首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
轻工业   1篇
无线电   1篇
自动化技术   9篇
  2021年   1篇
  2019年   1篇
  2011年   1篇
  2010年   2篇
  2007年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
When a disaster occurs, timely actions in response to urgent requests conveyed by critical messages (known as alerts) constitute a vital key to effectiveness. These actions include notifying potentially affected parties so that they can take precautionary measures, gathering additional information, and requesting remedial actions and resource allocation. However, there are different types of disasters such as epidemic outbreaks, natural disasters, major accidents, and terrorist attacks. At the same time, there are also many different parties involved such as governments, healthcare institutions, businesses, and individuals. To address these problems, we introduce a Disaster Notification and Resource Allocation System (DNRAS) based on an Alert Management System (AMS) implemented through Web services. This unified platform supports timely interactions among various parties, focusing on notification and monitoring, resource enquiry and allocation, as well as the mobility of information. We detail the mechanisms of these functions in our system, illustrating the Web services interface parameters for communications and interoperability. We illustrate the applicability of our approach with an example of an epidemic outbreak and discuss the advantage of our approach with respect to various stakeholders of our system.  相似文献   
2.
Neural Computing and Applications - Graph signal processing has recently emerged as a field with applications across a broad spectrum of fields including brain connectivity networks, logistics and...  相似文献   
3.
Workflow technology has recently been employed not only within businesses but also as a framework for implementing e-services over the Internet. Such e-services typically require collaborative enactment of workflows across multiple organizations. In this paper, we propose the use of workflow views as a fundamental support mechanism for the interoperability of multiple workflows across business organizations. We present a meta-model of workflow views and their semantics using a cross-organization workflow example based on a supply-chain e-service. We also formulate an interoperation model of workflow views and its consistency criteria. Finally, this paper presents an implementation of the model based on XML and contemporary Web services technologies, with adaptation to our E-ADOME workflow engine.  相似文献   
4.
In an e-service environment, workflow involves not only a single organization but also a number of business partners. Therefore, workflow inter-operability in such an environment is an important issue for enacting workflows. In this article, we introduce our approach of using workflow views as a fundamental support for E-service workflow inter-operability and for controlled visibility of (sub-)workflows by external parties. We discuss various aspects of a workflow view, and their semantics with example usage. Furthermore, we develop a contract model based on workflow views and demonstrate how management of e-contracts can be facilitated, with an Internet start-up E-service inter-organization workflow example.  相似文献   
5.
6.
With the recent adoption of service outsourcing, there have been increasing general demands and concerns for privacy control, in addition to basic requirement of integration. The traditional practice of a bulk transmission of the customers’ information to an external service provider is no longer adequate, especially in the finance and healthcare sectors. From our consultancy experience, application-to-application privacy protection technologies at the middleware layer alone are also inadequate to solve this problem, particularly when human service providers are heavily involved in the outsourced process. Therefore, we propose a layered architecture and a development methodology for enforcing end-to-end privacy control policies of enterprises over the export of personal information. We illustrate how Web services, augmented with updated privacy facilities such as Service Level Agreement (SLA), Platform for Privacy Preferences Project (P3P), and the P3P Preference Exchange Language (APPEL), can provide a suitable interoperation platform for service outsourcing. We further develop a conceptual model and an interaction protocol to send only the required part of a customer’s record at a time. We illustrate our approach for end-to-end privacy control in service outsourcing with a tele-marketing case study and show how the software of the outsourced call center can be integrated effectively with the Web services of a bank to protect privacy.
Vivying S. Y. ChengEmail:
  相似文献   
7.
Asset management has long been considered as an important issue in enterprises. With the maturing of the Radio Frequency Identification (RFID) technology, automated management of assets (particularly for mobile ones) in an enterprise using RFID becomes practical. We have developed a RFID-based Asset Management System (RAMS) for a large telecommunication enterprise and this paper details how we maintain the whole life-cycle of assets from their acquisition, transfer, maintenance, audit taking, to retirement. Our system also displays spatial information of assets on an electronic geographical map using Web-based Geographical Information System (WebGIS) technology. Further asset security is improved by automated notification of asset movement and malfunction alarm through Short Message System (SMS). To improve the sending time of the alarm SMSs that have high priority, we also develop a Maximum Position First (MPF) speed-up algorithm for their scheduling. Our initial deployment shows that our system can improve the availability of assets and reduce the asset management cost dramatically.  相似文献   
8.
Recent advances in mobile technologies have greatly extended traditional communication technologies to mobile devices. At the same time, healthcare environments are by nature "mobile" where doctors and nurses do not have fixed workspaces. Irregular and exceptional events are generated in daily hospital routines, such as operations rescheduling, laboratory/examination results, and adverse drug events. These events may create requests that should be delivered to the appropriate person at the appropriate time. Those requests that are classified as urgent are referred to as alerts. Efficient routing and monitoring of alerts are keys to quality and cost-effective healthcare services. Presently, these are generally handled in an ad hoc manner. In this paper, we propose the use of a healthcare alert management system to handle these alert messages systematically. We develop a model for specifying alerts that are associated with medical tasks and a set of parameters for their routing. We design an alert monitor that matches medical staff and their mobile devices to receive alerts, based on the requirements of these alerts. We also propose a mechanism to handle and reroute, if necessary, an alert message when it has not been acknowledged within a specific deadline.  相似文献   
9.
With recent advances in mobile technologies and infrastructures, there are increasing demands for ubiquitous access to networked services. These services, generally known as m-services, extend supports from Web browsers on personal computers to handheld devices, such as mobile phones and PDAs. However, in general, the capabilities and bandwidth of these devices are significantly inferior to desktop computers over wired connections, which have been assumed by most Internet services. Instead of redesigning or adapting m-services in an ad-hoc manner for multiple platforms available in handheld devices, we propose a methodology for such adaptation based on three tiers: user interface views, data views, and process views. These views provide customization and help balance security and trust. User interface views provide alternative presentations of inputs and outputs. Data views summarize data over limited bandwidth and map heterogeneous data sources. In addition, we introduce a novel approach of applying process views to m-service adaptation, where mobile users may execute a more concise version or modified procedures of the original process. The process view also serves as the key mechanism for integrating user interface views and data views. In addition, we present a formal model on view consistency and integrity in our methodology. We demonstrate the feasibility of our methodology by extending a service negotiation subsystem into an m-service with multi-platform support.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号