Developing cross-organizational business processes is a tedious task. the partners have to agree on a common data format and meaning as well as on the Quality of Service (QoS) requirements each partner has to fulfill....
详细信息
ISBN:
(纸本)9780769528915
Developing cross-organizational business processes is a tedious task. the partners have to agree on a common data format and meaning as well as on the Quality of Service (QoS) requirements each partner has to fulfill. the QoS requirements are typically described using Service Level Agreements (SLAs) among the partners. In this paper we propose a top-down modeling approach for Web service based business processes to capture the functional and non-functional aspects using a choreography language (WS-CDL) which describes the message interactions among the participants. the choreography is annotated with SLAs for the different partners. For each partner in the process, an orchestration (in WS-BPEL) and the necessary Web service templates are automatically generated. Additionally, the Service Level Objectives (SLOs) from the partner SLAs are automatically translated into policies which can then be enforced by a BPEL engine during execution.
Existing approaches for Trust Management through software alone - by their very principle - are uncompromising and have inherent weaknesses. Once the information leaves the service provider platform, there is no way t...
详细信息
ISBN:
(纸本)9780769528915
Existing approaches for Trust Management through software alone - by their very principle - are uncompromising and have inherent weaknesses. Once the information leaves the service provider platform, there is no way to guarantee the integrity, of the information on the client (or service requestor) platform. the Trusted computing Group proposed a quantum leap in security, a hardware based "root of trust" by which the integrity of a platform - be a client or service provider can be verified. However there is no approach for the integration of this novel but essentially straightforward concept into the distributed application development. We believe that the complexity of Trusted computing (TC) is one of the key factors that will hinder its successful integration within the web services based distributed application realm. Model-driven techniques offer a promising approach to alleviate the complexity of platforms. this contribution has three objectives. First, we detail SECTET - a model-driven framework for leveraging TC concepts at a higher level of abstraction. We secondly elaborate the integration of platform-independent XACML policies withthe platform-specific SELinux policies. thirdly, we share our experiences regarding the implementation results of the SECTET on TC based systems.
the aim of this paper is to present the recent development in the design and implementation of distributed Microwave Integrated Circuits (MICs). MIC technology has experienced a tremendous growth during the last years...
详细信息
ISBN:
(纸本)9781934272268
the aim of this paper is to present the recent development in the design and implementation of distributed Microwave Integrated Circuits (MICs). MIC technology has experienced a tremendous growth during the last years. It has matured to the extend that multifunction circuits including transmitters and receivers can be incorporated in one module. We introduce the basics of distributed MIC which include the basics of distributed active and passive Circuits (distributed microstrip amplifiers, oscillators, couplers, and diode mixers). the paper demonstrates two different SOP MIC transceiver modules in addition to microstrip patch antenna. the designed MIC modules have many applications especially in Wireless Communications, Wireless networking, Digital Communications, Radar Systems Deep Space Communications, Medical Imaging and Treatment, and Radio Spectrometry.
Trust and reputation systems have recently come into the picture for the virtual environment to offer an online user a decision support mechanism. Many of them are agentbased as software agents are a promising paradig...
详细信息
ISBN:
(纸本)9780889866935
Trust and reputation systems have recently come into the picture for the virtual environment to offer an online user a decision support mechanism. Many of them are agentbased as software agents are a promising paradigm for open, distributed marketplaces. this paper considers how to make a distributed agentbased reputation mechanism, which extends the existing frameworks based on information about past behaviour, with other aspects affecting online trust, taken from the Trust Taxonomy [10], such as existence of control mechanisms and supporting organisations, security and privacy strategies, technology and information based factors as well as interaction.
Binary decision diagrams (BDDs) are data structures that enable efficient representation and formal verification of digital systems. there are different heuristics that can be employed in order to optimize BDD based f...
详细信息
ISBN:
(纸本)9781934272152
Binary decision diagrams (BDDs) are data structures that enable efficient representation and formal verification of digital systems. there are different heuristics that can be employed in order to optimize BDD based formal verification process. In particular, distributed BDD construction and manipulation can be used to make formal verification of digital systems more efficient. the paper describes distributed algorithms for BDD C, manipulation based on combined breadth-first and depth-first BDD construction techniques. the algorithms are targeted for execution on network of workstations. the measurement of the distributed BDD creation performance is accomplished by building BDD representation of digital multiplier circuit. the multiplier is used because of the specific characteristics of its BDD representations. Performance of distributed algorithms is measured using two processor system and a computer cluster. Special analysis on performance impact of distributed computed cache is also given.
distributed Constraint Satisfaction Problems (DCSPs) involve a vast number of AI and Multi-Agent problems. Many important efforts have been recently accomplished to solve these kinds of problems using both backtrackin...
