This document proposes techniques for exchanging data agreements in data-as-a-service (DaaS) models and cloud-based data marketplaces. It develops a metamodel for representing data agreements and techniques for associating agreements with data assets. An interaction model and Data Agreement Exchange as a Service (DAES) are proposed to facilitate agreement exchange. Examples illustrate inserting agreements in data assets and linking agreements to geospatial data provided by DaaS. Future work includes integrating DAES with data contracts and a data marketplace prototype.
On Analyzing and Developing Data Contracts in Cloud-based Data MarketplacesHong-Linh Truong
Currently, rich and diverse data types have been
increasingly provided using the Data-as-a-Service (DaaS) model,
a form of cloud computing services. However, data offered by
DaaS are constrained by several data concerns that, if not
automatically being reasoned properly, will lead to a wrong way
of using them. In this paper, we support the assumption that
data concerns should be explicitly modeled and specified in data
contracts to support concern-aware data selection and utilization.
Instead of relying on a specific definition of data contracts, we
analyze contemporary data contracts and we present an abstract
model for data contracts. Based on the abstract model, we
propose several techniques for evaluating data contracts that
can be integrated into data service selection and composition
frameworks. We also illustrate our approach with some realworld
scenarios.
Agent based Aggregation of Cloud Services- A Research Agendaidescitation
-Cloud computing has come to the forefront as it
overcomes some of the issues in computing such as storage
space and processing power. It enables ubiquitous accessing
and processing of information without the need of excessive
computing facilities. In this work, we plan to brief some of the
issues in aggregating the cloud services, discovering futuristic
cloud service requests, develop a repository of the same and
propose an agent based Quality of Service (QoS) provisioning
system for cloud clients.
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINijmpict
Cloud computing is a key element in many nations’ pursuit of fast-tracked digital transformation and the
quick implementation of digital tools but is still facing considerable barriers due to the distinct challenges
that information technology adoption faces in public sector environments. Using scientometric data from
the Web of Science database, this study explores the current state of research and the structure of the
public sector cloud computing knowledge domain in a novel way, utilizing the CiteSpace visual analytic
software to produce knowledge maps that visualize public sector cloud computing research in terms of
publication activity, constituent authors, and publication venues, as well as exploring the intellectual base
of the knowledge domain. For public sector cloud computing researchers and practitioners, the study
provides visual insights and analyses that support future research, collaboration, and evidence-based
cloud computing implementation and utilization.
FIWARE Global Summit - International Data Spaces - From Industry 4.0 to Data ...FIWARE
Presentation by Sebastian Steinbuss
Director Architecture, International Data Spaces Association
FIWARE Global Summit
27-28 November 2018
Malaga, Spain
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
Towards a Framework of Influence Factors for Value Co-Creation in Service Sys...Peter Hottum
Presented at the International Conference on Exploring Service Science 1.5 in Porto (Portugal), Feb 5th 2015.
According to modern service science theory, value is jointly generated by several partners forming a service system. In this work, we focus on a simple two-party system consisting of a service provider and its customer. The value created by this service system hinges on the contribution of both parties.
That is, it also depends on the collaboration of the customer, which is a key characteristic of services in traditional definitions. Providers, however, lack knowledge on how to identify and measure the influence factors for value cocreation, such as customer contribution. Being aware of customer contribution, providers could design and manage value propositions purposefully. In this work, we provide a first version of a framework of influence factors for value co-creation in service systems, which may serve providers as a guideline for identifying different types of customer contribution.
On Analyzing and Developing Data Contracts in Cloud-based Data MarketplacesHong-Linh Truong
Currently, rich and diverse data types have been
increasingly provided using the Data-as-a-Service (DaaS) model,
a form of cloud computing services. However, data offered by
DaaS are constrained by several data concerns that, if not
automatically being reasoned properly, will lead to a wrong way
of using them. In this paper, we support the assumption that
data concerns should be explicitly modeled and specified in data
contracts to support concern-aware data selection and utilization.
