scispace - formally typeset
Search or ask a question

Showing papers on "Service (systems architecture) published in 1993"


Journal ArticleDOI
TL;DR: The role of pricing policies in multiple service class networks is studied and it is found that it is possible to set the prices so that users of every application type are more satisfied with the combined cost and performance of a network with service-class-sensitive prices.
Abstract: The role of pricing policies in multiple service class networks is studied. An abstract formulation of service disciplines and pricing policies that allows the interplay between service disciplines and pricing policies in determining overall network performance to be described more clearly is presented. Effective multiclass service disciplines allow networks to focus resources on performance-sensitive applications, while effective pricing policies allows the benefits of multiple service classes to be spread around to all users. Furthermore, the incentives formed by service disciplines and pricing policies must be carefully tuned so that user self-interest leads to optimal overall network performance. These concepts are illustrated through simulation of several simple example networks. It is found that it is possible to set the prices so that users of every application type are more satisfied with the combined cost and performance of a network with service-class-sensitive prices. >

518 citations


Journal ArticleDOI
TL;DR: This paper developed an inventory model that the HP's Deskjet-plus Printer Division used to evaluate alternative product and process designs for localization, taking into account the operational and delivery service considerations for the multiple market segments.
Abstract: At Hewlett-Packard (HP) Company, design for manufacturability has recently been adopted as a principle for product design and development. Frequently overlooked is the relationship between design and the eventual customization, distribution, and delivery of the product to multiple markets. Different markets may have different requirements for the product due to differences in taste, language, geographical environment, or government regulations. We use design for localization or design for customization for design processes that take into account the operational and delivery service considerations for the multiple market segments. We developed an inventory model that the HP's Deskjet-Plus Printer Division used to evaluate alternative product and process designs for localization. Significant benefits can be obtained by properly exploring the opportunities in this design for localization concept.

346 citations


Proceedings ArticleDOI
01 Dec 1993
TL;DR: This paper proposes an extension of access control to integrate licensing called Stateful Access Control and it addresses some aspects of virus protection.
Abstract: Licensing is a topic of increasing importance for software publishers and users. More and more, the magnitude of financial transfers between these two partners are determined by some electronic licensing service being part of the system on which the licensed software is running. In order to ease the use and management of such licensing schemes and to enable economic software usage in enterprise-wide computer systems through flexible and fair billing structures, various organizations are working on formulating requirements, defining architectures, and building standard interfaces for so called license brokerage systems. The trustworthiness of these services is essential because large amounts of money can depend on them. Most of these licensing services are currently operating independently of access control and rely on proprietary and unpublished security algorithms. This paper proposes an extension of access control to integrate licensing called Stateful Access Control and it addresses some aspects of virus protection.

322 citations


Patent
21 Apr 1993
TL;DR: In this article, the Broker-Performance Mechanism retrieves, analyzes, and stores the response time data and determines which server is best suited, at that particular time, to provide the requested service to the requesting client.
Abstract: In a method and system for monitoring the performance of servers across a network and for suggesting an appropriate server to a client requesting a service, a plurality of probes are placed in various clients in the network by a Broker-Performance Mechanism. The probes request that the servers perform various network functions and measure the response times of the servers in satisfying those requests. The Broker-Performance Mechanism retrieves, analyzes, and stores the response time data. The stored data can be made available to a user for system diagnostic purposes. In addition, when a particular client requests a particular service, the Broker-Performance Mechanism examines the analyzed data and determines which server is best suited, at that particular time, to provide the requested service to the requesting client.

311 citations


Proceedings Article
01 Jan 1993
TL;DR: This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact.
Abstract: To take full advantage of the promise of ubiquitous computing requires the use of location information, yet people should have control over who may know their whereabouts. We present an architecture that achieves these goals for an interesting set of applications. Personal information is managed by User Agents, and a partially decentralized Location Query Service is used to facilitate location-based operations. This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. We also discuss various extensions to our architecture that offer users additional trade-offs between privacy and efficiency. Finally, we report some measurements of the unextended system in operation, focusing on how well the system is actually able to track people. Our system uses two kinds of location information, which turn out to provide partial and complementary coverage.

