Waleed W. Smari's research while affiliated with Ball Aerospace & Technologies Corp. and other places

Publications (61)

Article
The recent developments in web technologies, pervasive and ubiquitous systems and networks, cloud and highly distributed computing systems, and the availability of massive amounts of data have changed the field of computer supported collaboration, particularly with the emergence of new capabilities and forms of collaboration both locally and remote...
Article
In recent decades, the complexity of scientific and engineering problems has increased considerably. New applications and domains that use high performance computing systems have been introduced. These trends are projected to continue for the foreseen future (Reed and Dongarra, 2015) [1]. In many areas of engineering and science, High-Performance C...
Article
High-performance computing (HPC) is now present in many spheres and domains of modern society. The special issue of Concurrency Computation contains research papers addressing the state-of-the-art in HPC and simulation and reflects some of the trends reported earlier. P. Trunfio deals with a peer-to-peer file-sharing model that takes into account e...
Article
The special issue of Concurrency and Computation: Practice and Experience contains papers representing recent advances in the area of high-performance computing and simulation. 'Finding Near-Perfect Parameters for Hardware and Code Optimizations by Automatic Multi-Objective Design Space Explorations' by Ralf Jahr, Horia Calborean, Lucian Vintan, an...
Article
Cloud federation can be described through the concept of collaboration, where each organization has its own cloud(s) that deals with a different and independent domain but needs to work together with other organizations in order to fulfill a specific shared objective. According to this perspective, the federation is a collection of interacting clou...
Article
The Special Issue on Advances in Computer Supported Collaboration: Technologies and Systems of the Future Generation Computer Systems Journal is based on extended contributions from the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011). The editorial section surveys the evolution of the computer supported collaborat...
Article
Full-text available
Many efforts in the area of computer security have been drawn to attribute-based access control (ABAC). Compared to other adopted models, ABAC provides more granularity, scalability, and flexibility. This makes it a valuable access control system candidate for securing platforms and environments used for coordination and cooperation among organizat...
Conference Paper
Semantic technologies can play a key role in representing, storing, interconnecting, searching, and organizing information generated/consumed by things. In order to evaluate its feasibility, this paper presents a set of reasoning mechanisms based on an IoT ontology to be applied in an emergency management scenario. The scenario presented in this pa...
Article
Intensive computing and numerical simulation are now essential tools that contribute to the success in systems designs, effectiveness of public policies such as prevention of natural hazards and taking account of climate risks, but also to security and national sovereignty. There are indications that the scientific community is technologically read...
Article
Recent developments in high performance computing and security are discussed in the Special Issue of Future Generation Computer System. High-performance computing is a research area dealing with the solution of computationally intensive problems by means of parallel architectures and parallel programming. Parallel programming is an extensive resear...
Article
Full-text available
We would like to thank all the authors of this special issue for their contributions. We are also grateful to all the reviewers for their high quality and timely expert reviews that provided many valuable suggestions to the authors. We hope that you enjoy the special issue and find the articles informative and useful.
Conference Paper
Full-text available
Cloud Computing is a paradigm that applies a service model on infrastructures, platforms and software. In the last few years, this new idea has been showing its potentials and how, in the long run, it will affect Information Technology and the act of interfacing to computation and storage. This article introduces the FCFA project, a framework for a...
Article
In the last few years, the landscape of parallel computing has been subject to profound and highly dynamic changes. The paradigm shift towards multicore and manycore technologies coupled with accelerators in a heterogeneous environment is offering a ...
Article
The right information at the right time is a critical aspect in any emergency or disaster management activity. Decision making and efficiency are improved when based on complete information about the conditions of the affected area. Sensors integration in a grid-based infrastructure, through a service-oriented architecture and via the World Wide We...
Conference Paper
Full-text available
Many efforts in the area of computer security have been drawn to attribute-based access control (ABAC). Compared to other up-to-date models, ABAC provides more granularity, scalability, and flexibility, which make it a valuable candidate for securing collaboration between organizations, especially over an open network such as the Internet. On the o...
