scispace - formally typeset
Search or ask a question
Topic

Systems architecture

About: Systems architecture is a research topic. Over the lifetime, 17612 publications have been published within this topic receiving 283719 citations. The topic is also known as: system architecture.


Papers
More filters
Proceedings ArticleDOI
10 Oct 2011
TL;DR: SenGuard is a user identification framework that enables continuous and implicit user identification service for smartphone that leverages availability of multiple sensors on today's smartphones and passively use sensor inputs as sources of user authentication.
Abstract: User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper describes SenGuard, a user identification framework that enables continuous and implicit user identification service for smartphone. Different from traditional active user authentication and access control, SenGuard leverages availability of multiple sensors on today's smartphones and passively use sensor inputs as sources of user authentication. It extracts sensor modality dependent user identification features from captured sensor data and performs user identification at background. SenGuard invokes active user authentication when there is a mounting evidence that the phone user has changed. In addition, SenGuard uses a novel virtualization based system architecture as a safeguard to prevent subversion of the background user identification mechanism by moving it into a privileged virtual domain. An initial prototype of SenGuard was created using four sensor modalities including, voice, location, multitouch, and locomotion. Preliminary empirical studies with a set of users indicate that those four modalities are suited as data sources for implicit mobile user identification.

212 citations

Patent
11 May 2000
TL;DR: In this paper, a technique for effecting electronic commerce using a data network is described, which includes a plurality of subsystems which, together, form an integrated system for receiving customer orders for selected items via data network, fulfilling the customer orders, and delivering the ordered products to the customers.
Abstract: A technique for effecting electronic commerce using a data network is described. The data network includes a plurality of subsystems which, together, form an integrated system for receiving customer orders for selected items via a data network, fulfilling the customer orders, and delivering the ordered products to the customers. Moreover, according to a specific embodiment, the integrated nature of the system architecture of the present invention allows the on-line merchant to provide a guarantee to the customer that the ordered items will be available to be delivered to the customer at the specified delivery date, time, and location.

211 citations

Book ChapterDOI
01 Jan 1988
TL;DR: The principal research issues in each of the active database management systems areas are described, the approaches being taken in a number of research projects on active DBMSs are surveyed, and the approaches are emphasized in the HiPAC (High Performance ACtive DBMS) project.
Abstract: Conventional passive database management systems are inadequate for time-constrained applications, because they either do not provide timely response to critical situations or compromise modularity. Active database management systems attempt to provide both modularity and timely response, by allowing event-condition-action rules to be specified declaratively; when events of interest occur, they efficiently evaluate the corresponding conditions, and if these conditions are satisfied, they trigger the corresponding actions. The development of active database management systems requires the solution of a number of research problems in the areas of knowledge modelling, execution modelling, condition monitoring, scheduling, system architecture, and performance evaluation. This paper describes the principal research issues in each of these areas, surveys the approaches being taken in a number of research projects on active DBMSs, and emphasizes the approaches we are taking in the HiPAC (High Performance ACtive DBMS) project.

210 citations

Journal ArticleDOI
01 Oct 1978
TL;DR: The concept of faulttolerance, the reasons for its inclusion in digital system architecture, and the methods of its implementation are discussed.
Abstract: Fault-tolerance is the architectural attribute of a digital system that keeps the logic machine doing its specified tasks when its host, the physical system, suffers various kinds of failures of its components. A more general concept of fault-tolerance also includes human mistakes committed during software and hardware implementation and during man/machine interaction among the causes of faults that are to be tolerated by the logic machine. This paper discusses the concept of faulttolerance, the reasons for its inclusion in digital system architecture, and the methods of its implementation. A chronological view of the evolution of fault-tolerant systems and an outline of some goals for its further development conclude the presentation.

210 citations

Patent
Andrei Z. Broder1, David Carmel1, Herscovici Michael1, Aya Soffer1, Jason Zien1 
30 May 2003
TL;DR: In this paper, the authors present a system architecture, components and a searching technique for an unstructured information management system (UIMS), which is provided as middleware for the effective management and interchange of information over a wide array of information sources.
Abstract: Disclosed is a system architecture, components and a searching technique for an Unstructured Information Management System (UIMS). The UIMS may be provided as middleware for the effective management and interchange of unstructured information over a wide array of information sources. The architecture generally includes a search engine, data storage, analysis engines containing pipelined document annotators and various adapters. The searching technique makes use of a two-level searching technique. A search query includes a search operator containing of a plurality of search sub-expressions each having an associated weight value. The search engine returns a document or documents having a weight value sum that exceeds a threshold weight value sum. The search operator is implemented as a Boolean predicate that functions as a Weighted AND (WAND).

210 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
90% related
Wireless sensor network
142K papers, 2.4M citations
86% related
Information system
107.5K papers, 1.8M citations
85% related
Wireless
133.4K papers, 1.9M citations
85% related
Network packet
159.7K papers, 2.2M citations
85% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202311
202227
2021405
2020555
2019638
2018572