273 citations


02 Aug 1993
TL;DR: This work presents several alternative schemes for maintaining network connections used to provide multimedia service, as hosts move through a nano-cellular radio network, using a simple analytical model.
Abstract: Mobile computers using wireless networks, along with multimedia applications, are two emerging trends in computer systems. This new mobile multimedia computing environment presents many challenges, due to the requirements of multimedia applications and the mobile nature of hosts. We present several alternative schemes for maintaining network connections used to provide multimedia service, as hosts move through a nano-cellular radio network. These algorithms modify existing connections by partially reestablishing them to perform handoffs. Using a simple analytical model, we compare the schemes on the basis of the service disruption caused by handoffs, required buffering, and excess resources required to perform the handoffs.

155 citations


Patent
16 Feb 1993
TL;DR: In this paper, a central service data-processor system communicating with the customer system and having a data base for converting machine, software, and symptom data into instructions, hardware and software module lists, and service call schedules.
Abstract: Automated problem analysis and resolution of a customer data-processing system uses a central service data-processor system communicating with the customer system and having a data base for converting machine, software, and symptom data into instructions, hardware and software module lists, and service call schedules. The customer system detects data concerning its own configuration and problem symptoms for communication to the service system. The service system itself orders repair modules, and electronically communicates software fixes to the customer system.

111 citations


Proceedings ArticleDOI
Mike Spreitzer1, Marvin M. Theimer1
01 Dec 1993
TL;DR: This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact.
Abstract: To take full advantage of the promise of ubiquitous computing requires the use of location information, yet people should have control over who may know their whereabouts. We present an architecture that achieves these goals for an interesting set of applications. Personal information is managed by User Agents, and a partially decentralized Location Query Service is used to facilitate location-based operations. This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. We also discuss various extensions to our architecture that offer users additional trade-offs between privacy and efficiency. Finally, we report some measurements of the unextended system in operation, focusing on how well the system is actually able to track people. Our system uses two kinds of location information, which turn out to provide partial and complementary coverage.

87 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a store-and-forward architecture that can provide video-on-demand (VOD), as well as other data-based services, assuming a B-ISDN network to be in place.
Abstract: The authors present store-and-forward architecture that can provide video-on-demand (VOD), as well as other data-based services. They assume a B-ISDN network to be in place. The four major elements in this architecture are the information provider warehouse (IPw) where video material is archived; the central office (CO) server which contains a processor responsible for the service management and a video buffer that interacts directly with network customers; and, finally, the customer premise equipment. A requested video program is provided in a real-time fashion from the CO server to the customer. However, at the information provider, the video program is retrieved from the archival storage in blocks, and with transfer rates much faster than real time. Subsequently, it is sent in a bursty mode to the CO servers via high-speed trunks.

77 citations


Journal ArticleDOI
TL;DR: The telecommunications information networking architecture (TINA), which builds on the current advances in broadband communication and distributed computing technologies, specifying a software-based architecture for future information networks that are required to transport multimedia information and manage multimedia communication, is described.
Abstract: The telecommunications information networking architecture (TINA), which builds on the current advances in broadband communication and distributed computing technologies, specifying a software-based architecture for future information networks that are required to transport multimedia information and manage multimedia communication, is described. An important aspect of the architecture is that service segment functions are separated from delivery segment functions. Another key aspect is the elimination of the rigid division between network applications and operations applications that exists in current-day networks. In the TINA architecture, both kinds of applications execute on a common distributed processing platform that hides from applications the effects and complexities introduced by distribution. The architecture supports application interoperability enabling flexible construction of services, composed of service components distributed across network domains, allowing network operators and service providers to cooperatively meet the needs of the user. >

69 citations


Patent
Norell Bror Lennart1
12 Aug 1993
TL;DR: In this article, the authors present a general signalling protocol for telecommunication networks, which supports the addition of new service features to existing nodes as well as the execution and management of the new services.
Abstract: A network structure and a signalling protocol for a telecommunication network. The nodes (10, 11, 12) of the communication network are interconnected by a connection network (30) as well as a signalling network (41, 42, 50). Computer software (100) controlling the communication equipment (101, 102, 103) of each node is divided into two types of software, connection related software (210) and service related software (220). Connection related software groups (210) of different nodes communicate with each other via a first protocol (p211) while service related software groups (220) of different nodes communicate via a second protocol (p221) different from the first protocol. Between an originating node of a call and the terminating node of the same call a direct signalling path is established in the signalling network allowing for the addition of new service features in the originating and terminating nodes without the need to implement the new service features in the in between nodes via which the same call is routed in the connection network. A general signalling protocol supports the addition of new service features to existing nodes as well as the execution and management of the new services as well as of the services already existing in the telecommunication network. The signalling protocol (p221) is divided into a basic protocol (240) and one or more service specific protocols (241) called dialogues. The basic protocol is used to establish a signalling path between service related software groups in the originating and terminating nodes and to establish dialogues along said signalling path. This allows for a modular addition/removal of dialogues (241) to the basic protocol which remains unchanged.

