IEEE Xplore Search Results

Showing 1-25 of 264 resultsfor

Filter Results

Show

Results

This panel examines the need for digital libraries to capture and preserve journalistic content in digital formats, especially online news.Show More
Information security, based on the pillars of integrity, confidentiality and availability of information, involves determining tools, methods, techniques and controls prone to continuity of operations and management of information assets.For its part, digital preservation defines and promotes the guidelines for preserving documentary heritage in electronic support in order to ensure that the attri...Show More
The decarbonization of UNESCO-protected historic centers is an increasingly important issue, with both environmental and cultural implications. These spaces, often characterized by historic buildings and delicate infrastructures, must find a balance between preservation needs and the necessity to adopt modern solutions for carbon emission reduction. This paper provides a comprehensive review of th...Show More
There is a vital need to electronically preserve our cultural heritage as well as the digital outcomes of today's research, arts and humanities. Due to the rapid pace of changes in information technologies, digital data, documents and records are likely to become uninterpretable bit-streams within short periods of time. Digital Preservation deals with the long-term storage, access and maintenance ...Show More
Sustainable city planning plays an important role in fighting climate change, and heritage trails are critical to this effort. Heritage trails are walking, hiking, and biking paths that link features of historical interest. Examples include paths in parks, trails connecting villages, and walking routes in the historic centers of cities. On its face, historic conservation is not a sustainable pract...Show More
Planning is one of the main approaches used to improve agents’ working efficiency by making plans beforehand. However, during planning, agents face the risk of having their private information leaked. This article proposes a novel strong privacy-preserving planning approach for logistic-like problems. This approach outperforms existing approaches by addressing two challenges: 1) simultaneously ach...Show More
In the last century, specializing in Information Technologies became one of the growing trends which effected almost every sector and became a major tool for urban planners who need an integrated source of data. Digital data, both in vector and raster formats, made it quicker to match the spatial data with the land use which serves better city planning and sustainable development actions. Geophysi...Show More

Bracing for zero day [Y2K management]

H. Rubin

IT Professional
Year: 1999 | Volume: 1, Issue: 3 | Magazine Article |
Cited by: Papers (3)
Your Y2K efforts focus on one goal: ensuring business continuity. Implement the right zero-day strategies to clinch the compliance race. Business continuity planning evolved from contingency planning, which looks at your business operations, imagines what could go wrong, and develops measures for dealing with those emergencies. Ultimately, contingency planning is shortsighted because it focuses on...Show More

Bracing for zero day [Y2K management]