Instead of relying on a specific definition of data contracts, we
analyze contemporary data contracts and we present an abstract
model for data contracts. Based on the abstract model, we
propose several techniques for evaluating data contracts that
can be integrated into data service selection and composition
frameworks. We also illustrate our approach with some realworld
scenarios.
Agent based Aggregation of Cloud Services- A Research Agendaidescitation
-Cloud computing has come to the forefront as it
overcomes some of the issues in computing such as storage
space and processing power. It enables ubiquitous accessing
and processing of information without the need of excessive
computing facilities. In this work, we plan to brief some of the
issues in aggregating the cloud services, discovering futuristic
cloud service requests, develop a repository of the same and
propose an agent based Quality of Service (QoS) provisioning
system for cloud clients.
CLOUD COMPUTING IN THE PUBLIC SECTOR: MAPPING THE KNOWLEDGE DOMAINijmpict
Cloud computing is a key element in many nations’ pursuit of fast-tracked digital transformation and the
quick implementation of digital tools but is still facing considerable barriers due to the distinct challenges
that information technology adoption faces in public sector environments. Using scientometric data from
the Web of Science database, this study explores the current state of research and the structure of the
public sector cloud computing knowledge domain in a novel way, utilizing the CiteSpace visual analytic
software to produce knowledge maps that visualize public sector cloud computing research in terms of
publication activity, constituent authors, and publication venues, as well as exploring the intellectual base
of the knowledge domain. For public sector cloud computing researchers and practitioners, the study
provides visual insights and analyses that support future research, collaboration, and evidence-based
cloud computing implementation and utilization.
FIWARE Global Summit - International Data Spaces - From Industry 4.0 to Data ...FIWARE
Presentation by Sebastian Steinbuss
Director Architecture, International Data Spaces Association
FIWARE Global Summit
27-28 November 2018
Malaga, Spain
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
Towards a Framework of Influence Factors for Value Co-Creation in Service Sys...Peter Hottum
Presented at the International Conference on Exploring Service Science 1.5 in Porto (Portugal), Feb 5th 2015.
According to modern service science theory, value is jointly generated by several partners forming a service system. In this work, we focus on a simple two-party system consisting of a service provider and its customer. The value created by this service system hinges on the contribution of both parties.
That is, it also depends on the collaboration of the customer, which is a key characteristic of services in traditional definitions. Providers, however, lack knowledge on how to identify and measure the influence factors for value cocreation, such as customer contribution. Being aware of customer contribution, providers could design and manage value propositions purposefully. In this work, we provide a first version of a framework of influence factors for value co-creation in service systems, which may serve providers as a guideline for identifying different types of customer contribution.
Mapping Lexical Gaps In Cloud Ontology Using BabelNet and FP-GrowthCSCJournals
In spite of the rapid growth of cloud services, a wide spectrum of enterprises and users do not buy such services as a result of insufficient knowledge about cloud technology. On the other hand, the majority of cloud service discovery and repository frameworks depend on cloud ontologies as one of the main building blocks. Accordingly, constructing a suitable cloud service discovery mechanism will exclude an immense obstacle especially for non-expert users due to the difficulty to select suitable concepts from referenced cloud ontology. Users always prefer to compose queries using their natural languages. But, it is difficult to truly match such queries because of natural language ambiguities. In this paper, we propose a new mechanism bridging the gap between English natural language terms and concepts of the referenced cloud ontology using BabelNet knowledge base and FP-Growth mining algorithm. The contribution of this paper is two folded: firstly, classifying cloud services into their corresponding cloud ontology concepts; secondly, anticipating a system that enables non-specialized users to flexibly compose their cloud service searching queries using English natural language. We have applied the proposed mechanism on two sets of cloud services related to concepts in the referenced cloud ontology; Streaming and Multimedia (S&M), and Human Resource (HR). According to our experimental results, the proposed mechanism has achieved 90%, and 86% in the F-Score measure for classifying S&M, and HR cloud services, respectively. For matching users' queries, the results have shown that 80% of S&M and 82% of HR relevant queries have been assigned correctly.