详细信息
ISBN:
(纸本)9780889866935
distributed Constraint Satisfaction Problems (DCSPs) involve a vast number of AI and Multi-Agent problems. Many important efforts have been recently accomplished to solve these kinds of problems using both backtracking based and mediation based methods. One of the most successful algorithms in this field is Asynchronous Partial Overlay (APO). By choosing some agents as mediators, APO tries to centralize portions of the distributed problem. Each mediator tries to solve its centralized subproblem. this paper presents a new strategy for selecting mediators. the main idea behind this strategy is that the number of a mediator's conflicts (violated constraints) impacts directly on its performance. Experimental results show that choosing a mediator withthe most conflicts leads to a considerable decrease in APO complexity. the results show a rapid and desirable improvement over various parameters in comparison with APO.
Network virtual reality is an advanced, distributed interactive and collaborative computer graphics technology for presenting information and exploring data in the 3D virtual environment. In this paper, a real-time ne...
详细信息
ISBN:
(纸本)9780769529004
Network virtual reality is an advanced, distributed interactive and collaborative computer graphics technology for presenting information and exploring data in the 3D virtual environment. In this paper, a real-time network virtual military simulation system is developed the Digital Terrain Model and SPOT images of the Geographic Information System are integrated withthe weather simulation of the particle system to construct a 3D virtual environment. the main features of the system include (1) ROAMing is used to construct and visualize the 3D virtual environment, (2) particle system is employed to simulate the weather conditions, (3) physical, gravity and collision detection are adopted to fulfill the realistic interactions, and (4) network communications is supported for distributed multi-users. Several computer graphics accelerating schemes, such as real-time optimally adapting meshes, view frustum culling, level-of-detail, are used to speedup the rendering, and dead reckoning to reduce the flow rate of net-work to make the distributed real-time VR feasible.
Broadcast algorithms are are very important in parallel and distributedcomputing. In this paper we design new sparce graphs and present a minimum time broadcast algorithms from any vertex of these graphs. A broadcast...
详细信息
ISBN:
(纸本)9780769529004
Broadcast algorithms are are very important in parallel and distributedcomputing. In this paper we design new sparce graphs and present a minimum time broadcast algorithms from any vertex of these graphs. A broadcast graph on n vertices is a graph which allows any vertex to broadcast in time [log n]. A minimum broadcast graph on n vertices is a broadcast graph withthe minimum number of edges over all broadcast graphs on n vertices. this minimum number of edges is denoted by B(n). Many papers have presented methods to construct broadcast graphs. Here we present a method to construct a broadcast graph on n + 1 vertices by adding a vertex to a broadcast graph on n vertices. Our general upper bound on B(n) improves the best known upper bounds for almost all odd values of n. Our broadcast algorithms are simple. Our new broadcast graphs can be combined using some of the known methods to obtain further improvements.
the proceedings contain 27 papers. the topics discussed include: a Web service-enabled distributed system workflow for scientific data processing;reaching semantic interoperability through semantic association of doma...
详细信息
ISBN:
(纸本)0769528104
the proceedings contain 27 papers. the topics discussed include: a Web service-enabled distributed system workflow for scientific data processing;reaching semantic interoperability through semantic association of domain standards;agent-based design of load balancing system for RFID middlewares;a service-oriented approach to security - concepts and issues;conflict resolution model based on weight in situation aware collaboration system;exploring adaptive data centers through cooperative symbiotic networking;a transactional framework for programming wireless sensor/actor networks;using continuous queries for event filtering and routing in sparse MANETs;a software cybernetics approach to deploying and scheduling workflows in service-based systems;and thread-sensitive pointer analysis for inter-thread dataflow detection.
the paper considers the use of .NET as a framework for use in distributed scientific computing on desktop computers. Execution speed tests are carried out for a range of problems. the range covered direct and iterativ...
详细信息
暂无评论