首页 > 最新文献

2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises最新文献

英文 中文
Relation-Centric Development of Spatially-Aware Applications 以关系为中心的空间感知应用开发
Clemens Holzmann, M. Hechinger, A. Ferscha
With an increasing density of computationally enhanced objects that are distributed in physical space, it becomes important that they operate autonomously and allow for a more implicit interaction with humans. Spatial properties and relations are important in this regard, as an awareness about such context information builds up the basis for automatically adapting to spatial changes in the environment. In this paper, we propose a relation-centric approach for the development of spatially-aware applications for autonomous embedded systems, which builds upon qualitative abstractions of spatial relations and the rule-based inference of conclusions from them. We implemented a service-oriented software framework therefore and demonstrate our approach by means of two application scenarios.
随着分布在物理空间中的计算增强对象密度的增加,它们自主操作并允许与人类进行更隐式的交互变得非常重要。空间属性和关系在这方面很重要,因为对这些上下文信息的认识为自动适应环境中的空间变化奠定了基础。在本文中,我们提出了一种以关系为中心的方法来开发自主嵌入式系统的空间感知应用程序,该方法建立在空间关系的定性抽象和基于规则的结论推理的基础上。因此,我们实现了一个面向服务的软件框架,并通过两个应用程序场景演示了我们的方法。
{"title":"Relation-Centric Development of Spatially-Aware Applications","authors":"Clemens Holzmann, M. Hechinger, A. Ferscha","doi":"10.1109/WETICE.2008.22","DOIUrl":"https://doi.org/10.1109/WETICE.2008.22","url":null,"abstract":"With an increasing density of computationally enhanced objects that are distributed in physical space, it becomes important that they operate autonomously and allow for a more implicit interaction with humans. Spatial properties and relations are important in this regard, as an awareness about such context information builds up the basis for automatically adapting to spatial changes in the environment. In this paper, we propose a relation-centric approach for the development of spatially-aware applications for autonomous embedded systems, which builds upon qualitative abstractions of spatial relations and the rule-based inference of conclusions from them. We implemented a service-oriented software framework therefore and demonstrate our approach by means of two application scenarios.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Defusing Intrusion Capabilities by Collaborative Anomalous Trust 协同异常信任化解入侵能力
Khalil A. Abuosba, C. Martin
From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.
从计算机安全的角度来看,分布式信息系统提供的服务可以根据其安全属性、目标和要求进行组织;这些过程和服务被分类为匿名、注册、加密和可信。在本研究中,我们提出了一个隐式观察漏洞减少的操作信任保证问题的解决方案。协作异常信任管理(CATM)是一种用于确认通信端点之间信任的方法。结合可信计算基础、零知识协议和分层信任,定义了CATM。CATM基于计算环境变量构建信任凭证。理想情况下,此方法适合于面向服务的体系结构,例如Web服务,其中服务提供者和使用者在不同级别的安全需求上进行交互。这种方法最适合作为风险管理工具使用。在这种方法中,漏洞隐式地减少了,因此消除了入侵能力。
{"title":"Defusing Intrusion Capabilities by Collaborative Anomalous Trust","authors":"Khalil A. Abuosba, C. Martin","doi":"10.1109/WETICE.2008.32","DOIUrl":"https://doi.org/10.1109/WETICE.2008.32","url":null,"abstract":"From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134242937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Agent-Oriented System for Workflow Enactment Tracking 面向agent的工作流制定跟踪系统
T. Sauer, Mirjam Minor, Sascha Werno
The notion of workflows has evolved from a means to describe the flow of paperwork through an organization to a more abstract and general technique used to express best practices and lessons learned in many application domains. When putting workflow definitions into practice, it is important to stay informed which tasks are currently performed, as this allows detecting slipping schedules or unwanted deviations. In this paper, an agent-based approach for automatically tracking the set of active tasks is presented by observing the data produced during enactment. This enables short-term planning and quality control without obliging team members to explicitly document progress.
