• Title/Summary/Keyword: End-user computing

Search Result 131, Processing Time 0.029 seconds

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

STEPSTONE: An Intelligent Integration Architecture for Personal Tele-Health

  • Helal, Sumi;Bose, Raja;Chen, Chao;Smith, Andy;De Deugd, Scott;Cook, Diane
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.269-281
    • /
    • 2011
  • STEPSTONE is a joint industry-university project to create open source technology that would enable the scalable, "friction-free" integration of device-based healthcare solutions into enterprise systems using a Service Oriented Architecture (SOA). Specifically, STEPSTONE defines a first proposal to a Service Oriented Device Architecture (SODA) framework, and provides for initial reference implementations. STEPSTONE also intends to encourage a broad community effort to further develop the framework and its implementations. In this paper, we present SODA, along with two implementation proposals of SODA's device integration. We demonstrate the ease by which SODA was used to develop an end-to-end personal healthcare monitoring system. We also demonstrate the ease by which the STEPSTONE system was extended by other participants - Washington State University - to include additional devices and end user interfaces. We show clearly how SODA and therefore SODA devices make integration almost automatic, replicable, and scalable. This allows telehealth system developers to focus their energy and attention on the system functionality and other important issues, such as usability, privacy, persuasion and outcome assessment studies.

정보 시스템 통제 아키텍처를 이용한 정보자원 관리에 관한 실증적 연구

  • Kim, Jeong-Uk
    • Journal of Korean Society for Quality Management
    • /
    • v.28 no.4
    • /
    • pp.29-46
    • /
    • 2000
  • Advent of the distributed computing has contributed to the rapid distribution of information technology throughout the organization. While powerful and user-friendly information technology are more available to end users, managing the distributed, heterogeneous IT environment has become a serious problem for corporate IT managers. Integrated Control Architecture (ICA) enables the monitoring and controlling of the dispersed information resources for effective enterprise-wide information resource management. This paper empirically examines the propositions that the level of information resource control is positively related to IS effectiveness measured in user satisfaction. Measures are developed and validated for the control of information resource object such as data, application, platform, and control of relationships among such objects. Results from a study of 130 organizations support that the organizations with high information resource control exhibit user satisfaction.

  • PDF

Deriving Personalized Context-aware Services from Activities of Daily Living (생활 데이터 분석을 통한 개인화된 상황인식서비스 생성)

  • Park, Jeong-Kyu;Lee, Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.525-530
    • /
    • 2010
  • Currently, most context-aware services are built by developers. Some researchers argued that services should be defined by end users, who understand their own needs best. We view that the significance of enabling the user to define his/her personalized services will multiply as our living spaces grow smarter. This paper introduces a novel method called CASPER, which is capable of deriving personalized services from the log of user's activities of daily living. CASPER can generate useful services that even the user may not perceive, mining causality of events in the log. We present the algorithm of CASPER in detail and discuss the result of an experiment which we conducted as a proof of concept.

Research on Science DMZ scalability for the high performance research data networking (연구데이터의 고성능 네트워킹을 위한 Science DMZ 확장성 연구)

  • Lee, Chankyun;Jang, Minseok;Noh, Minki;Seok, Woojin
    • KNOM Review
    • /
    • v.22 no.2
    • /
    • pp.22-28
    • /
    • 2019
  • A Science DeMilitarized Zone (DMZ) is an optimized network technology tailored to research data nature. The Science DMZ guarantees end-to-end network performance by forming a closed research network without redundant networking and security devices for the authorized researchers. Data Transfer Node (DTN) is an essential component for the high performance and security of the Science DMZ, since only transfer functions of research data are allowed to the DTN without any security- and performance-threatening functions such as commercial internet service. Current Science DMZ requires per-user DTN server installation which turns out a scalability limitation of the networks in terms of management overhead, entry barrier of the user, and networks-wise CAPEX. In order to relax the aforementioned scalability issues, this paper suggests a centralized DTN design where end users in a group can share the centralized DTN. We evaluate the effectiveness of the suggested sharable DTN design by comparing CAPEX against to that of current design with respect to the diverse network load and the state-of-the-art computing machine.

Estimating User Utility Functions for Network-Resource Pricing (네트워크 자원 가격정책을 위한 사용자 유틸리티 함수 추정법)

  • Park, Sun-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.103-112
    • /
    • 2006
  • Priority-based network service has been widely adopted for the Internet traffic management in the context of IETF differentiated services, and computing optimal prices for such priority-based service is the key topic in many pricing literature. While the equilibrium analysis has been commonly used to this end, many have criticized the validity of the underlying assumption of equilibrium analysis that user utility functions are precisely known. In this paper, we propose a solution for bridging the gap between the existing theoretical work on optimal pricing and the unavailability of precise user utility information in real networks. In the proposed method, the service provider obtains more and more accurate estimates of user utility functions from the initial imprecise knowledge by iteratively changing the price of service levels and observing the users' decisions under the changed price. Our contribution is two-fold. First, we have developed a general principle for estimating the user utility functions. Second, we have developed a novel method for setting the prices that can optimize the extraction of the knowledge about user utility functions. The extensive simulation results demonstrate the effectiveness of our method.

