the proceedings contain 40 papers. the topics discussed include: dealing with undependable workers in decentralized network supercomputing;transport protocol with acknowledgement-assisted storage management for interm...
ISBN:
(纸本)9783642356674
the proceedings contain 40 papers. the topics discussed include: dealing with undependable workers in decentralized network supercomputing;transport protocol with acknowledgement-assisted storage management for intermittently connected wireless sensor networks;iterative approximate Byzantine consensus under a generalized fault model;exploiting partial-packet information for reactive jamming detection: studies in UWSN environment;fault-tolerant design of wireless sensor networks with directional antennas;robust deployment of wireless sensor networks using gene regulatory networks;cellular pulse switching: an architecture for event sensing and localization in sensor networks;maximal antichain lattice algorithms for distributed computations;on the analysis of a label propagation algorithm for community detection;PeerVault: a distributed peer-to-peer platform for reliable data backup;and poster: a secure and efficient cross authentication protocol in VANET hierarchical model.
the proceedings contain 103 papers. the topics discussed include: an undirected graph traversal based grouping prediction method for data de-duplication;an algorithm of developed imperialist competition for suitable h...
ISBN:
(纸本)9780769550053
the proceedings contain 103 papers. the topics discussed include: an undirected graph traversal based grouping prediction method for data de-duplication;an algorithm of developed imperialist competition for suitable human resource layout;file transfer scheduling optimization using artificial immune system;improve the intelligent consortium agent for SMEs in the plastic market;modeling stock analysts' decision making: an intelligent decision support system;veracity and convincingness: sources of plausibility for decision making and situation management;winner-take-all memetic differential evolution for genetic interaction: parameter identification;e-learning content authentication using bipartite matching;cloud resource provisioning and bursting approaches;a content aggregation using aspect oriented programming;an ensemble approach for cyber attack detection system: a generic framework;and an LBP based key management for secure wireless body area network (WBAN).
the proceedings contain 222 papers. the topics discussed include: DRL-deploy: adaptive service function chains deployment with deep reinforcement learning;accuracy vs. efficiency: achieving boththrough hardware-aware...
ISBN:
(纸本)9781665435741
the proceedings contain 222 papers. the topics discussed include: DRL-deploy: adaptive service function chains deployment with deep reinforcement learning;accuracy vs. efficiency: achieving boththrough hardware-aware quantization and reconfigurable architecture with mixed precision;cmss: collaborative modeling of safety and security requirements for network protocols;FGPA: fine-grained pipelined acceleration for depthwise separable CNN in resource constraint scenarios;Dyacon: JointCloud dynamic access control model of data security based on verifiable credentials;understanding the runtime overheads of deep learning inference on edge devices;and alleviating imbalance in synchronous distributed training of deep neural networks.
the proceedings contain 84 papers. the topics discussed include: MMLRU selection function: an output selection function on adaptive routing;optimal broadcasting in injured hypercubes using directed safety levels;impro...
ISBN:
(纸本)9781618395740
the proceedings contain 84 papers. the topics discussed include: MMLRU selection function: an output selection function on adaptive routing;optimal broadcasting in injured hypercubes using directed safety levels;improving tree-based multicasting for wormhole switch-based networks;a group communications facility for reliable computing on clusters;deadlock-free prefix multicasting in irregular networks;multidestination multicast communication based on hierarchical block rings;bandwidth learning in distributednetworking environments for global information dissemination;on the treatment of non-functional properties of dynamic distributed software architectures;order-theoretic refinement of infinite stream behaviors;and using path-spectra-based cloning in region-based optimization for instruction-level parallelism.
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the netwo...
