Institution
Polytechnic University of Milan
Education•Milan, Italy•
About: Polytechnic University of Milan is a education organization based out in Milan, Italy. It is known for research contribution in the topics: Computer science & Finite element method. The organization has 18231 authors who have published 58416 publications receiving 1229711 citations. The organization is also known as: PoliMi & L-NESS.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: The goal of this article is to compare the approaches to QoS description in the literature, where several models and metamodels are included, and to analyze where the need for further research and investigation lies.
Abstract: Quality of service (QoS) can be a critical element for achieving the business goals of a service provider, for the acceptance of a service by the user, or for guaranteeing service characteristics in a composition of services, where a service is defined as either a software or a software-support (i.e., infrastructural) service which is available on any type of network or electronic channel. The goal of this article is to compare the approaches to QoS description in the literature, where several models and metamodels are included. consider a large spectrum of models and metamodels to describe service quality, ranging from ontological approaches to define quality measures, metrics, and dimensions, to metamodels enabling the specification of quality-based service requirements and capabilities as well as of SLAs (Service-Level Agreements) and SLA templates for service provisioning. Our survey is performed by inspecting the characteristics of the available approaches to reveal which are the consolidated ones and which are the ones specific to given aspects and to analyze where the need for further research and investigation lies. The approaches here illustrated have been selected based on a systematic review of conference proceedings and journals spanning various research areas in computer science and engineering, including: distributed, information, and telecommunication systems, networks and security, and service-oriented and grid computing.
397 citations
••
TL;DR: It is proved that, if constraints in the SP problem are optimally removed—i.e., one deletes those constraints leading to the largest possible cost improvement—, then a precise optimality link to the original chance-constrained problem CCP in addition holds.
Abstract: In this paper, we study the link between a Chance-Constrained optimization Problem (CCP) and its sample counterpart (SP). SP has a finite number, say N, of sampled constraints. Further, some of these sampled constraints, say k, are discarded, and the final solution is indicated by $x^{\ast}_{N,k}$
. Extending previous results on the feasibility of sample convex optimization programs, we establish the feasibility of $x^{\ast}_{N,k}$
for the initial CCP problem. Constraints removal allows one to improve the cost function at the price of a decreased feasibility. The cost improvement can be inspected directly from the optimization result, while the theory here developed permits to keep control on the other side of the coin, the feasibility of the obtained solution. In this way, trading feasibility for performance is put on solid mathematical grounds in this paper. The feasibility result here obtained applies to a vast class of chance-constrained optimization problems, and has the distinctive feature that it holds true irrespective of the algorithm used to discard k constraints in the SP problem. For constraints discarding, one can thus, e.g., resort to one of the many methods introduced in the literature to solve chance-constrained problems with discrete distribution, or even use a greedy algorithm, which is computationally very low-demanding, and the feasibility result remains intact. We further prove that, if constraints in the SP problem are optimally removed—i.e., one deletes those constraints leading to the largest possible cost improvement—, then a precise optimality link to the original chance-constrained problem CCP in addition holds.
397 citations
••
TL;DR: This paper investigates the current situation of Web development tools, both in the commercial and research fields, by identifying and characterizing different categories of solutions, evaluating their adequacy to the requirements of Web application development, enlightening open problems, and exposing possible future trends.
Abstract: The exponential growth and capillar diffusion of the Web are nurturing a novel generation of applications, characterized by a direct business-to-customer relationship. The development of such applications is a hybrid between traditional IS development and Hypermedia authoring, and challenges the existing tools and approaches for software production. This paper investigates the current situation of Web development tools, both in the commercial and research fields, by identifying and characterizing different categories of solutions, evaluating their adequacy to the requirements of Web application development, enlightening open problems, and exposing possible future trends.
397 citations
••
TL;DR: A scenario with two single-user links, one licensed to use the spectral resource (primary) and one unlicensed (secondary or cognitive), is considered and benefits of relaying strongly depend on the topology of the network.
Abstract: A scenario with two single-user links, one licensed to use the spectral resource (primary) and one unlicensed (secondary or cognitive), is considered. According to the cognitive radio principle, the activity of the secondary link is required not to interfere with the performance of the primary. Therefore, in this paper, it is assumed that the cognitive link accesses the channel only when sensed idle. Moreover, the analysis includes: (1) random packet arrivals; (2) sensing errors due to fading at the secondary link; (3) power allocation at the secondary transmitter based on long-term measurements. In this framework, the maximum stable throughput of the cognitive link (in packets/slot) is derived for a fixed throughput selected by the primary link. The model is modified so as to allow the secondary transmitter to act as a ldquotransparentrdquo relay for the primary link. In particular, packets that are not received correctly by the intended destination might be decoded successfully by the secondary transmitter. The latter can, then, queue and forward these packets to the intended receiver. A stable throughput of the secondary link with relaying is derived under the same conditions as before. Results show that benefits of relaying strongly depend on the topology (i.e., average channel powers) of the network.
397 citations
••
TL;DR: In this paper, the reference model for proactive action (RMfPA) is proposed to develop and implement sustainable manufacturing (CSM) at both the macro-meso-field level and the international level.
396 citations
Authors
Showing all 18743 results
Name | H-index | Papers | Citations |
---|---|---|---|
Alex J. Barker | 132 | 1273 | 84746 |
Pierluigi Zotto | 128 | 1197 | 78259 |
Andrea C. Ferrari | 126 | 636 | 124533 |
Marco Dorigo | 105 | 657 | 91418 |
Marcello Giroletti | 103 | 558 | 41565 |
Luciano Gattinoni | 103 | 610 | 48055 |
Luca Benini | 101 | 1453 | 47862 |
Alberto Sangiovanni-Vincentelli | 99 | 934 | 45201 |
Surendra P. Shah | 99 | 710 | 32832 |
X. Sunney Xie | 98 | 225 | 44104 |
Peter Nijkamp | 97 | 2407 | 50826 |
Nicola Neri | 92 | 1122 | 41986 |
Ursula Keller | 92 | 934 | 33229 |
A. Rizzi | 91 | 653 | 40038 |
Martin J. Blunt | 89 | 485 | 29225 |