The Relationship between the Task Characteristics and the Success Factors of End-User Computing (현업부서의 과업특성과 현업사용자주도 전산의 성공요인과의 관계)

  • 김상훈
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.1
    • /
    • pp.87-101
    • /
    • 2000
  • End-User Computing(EUC) is a rapidly growing phenomenon in organizations As EUC gets to be a major segment of information systems, it becomes more important to manage EUC effectively. This paper focuses on developing an integrative framework of EUC management in the contingent perspective. The characterstic of task for which EUC is implemented was considered as a contingent variable. Based on systematic review of previous research on success factors of EUC implementation, three generic variables for EUC management were identified theoretically, which were support, promotion and control. The contingent relationships between these three EUC management variables and EUC performance were reasoned and four hypotheses concerning these relationships were derived. A field study was undertaken to test the hypotheses. Data were collected from 83 End-Users belonging to Korean business organizations. Correlation analyses and Fisher's Z tests were employed to test the hypotheses. The results supported the hypotheses for the most part and gave implications and future research directions for the management for EUC.

  • PDF

A Cooperative Security Gateway cooperating with 5G+ network for next generation mBcN (차세대 mBcN을 위한 5G+ 연동보안게이트웨이)

  • Nam, Gu-Min;Kim, Hyoungshick;Lee, Hyun-Jin;Cho, Hark-Su
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.129-140
    • /
    • 2021
  • The next generation mBcN should be built to cooperate with the wireless network to support hyper-speed and hyper-connectivity. In this paper, we propose a network architecture for the cooperation mBcN and 5G commercial network and architecture of the cooperative security gateway required for the cooperation. The proposed cooperative security gateway is between gNB and UPF to support LBO, SFC, and security. Our analysis shows that the proposed architecture has several advantages. First of all, user equipment connected with the mBcN can be easily connected through the 5G commercial radio network to the mBcN. Second, the military application traffic can be transmitted to mBcN without going through the 5G core network, reducing the end-to-end transmission delay without causing the traffic load on the 5G core network. In addition, the security level of the military application can effectively be maintained because the user equipment can be connected to the cooperative security gateway, and the traffic generated by the user equipment is transmitted to the mBcN without going through the 5G core network. Finally, we demonstrate that LBO, SFC, and security modules are essential functions of the proposed gateway in the 5G test-bed environment.

A Software Architecture for URC Robots using a Context-Aware Workflow and a Service-Oriented Middleware (상황인지 워크플로우와 서비스 지향 미들웨어를 이용한 URC 로봇 소프트웨어 아키텍처)

  • Kwak, Dong-Gyu;Choi, Jong-Sun;Choi, Jae-Young;Yoo, Chae-Woo
    • The Journal of Korea Robotics Society
    • /
    • v.5 no.3
    • /
    • pp.240-250
    • /
    • 2010
  • A URC, which is a Ubiquitous Robot Companion, provides services to users in ubiquitous computing environments and has advantage of simplifying robot's hardware and software by distributing the complicated functionality of robots to other system. In this paper, we propose SOWL, which is a software architecture for URC robots and a mixed word of SOMAR and CAWL. SOWL keeps the advantages of URC and it also has the loosely-coupled characteristics. Moreover it makes it easy to develop of URC robot software. The proposed architecture is composed of 4 layers: device software, robot software, robot application, and end user layer. Developers of the each layer is able to build software suitable for their requirements by combining software modules in the lower layer. SOWL consists of SOMAR and CAWL engine. SOMAR, which is a middleware for the execution of device software and robot software, is based on service-oriented architecture(SOA) for robot software. CAWL engine is a system to process CAWL which is a context-aware workflow language. SOWL is able to provide a layered architecture for the execution of a robot software. It also makes it possible for developers of the each layer to build module-based robot software.

New execution model for CAPE using multiple threads on multicore clusters

  • Do, Xuan Huyen;Ha, Viet Hai;Tran, Van Long;Renault, Eric
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.825-834
    • /
    • 2021
  • Based on its simplicity and user-friendly characteristics, OpenMP has become the standard model for programming on shared-memory architectures. Checkpointing-aided parallel execution (CAPE) is an approach that utilizes the discontinuous incremental checkpointing technique (DICKPT) to translate and execute OpenMP programs on distributed-memory architectures automatically. Currently, CAPE implements the OpenMP execution model by utilizing the DICKPT to distribute parallel jobs and their data to slave machines, and then collects the results after executing these distributed jobs. Although this model has been proven to be effective in terms of performance and compatibility with OpenMP on distributed-memory systems, it cannot fully exploit the capabilities of multicore processors. This paper presents a novel execution model for CAPE that utilizes two levels of parallelism. In the proposed model, we add another level of parallelism in the form of multithreaded processes on slave machines with the goal of better exploiting their multicore CPUs. Initial experimental results presented near the end of this paper demonstrate that this model provides significantly enhanced CAPE performance.