Conference Paper
Java collaborative applications are increasingly and widely used in the form of applets or servlets, as a way to easily download and execute small programs on one's computer. However, security associated with these downloaded applications, even if it exists, is not easily manageable. Most of the time, it relies on the user's ability to define a sec...
Conference Paper
This paper presents an implementation of Team-based Access Control policy (TMAC) using SELinux as mandatory access control mechanism for Linux operating systems. After explaining the particularities of TMAC in an elaborate example, the paper presents the XML TMAC format developed and introduces a visualization tool that allows a user to explore the...
Conference Paper
Proliferation of collaboration environments brings new issues to the area of security. In this paper, we briefly describe the characteristics of security associated with collaboration environments. We also discuss and analyze several schemes in different areas of security, including access control, secure group communication, and security managemen...
Conference Paper
Emergency Management, EM, is the managerial function charged with creating the framework within which communities cope with disasters and reduce vulnerability to hazards. Emergency management activities and life time concerns include: pre-incident activities, such as information sharing, threat identification, planning, and readiness exercises; inc...
Conference Paper
Context and information awareness is generally driven by the choice of available data acquisition mechanisms. In context aware system design, sensors are the primary means for data acquisition. To make such systems effective, sensors need to provide data that is accurate and reflects real time situations and events. Such data is not always readily...
Conference Paper
Over the past few decades, electronic devices and computing systems have evolved from being rigid, complex and inflexible, to becoming highly dynamic, and responsive. While these properties have the potential to make them user friendly and human centric, they also bring about inherent drawbacks, such as user interruptions caused by a variety of sys...
Conference Paper
In recent years, collaborative commerce (or c-commerce) and human-centric systems have been research subjects of keen interest in Web-based technologies and have become a major focus for many organizations. C-commerce provides and supports dynamic collaborative environments over the Internet and other potential public information networks (PINs). I...
Conference Paper
Full-text available
In this paper, we propose a multi-agents system for the simulation of prototypes for different agriculture robots that can be employed in the harvesting of a vineyard. We show that this prototyping method works well and is appropriate for a system involving several robots. We present the behaviors of each robot, their interactions and some scenario...
Conference Paper
Workflow systems have been used in collaborative environments for many years to assist individuals and organizations to organize project executions and carry out work sequences. Two conflicting goals are argued in the literature regarding workflow systems: the need to provide efficient flexibility in terms of capabilities to handle changing situati...
Conference Paper
Full-text available
The rise of globally distributed computer based workspaces has enabled the incorporation of collaboration in electronic commerce (e-Commerce) systems. Working in collaborative environments with e-Commerce technologies leads to the subject of collaborative commerce (or c-Commerce). C-Commerce creates dynamic collaboration and harnesses organizations...
Article
In a Knowledge Discovery in Databases (KDD) process, hu-man capabilities and judgment are still a fundamental ingre-dient to ensure that useful and valid knowledge is derived from data. Such capabilities assume the form of skills and expertise in different domains such as databases, statistics, machine learning, data mining, as well as the specific...
Conference Paper
Full-text available
Advances in computer science and communication technologies have helped people, businesses, and organizations interact faster and easier than ever before. In the future, computers will be required to play a lot more active role in performing a wide range of activities, such as collaboration, decision-making, task automation, data and information ma...
Conference Paper
Full-text available
This paper describes a vision system to obtain the 3D trajectory of a moving target by stereovision. For our study, we chose to reconstruct the trajectory of a clay plate that is used in ball-trap. The plate's path can reach 60 meters in length. The trajectory is reconstructed from videos of the moving target and plate positions between the left an...
Conference Paper
This work describes and evaluates an integrated system of computing information technologies to support the data mining and knowledge discovery of qualitative data collected from groups with diverse objectives and multiple, possibly conflicting criteria. The system provides a method and supporting infrastructure to produce a shared view and common...
