this book contains the combined proceedings of the 4thinternationalconference on Ubiquitous computing Application and Wireless Sensor Network (UCAWSN-15) and the 16thinternationalconference on parallel and Distrib...
ISBN:
(数字)9789811000683
ISBN:
(纸本)9789811000676;9789811000683
this book contains the combined proceedings of the 4thinternationalconference on Ubiquitous computing Application and Wireless Sensor Network (UCAWSN-15) and the 16thinternationalconference on parallel and distributedcomputing, applications and technologies (PDCAT-15). the combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. the book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
Currently, most cloud computing deployments are generally supported through the use of large scale data centres. there is a common perception that by developing scalable computation, storage, network, and by energy-ac...
详细信息
ISBN:
(纸本)9783319295824;9783319295817
Currently, most cloud computing deployments are generally supported through the use of large scale data centres. there is a common perception that by developing scalable computation, storage, network, and by energy-acquisition at preferential prices, data centres are able to provide more efficient, reliable and cost effective hosting environments for user applications. However, although the network capacity within and in the proximity of such a data centre may be high - the connectivity of a user to their first hop network may not be. Understanding how a distributed cloud can be provisioned, enabling capability to be made available "closer" to a user (geographically or based on network metrics, such as number of hops or latency), remains an important challenge aiming to provide the same benefits as a centralised cloud, but with better Quality of Service for mobile users. With increasing proliferation of mobile devices and sensor-based deployments, understanding how data from such devices can be processed in closer proximity to the device (ranging from capability directly available on the device or through first-hop network nodes from the device) also forms an important requirement of such distributed clouds. We review a number of technologiesthat could be useful enablers of distributed clouds - outlining common themes across them and identifying potential business models.
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Withthe continuous evolution of global information processes, cloud ...
详细信息
ISBN:
(纸本)9781510821934
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Withthe continuous evolution of global information processes, cloud computing has become a new Internet service model following distributedcomputing, parallelcomputing and grid computing and it has attracted widespread concern from the industry and the government. Starting from the concept and development status of cloud computing, this paper proposes the connotation and two forms of cloud computing security with respect to services and data analysis, then it makes an in-depth analysis of the cloud computing security challenges encountered in the development process, and presents the critical technologies of security protection including data backup strategy, data partial encryption scheme and module design at last.
Computational Intelligence methods are widely used in a diverse range of scientific and industrial applications, including economic modeling, finance, networks and transportation, database design, design and control, ...
详细信息
ISBN:
(纸本)9781509032310
Computational Intelligence methods are widely used in a diverse range of scientific and industrial applications, including economic modeling, finance, networks and transportation, database design, design and control, scheduling and others. On the other hand, Collective Intelligence methods aim at harvesting the power of people's mobile devices for gathering and sending useful information about the values and the variations of environmental variables in a target area or the macroscopic behavior of a target population. In this paper we propose a computation paradigm, which combines computational, collective intelligence and privacy respecting techniques, towards the creation of a flexible, low-cost, secure, massively parallel virtual computing platform based on people's own devices. Examples of how such an infrastructure can be the platform of the deployment of innovative, computationally demanding, applications and services that demand peer-to-peer connections and users' device collaboration are presented. the privacy respecting techniques enhance people's trust in providing their data through their personal devices.
the proceedings contain 23 papers. the special focus in this conference is on Software Paradigm Trends, Software Engineering and applications. the topics include: Filtered model-driven product line engineering with su...
ISBN:
(纸本)9783319301419
the proceedings contain 23 papers. the special focus in this conference is on Software Paradigm Trends, Software Engineering and applications. the topics include: Filtered model-driven product line engineering with supermod;a semantic versioning service based on formal certification;an eclipse IDE for teaching Java;supporting privacy impact assessments using problem-based privacy analysis;integrating model driven and model checking to mine design patterns;an UML profile for verification of flexible control systems;invariant implementation for domain models applying incremental OCL techniques;an ontological analysis of a proposed theory for software development;specifying business process outsourcing requirements;supporting deviations on software processes;GQM-based definition and evaluation of software project success indicators;dynamic analysis techniques to reverse engineer mobile applications;annotating goals with concerns in goal-oriented requirements engineering;a model-based approach for integrating executable architectural design patterns in space flight software product lines;model checking feature interactions;deriving tailored UML interaction models from scenario-based runtime tests;documenting and designing QVTo model transformations through mathematics;an approach for the automatic adaptation of domain-specific modeling languages for model-driven mobile application development;automated testing of distributed and heterogeneous systems based on UML sequence diagrams;guiding cloud developers to build energy aware applications and subjective spaces architecture for contextualizing heterogeneous sources.
the proceedings contain 165 papers. the topics discussed include: large scale system management based on Markov decision process and big data concept;investigation of algorithms and models of optimization of cloud app...
