The proceedings contain 356 papers. The topics discussed include: an evidential approach in ensembles;solving first-order constraints in the theory of finite or infinite trees;dynamic interactive spatial similarity re...
详细信息
ISBN:
(纸本)1595931082
The proceedings contain 356 papers. The topics discussed include: an evidential approach in ensembles;solving first-order constraints in the theory of finite or infinite trees;dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph;strong agent mobility for aglets based on the IBM JikesRVM;a constraint logic programming approach to 3D structure determination of large protein complexes;innovative computational methods for transcriptomic data analysis;approaches to text mining for clinical medical records;real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator;detecting identifiable areas in mobile environments;distributed collaborative filtering for peer-to-peer file sharing systems;relevance feedback methods for logo and trademark image retrieval on the web;and handheld devices for cooperative educational activities.
The proceedings contain 356 papers. The topics discussed include: an evidential approach in ensembles;solving first-order constraints in the theory of finite or infinite trees;dynamic interactive spatial similarity re...
详细信息
ISBN:
(纸本)1595931082
The proceedings contain 356 papers. The topics discussed include: an evidential approach in ensembles;solving first-order constraints in the theory of finite or infinite trees;dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph;strong agent mobility for aglets based on the IBM JikesRVM;a constraint logic programming approach to 3D structure determination of large protein complexes;innovative computational methods for transcriptomic data analysis;approaches to text mining for clinical medical records;real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator;detecting identifiable areas in mobile environments;distributed collaborative filtering for peer-to-peer file sharing systems;relevance feedback methods for logo and trademark image retrieval on the web;and handheld devices for cooperative educational activities.
We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces f...
详细信息
ISBN:
(纸本)1595931082
We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces formalism, but the results apply to all protocol analysis techniques, and should be of particular value to those using model checking. The implications of the central result are discussed. Copyright 2006acm.
This paper presents ALTER, an adaptive failure detection service, which incorporates the technique of unreliable failure detection service and the idea of R-GMA. ALTER is organized in a hierarchical structure and it c...
详细信息
ISBN:
(纸本)1595931082
This paper presents ALTER, an adaptive failure detection service, which incorporates the technique of unreliable failure detection service and the idea of R-GMA. ALTER is organized in a hierarchical structure and it can be adaptive to the system conditions and user requirements with changing the system parameters and system organizations. With mathematical evaluation, ALTER shows good scalability and flexibility, which is suitable for grid environments. Copyright 2006acm.
This paper proposes a temporal version mapping concept and a SQL query rewriting technique to support the OLAP query analysis in multidimensional database (MDB) systems modeled on multiversion schema. Based on our pro...
详细信息
ISBN:
(纸本)1595931082
This paper proposes a temporal version mapping concept and a SQL query rewriting technique to support the OLAP query analysis in multidimensional database (MDB) systems modeled on multiversion schema. Based on our proposed model, an integration solution of MDB schema change and multiversion OLAP query analysis performed over the changed database schema are taken into account. In addition, we present the system design and implementation of our prototype system to demonstrate our research idea. Copyright 2006acm.
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effectively in an open and untrusted environ...
详细信息
ISBN:
(纸本)1595931082
Global public computing platforms, such as PlanetLab, grid computing systems, and XenoServers, require facilities for managing trust to allow their participants to interact effectively in an open and untrusted environment. In this paper, we describe BambooTrust, a practical, high-performance distributed trust management system for global public computing platforms. We present our peer-to-peer architecture, based on the XenoTrust model and the Bamboo distributed hash table. We describe the initial BambooTrust implementation and deployment, and demonstrate that the system performs and scales more than adequately well by means of experimental evaluation. Copyright 2006acm.
Most previous work on information flow in process algebras has been based on untimed models of concurrency. It is obvious, however, that an observer might well use time to gain information about what a high-level user...
详细信息
ISBN:
(纸本)1595931082
Most previous work on information flow in process algebras has been based on untimed models of concurrency. It is obvious, however, that an observer might well use time to gain information about what a high-level user of the system is doing. We use the priority took view (a discrete timed model) to extend several traditional untimed noninterference properties to the timed world. These are the determinism-based conditions of [14], [15] and [17], and Forster's local noninterference properties [6], [7]. Copyright 2006acm.
The release of computer hardware devices based on "trusted computing" technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the cont...
详细信息
ISBN:
(纸本)1595931082
The release of computer hardware devices based on "trusted computing" technologies is heralding a paradigm shift that will have profound implications for digital forensics. In this paper, we map out the contours of a trusted environment in order to establish the context for the paper. This is followed by the main components of the TC architecture with an emphasis on the Trusted Platform and the Trusted Platform Module (TPM). The next section presents a synopsis based on three threat models, viz., (i) pc owner-centric, (ii) trusted computing-centric, and (iii) digital forensics-centric and then briefly touches on the implications and unintended consequences of trusted computing for digital forensics. Finally, the last section of the concludes with a recommendation on how to mitigate the negative effects of trusted computing. Copyright 2006acm.
The Location API for J2ME is a standard Java mobile client API that is intended to provide a generic interface to multiple positioning technologies. Its client side object model goes beyond the provision of raw locati...
详细信息
ISBN:
(纸本)1595931082
The Location API for J2ME is a standard Java mobile client API that is intended to provide a generic interface to multiple positioning technologies. Its client side object model goes beyond the provision of raw location data to enable geocoding and reverse geocoding of physical landmarks, utilising the mobile device's persistent storage. However this alone does not provide direct support for 'friend finder' type applications that encompass third party mobile devices. In this paper we propose some extensions to the Location API that would enable such applications to be supported in a client centric manner, and demonstrate the use of these extensions within a simulation environment Copyright 2006acm.
We present an emotion recognition system based on a probabilistic approach to adaptive processing of Facial Emotion Tree Structures (FETS). FETS are made up of localized Gabor features related to the facial components...
详细信息
ISBN:
(纸本)1595931082
We present an emotion recognition system based on a probabilistic approach to adaptive processing of Facial Emotion Tree Structures (FETS). FETS are made up of localized Gabor features related to the facial components according to the Facial Action Coding System. The proposed model is an extension of the probabilistic based recursive neural network model applying in face recognition by Cho and Wong [1]. The robustness of the model in an emotion recognition system is evaluated by testing with known and unknown subjects with different emotions. The experiment results shows that the proposed model significantly improved the recognition rate in terms of generalization. Copyright 2006acm.
暂无评论