the proceedings contain 24 papers. the special focus in this conference is on Advances in network and information security. the topics include: computing of Trust in Ad-Hoc Networks;TAO: Protecting Against Hitlist Wor...
ISBN:
(纸本)3540478205
the proceedings contain 24 papers. the special focus in this conference is on Advances in network and information security. the topics include: computing of Trust in Ad-Hoc Networks;TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation;On the Privacy Risks of Publishing Anonymized IP Network Traces;Secure Mobile Notifications of Civilians in Case of a Disaster;A Fair Anonymous Submission and Review System;Attribute Delegation Based on Ontologies and Context Information;Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains;One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange;Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart;Perturbing and Protecting a Traceable Block Cipher;A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors;Timed Release Cryptography from Bilinear Pairings Using Hash Chains;Compression of Encrypted Visual Data;Selective Encryption for Hierarchical MPEG;Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods;A Flexible and Open DRM Framework;A Flexible and Open DRM Framework;PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies;A Privacy Agent in Context-Aware Ubiquitous computing Environments;Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems;Attack Graph Based Evaluation of Network Security;Information Modeling for Automated Risk Analysis and Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication.
A good decision is made usually from gathering adequate information, working out the importance of individual factors, and choosing the best course of action. the quantity and quality of the information, the process o...
详细信息
the paper describes parallel 3D DEM simulation of compacting of heterogeneous material. Static domain decomposition and message passing inter-processor communication have been implemented in the DEM code. A novel algo...
详细信息
Database management systems providing powerful data management services have been developed in the recent decades to a great extent. All these systems are based on its own single data model, whereas the demand for man...
详细信息
Database management systems providing powerful data management services have been developed in the recent decades to a great extent. All these systems are based on its own single data model, whereas the demand for managing multiple data sources with different data models is rapidly expanding. therefore the need for intelligent management systems providing access to those heterogeneous and often distributed data sources and allowing to search and query them as a single information source, has never been greater. this research challenge is faced by the vision of dataspaces. So far, no effort was devoted to realization of dataspace concepts on the grid. In this paper, we propose the architecture of a dataspace management system and discuss how some current components of the grid technology can support the future implementations of such architecture
Peer-to-peer computing has been emerged as very popular application due to the strong retrieval performance and the easiness of sharing resource and information. Nonetheless in reality p2p users are demanding more pri...
详细信息
the following topics are dealt with: e-learning system; business computing; finance computing; database management system; data warehousing; information system; data mining; user interfaces; human computer interaction...
the following topics are dealt with: e-learning system; business computing; finance computing; database management system; data warehousing; information system; data mining; user interfaces; human computer interaction; information society; intelligent and multi-agent systems; knowledge management and e-commerce; language technologies; process simulation; optimization problem; grid computing; middleware; distributed platform
Pervasive human-centric computing, the emerging next-generation computing, focuses on humans rather than machines. Pervasive computing's goal of "all the time, everywhere" access replaces today's mob...
详细信息
Pervasive human-centric computing, the emerging next-generation computing, focuses on humans rather than machines. Pervasive computing's goal of "all the time, everywhere" access replaces today's mobile and distributedcomputing's goal of "anytime, anywhere" access. Pervasive computing requires cross-disciplinary collaborations among experts in fields such as intelligent systems, agent technologies, autonomic computing, security and privacy, human factors engineering and ergonomics, human factors psychology, augmented reality computing, wearable computing, wireless and mobile computing, location-and context-aware computing, sensor computing, device technology, and social sciences. thus, it is crucial to reform software engineering education in order to well prepare software engineers for the new challenges and opportunities presented by pervasive human-centric computing. this paper presents and discusses our project results and the lessons learned about the software engineering education reform
this paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple strategies for context provisioning, n...
详细信息
this paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple strategies for context provisioning, namely internal sensors-based, external infrastructure-based, and distributed provisioning in ad hoc networks. Applications can query Contory about context items of different types, using a declarative query language which features on-demand, periodic, and event-based context queries. Contory allows applications to utilize different provisioning mechanisms depending on resource availability and presence of external infrastructures. this paper illustrates our approach along with its design and implementation on smart phones.
Auctions have been used as the market mechanism for allocating resources to users in a grid. However, most of the existing work either consider only homogeneous resources, or pick a resource randomly for bidding to in...
详细信息
Learning objects are gaining an increasing interest in the e-learning community. their availability in a distributed Web-based environment represents an opportunity for further developments generated by a richer conte...
详细信息
Learning objects are gaining an increasing interest in the e-learning community. their availability in a distributed Web-based environment represents an opportunity for further developments generated by a richer context of interaction that permits to different stakeholders to use, comment and evolve available objects, thus providing each other with suggestions and insights. In this paper, we propose a distributed scenario in which users may express their comments about learning objects, point out relationships among them, and evolve a learning object in the sense of specialization. the implementation of such environment in a super peer network is outlined together with basic exploration facilities.
暂无评论