internet and web construct a platform for a distributed knowledge set, where users surf on it to achieve information and get knowledge services. Since the elements of this knowledge set are isolated and mass, it often...
详细信息
internet and web construct a platform for a distributed knowledge set, where users surf on it to achieve information and get knowledge services. Since the elements of this knowledge set are isolated and mass, it often cause users confused and got lost in it, personalized aggregate knowledge services are demanded. Knowledge services have deep relations with human cognition. From the distributed Cognition viewpoint, this paper establishes a framework for aggregate knowledge services system, it adopts active design to distribute the system loads and also human cognition loads among the system components to make the system work towards aggregate and personal knowledge services. The main components for system implementation are a knowledge environment and multi-agents.
Information retrieval (IR) system plays an important role in many web applications such as digital library, digital museum and so on. On the aspect of querying process, most of the existing IR systems are based on key...
详细信息
Information retrieval (IR) system plays an important role in many web applications such as digital library, digital museum and so on. On the aspect of querying process, most of the existing IR systems are based on keyword query. This type of query requires users to describe their query request by using keywords. But, common users prefer using natural language to express their request. So, natural language-based (especially Chinese natural language-based) IR system is proposed in this paper. At present, most traditional IR systems are single data source oriented and always centralized. Grid is chosen to enable the coordinated use of distributed resources. All the algorithms are encapsulated into services and are effectively shared.
The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eCommerce interfaces. Albeit commercial webs...
详细信息
The Much advancement has lately occurred in eCommerce systems’ interfaces. Product specifications listings combined with pictures is no longer considered the benchmark for eCommerce interfaces. Albeit commercial websites haven’t ventured in these developments, academic research has tried, through this progression, to mimic the real-life shopping experience. Shopping in real-life is a social experience with other components attached to it: customers consult with experts and shop in groups benefiting from others’ opinions. These aspects, when lacking, can lead to reduction in sales. In this paper, we build on a collaborative eCommerce system. The system adopts concepts from virtual environments, allowing customers to interact with three-dimensional models of the items of interests in the virtual shop, as well as share those items with other customers or ask for expert opinions, in real-time. Our system addresses accessibility, by using Macromedia Shockwave, a widely deployed player, and therefore avoids the need of unusual plug-ins, such as VRML viewers. The system also addresses scalability, by using a peer-to-peer communications architecture to support a number of geographically dispersed users on the internet simultaneously.
Buttyan found out a security flaw in Ariadne (Y.C. Hu, A. Perrig, andD. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," in Proc. of the Eighth ACM hitl Conf. on Mobile Computi...
详细信息
Buttyan found out a security flaw in Ariadne (Y.C. Hu, A. Perrig, andD. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," in Proc. of the Eighth ACM hitl Conf. on Mobile computing and Networking (*** 2002), pp.23-28. Atlanta, GA.2002.) and proposed a secure routing protocol, EndairA (L. Buttyan, and I. Vajda, "Towards provable security for ad hoc routing protocols", in Proc. of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2005 and G. Acs, L. Buttyan, and I. Vajda, "Provably secure on-demand source routing in mobile ad hoc networks," IEEE Transactions on Mobile computing, Vol. 5, No. 11, November 2006.), with the ability to resist active-1-1 attacks. But unfortunately we discover an as yet unknown active-0- 1 attack which we call man-in-the-middle attack and EndairA couldn 't resist. Accordingly we propose a new secure routing protocol, EndairALoc. Analysis shows that EndairALoc can resist not only active-1-1 attacks but also the wormhole attack. Furthermore EndairALoc uses pairwise secret keys instead of public keys used in EndairA. Compared with EndairA, EndairALoc can save more energy in the routing establishment.
The proceedings contain 230 papers. The topics discussed include: reforming civil engineering education given the challenges related to infrastructure engineering and management;distributedcomputing strategy for dama...
ISBN:
(纸本)0415396506
The proceedings contain 230 papers. The topics discussed include: reforming civil engineering education given the challenges related to infrastructure engineering and management;distributedcomputing strategy for damage monitoring employing smart sensors;structural monitoring for the diagnosis and the retrofitting of the monumental heritage;monitoring of bridges and transportation infrastructures;technology issues in developing structural health monitoring systems for long-span bridges;structural damage detection based on smart anddistributed sensing technologies;health monitoring and assessment of long-span bridges;ambient vibration monitoring;two-stage damage detection to a benchmark structure using ambient data;damage identification of steel structures based on changes in the curvature of power spectral density;damage diagnosis to a two-story steel braced-frame model structure;and research on damage detection of reticulated shell.
The proceedings contain 230 papers. The topics discussed include: reforming civil engineering education given the challenges related to infrastructure engineering and management;distributedcomputing strategy for dama...
ISBN:
(纸本)0415396514
The proceedings contain 230 papers. The topics discussed include: reforming civil engineering education given the challenges related to infrastructure engineering and management;distributedcomputing strategy for damage monitoring employing smart sensors;structural monitoring for the diagnosis and the retrofitting of the monumental heritage;monitoring of bridges and transportation infrastructures;technology issues in developing structural health monitoring systems for long-span bridges;structural damage detection based on smart anddistributed sensing technologies;health monitoring and assessment of long-span bridges;ambient vibration monitoring;two-stage damage detection to a benchmark structure using ambient data;damage identification of steel structures based on changes in the curvature of power spectral density;damage diagnosis to a two-story steel braced-frame model structure;and research on damage detection of reticulated shell.
With the rapid evolution of web technology andinternet, the mathematical web has emerged as a new research trend, which changes the traditional manner of mathematical scientific researching, mathematical production s...
详细信息
Recently, rapid advances in smart sensor technology have made damage monitoring using a dense array of sensors feasible, and therefore have the potential to change fundamentally the way civil infrastructure systems ar...
详细信息
The potential for RFID applications appears virtually limitless and there is a variety of applications for RFID in manufacture, supply chain, retail inventory control, transportation, agriculture, construction, etc. B...
详细信息
A proactive model for gathering resource attribute values in large scale distributed systems is proposed and analyzed within the context of resource discovery. This model, based on a tree topology, relies on informati...
详细信息
ISBN:
(纸本)9728865465
A proactive model for gathering resource attribute values in large scale distributed systems is proposed and analyzed within the context of resource discovery. This model, based on a tree topology, relies on information reduction to limit the amount of information collected at each node of the tree structure and to minimize information update and query cost. A Markov chain is used to model resource attribute value changes. This model is solved using dynamic programming to determine the optimal reduction scheme that minimizes the overall cost of updating and querying resource attributes.
暂无评论