工作流的概念已经从一种描述组织中文书工作流程的方法演变为一种更抽象和通用的技术,用于表达许多应用程序领域中的最佳实践和经验教训。当将工作流定义付诸实践时,了解当前执行的任务是很重要的,因为这允许检测进度延迟或不必要的偏差。本文提出了一种基于代理的方法,通过观察执行过程中产生的数据来自动跟踪活动任务集。这使得短期计划和质量控制成为可能,而不需要团队成员明确地记录进度。
{"title":"An Agent-Oriented System for Workflow Enactment Tracking","authors":"T. Sauer, Mirjam Minor, Sascha Werno","doi":"10.1109/WETICE.2008.28","DOIUrl":"https://doi.org/10.1109/WETICE.2008.28","url":null,"abstract":"The notion of workflows has evolved from a means to describe the flow of paperwork through an organization to a more abstract and general technique used to express best practices and lessons learned in many application domains. When putting workflow definitions into practice, it is important to stay informed which tasks are currently performed, as this allows detecting slipping schedules or unwanted deviations. In this paper, an agent-based approach for automatically tracking the set of active tasks is presented by observing the data produced during enactment. This enables short-term planning and quality control without obliging team members to explicitly document progress.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Correctness, Compliance and Consistency of Process Models 论过程模型的正确性、遵从性和一致性
R. Wörzberger, T. Kurpick, T. Heer
Process management incorporates a plethora of models, which are expressed in different languages for different layers of abstraction. A holistic process modeling environment must provide means for dealing with three types of modeling constraints. First, it must ensure a model's correctness. Second, a modeling environment must account for compliance of models with respect to models on higher layers of abstraction. Third, consistency of different models of the same language layer should be supported. In this paper, we exemplify these three constraint types and discuss how they can be enforced in a holistic modeling environment.
流程管理包含了大量的模型,这些模型是针对不同的抽象层用不同的语言表达的。整体流程建模环境必须提供处理三种类型建模约束的方法。首先,它必须确保模型的正确性。其次,建模环境必须考虑模型相对于更高抽象层上的模型的遵从性。第三,支持同一语言层不同模型的一致性。在本文中,我们举例说明了这三种约束类型,并讨论了如何在整体建模环境中实施它们。
{"title":"On Correctness, Compliance and Consistency of Process Models","authors":"R. Wörzberger, T. Kurpick, T. Heer","doi":"10.1109/WETICE.2008.9","DOIUrl":"https://doi.org/10.1109/WETICE.2008.9","url":null,"abstract":"Process management incorporates a plethora of models, which are expressed in different languages for different layers of abstraction. A holistic process modeling environment must provide means for dealing with three types of modeling constraints. First, it must ensure a model's correctness. Second, a modeling environment must account for compliance of models with respect to models on higher layers of abstraction. Third, consistency of different models of the same language layer should be supported. In this paper, we exemplify these three constraint types and discuss how they can be enforced in a holistic modeling environment.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124524436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Context-Sware Data Sharing Service over MANet to Enable Spontaneous Collaboration 基于MANet的上下文数据共享服务,实现自发协作
J. A. Blaya, A. Gómez-Skarmeta, Hoa Ha Doung, I. Demeure
In this paper we present a context-aware data sharing service over MANet to enable spontaneous collaboration between mobile workers. Context information is used to adapt services and applications to user situation as well as working groups situation. The paper first presents the data sharing system. It then describes the context awareness service. We explain how data sharing uses context information to adapt to changing conditions and how the context service relies on data sharing to store context information afterwards. Context aware and data sharing services maintain a mutually beneficial interaction. Both services are part of a software framework for spontaneous collaboration over MANets that is developed within the Popeye European IST research project.
在本文中,我们提出了一种基于MANet的上下文感知数据共享服务,以实现移动工作人员之间的自发协作。上下文信息用于使服务和应用程序适应用户情况和工作组情况。本文首先介绍了数据共享系统。然后描述上下文感知服务。我们解释了数据共享如何使用上下文信息来适应不断变化的条件,以及上下文服务如何依赖数据共享来存储上下文信息。上下文感知和数据共享服务保持互利的交互。这两种服务都是由Popeye欧洲IST研究项目开发的用于manet自发协作的软件框架的一部分。
{"title":"A Context-Sware Data Sharing Service over MANet to Enable Spontaneous Collaboration","authors":"J. A. Blaya, A. Gómez-Skarmeta, Hoa Ha Doung, I. Demeure","doi":"10.1109/WETICE.2008.13","DOIUrl":"https://doi.org/10.1109/WETICE.2008.13","url":null,"abstract":"In this paper we present a context-aware data sharing service over MANet to enable spontaneous collaboration between mobile workers. Context information is used to adapt services and applications to user situation as well as working groups situation. The paper first presents the data sharing system. It then describes the context awareness service. We explain how data sharing uses context information to adapt to changing conditions and how the context service relies on data sharing to store context information afterwards. Context aware and data sharing services maintain a mutually beneficial interaction. Both services are part of a software framework for spontaneous collaboration over MANets that is developed within the Popeye European IST research project.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122585474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Modeling of Bell-LaPadula Security Policies Using RBAC 基于RBAC的Bell-LaPadula安全策略建模
Gansen Zhao, D. Chadwick
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely accepted in military environments for its capability to specify military style confidentiality policies. The role based access control (RBAC) model has attracted extensive research effort and has been acknowledged as a flexible and policy natural model. This paper investigates a way of modeling Bell-LaPadula security policies using the RBAC model. The capability of modeling Bell-LaPadula security policies using RBAC model means that applications that are implemented using the RBAC model can then be deployed in military environments and will meet their requirements for information confidentiality.