ISBN:
(纸本)9781509018406
the proceedings contain 165 papers. the topics discussed include: large scale system management based on Markov decision process and big data concept;investigation of algorithms and models of optimization of cloud applications and services in virtual infrastructure of data center;big data integration architectural concepts for oil and gas industry;statistical data analysis for network infrastructure monitoring to recognize aberrant behavior of system local segments;determination of loss of information during data anonymization procedure;architecture and security tools in distributed information systems with big data;distributed information and control system for emergencies in critical infrastructures;link grammar parser for turkic languages and algorithms for estimation the relevance of documents;applying of ontological engineering to represent knowledge and training sessions;ordered multidimensional model construction of relational source for integral olapmodeling;information's semantic search, classification, structuring and integration objectives in the knowledge management context problems;application of data mining technology to optimize the city transport network;new approach to software code diversification in interpreted languages based on the moving target technology;a new approach to detecting and preventing the worm hole attacks for secure routing in mobile ad-hoc networks based on the spr protocol;research on the structural characteristic of global terrorist organization cooperation network;investigation of the spatial structure of the analogue [LEU7] of octarphin molecule by computer modeling;the technique of creating distributedcomputing systems based on service-oriented architecture;and simulation of identification process of parameters of movement of the wagon on monorail transport.
Solution of the finding a minimum spanning tree problem is common in various areas of research: recognition of different objects, computer vision, analysis and construction of networks (eg, telephone, electrical, comp...
详细信息
Solution of the finding a minimum spanning tree problem is common in various areas of research: recognition of different objects, computer vision, analysis and construction of networks (eg, telephone, electrical, computer, travel, etc.), chemistry and biology, and many others. there are at least three well-known algorithms for solving this problem: Boruvka, Kruskal and Prim. Processing large graphs is a quite time-consuming task for the central processor (CPU), and in high demand at the present moment. the usage of Graphics processing units (GPUs) as a mean to solve general-purpose problems grows every day, because GPUs have more computing power than CPUs. But the minimum spanning tree (MST) computation on a general graph is an irregular algorithm. So it suits poorly the GPU architecture. this article examins a hybrid implementation of this algorithm on GPU and CPU.
Recent advances in wireless sensors technology applied to e-health allow the development of "personal medicine" concept, whose main goal is to identify specific therapies that make safe and effective individ...
详细信息
ISBN:
(纸本)9783319487465;9783319487458
Recent advances in wireless sensors technology applied to e-health allow the development of "personal medicine" concept, whose main goal is to identify specific therapies that make safe and effective individualized treatment of patients based, for example, in health status remote monitoring. Also the existence of multiple sensor devices in Hospital Units like ICUs (Intensive Care Units) constitute a big source of data, increasing the volume of health information to be analyzed in order to detect or predict abnormal situations in patients. In order to process this huge volume of information it is necessary to use Big Data and IoT technologies. In this paper, we present a general approach for sensor's information processing and analysis based on Big Data concepts and to describe the use of common tools and techniques for storing, filtering and processing data coming from sensors in an ICU using a distributed architecture based on cloud computing. the proposed system has been developed around Big Data paradigms using bio-signals sensors information and machine learning algorithms for prediction of outcomes.
Network simulation is an important technique for designing interconnection networks and communication libraries. Also network simulations are useful for the analysis of internal communication behavior in parallel appl...
详细信息
the proceedings contain 13 papers. the special focus in this conference is on Mathematical and Engineering Methods in Computer Science. the topics include: Programming support for future parallel architectures;flexibl...
ISBN:
(纸本)9783319298160
the proceedings contain 13 papers. the special focus in this conference is on Mathematical and Engineering Methods in Computer Science. the topics include: Programming support for future parallel architectures;flexible interpolation for efficient model checking;understanding transparent and complicated users as instances of preference learning for recommender systems;span-program-based quantum algorithms for graph bipartiteness and connectivity;fitting aggregation operators;practical exhaustive generation of small multiway cuts in sparse graphs;self-adaptive architecture for multi-sensor embedded vision system;exceptional configurations of quantum walks with grover’s coin;performance analysis of distributed stream processing applicationsthrough colored petri nets;GPU-accelerated real-time mesh simplification using parallel half edge collapses;classifier ensemble by semi-supervised learning;the challenge of increasing safe response of antivirus software users and weak memory models as LLVM-to-LLVM transformations.
暂无评论