Including Cyberphysical Smart Objects into Digital Libraries. Giancarlo Forti...Universita della Calabria,
Slides related to the book chapter "Including Cyberphysical Smart Objects into Digital Libraries" Giancarlo Fortino , Anna Rovella , Wilma Russo, and Claudio Savaglio. Slides author: Claudio Savaglio
Presentation given by Angus Whyte as part of the Digital Curation Centre's Round Table: "How can other stakeholders support repositories on research data", which was led by Anna Clements, University of St Andrews; Angus Whyte, Digital Curation Centre; Robin Rice, University of Edinburgh; Sarah Jones, Digital Curation Centre. The Round Table took place on Friday 2nd August 2013 at Repository Fringe 2013
Mapping Lexical Gaps In Cloud Ontology Using BabelNet and FP-GrowthCSCJournals
In spite of the rapid growth of cloud services, a wide spectrum of enterprises and users do not buy such services as a result of insufficient knowledge about cloud technology. On the other hand, the majority of cloud service discovery and repository frameworks depend on cloud ontologies as one of the main building blocks. Accordingly, constructing a suitable cloud service discovery mechanism will exclude an immense obstacle especially for non-expert users due to the difficulty to select suitable concepts from referenced cloud ontology. Users always prefer to compose queries using their natural languages. But, it is difficult to truly match such queries because of natural language ambiguities. In this paper, we propose a new mechanism bridging the gap between English natural language terms and concepts of the referenced cloud ontology using BabelNet knowledge base and FP-Growth mining algorithm. The contribution of this paper is two folded: firstly, classifying cloud services into their corresponding cloud ontology concepts; secondly, anticipating a system that enables non-specialized users to flexibly compose their cloud service searching queries using English natural language. We have applied the proposed mechanism on two sets of cloud services related to concepts in the referenced cloud ontology; Streaming and Multimedia (S&M), and Human Resource (HR). According to our experimental results, the proposed mechanism has achieved 90%, and 86% in the F-Score measure for classifying S&M, and HR cloud services, respectively. For matching users' queries, the results have shown that 80% of S&M and 82% of HR relevant queries have been assigned correctly.
Including Cyberphysical Smart Objects into Digital Libraries. Giancarlo Forti...Universita della Calabria,
Slides related to the book chapter "Including Cyberphysical Smart Objects into Digital Libraries" Giancarlo Fortino , Anna Rovella , Wilma Russo, and Claudio Savaglio. Slides author: Claudio Savaglio
Presentation given by Angus Whyte as part of the Digital Curation Centre's Round Table: "How can other stakeholders support repositories on research data", which was led by Anna Clements, University of St Andrews; Angus Whyte, Digital Curation Centre; Robin Rice, University of Edinburgh; Sarah Jones, Digital Curation Centre. The Round Table took place on Friday 2nd August 2013 at Repository Fringe 2013
The MODDERN Cures Solution updates the regulatory system by removing barriers to invention and providing greater predictability in the search for answers to our nation’s unmet medical needs. It’s in everyone’s interest to push for a MODDERN regulatory system that encourages scientific inquiry, rewards ingenuity, and safely speeds modern miracles into everyday diagnostics and treatments that improve patient outcomes.
TUW - 184.742 Data marketplaces: models and conceptsHong-Linh Truong
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
TUW-ASE Summer 2015: Data marketplaces: core models and conceptsHong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase/
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)ijdpsjournal
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
TUW- 184.742 Emerging Dynamic Distributed Systems and Challenges for Advanced...Hong-Linh Truong
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
Traditionally, data integration has meant compromise. No matter how rapidly data architects and developers could complete a project before its deadline, speed would always come at the expense of quality. On the other hand, if they focused on delivering a quality project, it would generally drag on for months thus exceeding its deadline. Finally, if the teams concentrated on both quality and rapid delivery, the costs would invariably exceed the budget. Regardless of which path you chose, the end result would be less than desirable. This led some experts to revisit the scope of data integration. This write up shall focus on the same issue.
TUW- 184.742 Analyzing and Specifying Concerns for DaaSHong-Linh Truong
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Framework for Geospatial Web Services for Public Health by Dr. Leslie LenertWansoo Im
A Framework for Geospatial Web Services for Public Health
by Leslie Lenert, MD, MS, FACMI, Director
National Center for Public Health Informatics, CCHIS, CDC
June 8 2009 URISA Public Health Conference
uploaded by Wansoo Im, Ph.D.
