Architectural Framework

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 49527 Experts worldwide ranked by ideXlab platform

Gerrit Muller - One of the best experts on this subject based on the ideXlab platform.

  • an Architectural Framework for roadmapping towards visual strategy
    Technological Forecasting and Social Change, 2009
    Co-Authors: Robert Phaal, Gerrit Muller
    Abstract:

    Abstract Since the first application of technology roadmapping in the late 1970s to support integrated product-technology planning, roadmapping concepts and techniques have been widely adopted at product, technology, company, sector and policy levels. The roadmapping approach is flexible and scalable, and can be customized to suit many different strategic and innovation contexts. However, this demands careful planning and design, including consideration of roadmap structure, process and participation. This paper explores the issues of how to design and architect roadmaps and roadmapping processes, which is crucial if the approach is to provide a Framework for supporting effective dialogue and communication within and between organizations. The structure of the roadmap, and the process for developing and maintaining the roadmap, should be designed to serve the purpose for which the activity is intended to satisfy, providing a ‘common language and structure' for both development and deployment of strategy.

  • towards visual strategy an Architectural Framework for roadmapping
    Portland International Conference on Management of Engineering and Technology, 2007
    Co-Authors: Robert Phaal, Gerrit Muller
    Abstract:

    Roadmapping concepts and techniques have been widely adopted (and adapted), at product, technology, company, sector and policy levels, since its first application in the late 1970s to support integrated product-technology planning. The roadmapping approach is flexible and scalable, and can be customized to suit many different strategic and innovation contexts. However, this demands careful planning and design, including consideration of roadmap structure, process and participation. This paper explores the issues of how to design and architect roadmaps and roadmapping processes, which is crucial if the approach is to provide a Framework for supporting effective dialogue and communication within and between organizations. The structure of the roadmap, and the process for developing and maintaining the roadmap, should be designed to serve the purpose for which the activity is intended to satisfy, providing a 'common language and structure' for both development and deployment of strategy.

Robert Phaal - One of the best experts on this subject based on the ideXlab platform.

  • an Architectural Framework for roadmapping towards visual strategy
    Technological Forecasting and Social Change, 2009
    Co-Authors: Robert Phaal, Gerrit Muller
    Abstract:

    Abstract Since the first application of technology roadmapping in the late 1970s to support integrated product-technology planning, roadmapping concepts and techniques have been widely adopted at product, technology, company, sector and policy levels. The roadmapping approach is flexible and scalable, and can be customized to suit many different strategic and innovation contexts. However, this demands careful planning and design, including consideration of roadmap structure, process and participation. This paper explores the issues of how to design and architect roadmaps and roadmapping processes, which is crucial if the approach is to provide a Framework for supporting effective dialogue and communication within and between organizations. The structure of the roadmap, and the process for developing and maintaining the roadmap, should be designed to serve the purpose for which the activity is intended to satisfy, providing a ‘common language and structure' for both development and deployment of strategy.

  • towards visual strategy an Architectural Framework for roadmapping
    Portland International Conference on Management of Engineering and Technology, 2007
    Co-Authors: Robert Phaal, Gerrit Muller
    Abstract:

    Roadmapping concepts and techniques have been widely adopted (and adapted), at product, technology, company, sector and policy levels, since its first application in the late 1970s to support integrated product-technology planning. The roadmapping approach is flexible and scalable, and can be customized to suit many different strategic and innovation contexts. However, this demands careful planning and design, including consideration of roadmap structure, process and participation. This paper explores the issues of how to design and architect roadmaps and roadmapping processes, which is crucial if the approach is to provide a Framework for supporting effective dialogue and communication within and between organizations. The structure of the roadmap, and the process for developing and maintaining the roadmap, should be designed to serve the purpose for which the activity is intended to satisfy, providing a 'common language and structure' for both development and deployment of strategy.

Ravishankar K. Iyer - One of the best experts on this subject based on the ideXlab platform.

  • an Architectural Framework for detecting process hangs crashes
    European Dependable Computing Conference, 2005
    Co-Authors: Nithin Nakka, Zbigniew Kalbarczyk, Giacinto Paolo Saggese, Ravishankar K. Iyer
    Abstract:

    This paper addresses the challenges faced in practical implementation of heartbeat-based process/crash and hang detection. We propose an in-processor hardware module to reduce error detection latency and instrumentation overhead. Three hardware techniques integrated into the main pipeline of a superscalar processor are presented. The techniques discussed in this work are: (i) Instruction Count Heartbeat (ICH), which detects process crashes and a class of hangs where the process exists but is not executing any instructions, (ii) Infinite Loop Hang Detector (ILHD), which captures process hangs in infinite execution of legitimate loops, and (iii) Sequential Code Hang Detector (SCHD), which detects process hangs in illegal loops. The proposed design has the following unique features: 1) operating system neutral detection techniques, 2) elimination of any instrumentation for detection of all application crashes and OS hangs, and 3) an automated and light-weight compile-time instrumentation methodology to detect all process hangs (including infinite loops), the detection being performed in the hardware module at runtime. The proposed techniques can support heartbeat protocols to detect operating system/process crashes and hangs in distributed systems. Evaluation of the techniques for hang detection show a low 1.6% performance overhead and 6% memory overhead for the instrumentation. The crash detection technique does not incur any performance overhead and has a latency of a few instructions.