Bell-LaPadula安全模型是一个混合模型,它结合了强制访问控制和自由访问控制。Bell-LaPadula安全模型在军事环境中被广泛接受,因为它能够指定军事风格的保密策略。基于角色的访问控制(role - based access control, RBAC)模型作为一种灵活、策略自然的模型受到了广泛的研究。本文研究了一种利用RBAC模型对Bell-LaPadula安全策略建模的方法。使用RBAC模型对Bell-LaPadula安全策略建模的能力意味着使用RBAC模型实现的应用程序随后可以部署在军事环境中,并将满足其对信息机密性的需求。
{"title":"On the Modeling of Bell-LaPadula Security Policies Using RBAC","authors":"Gansen Zhao, D. Chadwick","doi":"10.1109/WETICE.2008.34","DOIUrl":"https://doi.org/10.1109/WETICE.2008.34","url":null,"abstract":"The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely accepted in military environments for its capability to specify military style confidentiality policies. The role based access control (RBAC) model has attracted extensive research effort and has been acknowledged as a flexible and policy natural model. This paper investigates a way of modeling Bell-LaPadula security policies using the RBAC model. The capability of modeling Bell-LaPadula security policies using RBAC model means that applications that are implemented using the RBAC model can then be deployed in military environments and will meet their requirements for information confidentiality.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122844846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Federated Collaborations with Exertions 联合协作与努力
M. Sobolewski
This paper describes a service-oriented P2P architecture and related federated metaprogramming model to support development of highly scalable and reliable distributed collaborative applications. In the proposed architecture, autonomic service providers, corresponding to various activities that occur in the collaborative process, reside on the overlay network and are discovered dynamically during the execution of the process. To execute a specific collaboration, a set of services that map into the collaboration specification (exertion) are federated together and executed in a choreographed workflow. All services (peers) implement a standardized top-level interface and this allows any service to be seamlessly replaced with another service without affecting the performance of the federation. The paper describes a service object-oriented environment (SORCER) and presents how it supports programming of three collaboration types.
本文描述了一种面向服务的P2P体系结构和相关的联邦元编程模型,以支持高度可扩展和可靠的分布式协作应用程序的开发。在提出的体系结构中,自治服务提供者(对应于协作过程中发生的各种活动)驻留在覆盖网络上,并在流程执行期间被动态发现。为了执行特定的协作,映射到协作规范(执行)的一组服务被联合在一起,并在编排的工作流中执行。所有服务(对等体)都实现了一个标准化的顶级接口,这使得任何服务都可以无缝地替换为另一个服务,而不会影响联合的性能。本文描述了一个面向对象的服务环境(SORCER),并介绍了它如何支持三种协作类型的编程。
{"title":"Federated Collaborations with Exertions","authors":"M. Sobolewski","doi":"10.1109/WETICE.2008.40","DOIUrl":"https://doi.org/10.1109/WETICE.2008.40","url":null,"abstract":"This paper describes a service-oriented P2P architecture and related federated metaprogramming model to support development of highly scalable and reliable distributed collaborative applications. In the proposed architecture, autonomic service providers, corresponding to various activities that occur in the collaborative process, reside on the overlay network and are discovered dynamically during the execution of the process. To execute a specific collaboration, a set of services that map into the collaboration specification (exertion) are federated together and executed in a choreographed workflow. All services (peers) implement a standardized top-level interface and this allows any service to be seamlessly replaced with another service without affecting the performance of the federation. The paper describes a service object-oriented environment (SORCER) and presents how it supports programming of three collaboration types.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Introspection into an Agile Workflow Engine for Long-Term Processes 对长期流程的敏捷工作流引擎的内省
Mirjam Minor, Daniel Schmalen, Jakob Weidlich, A. Koldehoff
This demo paper is on an introspection tool for an agile workflow engine that executes long-term workflows. Agile workflows are workflows whose control flow structure can be adapted at run-time. We will present the architecture of the overall agile workflow management system, briefly introduce the agile workflow modelling language, and describe the tool for the introspection into the representation and execution of the workflows.