URISA Membership Committee Chair
http://www.gisinpublichealth.org
Similar to Exchanging Data Agreements in the DaaS Model (20)
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...Hong-Linh Truong
For predictive maintenance of equipment with In-
dustrial Internet of Things (IIoT) technologies, existing IoT Cloud
systems provide strong monitoring and data analysis capabilities
for detecting and predicting status of equipment. However, we
need to support complex interactions among different software
components and human activities to provide an integrated analyt-
ics, as software algorithms alone cannot deal with the complexity
and scale of data collection and analysis and the diversity of
equipment, due to the difficulties of capturing and modeling
uncertainties and domain knowledge in predictive maintenance.
In this paper, we describe how we design and augment complex
IoT big data cloud systems for integrated analytics of IIoT
predictive maintenance. Our approach is to identify various
complex interactions for solving system incidents together with
relevant critical analytics results about equipment. We incorpo-
rate humans into various parts of complex IoT Cloud systems
to enable situational data collection, services management, and
data analytics. We leverage serverless functions, cloud services,
and domain knowledge to support dynamic interactions between
human and software for maintaining equipment. We use a real-
world maintenance of Base Transceiver Stations to illustrate our
engineering approach which we have prototyped with state-of-
the art cloud and IoT technologies, such as Apache Nifi, Hadoop,
Spark and Google Cloud Functions.
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesHong-Linh Truong
Modern Cyber-Physical Systems (CPS) and Internet of Things (IoT)
systems consist of both loosely and tightly interactions among
various resources in IoT networks, edge servers and cloud data
centers. These elements are being built atop virtualization layers
and deployed in both edge and cloud infrastructures. They also deal
with a lot of data through the interconnection of different types of
networks and services. Therefore, several new types of uncertainties
are emerging, such as data, actuation, and elasticity uncertainties.
This triggers several challenges for testing uncertainty in such
systems. However, there is a lack of novel ways to model and
prepare the right infrastructural elements covering requirements
for testing emerging uncertainties. In this paper, first we present
techniques for modeling CPS/IoT Systems and their uncertainties
to be tested. Second, we introduce techniques for determining and
generating deployment configuration for testing in different IoT
and cloud infrastructures. We illustrate our work with a real-world
use case for monitoring and analysis of Base Transceiver Stations.
Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructures: C...Hong-Linh Truong
Today’s cyber-physical systems (CPS) span IoT and cloud-based
datacenter infrastructures, which are highly heterogeneous with
various types of uncertainty. Thus, testing uncertainties in these
CPS is a challenging and multidisciplinary activity. We need several
tools for modeling, deployment, control, and analytics to test and
evaluate uncertainties for different configurations of the same CPS.
In this paper, we explain why using state-of-the art model-driven
engineering (MDE) and model-based testing (MBT) tools is not
adequate for testing uncertainties of CPS in IoT Cloud infrastruc-
tures. We discus how to combine them with techniques for elastic
execution to dynamically provision both CPS under test and testing
utilities to perform tests in various IoT Cloud infrastructures.
Towards a Resource Slice Interoperability Hub for IoTHong-Linh Truong
Interoperability for IoT is a challenging problem
because it requires us to tackle (i) cross-system interoperability
issues at the IoT platform sides as well as relevant network
functions and clouds in the edge systems and data centers
and (ii) cross-layer interoperability, e.g., w.r.t. data formats,
communication protocols, data delivery mechanisms, and perfor-
mance. However, existing solutions are quite static w.r.t software
deployment and provisioning for interoperability. Many middle-
ware, services and platforms have been built and deployed as
interoperability bridges but they are not dynamically provisioned
and reconfigured for interoperability at runtime. Furthermore,
they are often not considered together with other services as a
whole in application-specific contexts. In this paper, we focus
on dynamic aspects by introducing the concept of Resource
Slice Interoperability Hub (rsiHub). Our approach leverages
existing software artifacts and services for interoperability to
create and provision dynamic resource slices, including IoT,
network functions and clouds, for addressing application-specific
interoperability requirements. We will present our key concepts,
architectures and examples toward the realization of rsiHub.
