRUCH
4.) TOWARDS THE FUTURE OF THE INTERNET
- PROF. DR. LUTZ HEUSER
5.) IPV6 STRATEGY & DEPLOYMENT STATUS IN JAPAN
- HIROSHI MIYATA
6.) IPV6 STRATEGY & DEPLOYMENT STATUS IN CHINA
- PROF. WU HEQUAN
7.) IPV6 STRATEGY AND DEPLOYMENT STATUS IN KOREA
- DR. EUNSOOK KIM
8.) IPV6 DEPLOYMENT EXPERIENCES IN GREEK SCHOOL NETWORK
- ATHANASSIOS LIAKOPOULOS
9.) IPV6 NETWORK MOBILITY AND IST USAGE
- JEAN-MARIE BONNIN
10.) IPV6 - RÜSTZEUG FÜR OPERATOR & ISP IPV6 DEPLOYMENT UND STRATEGIEN DER DEUTSCHEN TELEKOM
- HENNING GROTE
11.) VIEW FROM THE IPV6 DEPLOYMENT FRONTLINE
- YVES POPPE
12.) DEPLOYING IPV6 IN MOBILE ENVIRONMENTS
- WOLFGANG FRITSCHE
13.) PRODUCTION READY IPV6 FROM CUSTOMER LAN TO THE INTERNET
- LUTZ DONNERHACKE
14.) IPV6 - DIE BASIS FÜR NETZWERKZENTRIERTE OPERATIONSFÜHRUNG (NETOPFÜ) IN DER BUNDESWEHR HERAUSFORDERUNGEN - ANWENDUNGSFALLBETRACHTUNGEN - AKTIVITÄTEN
- CARSTEN HATZIG
15.) WINDOWS VISTA & IPV6
- BERND OURGHANLIAN
16.) IPV6 & HOME NETWORKING TECHINCAL AND BUSINESS CHALLENGES
- DR. TAYEB BEN MERIEM
17.) DNS AND DHCP FOR DUAL STACK NETWORKS
- LAWRENCE HUGHES
18.) CAR INDUSTRY: GERMAN EXPERIENCE WITH IPV6
- AMARDEO SARMA
19.) IPV6 & AUTONOMIC NETWORKING
- RANGANAI CHAPARADZA
20.) P2P & GRID USING IPV6 AND MOBILE IPV6
- DR. LATIF LADID
|
122 |
Proceedings of the 2. Ph.D. retreat of the HPI Research School on Service-oriented Systems EngineeringJanuary 2008 (has links)
Contents
1. Styling for Service-Based 3D Geovisualization
Benjamin Hagedorn
2. The Windows Monitoring Kernel
Michael Schöbel
3. A Resource-Oriented Information Network Platform for Global Design Processes
Matthias Uflacker
4. Federation in SOA – Secure Service Invocation across Trust Domains
Michael Menzel
5. KStruct: A Language for Kernel Runtime Inspection
Alexander Schmidt
6. Deconstructing Resources
Hagen Overdick
7. FMC-QE – Case Studies
Stephan Kluth
8. A Matter of Trust
Rehab Al-Nemr
9. From Semi-automated Service Composition to Semantic Conformance
Harald Meyer
|
123 |
Reducing the complexity of large EPCsPolyvyanyy, Artem, Smirnov, Sergey, Weske, Matthias January 2008 (has links)
Inhalt:
1 Introduction
2 Motivation and Goal
3 Fundamentals
4 Elementary Abstractions
5 Real World Example
6 Conclusions
|
124 |
STG decomposition : avoiding irreducible CSC conflicts by internal communicationWist, Dominic, Wollowski, Ralf January 2007 (has links)
Inhalt:
1 Introduction
2 Basic Definitions
3 Achieving SI Implementability by Internal Communication
4 Towards a Structural Method
5 Examples
6 Conclusions and Future Work
|
125 |
Proceedings of the fall 2006 workshop of the HPI research school on service-oriented systems engineeringHagedorn, Benjamin, Schöbel, Michael, Uflacker, Matthias, Copaciu, Flavius, Milanovic, Nikola January 2007 (has links)
1. Design and Composition of 3D Geoinformation Services
Benjamin Hagedorn
2. Operating System Abstractions for Service-Based Systems
Michael Schöbel
3. A Task-oriented Approach to User-centered Design of Service-Based Enterprise Applications
Matthias Uflacker
4. A Framework for Adaptive Transport in Service- Oriented Systems based on Performance Prediction
Flavius Copaciu
5. Asynchronicity and Loose Coupling in Service-Oriented Architectures
Nikola Milanovic
|
126 |
Visualizing movement dynamics in virtual urban environmentsNienhaus, Marc, Gooch, Bruce, Döllner, Jürgen January 2006 (has links)
Dynamics in urban environments encompasses complex processes and phenomena such as related to movement (e.g.,traffic, people) and development (e.g., construction, settlement).