Conference Paper
Collaborative commerce (or c-commerce) can be regarded as the next evolutionary step beyond the more basic process of electronic commerce (or e-commerce). It is an emerging area that is based on interactions enabled by Internet technology. It offers many levels of coordination, collaborative interactions and cooperation among or within organization...
Conference Paper
Full-text available
This article describes an artificial vision system for quality control of cherries. The system is comprised of multiple vision machines controlled by a monitoring unit, thereby achieving, an efficient, robust, maintainable and scalable system. The cherry grading is carried out at a rate of twenty fruits per second per vision machine which requires...
Conference Paper
The design of collaborative systems is a complex process. It involves addressing various aspects of collaboration sciences, including technologies to use, environments' design, users and human factors, and work processes associated with a given application domain. In order to deal with this challenging task, an effective design framework and method...
Conference Paper
Collaboration and the use of knowledge in collaborative decision-making are fundamental to all organizational processes, and have been the subject of research in management and in decision and computer sciences for years. More recently, it has become necessary to integrate human-centered designs and groupwork practices with other aspects of collabo...
Article
The primary emphasis of this paper is the exploration of a method of development that combines high-level prototyping of algorithms with low-level hardware development on FPGAs. The method of development was applied to implement a wavelet image compression algorithm as a real-world test. This development method is based on standard software-enginee...
Conference Paper
Mobile and wireless technology continues to witness unprecedented growth which brings with it several new challenges. In mobile computing, location management is introduced whenever users move from one place to another. Independent of their locations, mobile users establish connections to the system using both wired and wireless networks. This can...
Conference Paper
With the rapid growth in mobile and wireless computing technology, location management techniques become more challenging. Future personal communications systems (PCS) will support a huge user population and a network spanning a large geographical area. In such systems, the signaling traffic and processing overhead for locating mobile users is expe...
Conference Paper
The World Wide Web (WWW) has experienced tremendous growth over the past few years. This increase in use makes server load heavier and leads to more system-bound queries due to newly sought emerging Web techniques, such as information discovery and reuse, mining and fusion. There is an obvious interest in assessing the consequences of this growth a...
Conference Paper
The growth of electronic commerce (e-commerce) is complex and rapidly expanding. E-commerce is also one of the fastest growing application areas for the World Wide Web, spanning all businesses and industries and providing new paradigms. Computer-based technologies embody essential characteristics of work environments which require many decision mak...
Conference Paper
Image compression using wavelets has proven to be a useful design tool for achieving large compression ratios while preserving reconstructed image quality. However, wavelet image compression has traditionally been an expensive process in terms of computation time. In the new digital era, multimedia data requirements are exceeding the available tran...
Article
Distributed computing systems offer the potential for improved performance and resource sharing. In a real-time system, uncontrolled task arrivals may temporarily overload some nodes while leaving other nodes idle. Adaptive load sharing offers techniques for queue control in order to achieve optimal or near-optimal efficiency and performance. This...
Article
The primary emphasis of this paper is the exploration of a method of development that combines high-level prototyping of algorithms with low-level hardware development on FPGAs. The method of development was applied to implement a wavelet image compression algorithm as a real-world test. This development method is based on standard software-enginee...
Conference Paper
In this paper we review two student design projects executed under a geographically distributed protocol. Our pilot design project occurred at the University of Dayton between the 5th and 14th of July, 2000. We assembled a small group of students into a distributed design team and assigned a rudimentary project via an audio chat session. Most team...
Conference Paper
Integer-based wavelet transforms present advantages in image compression such as computational speed, simplicity, and reconstructed image quality. The nature of wavelet decomposition allows high compression ratios to be achieved through efficient methods of encoding. The work presented here describes an efficient hardware implementation of a simple...
