The proceedings contain 172 papers. The topics discussed include: the info-plosion project;keyword search on relational databases;efficient algorithms for on-line analysis processing on compressed data warehouses;quer...
详细信息
ISBN:
(纸本)0769529437
The proceedings contain 172 papers. The topics discussed include: the info-plosion project;keyword search on relational databases;efficient algorithms for on-line analysis processing on compressed data warehouses;querying graph-structured data;content-based search using term aggregation and classification over hybrid peer-to-peer systems;collaborative legal information sharing on P2P network;a reliable SLA-based admission controller for MPLS networks;a conceptual framework for a SIM-based electronic transaction authentication system;constructing role-based access control and delegation based on hierarchical IBS;DoS evading mechanism upon service hopping;a novel gray hole attack detection scheme for mobile ad hoc networks;sharing software resources with floating license in grid environment;anti-phishing by smart mobile device;and an efficient sensor observation data registration based on asynchronous service middleware.
The following topics are dealt with: data-driven engineering; network and system security; information and storage management for ubiquitous computing; performance analysis; parallel and distributed system; intelligen...
The following topics are dealt with: data-driven engineering; network and system security; information and storage management for ubiquitous computing; performance analysis; parallel and distributed system; intelligent computing; image processing; data management; and information system.
The proceedings contain 57 papers. The topics discussed include: dynamic multi-resource advance reservation in grid environment;a novel adaptive proxy certificates management scheme in military grid environment;overal...
详细信息
ISBN:
(纸本)9783540747833
The proceedings contain 57 papers. The topics discussed include: dynamic multi-resource advance reservation in grid environment;a novel adaptive proxy certificates management scheme in military grid environment;overall blocking behavior analysis on banyan-based optical switching networks under crosstalk constraint;energy-efficient scheduling fixed-priority tasks with preemption threshold on variable voltage processors;a collaborative service discovery and service sharing framework for mobile ad hoc networks;modulation multiplexing distributed space-time block coding for two-user cooperative diversity in wireless network;design and evaluation of parallel string matching algorithms for network intrusion detection systems;object-based storage model for object-oriented database;a direction to avoid re-encryption in cryptographic file sharing;and an improved fuzzy support vector machine for credit rating.
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.
Encryption is the basis and important method to ensure security of storage area network. And it is very expensive and will drop off performance of storage area network system to unacceptable situation. We evaluate per...
详细信息
ISBN:
(纸本)9780769529431
Encryption is the basis and important method to ensure security of storage area network. And it is very expensive and will drop off performance of storage area network system to unacceptable situation. We evaluate performance of encrypted storage area network using some current cryptographic algorithms, and want to observe some useful result to help researching and designing security system for storage area network.
Due to the complicated and ever-changing characteristics of Internet, network traffic prediction is a very complex and difficult issue in the network management and design. This paper shows a model with a new algorith...
详细信息
In this paper, we obtain the representation of connected regular digraphs as coset graphs of S-n. Applying this representation, we give the conditions of isomorphisms and the formula of automorphism groups of connecte...
详细信息
ISBN:
(纸本)9780769529431
In this paper, we obtain the representation of connected regular digraphs as coset graphs of S-n. Applying this representation, we give the conditions of isomorphisms and the formula of automorphism groups of connected regular digraphs, and their applications to Thompson's problem. It would have further more applications for parallel and distributed computing.
Peer-to-Peer (P2P) network is a fast developing branch of Computer Science and many researchers are developing new algorithms for such systems. After the success of systems like Napster, Kazza, the use of such network...
详细信息
暂无评论