On Supporting Contract-aware IoT Dataspace ServicesHong-Linh Truong
Advances in the Internet of Things (IoT) enable a
huge number of connected devices that produce large amounts
of data. Such data is increasingly shared among various
stakeholders to support advanced (predictive) analytics and
precision decision making in different application domains like
smart cities and industrial internet. Currently there are several
platforms that facilitate sharing, buying and selling IoT data.
However, these platforms do not support the establishment and
monitoring of usage contracts for IoT data. In this paper we
address this research issue by introducing a new extensible
platform for enabling contract-aware IoT dataspace services,
which supports data contract specification and IoT data flow
monitoring based on established data contracts. We present
a general architecture of contract monitoring services for
IoT dataspaces and evaluate our platform through illustrative
examples with real-world datasets and through performance
analysis.
Towards the Realization of Multi-dimensional Elasticity for Distributed Cloud...Hong-Linh Truong
As multiple types of distributed, heterogeneous cloud computing environments have proliferated, cloud software can leverage
diverse types of infrastructural, platform and data resources with di
erent cost and quality models. This introduces a multi-
dimensional elasticity perspective for cloud software that would greatly meet changing demands from the user. However, we argue
that current techniques are not enough for dealing with multi-dimensional elasticity in distributed cloud environments. We present
our approach to the realization of multi-dimensional elasticity by introducing novel concepts and a roadmap to achieve them.
On Engineering Analytics of Elastic IoT Cloud SystemsHong-Linh Truong
Developing IoT cloud platforms is very challenging, as IoT
cloud platforms consist of a mix of cloud services and IoT elements, e.g.,
for sensor management, near-realtime events handling, and data analyt-
ics. Developers need several tools for deployment, control, governance
and analytics actions to test and evaluate designs of software compo-
nents and optimize the operation of di erent design con gurations. In
this paper, we describe requirements and our techniques on support-
ing the development and testing of IoT cloud platforms. We present our
choices of tools and engineering actions that help the developer to design,
test and evaluate IoT cloud platforms in multi-cloud environments.
HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...Hong-Linh Truong
Effective resource management in IoT systems must
represent IoT resources, edge-to-cloud network capabilities, and
cloud resources at a high-level, while being able to link to diverse
low-level types of IoT devices, network functions, and cloud
computing infrastructures. Hence resource management in such
a context demands a highly distributed and extensible approach,
which allows us to integrate and provision IoT, network functions,
and cloud resources from various providers. In this paper, we
address this crucial research issue. We first present a high-
level information model for virtualized IoT, network functions
and cloud resource modeling, which also incorporates software-
defined gateways, network slicing and data centers. This model
is used to glue various low-level resource models from different
types of infrastructures in a distributed manner to capture
sets of resources spanning across different sub-networks. We
then develop a set of utilities and a middleware to support
the integration of information about distributed resources from
various sources. We present a proof of concept prototype with
various experiments to illustrate how various tasks in IoT cloud
systems can be simplified as well as to evaluate the performance
of our framework.
SINC – An Information-Centric Approach for End-to-End IoT Cloud Resource Prov...Hong-Linh Truong
We present SINC –
Slicing IoT, Network Functions, and Clouds – which enables designers to dynamically create/update end-to-end slices of the overall IoT network in order to simultaneously meet multiple user needs.