这篇演示论文是关于一个用于执行长期工作流的敏捷工作流引擎的自省工具。敏捷工作流是可以在运行时调整其控制流结构的工作流。我们将介绍整个敏捷工作流管理系统的架构,简要介绍敏捷工作流建模语言,并描述用于对工作流表示和执行进行内省的工具。
{"title":"Introspection into an Agile Workflow Engine for Long-Term Processes","authors":"Mirjam Minor, Daniel Schmalen, Jakob Weidlich, A. Koldehoff","doi":"10.1109/WETICE.2008.24","DOIUrl":"https://doi.org/10.1109/WETICE.2008.24","url":null,"abstract":"This demo paper is on an introspection tool for an agile workflow engine that executes long-term workflows. Agile workflows are workflows whose control flow structure can be adapted at run-time. We will present the architecture of the overall agile workflow management system, briefly introduce the agile workflow modelling language, and describe the tool for the introspection into the representation and execution of the workflows.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The PIRR Methodology to Estimate Resource Requirements for Distributed NM Applications in Mobile Networks 移动网络中分布式纳米应用资源需求估算的PIRR方法
F. Neri
The current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. The next generation mobile networks proposed by 3rd Generation Partnership Project (3GPP) envision a flat network architecture comprising some thousands of network nodes, each of which will need to be managed, in a timely and efficient fashion. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches.
当前移动网络中的集中式网络管理方法可能会导致在网络中部署新的客户服务和网络节点时无法扩展的问题。第三代合作伙伴计划(3GPP)提出的下一代移动网络设想了一个由数千个网络节点组成的扁平网络架构,每个节点都需要及时有效地进行管理。这种考虑促使了一项研究活动,以寻找能够克服当前集中式方法的局限性的替代应用程序体系结构。
{"title":"The PIRR Methodology to Estimate Resource Requirements for Distributed NM Applications in Mobile Networks","authors":"F. Neri","doi":"10.1109/WETICE.2008.8","DOIUrl":"https://doi.org/10.1109/WETICE.2008.8","url":null,"abstract":"The current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. The next generation mobile networks proposed by 3rd Generation Partnership Project (3GPP) envision a flat network architecture comprising some thousands of network nodes, each of which will need to be managed, in a timely and efficient fashion. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coordination of Knowledge in Pervasive Environments 普适环境中的知识协调
Manfred Bortenschlager, L. Nixon, R. Tolksdorf, E. Simperl
The "amount" of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provision of accurate knowledge with respect to a requester's context gets more challenging. Explicit coordination of knowledge can be one means to address such developments. This report summarises several works and discussions on the topic of Coordination of Knowledge in Pervasive Environments, highlights current research directions, and outlines potential future challenges.
知识的“量”在不断增长。科技的进步越来越方便人们随时随地以任何方式获取知识。根据请求者的上下文提供准确的知识变得更具挑战性。明确的知识协调可以成为解决这种发展的一种手段。本报告总结了关于普适环境中知识协调的几项工作和讨论,强调了当前的研究方向,并概述了潜在的未来挑战。
{"title":"Coordination of Knowledge in Pervasive Environments","authors":"Manfred Bortenschlager, L. Nixon, R. Tolksdorf, E. Simperl","doi":"10.1109/WETICE.2008.53","DOIUrl":"https://doi.org/10.1109/WETICE.2008.53","url":null,"abstract":"The \"amount\" of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provision of accurate knowledge with respect to a requester's context gets more challenging. Explicit coordination of knowledge can be one means to address such developments. This report summarises several works and discussions on the topic of Coordination of Knowledge in Pervasive Environments, highlights current research directions, and outlines potential future challenges.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1