Patent
29 Jun 1993
TL;DR: In this article, a remote service facility (RSF) unit is integrated into the operating system of the host system being supported by a standard generic menu interface system (GMIS) unit through which a user can enter different types of commands which results in the display of a number of menu sequences for configuring how the different independently controllable components of the RSF unit will operate in performing remote support functions.
Abstract: A remote service facility (RSF) unit is integrated into the operating system of the host system being supported. The RSF unit utilizes a standard generic menu interface system (GMIS) unit through which a user can enter different types of commands which results in the display of a number of menu sequences for configuring how the different independently controllable components of the RSF unit will operate in performing remote support functions. The components include a problem detection and reaction component, a system action component and a callback component, each of which operatively couple to the GMIS unit. The components are integrated in a predetermined manner so that collectively, they carry out remote support according to the way in which they were configured.

Book ChapterDOI
Mike Spreitzer1, Marvin M. Theimer1
01 Jan 1993
TL;DR: In this paper, the authors present an architecture that gives users primary control over their location information, at the cost of making more expensive certain queries, such as those where location and identity closely interact.
Abstract: To take full advantage of the promise of ubiquitous computing requires the use of location information, yet people should have control over who may know their whereabouts. We present an architecture that achieves these goals for an interesting set of applications. Personal information is managed by User Agents, and a partially decentralized Location Query Service is used to facilitate location-based operations. This architecture gives users primary control over their location information, at the cost of making more expensive certain queries, such as those wherein location and identity closely interact. We also discuss various extensions to our architecture that offer users additional trade-offs between privacy and efficiency. Finally, we report some measurements of the unextended system in operation, focusing on how well the system is actually able to track people. Our system uses two kinds of location information, which turn out to provide partial and complementary coverage.

Patent
27 May 1993
TL;DR: A method and apparatus for upgrading the naming service of a distributed network data processing system uses controlled upgrades of replicated directories in clearinghouses on a node-by-node basis.
Abstract: A method and apparatus for upgrading the naming service of a distributed network data processing system uses controlled upgrades of replicated directories in clearinghouses on a node-by-node basis.

Book ChapterDOI
03 Nov 1993
TL;DR: An overview of the QoS-A, which incorporates the notions of flow, service contract and flow management, is provided and the role of a multimedia enhanced transport service (METS) is focused on to show how QoS levels contracted by the transport service user can be assured in the context of the authors' experimental local ATM environment.
Abstract: For applications relying on the transfer of multimedia, and in particular continuous media, it is essential that quality of service (QoS) is guaranteed system-wide, including end-systems, communications systems and networks. Although researchers have addressed many isolated areas of QoS provision, little attention has so far been paid to the definition of an integrated and coherent framework that incorporates QoS interfaces, management and mechanisms across all architectural layers. To address this deficiency, we are developing a Quality of Service Architecture (QoS-A) which offers a framework to specify and implement the required performance properties of multimedia applications over integrated service networks. This paper provides an overview of the QoS-A, which incorporates the notions of flow, service contract and flow management. We then focus on the role of a multimedia enhanced transport service (METS) and show how QoS levels contracted by the transport service user can be assured in the context of our experimental local ATM environment.

Journal ArticleDOI
TL;DR: In this paper, the problem of setting appropriate safety leadtimes in an assembly system where all components are purchased and the only manufacturing operation is final assembly is considered, and two formulations of this problem are described: (1) minimize total inventory carrying and tardiness costs and (2) minimize inventory carrying costs subject to a service constraint.
Abstract: We consider the problem of setting appropriate safety leadtimes in an assembly system where all components are purchased and the only manufacturing operation is final assembly. First, we describe two formulations of this problem: (1) minimize total inventory carrying and tardiness costs and (2) minimize inventory carrying costs subject to a service constraint. Second, we discuss how these formulations sometimes fail to adequately provide a decision maker with sufficient information to establish leadtimes when applied independently but how they can be used together to provide a useful decision support system. Finally, we describe a procedure similar to ABC analysis that allows us to solve a much smaller related problem whose solution provides a good approximation to the solution of the original problem. We conclude the paper with numerical examples and a discussion of an actual implementation.