  • DSN - An Architectural Framework for providing reliability and security support
    International Conference on Dependable Systems and Networks 2004, 2004
    Co-Authors: Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Abstract:

    This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level Framework called the reliability and security engine (RSE), which is implemented as an integral part of a modern microprocessor. The RSE interacts with the processor through an input/output interface. The CHECK instruction, a special extension of the instruction set architecture of the processor, is the interface of the application with the RSE. The detection mechanisms described here in detail are: (I) the memory layout randomization (MLR) module, which randomizes the memory layout of a process in order to foil attackers who assume a fixed system layout, (2) the data dependency tracking (DDT) module, which tracks the dependencies among threads of a process and maintains checkpoints of shared memory pages in order to rollback the threads when an offending (potentially malicious) thread is terminated, and (3) the instruction checker module (ICM), which checks an instruction for its validity or the control-flow of the program just as the instruction enters the pipeline for execution. Performance simulations for the studied modules indicate low overhead of the proposed solutions.

  • an Architectural Framework for providing reliability and security support
    Dependable Systems and Networks, 2004
    Co-Authors: Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Abstract:

    This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level Framework called the reliability and security engine (RSE), which is implemented as an integral part of a modern microprocessor. The RSE interacts with the processor through an input/output interface. The CHECK instruction, a special extension of the instruction set architecture of the processor, is the interface of the application with the RSE. The detection mechanisms described here in detail are: (I) the memory layout randomization (MLR) module, which randomizes the memory layout of a process in order to foil attackers who assume a fixed system layout, (2) the data dependency tracking (DDT) module, which tracks the dependencies among threads of a process and maintains checkpoints of shared memory pages in order to rollback the threads when an offending (potentially malicious) thread is terminated, and (3) the instruction checker module (ICM), which checks an instruction for its validity or the control-flow of the program just as the instruction enters the pipeline for execution. Performance simulations for the studied modules indicate low overhead of the proposed solutions.

Igor Faynberg - One of the best experts on this subject based on the ideXlab platform.

  • An Architectural Framework for support of quality of service in packet networks
    IEEE Communications Magazine, 2003
    Co-Authors: Igor Faynberg
    Abstract:

    This article gives an overview of the effort underway in ITU-T SG 13 on an Architectural Framework for QoS support in packet networks, with a focus on IP. Provisionally named Y.qosar, the Framework is to be published as a new ITU-T Recommendation. At the center of the Architectural Framework is a set of QoS network mechanisms distributed across three logical planes (the control, data, and management planes) to control network performance. Ultimately the network mechanisms are to be used in combination to deliver the satisfactory collective effect of service performance. The article also provides pointers to standards efforts dealing with specific QoS network mechanisms.

Grammati Pantziou - One of the best experts on this subject based on the ideXlab platform.

  • PETRA - A pervasive Architectural Framework for providing remote medical treatment
    Proceedings of the 1st ACM international conference on PErvasive Technologies Related to Assistive Environments - PETRA '08, 2008
    Co-Authors: Dimitris Vassis, Petros Belsis, Christos Skourlas, Grammati Pantziou
    Abstract:

    The proliferation of mobile devices has led to their integration into a huge number of assistive environments where they perform a key role. Pervasive environments, built over wireless infrastructures, introduce new possibilities in the healthcare sector realizing the anytime-anywhere access to medical information paradigm. Towards this direction pervasive technology can be deployed in assistive environments, such as home monitoring for elderly or patients. In this paper we describe a policy based architecture that utilizes software agents and wireless sensor technologies to enable remote monitoring of patients and elderly people. We also discuss the technical challenges which directed the decisions with respect to the design of our software prototype architecture. These decisions mainly focus on providing continuous feedback of the patient's condition, while transferring encrypted versions of the necessary medical information in accordance with the increased security and privacy requirements. The presented prototype implementation utilizes advanced network management technologies and software agent engineering in order to operate effectively, to achieve interoperability through the different modules and in order to comply with the imposed (by the legislative Framework) increased security and privacy requirements.

  • a pervasive Architectural Framework for providing remote medical treatment
    Pervasive Technologies Related to Assistive Environments, 2008
    Co-Authors: Dimitris Vassis, Petros Belsis, Christos Skourlas, Grammati Pantziou
    Abstract:

    The proliferation of mobile devices has led to their integration into a huge number of assistive environments where they perform a key role. Pervasive environments, built over wireless infrastructures, introduce new possibilities in the healthcare sector realizing the anytime-anywhere access to medical information paradigm. Towards this direction pervasive technology can be deployed in assistive environments, such as home monitoring for elderly or patients. In this paper we describe a policy based architecture that utilizes software agents and wireless sensor technologies to enable remote monitoring of patients and elderly people. We also discuss the technical challenges which directed the decisions with respect to the design of our software prototype architecture. These decisions mainly focus on providing continuous feedback of the patient's condition, while transferring encrypted versions of the necessary medical information in accordance with the increased security and privacy requirements. The presented prototype implementation utilizes advanced network management technologies and software agent engineering in order to operate effectively, to achieve interoperability through the different modules and in order to comply with the imposed (by the legislative Framework) increased security and privacy requirements.