the proceedings contain 54 papers. the topics discussed include: tracking dynamics using sensor networks: some recurring themes;distributedcomputing and the multicore revolution;temporal considerations in wireless ne...
ISBN:
(纸本)3540922946
the proceedings contain 54 papers. the topics discussed include: tracking dynamics using sensor networks: some recurring themes;distributedcomputing and the multicore revolution;temporal considerations in wireless networks and cyberphysical systems;large-scale networked systems: from anarchy to geometric self-structuring;cheapest paths in multi-interface networks;concept-based routing in ad-hoc networks;heuristics for minimizing interference in sensor networks;non-blocking array-based algorithms for stacks and queues;an asymptotic performance/energy analysis and optimization of multi-core architecturel;representation of complex concepts for semantic routed network;guaranteeing eventual coherency across data copies, in a highly available peer-to-peer distributed file system;on minimal connectivity requirement for secure message transmission in asynchronous networks;and traffic engineering based attack detection in active networks.
this conference proceedings contains 69 papers. the following topics are dealt with: models of distributed computation;distributed shared memory;real-time systems;analysis by transformation;abstractions for distribute...
详细信息
this conference proceedings contains 69 papers. the following topics are dealt with: models of distributed computation;distributed shared memory;real-time systems;analysis by transformation;abstractions for distributed processing;distributed operating systems;fault tolerance;efficient file access;protocols;interconnection structures for multi-processing;concurrency and transactions;algorithms;multiprocessor architectures;replication network operation and control;distributed file systems;language support;performance improvement and monitoring;scheduling and assignment;networking;load balancing;and distributed applications.
I/O constitutes a significant portion of most of the application run-time. Spawning many such applications concurrently on an HPC system leads to severe I/O contention. thus, understanding and subsequently reducing I/...
详细信息
the proceedings contain 202 papers. the topics discussed include: multi-relational graph convolutional networks for skeleton-based action recognition;identifying the right person in social networks with double metapho...
ISBN:
(纸本)9781665414852
the proceedings contain 202 papers. the topics discussed include: multi-relational graph convolutional networks for skeleton-based action recognition;identifying the right person in social networks with double metaphone codes;a novel strong cache consistency mechanism in ICN based on role division and lease model;demystifying the largest live game streaming platform via black-box measurement;framework-agnostic optimization of repeated skewed joins at massive scale;remote procedure call optimization of big data systems based on data awareness;MCSEC: secure coded matrix multiplication scheme for edge computing with minimum communication cost;low-rate DoS attack detection based on WPD-EE algorithm;user identity linkage across location-based social networks with spatio-temporal check-in patterns;optimizing 3-D placement of multiple UAVs based on Taguchi’s method;and feature envy detection based on Bi-LSTM with self-attention mechanism.
the proceedings contain 106 papers. the topics discussed include: a HW/SW co-design methodology: an accurate power efficiency model and design metrics for embedded system;a study on issues in context-aware systems bas...
ISBN:
(纸本)9780769536422
the proceedings contain 106 papers. the topics discussed include: a HW/SW co-design methodology: an accurate power efficiency model and design metrics for embedded system;a study on issues in context-aware systems based on a survey and service scenarios;design and implementation of a course scheduling system using activation spreading;inexpensive, simple and quick photorealistic facial modeling;need for evaluation on the effectiveness of computer-mediated communication;networking resources for research and scientific education in BW-eLabs;quantitative comparison of LOC of beginners' program making ability;tag suggestion method based on association pattern and bigram approach;a new method for estimating the number of distinct values over data streams;a novel classifier-independent feature selection algorithm for imbalanced datasets;and a robust cylinder fitting method with parameterized distance function based on gauss image.
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is dif...
详细信息
ISBN:
(纸本)9780769536422
Recently, most researches in the area of wireless sensor networks are limited to the ground environment, so the demand for underground wireless sensor networks is increasing. However the underground environment is different from the ground environment in that there are some critical problems in reliability due to the large path loss of the underground. therefore, in this paper we propose an opportunistic routing protocol for improving the reliability in the underground environment. through the test-bed experiments the proposed routing protocol is compared with other routing protocols.
In this paper we present a true concurrency variant of pi-calculus. this calculus can describe the simultaneous execution of several atomic actions and the true concurrent execution of several processes. An important ...
详细信息
ISBN:
(纸本)9780769536422
In this paper we present a true concurrency variant of pi-calculus. this calculus can describe the simultaneous execution of several atomic actions and the true concurrent execution of several processes. An important character of true concurrency is conflict. When a process encounters a conflict, it cannot evolve into any process. In order to distinguish two processes that one may encounter a conflict, and the other cannot, we propose a concept of conflict bisimulation, two processes are conflict bisimilar if they can not only evolve into conflict bisimilar processes, but also have the Potential of same conflict. In pi-calculus, congruence cannot be preserved under prefix operator but in the case of our true concurrency variant of pi-calculus, the congruence property holds for all operators.
Supplier selection and evaluation are one of the most critical activities of a company in today's competitive business world. Partnering withthe suppliers has become a key factor to the success of an organization...
详细信息
ISBN:
(纸本)9780769536422
Supplier selection and evaluation are one of the most critical activities of a company in today's competitive business world. Partnering withthe suppliers has become a key factor to the success of an organization. the selection of supplier satisfying different evaluation criteria, is therefore of main importance and builds the topic of this paper this selection process is a difficult decision and optimization problem, such as data mining technology. this paper utilizes an integrated approach to find the interesting pattern Of supplier. this research has employed a numerical example for the explanation of the proposed approach, and the results show that the method is effective and applicable for supplier selection. In short, the approach provides a new route to guide the further research concerning supplier research.
the Architecture Tradeoff Analysis Method (ATAM) is an architecture evaluation technique for analyzing risks, tradeoffs, and sensitivity points of architectures. In this paper we describe an experience of evaluating a...
详细信息
ISBN:
(纸本)9780769536422
the Architecture Tradeoff Analysis Method (ATAM) is an architecture evaluation technique for analyzing risks, tradeoffs, and sensitivity points of architectures. In this paper we describe an experience of evaluating and improving the architecture of VAN-Core system which requires to run 24 hours a day, 365 days a year, for online credit card transaction services. the goal of the architecture evaluation for VAN-Core system includes establishing risk mitigation strategies for identified risky and suggesting architecture improvements in addition to architecture evaluation.
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. the member of the ring can generate a nominative signature on behalf of the origin...
详细信息
ISBN:
(纸本)9780769536422
In a nominative proxy ring signature scheme, an original signer delegates his nominative signing power to some proxies forming a ring. the member of the ring can generate a nominative signature on behalf of the original signer and the ring. In a nominative proxy ring signature scheme, only the nominee can verify the ring signature and if necessary, only the nominee can prove its validity to the third party. In this paper, we present the first nominative proxy ring signature scheme and we prove its security
暂无评论