Proceedings ArticleDOI
Ralf Hauser1
01 Dec 1993
TL;DR: This paper proposes an extension of access control to integrate licensing called Stateful Access Control and it addresses some aspects of virus protection.
Abstract: Licensing is a topic of increasing importance for software publishers and users. More and more, the magnitude of financial transfers between these two partners are determined by some electronic licensing service being part of the system on which the licensed software is running. In order to ease the use and management of such licensing schemes and to enable economic software usage in enterprise-wide computer systems through flexible and fair billing structures, various organizations are working on formulating requirements, defining architectures, and building standard interfaces for so called license brokerage systems. The trustworthiness of these services is essential because large amounts of money can depend on them. Most of these licensing services are currently operating independently of access control and rely on proprietary and unpublished security algorithms. This paper proposes an extension of access control to integrate licensing called Stateful Access Control and it addresses some aspects of virus protection.

Journal Article
TL;DR: The Delahaye/Desktop|TM~ software package as mentioned in this paper allows clients to easily retrieve data about their programs at their own desktop computers, and they can then chart and tabulate that data to spot trends, identify areas of opportunity or problems and summarize results.
Abstract: New Electronic Research Methods Improve Campaign Evaluation Using research, practitioners can meet the growing need to justify the cost of public relations and prove results. Ground-breaking techniques to manage issues and analyze attitudes are being developed. The key is to make research part of planning a campaign strategy. The latest technological advances, computer software programs and other state-of-the-art applications in public relations research and evaluation have added a vital twist to the age-old media clip book. Because research information has never been so accessible to public relations firms and corporate clients alike, venerable techniques such as article content analysis, phone and mail surveys, focus groups and before-and-after attitude studies are being looked at in a new light. The days of mainly clipping articles for the decision maker to review are gone. Purveyors of research services have taken public relations campaign results to the "nth" degree by introducing on-line, personalized information systems, issues management to take the pulse of the public, and charting tools to help calculate the most cost-effective marketing mix. Inquiry management services can even account for the number of leads that come in via a public relations campaign, including how much is spent on each inquiry and how many leads turn into actual sales. Several new types of research and evaluation techniques are in their infant stages. Before integrating them into everyday practice, public relations researchers are testing the waters on factor analysis and linking attitudes to behavior. Measuring "active versus passive" attitudes, and focusing on those interested in a message is another new frontier in attitude research, according to Lloyd Curbin, Ph.D., director of research for Burson-Marsteller in New York City. A growing climate of accountability has emphasized the need to use these and other research evaluation techniques. Most of the experts interviewed stressed that defining strategic objectives and supporting them with research from the onset can help clients determine whether they actually achieved their return on investment (ROI). "Basically, you can't do evaluations unless you set goals and objectives in advance of your content analysis," said Dr. Walter K. Lindenmann, APR, senior vice president and director of research for Ketchum Public Relations in New York City. "For example, if this year you did a survey where 50% of the respondents were familiar with your company, next year, you should plan to reach 60%. That is a measurable goal." To set measurable objectives, many practitioners are now strongly suggesting the inclusion of research as part of a campaign's overall strategy from the outset. This is good news for suppliers of research and evaluation counsel and services. In the past, they have often been overlooked until the last minute, when research would be incorporated into a campaign if there was enough time, money and management interest. Overabundance of data Until about five years ago, the over-abundance of research data culled from campaigns could not be effectively tabulated and easily implemented by clients. But new computer technologies have changed that pattern. "In the old days, data was filed away in clip books, files and databases that weren't doing anyone any good," said Katharine D. Paine, president of The Delahaye Group, in Hampton Falls, NH. "We wanted to transform that information into an on-line interactive database from which clients could continually draw conclusions." The Delahaye/Desktop|TM~ software package allows Delahaye clients to easily retrieve data about their programs at their own desktop computers. They can then chart and tabulate that data to spot trends, identify areas of opportunity or problems and summarize results. The user's own database thus becomes an interactive front end to Delahaye's comprehensive press coverage analysis service. …

Proceedings ArticleDOI
29 Nov 1993
TL;DR: The paper describes the design and implementation of the service logic execution environment platform of GTE's intelligent network (IN) testbed and discusses the server architecture which realizes that abstraction.
Abstract: The paper describes the design and implementation of the service logic execution environment platform of GTE's intelligent network (IN) testbed. The platform is a layer of software built on top of computer operating systems. Based on the primitive services provided by the underlying operating systems, the platform provides higher-level services to service logic programs (SLPs). SLPs, applications of the platform, provide the logic that implements IN services. The paper presents an overview of the abstraction and services presented to SLPs, and then discusses the server architecture which realizes that abstraction. >

01 Jun 1993
TL;DR: The IDPR architecture is designed to accommodate an internetwork containing tens of thousands of administrative domains with heterogeneous service requirements and restrictions.
Abstract: We present an architecture for inter-domain policy routing (IDPR). The objective of IDPR is to construct and maintain routes, between source and destination administrative domains, that provide user traffic with the requested services within the constraints stipulated for the domains transited. The IDPR architecture is designed to accommodate an internetwork containing tens of thousands of administrative domains with heterogeneous service requirements and restrictions.