This paper presents novel methods for creating human-centric illustrative maps for visualizing the movement dynamics in virtual 3D environments. The methods allow a viewer to gain rapid insight into traffic density and flow. The illustrative maps represent vehicle behavior as light threads. Light threads are a familiar visual metaphor caused by moving light sources producing streaks in a long-exposure photograph. A vehicle’s front and rear lights produce light threads that convey its direction of motion as well as its velocity and acceleration. The accumulation of light threads allows a viewer to quickly perceive traffic flow and density. The light-thread technique is a key
element to effective visualization systems for analytic reasoning, exploration, and monitoring of geospatial processes.
|
127 |
A virtual machine architecture for creating IT-security laboratoriesHu, Ji, Cordel, Dirk, Meinel, Christoph January 2006 (has links)
E-learning is a flexible and personalized alternative to traditional education. Nonetheless, existing e-learning systems for IT security education have difficulties in delivering hands-on experience because of the lack of proximity. Laboratory environments and practical exercises are indispensable instruction tools to IT security education, but security education in con-ventional computer laboratories poses the problem of immobility as well as high creation and maintenance costs. Hence, there is a need to effectively transform security laboratories and practical exercises into e-learning forms.
This report introduces the Tele-Lab IT-Security architecture that allows students not only to learn IT security principles, but also to gain hands-on security experience by exercises in an online laboratory environment. In this architecture, virtual machines are used to provide safe user work environments instead of real computers. Thus, traditional laboratory environments can be cloned onto the Internet by software, which increases accessibilities to laboratory resources and greatly reduces investment and maintenance costs.
Under the Tele-Lab IT-Security framework, a set of technical solutions is also proposed to provide eective functionalities, reliability, security, and performance. The virtual machines with appropriate resource allocation, software installation, and system congurations are used to build lightweight security laboratories on a hosting computer. Reliability and availability
of laboratory platforms are covered by the virtual machine management framework. This management framework provides necessary monitoring and administration services to detect and recover critical failures of virtual machines at run time. Considering the risk that virtual machines can be misused for compromising production networks, we present security management solutions to prevent misuse of laboratory resources by security isolation at the system
and network levels.
This work is an attempt to bridge the gap between e-learning/tele-teaching and practical IT security education. It is not to substitute conventional teaching in laboratories but to add practical features to e-learning. This report demonstrates the possibility to implement hands-on security laboratories on the Internet reliably, securely, and economically.
|
128 |
Business process model abstraction : theory and practiceSmirnov, Sergey, Reijers, Hajo A., Nugteren, Thijs, Weske, Mathias January 2010 (has links)
Business process management aims at capturing, understanding, and improving work in organizations. The central artifacts are process models, which serve different purposes. Detailed process models are used to analyze concrete working procedures, while high-level models show, for instance, handovers between departments. To provide different views on process models, business process model abstraction has emerged. While several approaches have been proposed, a number of abstraction use case that are both relevant for industry and scientifically challenging are yet to be addressed. In this paper we systematically develop, classify, and consolidate different use cases for business process model abstraction. The reported work is based on a study with BPM users in the health insurance sector and validated with a BPM consultancy company and a large BPM vendor. The identified fifteen abstraction use cases reflect the industry demand. The related work on business process model abstraction is evaluated against the use cases, which leads to a research agenda.
|
129 |
An e-librarian service : natural language interface for an efficient semantic search within multimedia resourcesLinckels, Serge, Meinel, Christoph January 2005 (has links)
1 Introduction
1.1 Project formulation
1.2 Our contribution
2 Pedagogical Aspect 4
2.1 Modern teaching
2.2 Our Contribution
2.2.1 Autonomous and exploratory learning
2.2.2 Human machine interaction
2.2.3 Short multimedia clips
3 Ontology Aspect
3.1 Ontology driven expert systems
3.2 Our contribution
3.2.1 Ontology language
3.2.2 Concept Taxonomy
3.2.3 Knowledge base annotation
3.2.4 Description Logics
4 Natural language approach
4.1 Natural language processing in computer science
4.2 Our contribution
4.2.1 Explored strategies
4.2.2 Word equivalence
4.2.3 Semantic interpretation
4.2.4 Various problems
5 Information Retrieval Aspect
5.1 Modern information retrieval
5.2 Our contribution
5.2.1 Semantic query generation
5.2.2 Semantic relatedness
6 Implementation
6.1 Prototypes
6.2 Semantic layer architecture
6.3 Development
7 Experiments
7.1 Description of the experiments
7.2 General characteristics of the three sessions, instructions and procedure 7.3 First Session
7.4 Second Session
7.5 Third Session
7.6 Discussion and conclusion
8 Conclusion and future work
8.1 Conclusion
8.2 Open questions
A Description Logics
B Probabilistic context-free grammars
|
130 |
Requirements for service compositionMeyer, Harald, Kuropka, Dominik January 2005 (has links)
1 Introduction
2 Use case Scenario
3 General Composition Requirements
4 Functional Requirements of Service Composition
5 Non-Functional Requirements
6 Conclusion
|
Page generated in 0.0789 seconds