Governing Elastic IoT Cloud Systems under UncertaintiesHong-Linh Truong
we introduce U-GovOps – a novel framework for
dynamic, on-demand governance of elastic IoT cloud systems under
uncertainty. We introduce a declarative policy language to simplify
the development of uncertainty- and elasticity-aware governance
strategies. Based on that we develop runtime mechanisms, which
enable mitigating the uncertainties by monitoring and governing
the IoT cloud systems through specified strategies.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Exchanging Data Agreements in the DaaS Model
1. Exchanging Data Agreements in the
DaaS Model
Hong-Linh Truong1, Schahram Dustdar1, Joachim Goetze2,
Tino Fleuren2, Paul Mueller2, Salah-Eddine Tbahriti3, Michael
Mrissa3, Chirine Ghedira3
1
Distributed Systems Group, Vienna University of Technology
2
Department of Computer Science, University of Kaiserslautern
3
Universite de Lyon, CNRS, Universite Lyon 1
truong@infosys.tuwien.ac.at
http://www.infosys.tuwien.ac.at/Staff/truong
APSCC 2011, 12 Dec, 2011, Jeju, Korean
2. Outline
Background and motivation
Our approach
Techniques for data agreements exchange
Prototype and illustrative examples
APSCC 2011, 12 Dec, 2011, Jeju, Korean
3. Background
Emerging data-as-a-service and on-demand data
provisioning in cloud-based data marketplaces
Rich data concerns associated with data assets
Dynamic interactions within data marketplaces
Data consumer DaaS provider Data provider
Data marketplaces quality1
DaaS quality2
Consumer
DaaS privacy1
DaaS
privacy2
Sensor
APSCC 2011, 12 Dec, 2011, Jeju, Korean
4. Motivation
Lack of models and protocols for data agreement
in data marketplaces
Constraints for data usage are not clear
Inadequate data/service description → hindering data
selection and integration
Existing techniques are not adequate for dynamic
data agreement exchange in data marketplaces
Our work: developing generic exchange models
suitable for different ways of data provisioning in
data marketplaces
APSCC 2011, 12 Dec, 2011, Jeju, Korean
5. Our approach
Develop metamodel for data agreement
exchange
Investigate techniques for enriching and
associating data assets with agreement terms
Develop interaction models for data agreement
exchange
Develop Data Agreement Exchange as a
Service (DAES)
APSCC 2011, 12 Dec, 2011, Jeju, Korean
6. Metamodel for data agreements
Different category
of agreements
Licensing,
privacy, quality of
data
Extensions
Languages
Different types of
agreements
Different
specifications
APSCC 2011, 12 Dec, 2011, Jeju, Korean
7. Associating data with data
agreements
Solutions
(a) directly inserting agreements into data assets
(b) providing two-step access to agreements and data assets
(c) linking data agreements to the description of DaaS
(d) linking data agreements to the message sent by DaaS
APSCC 2011, 12 Dec, 2011, Jeju, Korean
11. Illustrating examples – insert
agreement into data asset
A pay-per-use consumer uses dataAPI of DaaS
search for data
The consumer pays the use APIs
Each call can return different types of data
Example with
People Search in
Infochimps
But a strong
consequence for data
service engineering
techniques: dealing with
elastic requirements!
APSCC 2011, 12 Dec, 2011, Jeju, Korean
12. Illustrating examples – link
agreements to geospatial data
Domain-specific DaaS: different agreements for different data requests
Vector data of geographic features via Web-Feature-Service (WFS)
Terrain elevation data via Web-Coverage Services (WCS)
APSCC 2011, 12 Dec, 2011, Jeju, Korean
13. Illustrating examples – link
agreements to geospatial data
Consumers can interpret
and reason if the data
can be used for specific
purposes
APSCC 2011, 12 Dec, 2011, Jeju, Korean
14. Illustrative examples – develop an
app for policy compliance
Configuration
Results
APSCC 2011, 12 Dec, 2011, Jeju, Korean
15. Conclusions and future work
Dynamic data provisioning in DaaS/data marketplaces
need new models and techniques for data agreement
exchange
We present
Models and interactions for data agreement exchange
Data Agreement Exchange Service (DAES)
Data agreement is not just “data licensing”!
Future work
Integrate DAES with data contracts [another paper in
APSCC 11]
Integrate DAES with DEMODS ([AINA 2012])
APSCC 2011, 12 Dec, 2011, Jeju, Korean
16. Thanks for your attention!
Hong-Linh Truong
Distributed Systems Group
Vienna University of Technology
Austria
truong@infosys.tuwien.ac.at
http://www.infosys.tuwien.ac.at/staff/truong
APSCC 2011, 12 Dec, 2011, Jeju, Korean