Proceedings ArticleDOI
29 Nov 1993
TL;DR: The authors present a flexible management scheme that allows graceful adaptation of guaranteed performance service connections and distinguish between two types of adaptation: client initiated adaptation and network initiated adaptation.
Abstract: Most of the solutions proposed to support guaranteed performance communication services in a packet-switching network adopt a connection-oriented and reservation-oriented approach. In this approach, the resource allocation and route selection decisions are made during connection establishment on the basis of the current resource availability and real-time network load, and are usually kept for the duration of the connection's life time. However, such an approach shows two major limitations: first, the communication service provided is usually fixed, with limited or no capability of adapting to dynamic changes in the clients' requirements; second, a low utilization of the network may be observed. In the paper, the authors present a flexible management scheme that allows graceful adaptation of guaranteed performance service connections. Mechanisms have been devised to allow changing of the trade and performance parameters of a real-time connection during its lifetime. These mechanisms, together with an adaptation policy, can make more efficient use of the network resources by performing cooperative, consenting, high-level multiplexing. the authors distinguish between two types of adaptation: client initiated adaptation and network initiated adaptation. They give examples for both types and present results from simulation experiments to show the effectiveness of the approach. >

Journal ArticleDOI
TL;DR: An OPTICAL SCAN databased management system that permits flexible form generation, desktop publishing, and linking of observations in multiple files, and direct transfer of the data to ASCII and SAS format for mainframe manipulation of the clinical information is described.

Journal ArticleDOI
TL;DR: In this paper, the authors discuss the problems created by diffuse ownership and conflicts over control that exist before privatization in state-owned enterprises in Eastern Europe and outline how these problems can be addressed by incorporating incentive problems specific to Eastern Europe into the design of the policies to be implemented.
Abstract: Enterprise reform is emerging as the core economic problem in Eastern Europe. As privatization has been delayed, a new problem has emerged, largely unanticipated by outside advisers: It is probably possible to run a clear-cut state enterprise efficiently, and it is certainly possible to get efficient performance from a private enterprise. But it is utterly impossible to get anything like efficiency from an enterprise for which the current and future ownership status are in limbo. What has happened in Poland, where reform started earlier than elsewhere, is probably a harbinger of things to come. Two years after the crumbling of central authority that used to exercise both ownership and control, ownership of state-owned enterprises remains ineffective and control diffuse. Lacking sharply defined control rights, various groups (workers, incumbent managers, and local authorities) often had no other way of demonstrating their clout than by disrupting the enterprise. And with changes in ownership announced but not implemented, managers and workers councils alike have every incentive to decapitalize the enterprise and increase its debts. Eastern Europe is not well served with straight textbook advice. The common wisdom on privatization fails to address the problems created by diffuse ownership and conflicts over control that exist before privatization. Regular cash auctions may fail to match managers and capital stock efficiently because of pervasive wealth constraints. Standard service on enterprise restructuring does not allow for the sheer scale of the problem or the special reasons why, in Eastern Europe, current profits are a poor guide to potential profitability. Simply applying Western bankruptcy procedures based on current data about enterprise profitability introduces a destructive bias toward liquidation and delay. And, the author argues, introducing Western style unemployment insurance, although it would lower the social costs of unemployment, could also contribute to its indefinite extension. The author sketches how these problems can be addressed by incorporating all the incentive problems specific to Eastern Europe into the design of the policies to be implemented. Sometimes the advice that results is novel and as yet untried; sometimes examples exist of its successful implementation. But the alternative is a long period of declining incomes and, presumably, increasing social unrest as the consensus underlying the reform programs begins to erode.