详细信息
ISBN:
(纸本)9780769550053
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure. Various certificate authorities (CAs) distributed over the network, each with a periodically updated share of the secrete key, is usually adopted. thus many efforts have been made to adapt Certificate Authority's (CA) tasks to the dynamic environments of MANETs and distribute the tasks of CA among MANET nodes. Elliptic Curve Cryptography (ECC) is a cryptographic technique prominent suited for small devices, like those used in wireless communications and is gaining momentum. the main advantage of ECC versus RSA is that for the same level of security it requires a much shorter key length. the purpose of this work is to design and implement a fully certificate authority based on polynomial over elliptic curve, based on trust graphs and threshold cryptography, which though has better cryptography in nature. the security is based on the elliptic curve discrete logarithm problem which aimed to increase the authentication and the security in MANETs.
Code generation belongs to the backend of parallelizing compiler, and is for generating efficient computation and communication code for the target parallel computing system. Traditional research resolve array redistr...
详细信息
ISBN:
(纸本)9780769550053
Code generation belongs to the backend of parallelizing compiler, and is for generating efficient computation and communication code for the target parallel computing system. Traditional research resolve array redistribution mainly by generating communication code that each processor sends all data defined in its local memory to all processors, but this will bring large amount of communication redundancy, which increase withthe growth of number of processors. Focusing on this problem, this paper presents an accurate code generation algorithm of array redistribution for distributed-memory architecture. the algorithm determines source processor and goals processor of each array element's migration in array redistribution by the transformation of data decompositions, then generate accurate communication code. the experimental results show that algorithm proposed by this paper can effectively reduce communication redundancy withthe processor scale growth, and improve the parallel performance of applications.
In recent years, graphs have become popular in a variety of domains, withthe volume of graph databases increasing rapidly. therefore, large amounts of graph data need to be indexed, queried, and stored. To handle pro...
详细信息
ISBN:
(纸本)9780769550053
In recent years, graphs have become popular in a variety of domains, withthe volume of graph databases increasing rapidly. therefore, large amounts of graph data need to be indexed, queried, and stored. To handle problems on graph querying and storing for large graph databases, we present a distributed graph searching framework based on the well-known storage system HBase. We improve the querying and indexing methods in GiS [4] to process the querying problem in a distributed environment. To ensure that graph data are well distributed, we design a distributed graph indexing technique that uses a line graph signature to index graphs in HBase. Experiments in both real and synthetic databases demonstrate that the proposed framework is an efficient distributed solution for querying subgraphs in a large volume of graph data.
Heterogeneity in sensor nodes may be caused because of differences in transmission capabilities, different terrains or different distribution of event occurrences. A distributed, energy efficient clustering protocol, ...
详细信息
the Internet-of-things represent a future trend of the Internet, in which massive numbers of networked objects are assumed to have the capability of sharing data collected through sensing activities. It is envisioned ...
详细信息
ISBN:
(纸本)9781538668764
the Internet-of-things represent a future trend of the Internet, in which massive numbers of networked objects are assumed to have the capability of sharing data collected through sensing activities. It is envisioned that such objects are not dedicated hardware modules embedded specific machines communicating via proprietary wired or wireless networks to dedicated software applications. On contrary, Internet-of-things may have a more autonomic deployment, in which objects are autonomous and communicate via existing IP based networks. Due to its distributed nature, there is the need to rely on autonomic networking to improve the efficiency while reducing the operational costs of Internet-of-things frameworks. this paper aims to provide a study about the best data plane to support Internet-of-things, and an analysis about the best model to support its distributed autonomic behavior.
A current problem in software engineering is the modernization of useful legacy systems to mobile platforms. In this context, we describe a reengineering process that integrates traditional reverse engineering techniq...
详细信息
ISBN:
(纸本)9780769550053
A current problem in software engineering is the modernization of useful legacy systems to mobile platforms. In this context, we describe a reengineering process that integrates traditional reverse engineering techniques such as static and dynamic analysis with Model Driven Development (MDD), MDA (Model Driven Architecture) in particular. We describe a case study that shows how to move CRM (Customer Relationship Management) applications from desktop to mobile platforms. We validated our approach by using the open source application platform Eclipse, EMF (Eclipse Modeling Framework), EMP (Eclipse Modeling Project), the Atlas Transformation Language (ATL) and the Android platform.
暂无评论