نتایج جستجو برای: holistic architecture

تعداد نتایج: 257561  

2011
Martin Kost Björn Wiedersheim Stefan Dietzel Florian Schaub Tobias Bachmor PRECIOSA PERA

Cooperative Intelligent Transportation Systems must incorporate privacy enhancing mechanisms to gain acceptance by all involved parties. The PRECIOSA Privacy-enforcing Runtime Architecture (PeRA) provides a holistic privacy protection approach, which implements user-defined privacy policies. A data-centric protection chain ensures that ITS components process data according to attached privacy p...

2007
Arindam Mallik

Computer Architecture serves as an interface between technology trends and marketplace demands. Traditionally, a computer system is usually represented as consisting of five abstraction levels: hardware, firmware, assembler, operating system and applications [1]. My research questions this fundamental definition. Instead of viewing computer architecture as an interface, I aim at introducing a h...

2010
Helge Buckow Hans-Jürgen Groß Gunther Piller Karl Prott Johannes Willkomm Alfred Zimmermann

Abstract: The SOA Innovation Lab presents a holistic approach for the development of a service-oriented enterprise architecture with custom and standard software packages. Starting point is the construction and analysis of company domain maps with respect to characteristics of SOA and standard software. After assessing the SOA ability of standard software packages within an architecture maturit...

2017
Alexander Romanovsky Alessandro Garcia

Software maintenance is a crucial phase of the software development life cycle. It is important to facilitate this stage, complying with both functional and non-functional requirements. However, very often the main focus is made on the functional features of the application, whereas fault tolerance mechanisms are neglected and as a result do not provide sufficient maintainability and reusabilit...

2013
David Naranjo Mario E. Sánchez Jorge Villalobos

The discourse of Enterprise Architecture is based on modeling and performing ‘holistic’ (multi-layer) analyses. However, view centered methodologies offer a partial glimpse of the overall architecture, and current tools do not bring an explicit method of navigating the underlying model. Considering that we need a starting point for analysis and explore the whole model in order to drill down on ...

Journal: :Expert Syst. Appl. 2007
Alejandro Canales Cruz Alejandro Peña Ayala Rubén Peredo Valderrama Juan Humberto Sossa Azuela Agustin Gutiérrez

In this paper it is presented our contribution for carrying out adaptive and intelligent Web-based Education Systems (WBES) that take into account the individual student learning requirements, by means of a holistic architecture and Framework for developing WBES. In addition, three basic modules of the proposed WBES are outlined: an Authoring tool, a Semantic Web-based Evaluation, and a Cogniti...

2010
Matthias Fischer Marco Link Erich Ortner Nicole Zeise

The development of service-oriented applications has reached a point where more specifications are needed to enable holistic transparent service-management. A three-schema-architecture for design of servicebase-management-systems according to the ANSI/SPARC-model for database design is proposed in this paper. The conceptual schema of the proposed architecture decribes the servicebase, what prov...

Journal: :Enterprise Modelling and Information Systems Architectures 2008
Frank Wolff

Enterprise architecture management requires an extensive amount of information which concern distinct domains like company strategy, business processes, and IT-systems. To support management with essential information enterprise architecture models are reckoned almost indispensable. However, the creation and maintenance of an encompassing enterprise architecture model has proven to be a challen...

Journal: :Wireless Communications and Mobile Computing 2011
Rodrigo Roman Javier López Pablo Najera

The wireless sensor networks (WSN) paradigm is especially vulnerable against external and internal attacks. Therefore, it is necessary to develop security mechanisms and protocols to protect them. These mechanisms must become an integral part of the software architecture and network stack of a sensor node. A question that remains is how to achieve this integration. In this paper we check how bo...

2011
Juan Li Frédérique Biennier Chirine Ghedira

To fit the ever-changing business context, developing large scale networked and collaborative strategies involve increasing both enterprise and information system agility and interoperability. At the same time, lean and six sigma theories have also been used in industries to improve the industrial process itself so that profitability, quality and reputation are increased. In order to achieve th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید