Fully featured, commercially supported machine learning suites that can build Decision Trees in Hadoop are few and far between. Addressing this gap, Revolution Analytics recently enhanced its entire scalable analytics suite to run in Hadoop. In this talk, I will explain how our Decision Tree implementation exploits recent research reducing the computational complexity of decision tree estimation, allowing linear scalability with data size and number of nodes. This streaming algorithm processes data in chunks, allowing scaling unconstrained by aggregate cluster memory. The implementation supports both classification and regression and is fully integrated with the R statistical language and the rest of our advanced analytics and machine learning algorithms, as well as our interactive Decision Tree visualizer.
Fully featured, commercially supported machine learning suites that can build Decision Trees in Hadoop are few and far between. Addressing this gap, Revolution Analytics recently enhanced its entire scalable analytics suite to run in Hadoop. In this talk, I will explain how our Decision Tree implementation exploits recent research reducing the computational complexity of decision tree estimation, allowing linear scalability with data size and number of nodes. This streaming algorithm processes data in chunks, allowing scaling unconstrained by aggregate cluster memory. The implementation supports both classification and regression and is fully integrated with the R statistical language and the rest of our advanced analytics and machine learning algorithms, as well as our interactive Decision Tree visualizer.
TUW- 184.742 Analyzing and Specifying Concerns for DaaSHong-Linh Truong
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
On Analyzing and Specifying Concerns for Data as a ServiceHong-Linh Truong
Providing data as a service has not only fostered the
access to data from anywhere at anytime but also reduced the
cost of investment. However, data is often associated with various
concerns that must be explicitly described and modeled in order
to ensure that the data consumer can find and select relevant
data services as well as utilize the data in the right way. In
particular, the use of data is bound to various rules imposed by
data owners and regulators. Although, technically Web services
and database technologies allow us to quickly expose data sources
as Web services, until now, research has not been focused on the
description of data service concerns, thus hindering the discovery,
selection and utilization of data services. In this paper, we analyze
major concerns for data as a service, model these concerns, and
discuss how they can be used to improve the search and utilization
of data services.
TUW-ASE Summer 2015: Data marketplaces: core models and conceptsHong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase/
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
TUW-ASE Summer 2015: Advanced service-based data analytics: Models, Elasticit...Hong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase
Emerging Dynamic TUW-ASE Summer 2015 - Distributed Systems and Challenges for...Hong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase/
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...DATAVERSITY
Are you looking to measure Data Quality in a more organized way? Look no further, use the Conformed Dimensions of Data Quality to organize your efforts, improve communication with stakeholders and track improvement over time. In this webinar, Information Quality practitioner Dan Myers will present the Conformed Dimensions of Data Quality framework along with the complete results of the 3rd Annual Dimensions of Data Quality survey. This presentation will provide the first view of the 2017 results, and all attendees will receive the associated whitepaper free.
In this webinar you will learn:
Why organizations use the Dimensions of Data Quality
Why there are so many options, and what he recommends you use
3rd Annual Survey data about how frequently organizations use the dimensions and specifically which dimensions are most used
Industry trends in adoption and more resources on the topic
Technical Documentation 101 for Data Engineers.pdfShristi Shrestha
Introduction to technical documentation for data engineers. This presentation contains details about metadata management software, documentation good practices, data documentation principles, data pipeline documentation practices and data pipeline documentation standards like CRISP-DM.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)ijdpsjournal
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
TUW- 184.742 Analyzing and Specifying Concerns for DaaSHong-Linh Truong
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
On Analyzing and Specifying Concerns for Data as a ServiceHong-Linh Truong
Providing data as a service has not only fostered the
access to data from anywhere at anytime but also reduced the
cost of investment. However, data is often associated with various
concerns that must be explicitly described and modeled in order
to ensure that the data consumer can find and select relevant
data services as well as utilize the data in the right way. In
particular, the use of data is bound to various rules imposed by
data owners and regulators. Although, technically Web services
and database technologies allow us to quickly expose data sources
as Web services, until now, research has not been focused on the
description of data service concerns, thus hindering the discovery,
selection and utilization of data services. In this paper, we analyze
major concerns for data as a service, model these concerns, and
discuss how they can be used to improve the search and utilization
of data services.
TUW-ASE Summer 2015: Data marketplaces: core models and conceptsHong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase/
This presentation is part of the course "184.742 Advanced Services Engineering" at The Vienna University of Technology, in Winter Semester 2012. Check the course at: http://www.infosys.tuwien.ac.at/teaching/courses/ase/
TUW-ASE Summer 2015: Advanced service-based data analytics: Models, Elasticit...Hong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase
Emerging Dynamic TUW-ASE Summer 2015 - Distributed Systems and Challenges for...Hong-Linh Truong
This is a lecture from the advanced service engineering course from the Vienna University of Technology. See http://dsg.tuwien.ac.at/teaching/courses/ase/
Conformed Dimensions of Data Quality – An Organized Approach to Data Quality ...DATAVERSITY
Are you looking to measure Data Quality in a more organized way? Look no further, use the Conformed Dimensions of Data Quality to organize your efforts, improve communication with stakeholders and track improvement over time. In this webinar, Information Quality practitioner Dan Myers will present the Conformed Dimensions of Data Quality framework along with the complete results of the 3rd Annual Dimensions of Data Quality survey. This presentation will provide the first view of the 2017 results, and all attendees will receive the associated whitepaper free.
In this webinar you will learn:
Why organizations use the Dimensions of Data Quality
Why there are so many options, and what he recommends you use
3rd Annual Survey data about how frequently organizations use the dimensions and specifically which dimensions are most used
Industry trends in adoption and more resources on the topic
Technical Documentation 101 for Data Engineers.pdfShristi Shrestha
Introduction to technical documentation for data engineers. This presentation contains details about metadata management software, documentation good practices, data documentation principles, data pipeline documentation practices and data pipeline documentation standards like CRISP-DM.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)ijdpsjournal
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
Integrated Analytics for IIoT Predictive Maintenance using IoT Big Data Cloud...Hong-Linh Truong
For predictive maintenance of equipment with In-
dustrial Internet of Things (IIoT) technologies, existing IoT Cloud
systems provide strong monitoring and data analysis capabilities
for detecting and predicting status of equipment. However, we
need to support complex interactions among different software
components and human activities to provide an integrated analyt-
ics, as software algorithms alone cannot deal with the complexity
and scale of data collection and analysis and the diversity of
equipment, due to the difficulties of capturing and modeling
uncertainties and domain knowledge in predictive maintenance.
In this paper, we describe how we design and augment complex
IoT big data cloud systems for integrated analytics of IIoT
predictive maintenance. Our approach is to identify various
complex interactions for solving system incidents together with
relevant critical analytics results about equipment. We incorpo-
rate humans into various parts of complex IoT Cloud systems
to enable situational data collection, services management, and
data analytics. We leverage serverless functions, cloud services,
and domain knowledge to support dynamic interactions between
human and software for maintaining equipment. We use a real-
world maintenance of Base Transceiver Stations to illustrate our
engineering approach which we have prototyped with state-of-
the art cloud and IoT technologies, such as Apache Nifi, Hadoop,
Spark and Google Cloud Functions.
Modeling and Provisioning IoT Cloud Systems for Testing UncertaintiesHong-Linh Truong
Modern Cyber-Physical Systems (CPS) and Internet of Things (IoT)
systems consist of both loosely and tightly interactions among
various resources in IoT networks, edge servers and cloud data
centers. These elements are being built atop virtualization layers
and deployed in both edge and cloud infrastructures. They also deal
with a lot of data through the interconnection of different types of
networks and services. Therefore, several new types of uncertainties
are emerging, such as data, actuation, and elasticity uncertainties.
This triggers several challenges for testing uncertainty in such
systems. However, there is a lack of novel ways to model and
prepare the right infrastructural elements covering requirements
for testing emerging uncertainties. In this paper, first we present
techniques for modeling CPS/IoT Systems and their uncertainties
to be tested. Second, we introduce techniques for determining and
generating deployment configuration for testing in different IoT
and cloud infrastructures. We illustrate our work with a real-world
use case for monitoring and analysis of Base Transceiver Stations.
Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructures: C...Hong-Linh Truong
Today’s cyber-physical systems (CPS) span IoT and cloud-based
datacenter infrastructures, which are highly heterogeneous with
various types of uncertainty. Thus, testing uncertainties in these
CPS is a challenging and multidisciplinary activity. We need several
tools for modeling, deployment, control, and analytics to test and
evaluate uncertainties for different configurations of the same CPS.
In this paper, we explain why using state-of-the art model-driven
engineering (MDE) and model-based testing (MBT) tools is not
adequate for testing uncertainties of CPS in IoT Cloud infrastruc-
tures. We discus how to combine them with techniques for elastic
execution to dynamically provision both CPS under test and testing
utilities to perform tests in various IoT Cloud infrastructures.
Towards a Resource Slice Interoperability Hub for IoTHong-Linh Truong
Interoperability for IoT is a challenging problem
because it requires us to tackle (i) cross-system interoperability
issues at the IoT platform sides as well as relevant network
functions and clouds in the edge systems and data centers
and (ii) cross-layer interoperability, e.g., w.r.t. data formats,
communication protocols, data delivery mechanisms, and perfor-
mance. However, existing solutions are quite static w.r.t software
deployment and provisioning for interoperability. Many middle-
ware, services and platforms have been built and deployed as
interoperability bridges but they are not dynamically provisioned
and reconfigured for interoperability at runtime. Furthermore,
they are often not considered together with other services as a
whole in application-specific contexts. In this paper, we focus
on dynamic aspects by introducing the concept of Resource
Slice Interoperability Hub (rsiHub). Our approach leverages
existing software artifacts and services for interoperability to
create and provision dynamic resource slices, including IoT,
network functions and clouds, for addressing application-specific
interoperability requirements. We will present our key concepts,
architectures and examples toward the realization of rsiHub.
On Supporting Contract-aware IoT Dataspace ServicesHong-Linh Truong
Advances in the Internet of Things (IoT) enable a
huge number of connected devices that produce large amounts
of data. Such data is increasingly shared among various
stakeholders to support advanced (predictive) analytics and
precision decision making in different application domains like
smart cities and industrial internet. Currently there are several
platforms that facilitate sharing, buying and selling IoT data.
However, these platforms do not support the establishment and
monitoring of usage contracts for IoT data. In this paper we
address this research issue by introducing a new extensible
platform for enabling contract-aware IoT dataspace services,
which supports data contract specification and IoT data flow
monitoring based on established data contracts. We present
a general architecture of contract monitoring services for
IoT dataspaces and evaluate our platform through illustrative
examples with real-world datasets and through performance
analysis.
Towards the Realization of Multi-dimensional Elasticity for Distributed Cloud...Hong-Linh Truong
As multiple types of distributed, heterogeneous cloud computing environments have proliferated, cloud software can leverage
diverse types of infrastructural, platform and data resources with di
erent cost and quality models. This introduces a multi-
dimensional elasticity perspective for cloud software that would greatly meet changing demands from the user. However, we argue
that current techniques are not enough for dealing with multi-dimensional elasticity in distributed cloud environments. We present
our approach to the realization of multi-dimensional elasticity by introducing novel concepts and a roadmap to achieve them.
On Engineering Analytics of Elastic IoT Cloud SystemsHong-Linh Truong
Developing IoT cloud platforms is very challenging, as IoT
cloud platforms consist of a mix of cloud services and IoT elements, e.g.,
for sensor management, near-realtime events handling, and data analyt-
ics. Developers need several tools for deployment, control, governance
and analytics actions to test and evaluate designs of software compo-
nents and optimize the operation of di erent design con gurations. In
this paper, we describe requirements and our techniques on support-
ing the development and testing of IoT cloud platforms. We present our
choices of tools and engineering actions that help the developer to design,
test and evaluate IoT cloud platforms in multi-cloud environments.
HINC – Harmonizing Diverse Resource Information Across IoT, Network Functions...Hong-Linh Truong
Effective resource management in IoT systems must
represent IoT resources, edge-to-cloud network capabilities, and
cloud resources at a high-level, while being able to link to diverse
low-level types of IoT devices, network functions, and cloud
computing infrastructures. Hence resource management in such
a context demands a highly distributed and extensible approach,
which allows us to integrate and provision IoT, network functions,
and cloud resources from various providers. In this paper, we
address this crucial research issue. We first present a high-
level information model for virtualized IoT, network functions
and cloud resource modeling, which also incorporates software-
defined gateways, network slicing and data centers. This model
is used to glue various low-level resource models from different
types of infrastructures in a distributed manner to capture
sets of resources spanning across different sub-networks. We
then develop a set of utilities and a middleware to support
the integration of information about distributed resources from
various sources. We present a proof of concept prototype with
various experiments to illustrate how various tasks in IoT cloud
systems can be simplified as well as to evaluate the performance
of our framework.
SINC – An Information-Centric Approach for End-to-End IoT Cloud Resource Prov...Hong-Linh Truong
We present SINC –
Slicing IoT, Network Functions, and Clouds – which enables designers to dynamically create/update end-to-end slices of the overall IoT network in order to simultaneously meet multiple user needs.
Governing Elastic IoT Cloud Systems under UncertaintiesHong-Linh Truong
we introduce U-GovOps – a novel framework for
dynamic, on-demand governance of elastic IoT cloud systems under
uncertainty. We introduce a declarative policy language to simplify
the development of uncertainty- and elasticity-aware governance
strategies. Based on that we develop runtime mechanisms, which
enable mitigating the uncertainties by monitoring and governing
the IoT cloud systems through specified strategies.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
1.4 modern child centered education - mahatma gandhi-2.pptx
TUW-ASE- Summer 2014: Analyzing and Specifying Concerns for DaaS
1. Analyzing and Specifying Concerns for
DaaS
Hong-Linh Truong
Distributed Systems Group,
Vienna University of Technology
truong@dsg.tuwien.ac.at
http://dsg.tuwien.ac.at/staff/truong
1ASE Summer 2014
Advanced Services Engineering,
Summer 2014, Lecture 4
Advanced Services Engineering,
Summer 2014, Lecture 4
2. Outline
What are data concerns and why their are
important
Issues in DaaS concerns
Analysis and specification of DaaS concerns
Broad issues in DaaS concerns provisioning
ASE Summer 2014 2
3. ........
What are data concerns?
datadata DaaSDaaS.... data assetsdata assets
APIs, Querying, Data Management, etc.
Located
in US?
free?
price?
redistribution?
Service
quality?
3ASE Summer 2014
Quality of data? Privacy
problem?
4. ........
DaaS concerns
ASE Summer 2014 4
datadata DaaSDaaS.... data assetsdata assets
Data
concerns
Quality of
data
Ownership
Price
License ....
APIs, Querying, Data Management, etc.
DaaS concerns include QoS, quality of data (QoD),
service licensing, data licensing, data governance, etc.
DaaS concerns include QoS, quality of data (QoD),
service licensing, data licensing, data governance, etc.
5. Why DaaS/data concerns are
important?
Too much data returned to the
consumer/integrator are not good
Results are returned without a clear usage and
ownership causing data compliance problems
Consumers want to deal with dynamic changes
5
Ultimate goal: to provide relevant data with
acceptable constraints on data concerns in
different provisioning models
Ultimate goal: to provide relevant data with
acceptable constraints on data concerns in
different provisioning models
ASE Summer 2014
6. Example: mashup (1)
Composition of Yahoo! Boss News Search,
Google News Search , and Flickr
recent news and high-qualified images, but free-
of charge, related to "Haiti earthquake"
6
Hong Linh Truong, Marco Comerio, Andrea Maurino, Schahram Dustdar, Flavio De Paoli, Luca Panziera: On
Identifying and Reducing Irrelevant Information in Service Composition and Execution. WISE 2010: 52-66
Hong Linh Truong, Marco Comerio, Andrea Maurino, Schahram Dustdar, Flavio De Paoli, Luca Panziera: On
Identifying and Reducing Irrelevant Information in Service Composition and Execution. WISE 2010: 52-66
ASE Summer 2014
8. 8
If the composer is aware of context
and quality parameters
Possible mappings of context and quality
requirements
but it is a tedious task and hard to be automated and we
are not sure we have a correct mapping.
but it is a tedious task and hard to be automated and we
are not sure we have a correct mapping.
ASE Summer 2014
10. 10
Example: open data (2)
Retrieve big
datasets from
services for further
extraction,
transform or data
composition
activities
ASE Summer 2014
11. 11
Example: open data (3)
Example: study the population growth and
literacy rate from 1990-2009 for all countries in
the world
Without QoD: get datasets and perform mashup
ASE Summer 2014
12. 12
Example: open data (4)
With QoD support:
Population annual growth rate (percent):
dataelementcompleteness= 0.8654708520179372,
datasetcompleteness=0.7356502242152466;
Adult literacy rate (percent):
dataelementcompleteness=0.5874439461883408
datasetcompleteness=0.04349775784753363
Should we retrieve the data and perform data
composition?
Should we retrieve the data and perform data
composition?
ASE Summer 2014
CountriesYear 1990 ... 2009
1
...
223
223
elements
13. 13
Example: smart environments
Smart environments with several low level sensors:
Recognize human activities: idle, relaxing, and cleaning
up,
Provide context information for adaptive service
discovery and execution
E.g., FP7 SM4All, FP7 EU OPPORTUNITY
Virtual Sensor-as-a-Service provides human activities
Sensors in smart cities for sustainability governance
E.g., Xively, Pacific Controls
ASE Summer 2014
14. 14
Example: smart environments (2)
PoC: Probability of Correctness
QoC: Quality of Context
VSS: Virtual Sensor Service
CMS: Context Management Service
CCS: Context Consumer Service
AC: Appliances Control (AC)
AM: Ambiance Management
Atif Manzoor, Hong Linh Truong, Christoph
Dorn, Schahram Dustdar: Service-centric
Inference and Utilization of Confidence on
Context. APSCC 2010: 11-18
Atif Manzoor, Hong Linh Truong, Christoph
Dorn, Schahram Dustdar: Service-centric
Inference and Utilization of Confidence on
Context. APSCC 2010: 11-18
ASE Summer 2014
15. WHAT ARE OTHER CASES
WHERE DAAS CONCERNS
ARE IMPORTANT FOR?
Discussion time
ASE Summer 2014 15
16. Issues on DaaS concerns (1)
DaaS concern models
Unstructured description of context, QoS and
quality of data (QoD)
Different specifications and terminologies
Mismatching semantics of information about
services and data concerns
16ASE Summer 2014
17. Issues on DaaS concerns (2)
DaaS APIs
No/Limited description of data and service
usage
No API for retrieving quality and context
information
No quality and context information associated
with requested data
17ASE Summer 2014
18. Issues on DaaS concerns (3)
Evaluation techniques
Missing evaluation of compatibility of context
and concerns for multiple DaaS and data
assets
Missing evaluation techniques to filter
large/irrelevant data quantity
18
Require a „holistic integration“ of information models,
APIs and evaluation techniques for DaaS concerns!
Require a „holistic integration“ of information models,
APIs and evaluation techniques for DaaS concerns!
ASE Summer 2014
19. 19
Solutions needed
ASE Summer 2014
Developing techniques for context and DaaS concerns evaluation
On-the-fly data concerns
evaluation
Concerns compatibility evaluation
and composition
Developing context and DaaS concerns that can be accessed via open
APIs
APIs extension External DaaS information service
Developing meta-model and domain-dependent semantic
representations for quality and context information specifications
Reconciliation of DaaS concern
terms
Linked DaaS concerns models
21. DaaS concerns analysis and
specification
Which concerns are important in which
situations?
How to specify concerns?
21ASE Summer 2014
Hong Linh Truong, Schahram Dustdar On analyzing and specifying concerns for data as a service. APSCC 2009: 87-
94
Hong Linh Truong, Schahram Dustdar On analyzing and specifying concerns for data as a service. APSCC 2009: 87-
94
22. The importance of concerns in
DaaS consumer‘s view – data
governance
ASE Summer 2014 22
Important factor, for example, the security and
privacy compliance, data distribution, and auditing
Storage/Database
-as-a-Service
Storage/Database
-as-a-Service
datadata DaaSDaaS
Data governance
23. The importance of concerns in DaaS
consumer‘s view – quality of data
Read-only DaaS
Important factor for the
selection of DaaS.
For example, the
accurary and
compleness of the data,
whether the data is up-to-
date
CRUD DaaS
Expected some support
to control the quality of
the data in case the data
is offered to other
consumers
23 23ASE Summer 2014
24. The importance of concerns in
DaaS consumer‘s view– data and
service usage
Read-only DaaS
Important factor, in
particular, price, data
and service APIs
licensing, law
enforcement, and
Intellectual Property
rights
CRUD DaaS
Important factor, in
paricular, price, service
APIs licensing, and law
enforcement
ASE Summer 2014 24
25. The importance of concerns in
DaaS consumer‘s view – quality of
service
Read-only DaaS
Important factor, in
particular availability and
response time
CRUD Daas
Important factor, in
particular, availability,
response time,
dependability, and security
ASE Summer 2014 25
26. The importance of concerns in DaaS
consumer‘s view– service context
Read-only DaaS
Useful factor, such as
classification and service
type (REST, SOAP),
location
CRUD DaaS
Important factor, e.g.
location (for regulation
compliance) and versioning
ASE Summer 2014 26
29. Capability concerns
Data Quality capabilities
Based on well-established research on data quality
Timelineness, uptodate, free-of-error, cleaning, consistency,
completeness, domain-specific metrics, etc.
We mainly support the specification of QoD metrics for the whole
DaaS but possible to extend to the service operation level
Data Security/Privacy capabilities
Data protection within DaaS, e.g. encryption, sensitive data
filtering, and data privacy
Many terms are based on the W3C P3P
29ASE Summer 2014
30. Capability concerns (2)
Auditing capabilities
Logging, reporting (e.g., daily, weekly, and monthly),
and warning
Support system maintenance, SLA monitoring, billing,
and taxation
Data lifecycle
Backup/recovery, distribution (e.g., a service is in
Europe but data is stored in US), and disposition
Support system maintenance but also regulation on
data
30ASE Summer 2014
31. Capability concerns (3)
Data and service license
Usage permission: for data (distribution, transfer,
personal use, etc.) and for service APIs (adaptation,
composition, derivation, etc.)
We utilize some terms from ODRL/ODRL-S
Copyrights
Liability: e.g., who is reponsible for the loss due to a
network disruption?
Law enforcement (e.g., US or European court)
Domain specific Intellectural property rights
31ASE Summer 2014
32. Data source concerns
A DaaS may utilize data from many sources.
Similar DaaSs may utilize data from the same source
Data source properties
Name, e.g. ddfFlus or DataFlux
Size
Timespan: the duration of collected data
Update Frequency: how offen the data is updated
etc
32ASE Summer 2014
33. Service context concerns
Location:
Selecting a DaaS in Amazon US Zone or European Zone?
Service Type: REST or SOAP?
Level of Service
Service Classification
Based on UNSPSC Code Classification Services
Data Classification
Service/data versioning
33ASE Summer 2014
38. 38
Implementation (3)
Joint work with
Michael Mrissa, Salah-Eddine Tbahriti, Hong Linh
Truong: Privacy Model and Annotation for
DaaS. ECOWS 2010: 3-10
Michael Mrissa, Salah-Eddine Tbahriti, Hong Linh
Truong: Privacy Model and Annotation for
DaaS. ECOWS 2010: 3-10
ASE Summer 2014
39. HOW TO MODEL DOMAIN-
SPECIFIC DATA CONCERNS?
