-
21
Development of IOT Technology from the Angle of Patent
Published 2013-08-01Subjects: Get full text
Article -
22
Multilevel secure access control policy for distributed systems
Published 2017-08-01Subjects: Get full text
Article -
23
Architecture to connect sensor networks with Internet and services provided
Published 2008-01-01Subjects: Get full text
Article -
24
Modeling and verifying based on timed automata of Internet of things gateway security system
Published 2018-03-01Subjects: Get full text
Article -
25
MeidyaCoM‐policy: Approach for modelling and checking repair policies for self‐healing systems
Published 2021-08-01Subjects: Get full text
Article -
26
Specification and enforcement of personalized privacy policy for social network
Published 2012-09-01“…An authorization model was proposed to support personalized privacy preferences in the first-logic privacy preference language.The language allowed users to express personalized privacy preferences.Visitor-role authorization rules based on the attributes of visitors and role-permission assignment rules based on the tags of objects were introduced,which resolve dynamic authorization and fine-grained rights assignment problems.Analyzed privacy policy conflict cases and realized policy consistency verification by Prolog logic programming.Designed a personalized privacy policy management and implementation middleware for social network.In the middleware,it integrated the management of personalized policy into access control system on the existing resources.The experiments show that the policy conflict analysis has good efficiency in the implementation.…”
Get full text
Article -
27
A Data Stream-Based, Integrative Approach to Reliable and Easily Manageable Real Time Environmental Monitoring
Published 2015-12-01“…Therefore, the simple data stream-based distributed system model facilitates the development of general RTEM middleware system. The Galilee middleware system for RTEM is based on the distributed system model and designed to support various RTEM applications in a reliable and easily manageable way. …”
Get full text
Article -
28
System Optimization Strategy of Alarm Storm
Published 2015-05-01“…Through the study of daily experience of the existing alarm accumulation,including fusion of hardware structure adjustment,software adjustment,middleware configuration optlmization,and optimize the allocation of method to obtain a set of solving ways of the alarm storm was obtained,providing the experience for telecom operators to solve such problems.…”
Get full text
Article -
29
Design and implementation of AMQP-based campus message bus system
Published 2013-09-01“…For the strong coupling complex dependencies between applications in the traditional digital campus system,a digital campus message bus system was designs and implemented based on AMQP.In this system,the message bus is the digital messaging middleware between digital campus applications which simplifies application development logic and reduces the coupling dependencies between applications.Practical application of this system shows that the structure is suitable for the construction of digital campus,so that each application of digital campus will be easier to be managed and expanded.…”
Get full text
Article -
30
Design and Implementation of General-Purpose Data Service Platform for Telecom Company
Published 2013-02-01“…System users interact with the data mart via SOA-based data service middleware,which acts as a job scheduler and cube query executer. …”
Get full text
Article -
31
The SEMAINE API: Towards a Standards-Based Framework for Building Emotion-Oriented Systems
Published 2010-01-01“…By providing a Java and C++ wrapper around a message-oriented middleware, the API makes it easy to integrate components running on different operating systems and written in different programming languages. …”
Get full text
Article -
32
Research on integration of government information system based on cloud computing
Published 2021-09-01“…Since the mid-1980s, China began to carry out the construction of government information, and the government information system has developed rapidly.It has played an important role in economic regulation, market supervision, social management and public services, and achieved remarkable results.Under the background of “one network for all”, a new architecture mode based on cloud computing and PaaS platform was put forward, and the horizontal expansion of chimney system by decoupling the relationship between hardware resources, database and middleware was discussed, so as to improve the operation efficiency of government data center and reduce the construction cost of government data center.In addition, through the integration of government information system and the construction of capacity opening how to break the constraints of “system chimney” and “data island” was discussed, the collaborative business ability and intelligent service ability of government were improved.…”
Get full text
Article -
33
Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure
Published 2014-04-01“…In this paper, we introduce sensor-cloud infrastructure and present not only comprehensive technical issues like sensor description and publish/subscribe middleware but also applications using sensor-cloud infrastructure. …”
Get full text
Article -
34
An Embedded Cloud Design for Internet-of-Things
Published 2013-11-01“…An embedded cloud design is presented that consists of distributable Process Description Language (PDL), Distributed Middleware (DiMiWa), and an infrastructure. As a result, PDL can execute distributed processes and share resources as services over heterogeneous IoT devices with help of DiMiWa and the infrastructure. …”
Get full text
Article -
35
Game Portability Using a Service-Oriented Approach
Published 2008-01-01“…The games themselves are, however, dependent on the game engine they were developed on. Middleware has attempted to address this by, for instance, separating out the AI from the core game engine. …”
Get full text
Article -
36
Survey on industrial control protocol security research
Published 2024-06-01“…The protocol design security protection technology was comprehensively dissected from the three directions of industrial control protocol specification design, communication mechanism, and third-party middleware. In addition, the future development trend of industrial control protocol security was further prospected from the aspects of sandbox development, security protection, and vulnerability mining.…”
Get full text
Article -
37
Practical implementation of a full-stack information technology application innovation industry-compliant email system
Published 2024-11-01“…The email system, a typical information system, operates on hardware, platform software, middleware, databases, and application systems, and includes various services such as Web, POP/IMAP, and SMTP. …”
Get full text
Article -
38
Real-Time QoS-Aware Video Streaming: A Comparative and Experimental Study
Published 2014-01-01“…Due to its flexibility, scalability, real-time, and rich QoS features, Data Distribution Service (DDS) middleware provides seamless integration with high-performance, real-time, and mission-critical networks. …”
Get full text
Article -
39
Situation awareness via Internet of things and in-network data processing
Published 2017-01-01“…In-network data processing is supported by service-oriented middleware which facilitates run-time sensor discovery and tasking and ad hoc (re)configuration of the network links. …”
Get full text
Article -
40
Using the High-Level Based Program Interface to Facilitate the Large Scale Scientific Computing
Published 2014-01-01“…The related issues include the programming method, the overhead of the high-level program interface based middleware, and the data anticipate migration. The block based Gauss Jordan algorithm as a real example of large-scale scientific computing is used to evaluate those issues presented above. …”
Get full text
Article