Proceedings ArticleDOI
M. Ben-Bassat1, Israel Beniaminy, M. Eshel, B. Feldman, A. Shpiro 
20 Sep 1993
TL;DR: The authors present an integrated framework for effective management of maintenance operations that addresses two key problems: the shortage of resources; and the performance differences between the individual available resources, and specifically, the human resources.
Abstract: The authors present an integrated framework for effective management of maintenance operations that addresses two key problems: the shortage of resources; and the performance differences between the individual available resources, and specifically, the human resources. Software tools are proposed for these two problems. W-6 assists in improved cost-effective utilization of the available resources. That is, assigning the right person, to the right job, at the right time, and with the right resources. AITEST and OnDoc contribute in increasing the productivity and work quality of each individual service person. Software integration is not centered on sharing of data because most of the data and knowledge required by one tool is not required at all by the others. The proposed EPI (External Program Interface) tool implements integration that is centered on the concept of workflow management. The different software systems exchange messages that are characterized by control-passing and by division of labor, with relatively small amounts of data being shared. A case study of a large depot facility where this framework has been implemented is described. >

Journal ArticleDOI
J. P. Potocki de Montalk1
TL;DR: Airborne software, like other system changes, is used where its benefits outweigh its disadvantages, notably to improve human factors, which are involved in most aircraft accidents.

Journal ArticleDOI
TL;DR: In this article, a set of custom components used to implement a connectionless service on top of an atm network is described, together with the chosen architecture and the level of performance requested.
Abstract: This paper presents a set of custom components used to implement a connectionless service on top of an atm network. In a first part, the chosen architecture is described, together with the level of performance requested. Then we analyze how the architecture and other constraints influence the chip partitioning. Finally the three custom devices developed for this application are succinctly described.

Proceedings ArticleDOI
01 Dec 1993
TL;DR: The key to the concept of open hypermedia systems that are able to act as a link service to an existing set of applications is in the perception of hypertext principles as a method for integration rather than simply as a delivery medium for a clearly defined information set.
Abstract: INTRODUCTION As understanding of hypertext concepts has increased, the possibilities they present for the creation of a flexible system able to act as an integrator for a user’s whole environment are growing. This has led to interest in the concept of open hypermedia systems that are able to act as a link service to an existing set of applications. The key to this concept is in the perception of hypertext principles as a method for integration rather than simply as a delivery medium for a clearly defined information set.

Journal ArticleDOI
TL;DR: In this paper, the authors identify several nuts-and-bolts issues involved in planning and implementing school-linked services and discuss different strategies that community teams can use to address each of these issues.
Abstract: This article identifies several nuts-and-bolts issues involved in planning and implementing school-linked services. Effective planning must include discussion of implementation details and is possible only if a policy-minded team of coequals works toward the same goals. No one agency should "own" the process. In addition to education, health, and social services agency leaders, the team should include representatives of community and neighborhood groups, line workers, and parents. This team must carefully address questions of targeting, governance, financing, evaluation, and information sharing. In addition, team members must consider operational issues such as ensuring line worker buy-in and establishing an effective case management staffing plan that is acceptable to existing staff. The article discusses different strategies that community teams can use to address each of these issues. he development of school-linked services has progressed to a point where we can begin to distill the most effective approaches to planning and implementing these programs. In this journal issue the article by Levy and Shepardson discusses key elements of these programs. This article identifies some of the nuts-and-bolts issues that must be addressed when establishing school-linked service programs. These include planning, targeting, governance, information systems, and staffing.

Patent
12 Oct 1993
TL;DR: In this paper, a declarative model of the various services provided by a computer system is constructed to facilitate the carrying out of a range of different types of management tasks in computer systems.
Abstract: To facilitate the carrying out of a range of different types of management task in a computer system (such as fault diagnosis and service installation), declarative models (22) are constructed of the various services provided by the system (10-13). These models (22) specify the requirements that need to be met for the corresponding service to be available. These requirements are set out in terms of the system entities that need to be present and the inter-relationships of these entities. In addition, each management task is specified in a corresponding task program (21) in terms of general inferencing operations that can be performed on any of the models. Execution of a particular management task involves carrying out inferencing operations on the appropriate service model (22) in accordance with the task program (21) for the management task under consideration.

Proceedings ArticleDOI
17 Oct 1993
TL;DR: This paper presents several examples of service robots with different degrees of automation in their task execution, and uses a new optical measurement system: the Reseau scanning camera (RSC).
Abstract: This paper presents several examples of service robots with different degrees of automation in their task execution. Methods in planning and layout of service robots are addressed. The role of the operator/user interaction with the system is demonstrated with three examples of prototype service robots. In all examples referencing the robot to the object turned out to be of crucial importance for accurate task execution. This lead to the use of a new optical measurement system: the Reseau scanning camera (RSC). >