Article
Full-text available
In the past few years, collaborative commerce (or c-Commerce) and human-centric systems have been research subjects of keen interest in Web-based technologies and have become a major focus for many organizations. C-Commerce creates and supports dynamic collaborative environments over the Internet or other public information networks (PINs) . It off...
Article
During the last decade, collaborative commerce and human-centric systems concepts have been applied in several enterprise information systems. Many researchers have studied, developed and proposed architectures for such systems. In order to validate and verify the systems' architectures, researchers use various types of modeling and analysis techni...

Citations

... Here, trust is commonly conceptualised as linked to features of interpersonal relationships between people and often remains implicit with familiarity/lack of familiarity being a basis for trust/mistrust in human-human interactions (e.g., Jirotka et al., 2005;Carusi, 2009). Trust may also be conceptualised as generated 'in action', built up in some form of situated or contextual practical engagement of a work routine, often in contexts when people have a responsibility to build trust in new technology (e.g., Clarke et al., 2006aClarke et al., , 2006bOudshoorn, 2008;Kuutti and Bannon, 2014;Papangelis et al., 2019). ...
... It can be expected that SI will be a similar accelerant of data technologies and ecosystems. Large scale computing (i.e., peta-to-exa scale simulation) imposes significant challenges in engineering data pipelines [604,605], in particular for the HPC community which we discuss in the next section. ...
... High performance computing (HPC) and codes suitable for parallel processing are the best alternative for accelerating numerical solutions (Smari et al., 2016). Most codes that approximate the solution to the shallow water equations are developed using sequential processing or parallelization schemes based on Message Passing Interface (MPI) or Open Multi-Processing (OpenMP) compatible with clusters composed of several Central Processing Units (CPU) (O'Donncha et al., 2014(O'Donncha et al., , 2019Anguita et al., 2015;Noh et al., 2018Noh et al., , 2019. ...
... According to [10], people used the cloud in the late 1990s to signify everything that relates to the internet. The word "cloud computing" was initially used during the Search Engine Strategies Conference in San Jose in 2006, when Eric Schmidt, Google's former CEO tried to describe the history of internet and computer architecture [17]. ...
... Other works in the literature use ontology-based technologies to model the seismic domain too, building information systems on seismology [22], also focusing on the earthquake emergency evaluation and response domain [5], [23]. ...
... At best, human centeredness and security components are conveniently implied or assumed to be there. However, Kim and Smari [15,16] attempted to look at c-Commerce a bit differently: more from an information technology (IT) and human centric point of view rather than from business perspective only. The more recent strong need for security and privacy in c-commerce systems is attributable to many factors, such as the vulnerability of heterogeneous and distributed system environments, anonymous users from across geographic boundaries, and the availability of sensitive information [12]. ...
... Ontology based IOT service matching are widely studied in existing literature [16,18]. These works often refer to and maintain compatibility with the Semantic Sensor Network (SSN) ontology [4]. ...
... CPM climate simulations pose a number of high-performance scientific computing challenges. The continuous weather and climate model development that makes CPM climate simulations possible is concurrent to considerable progress of highly scalable supercomputing infrastructure with high-bandwidth and low-latency network connections (interconnects), multicore CPUs, or parallel file systems leading to ever-increasing computational resources [Navarra et al., 2010;Smari et al., 2013]. The cumulative peak performance was about 250,000 times higher in 2014 than it was in 1993 (http://www.top500.org). ...
... The Intercloud Resource-Provision System (IRPS) proposed by [32,33] is a semantically driven ontological model that facilitates application resource provision to distinct clouds. The main objective of incorporating the ontological notion is to realize interoperability among service providers with distinct resource policies. ...
... Various factors need to be taken into account when choosing a suitable access control model, such as affordability, cost-effectiveness, efficiency in preventing misconduct, security, and the trust developed as a consequence of using the model [14]. Trust is a very important element in securing cloud computing services [15] [16]. Trust is described in [1] as "an implicit feature found in the backdrop instead of being explicit, which is clearly defined and measurable." ...