HOW TO DEAL WITH THE BIG
SCALE (BIG DATA)?
Discussion time
ASE Summer 2014 39
40. Recall -- stakeholders in data
provisioning
ASE Summer 2014 40
Data
Data Provider
• People
(individual/crowds/org
anization)
• Software, Things
Data Provider
• People
(individual/crowds/org
anization)
• Software, Things
Service Provider
• Software and people
Service Provider
• Software and people
Data Consumer
• People, Software,
Things
Data Consumer
• People, Software,
Things
Data Aggregator/Integrator
• Software
• People + software
Data Aggregator/Integrator
• Software
• People + software
Data Assessment
• Software and
people
Data Assessment
• Software and
people
41. 41
Populating DaaS concerns
DaaS
Concerns
evaluate, specify,
publish and manage
specify, select,
monitor, evaluate
monitor and
evaluate
The role of stakeholders in the most trivial view
Data
Aggregator/Integrator
Data
Consumer
Data
Assessment
Service Provider
Data Provider
ASE Summer 2014
42. Support DaaS concerns selection
42
Service Information
Management
Service
service/data
information, including
concerns
DeXIN
Data
Consumer
External
sources
SECO2
1. Muhammad Intizar Ali, Reinhard Pichler, Hong Linh Truong, Schahram Dustdar: Data Concern Aware Querying
for the Integration of Data Services. ICEIS (1) 2011: 111-119
2. Marco Comerio, Hong Linh Truong, Flavio De Paoli, Schahram Dustdar: Evaluating Contract Compatibility for
Service Composition in the SeCO2 Framework. ICSOC/ServiceWave 2009: 221-236
1. Muhammad Intizar Ali, Reinhard Pichler, Hong Linh Truong, Schahram Dustdar: Data Concern Aware Querying
for the Integration of Data Services. ICEIS (1) 2011: 111-119
2. Marco Comerio, Hong Linh Truong, Flavio De Paoli, Schahram Dustdar: Evaluating Contract Compatibility for
Service Composition in the SeCO2 Framework. ICSOC/ServiceWave 2009: 221-236
ASE Summer 2014 42
43. 43
From capability/context to
DaaS contract
43
Search
properties of
DaaSs
Define and
negotiate contract
terms
Contracts
DaaS Capabilities,
Context, Data
Source
Consumer-specific
concerns
A DaaS contract includes a set of generic, data-
specific and service-specific conditions established
based on concerns (see Lecture 6)
A DaaS contract includes a set of generic, data-
specific and service-specific conditions established
based on concerns (see Lecture 6)
ASE Summer 2014
44. WHAT CAN WE DO MORE
WITH INFORMATION ABOUT
DAAS CONCERNS?
Discussion time
ASE Summer 2014 44
45. Providing data concerns
Importance issue for DaaS service/data
providers
How do data concerns provisioning models influence
service provisioning models, service execution and
management?
Some complex tradeoffs
Increase quality of data
increase computational effort ?
reduce the performance ?
Providing data concerns
Need more resources, Need more data
ASE Summer 2014 45
46. Data concerns in multi-dimensional
elasticity
Simple
dependency
flows (increase nr. of services)
(increase) (increase response time)
(increase cost)
How do we maintain
our systems to deal
with such complex
dependencies?
How do we maintain
our systems to deal
with such complex
dependencies?
ASE Summer 2014 46
47. Exercises
Read mentioned papers
Visit DaaS mentioned in previous lectures
Analyze existing DaaS concerns
Examine how they specify and publish concerns
Investigate possible concerns when merging
data from different types of DaaS
Open government data and near-realtime data from
sensors
Work on some DaaS concern dependency
scenarios
ASE Summer 2014 47
48. 48
Thanks for
your attention
Hong-Linh Truong
Distributed Systems Group
Vienna University of Technology
truong@dsg.tuwien.ac.at
http://dsg.tuwien.ac.at/staff/truong
ASE Summer 2014