H. Rubin

Year: 1999 | Volume: 1, Issue: 3 | Magazine Article |
Large language models (LLMs) have shown remarkable capabilities in natural language understanding and generation. However, they face challenges in solving complex planning problems, especially those obscured by altered terminologies and representations, known as mystery planning problems. This paper presents a novel approach leveraging category theory and functors to systematically map mystery pla...Show More
Grand Canal of China (GCC) is considered as a significant historical cultural heritage in China. Conservation and management of GCC are becoming an extremely urgent issue. In this paper, a design of GCC conservation integrated information system was designed after analyzing GCC conservation of business requirement. The design focuses on the analysis of the system's overall structure, function mode...Show More
This paper presents the educational outcomes of a Project-Based-Learning (PBL) approach as applied in urban design education by graduate students at the Master of Urban Planning and Design program, Department of Architecture and Urban Planning, College of Engineering, Qatar University. PBL approach has always proved effective in teaching and learning in engineering, architecture and urban design p...Show More
This paper presents an efficient reactive approach to mobile robot motion planning in dynamically unknown environments featuring multi-shaped obstacles moving with varying velocities both in direction and in magnitude. In order to endow the mobile robot with real-time response capability, the entire motion planning duration is divided into tiny time slices during each of which a control input is d...Show More
Cybersecurity is becoming very crucial in the today's world where technology is now not limited to just computers, smartphones, etc. It is slowly entering into things that are used on daily basis like home appliances, automobiles, etc. Thus, opening a new door for people with wrong intent. With the increase in speed of technology dealing with such issues also requires quick response from security ...Show More
As a developing country, China is experiencing rapid industrialization and urbanization, and facing the problems such as land pollution and decrease of farmland which influence food safety and food security. Protecting farmland is an indisputable and urgent task to China government. This paper constructs a two level multi-objective model for decision-making of the quantity of prime farmland preser...Show More
This paper describes a new method of active acquisition of operating ranges for a humanoid robot by taking insights from pain perception, which is regarded as the function of self-preservation in nature. This study aims to determine the operating ranges for each joint of anthropomorphic humanoid robot by its own active behavior. Pain is regarded as an alert of unexpected events and the robot learn...Show More
We propose a solution for handling robot abort commands, illustrated by a real-world scenario involving household kitchen robots. The robot uses planning to find sequences of actions that must be performed in order to gracefully cancel a previously received command. The Planning Domain Definition Language (PDDL) is used to write a domain to model kitchen activities and behaviours, and this domain ...Show More
The goal of this practice-based work is to share experiences and findings with other digital preservation practitioners. The Thomas Fisher Rare Book Library Digital Preservation Pilot is a collaborative project involving the Thomas Fisher Rare Book Library, Information Technology Services at University of Toronto Libraries, and the TALint internship program at the school's Faculty of Information. ...Show More
This study investigates the applications of cloud computing in academic libraries, aiming to explore its impact on library operations, user experiences, and scholarly collaboration. The objectives of the research include examining the various ways cloud computing is utilized in academic libraries, assessing its benefits and challenges, and identifying opportunities for future development. Through ...Show More
ULISSE is an EU project that aims at data valorization around the ISS experiments. The ULISSE software platform is endowed with a number of additional services to improve both data production and data analysis. This paper describes the Planning and Scheduling Service (PSS), a module developed to support functions of data production around the ISS activities and integrated in the ULISSE platform. I...Show More
During flights, an unmanned aerial vehicle (UAV) may not be allowed to move across certain areas due to soft constraints such as privacy restrictions. Current methods on self-adaption focus mostly on motion planning such that the trajectory does not trespass predetermined restricted areas. When the environment is cluttered with uncertain obstacles, however, these motion planning algorithms are not...Show More
This paper presents an online kinodynamic motion planning scheme for dynamically evolving environments, by employing Q-learning. The methodology addresses the finite horizon continuous-time optimal control problem with completely unknown system dynamics. An actor-critic structure is employed along with a buffer of previous experiences, to approximate the optimal policy and alleviate the learning s...Show More
This work establishes a cyber space of an urban area for visiting on the Internet. By registering entire scenes along every street and scenes at many locations, people can visually travel from street to street, and reach their destinations in cyber city. The issues we discuss here are how to map a large scale area to image domain in a small amount of data, how to cover visual information as comple...Show More
This paper proposes transforming Shahjahanabad into a Smart Heritage City by integrating good governance principles, speech technology, and IoT. Good governance, encompassing principles like Accountability, Transparency, Equity & Inclusiveness/ Fairness, Performance/Responsiveness, Effectiveness & Efficiency/ Direction, Participation/ Legitimacy & Voice, is crucial for sustainable development. Spe...Show More
In the renovation of the old cities in contemporary china, the way of building first has been generally adopted for a long time. Land function transformation is made as a top priority in urban renewal for land value increment and tax. In this way, what is gained in economic interests temporarily is lost in the historical value and feature of old city. The paper presents a strategy of considering f...Show More
We propose a novel obfuscation technique that can be used to outsource hard satisfiability (SAT) formulas to the cloud. Servers with large computational power are typically used to solve SAT instances that model real-life problems in task scheduling, AI planning, circuit verification and more. However, outsourcing data to the cloud may lead to privacy and information breaches since satisfying assi...Show More