Grid is a distributed platform that makes the utilization of distributed and powerful sharing resources for those submitted applications more conveniently. Applications designed to execute on grid frequently require t...
详细信息
Web services and Grid computing are technologies with a great impact these days. Both technologies are taking a syntactical based approach to describe services, and therefore, limited support is provided for service r...
详细信息
In online communities, the users typically do not meet personally, and, thus, they have to estimate the trustworthiness of the other parties using other means. To assist these estimations, various reputation systems h...
详细信息
In this paper, we propose an improved alternative for the path key establishment phase of the bootstrapping protocol in a sensor network. This scheme has better connectivity than the path key establishment. The commun...
详细信息
Position-based routing protocols make routing decisions based on the geographical position of the destination of a packet. Such protocols scale well since they do not require nodes to maintain explicit routes. Instead...
详细信息
ISBN:
(纸本)0769523692
Position-based routing protocols make routing decisions based on the geographical position of the destination of a packet. Such protocols scale well since they do not require nodes to maintain explicit routes. Instead each node must know only its own position, the position of its neighbors, and the position of the destination. Thus, a critical component of position-based routing protocols is the position service that allows nodes to obtain the position of a destination node. In this paper we analyze the security vulnerabilities of position-based routing protocols and virtual home region (VHR)-based distributed position service systems. We propose methods to protect the position information from both external and internal attackers. We then discuss and propose several mitigation mechanisms against position abuse by internal attackers that exploit the position service to trace their targets. Finally, we propose a position verification mechanism that allows the position service to verify that the positions reported by nodes are correct.
Personal presence systems are widely used to get aware Of other users' availabilitv and willingness to communicate before actually contacting them. After early systems focused on ad-hoc text messaging only and rel...
详细信息
ISBN:
(纸本)0780393058
Personal presence systems are widely used to get aware Of other users' availabilitv and willingness to communicate before actually contacting them. After early systems focused on ad-hoc text messaging only and relied oil manual updates of status descriptions, modern applications not only integrate multi-media communication but also facilitate automatic detection of status changes. The status of devices owned by a particular user then call be used to infer the user's presence status automatically, i.e. without explicit user-interaction. To achieve this, unstructured data provided from various sources is aggregated and set into relation with user-specific context information. The aggregation service presented here eliminates the need for extensive information acquisition that is necessary for most learning algorithms. Users instead have full control over the aggregation. process, including the distribution of their presence status information to interested watchers.
As the power of computational Grids increases, there is a corresponding need for better usability in PSE community. In this paper, we describe our experiences on design of project GridPSi, a Gridenabled PSE for physic...
详细信息
Fast matrix multiplication (FMM) algorithms to multiply two n × n matrices reduce the asymptotic operation count from O(n3) of the traditional algorithm to O(n2.38), thus on distributed memory computers, the asso...
详细信息
Advances in computer science and communication technologies have helped people, businesses, and organizations interact faster and easier than ever before. In the future, computers will be required to play a lot more a...
详细信息
New energy-efficient linear forecasting methods are proposed for various sensor network applications, including in-network data aggregation and mining. The proposed methods are designed to minimize the number of trend...
详细信息
暂无评论