Trusted chain technology provides a good opportunity to guarantee software and data integrities on cloud computing platforms. However, trusted chain on current virtualization computing platforms expose some problems, ...
详细信息
ISBN:
(纸本)9780769548968;9781467347259
Trusted chain technology provides a good opportunity to guarantee software and data integrities on cloud computing platforms. However, trusted chain on current virtualization computing platforms expose some problems, such as non-continuous, difficult to evolve or customize, insecure to transmit for remote attestation. To address these issues, this paper proposes a new approach to construct, protect and update the trusted chain on virtualization computing platform. this approach constructs a complete trusted chain based on full-virtualization technology, ensures the security of the chain by using the seal and unseals features of Trusted Platform Module (TPM), and proposes an algorithm called TPRTM to update the chain. We also describe architecture and a prototype system implementation that can solve the problems mentioned above on current platform. Experimental results show that our method can guarantee the integrities of all customizable programs on the trusted chain while incurring only 2.23% performance degradation. Furthermore, the system has been deployed in a large-scale communication enterprise and the results reveal that our system is safe, stable, and easy to use.
Wireless Sensor Networks (WSN) perform collaborative distributed sensing of a moving object in an environment for the purpose of classification. this requires collecting measurements from as many sensors as possible t...
详细信息
Wireless Sensor Networks (WSN) perform collaborative distributed sensing of a moving object in an environment for the purpose of classification. this requires collecting measurements from as many sensors as possible to classify the object. However, there is a tradeoff between the value of information contained in a distributed set of measurements and the energy cost of acquiring these measurements, fusing them into a belief and transmitting the updated belief. To manage this tradeoff, sensor selection schemes are used. In this paper, the sensor selection scheme proceeds as a sequence of rounds as follows. the network chooses an active set of sensors at each round based on physical proximity to the object. From this set, one sensor is selected by bidding to take a measurement. this measurement is transmitted to the sensor selected at the next round. the main contribution is to dynamically optimize the classification performance for a given cost of sensing, communication and computation. the method is illustrated by an example.
We solve the problem of localizing and tracking household objects using a depth-camera sensor network. We design and implement Kin sight that tracks household objects indirectly -- by tracking human figures, and detec...
详细信息
We solve the problem of localizing and tracking household objects using a depth-camera sensor network. We design and implement Kin sight that tracks household objects indirectly -- by tracking human figures, and detecting and recognizing objects from human-object interactions. We devise two novel algorithms: (1) Depth Sweep -- that uses depth information to efficiently extract objects from an image, and (2) Context Oriented object Recognition -- that uses location history and activity context along with an RGB image to recognize object sat home. We thoroughly evaluate Kinsight's performance with a rich set of controlled experiments. We also deploy Kinsightin real-world scenarios and show that it achieves an average localization error of about 13 cm.
One of the difficult challenges in inter-enterprisecomputing is aligning business transactions and technical management of distributed transactions, especially in breach situations. We propose and analyse a two-level...
详细信息
One of the difficult challenges in inter-enterprisecomputing is aligning business transactions and technical management of distributed transactions, especially in breach situations. We propose and analyse a two-level business transaction management framework that allows injection of business level concerns to the control processes of inter-enterprise transactions. the two levels are associated with a) the metamodel of the collaboration, captured in eContract governing the collaboration, and b) the transactional interactions between collaboration member services. the two levels are bound together to form a reflective model, while business level breaches to the eContract can disturb the normal interactions, the metalevel possesses processes for managing (rolling back, compensating, ignoring, triggering ecosystem-level consequences) the failure in manners that align withthe business incentives. this framework enables correctness, coherence and efficiency of processing in open inter-enterprise environments, i.e., service ecosystems.
An image automatic annotation algorithm based on relevance feedback is proposed. Firstly, images are segmented into regions, and then the regions can generate blobs according to image features using clustering. Given ...
详细信息
ISBN:
(纸本)9783642315756;9783642315763
An image automatic annotation algorithm based on relevance feedback is proposed. Firstly, images are segmented into regions, and then the regions can generate blobs according to image features using clustering. Given a training set of images with annotations, we can compute the probability of a word given the image regions so as to automatically generate keywords for un-annotated image. Considering correlations among different semantics concepts, we employ condition probability to present two types of connections among different semantics concepts, and use the user's feedback information to adjust the probabilities of the keywords in annotation. the test results with Ground Truth Database illustrate the effect and efficiency of this algorithm.
the subsurface geological structures are considerably complicated, which often appear in the form of normal fault, reverse fault, fold, pinchout and irregular body etc. In order to model geometrically the face structu...
详细信息
the Internet of things (IoT) integrates wireless sensors to provide online and real-time access to the state of things and places. However, many interesting real-world states are difficult to detect with traditional s...
详细信息
the Internet of things (IoT) integrates wireless sensors to provide online and real-time access to the state of things and places. However, many interesting real-world states are difficult to detect with traditional scalar sensors. Tiny wireless camera sensor nodes are an interesting alternative as a single camera can observe a large area in great detail. However, low image resolution, poor image quality, and low frame rates as well as varying lighting conditions in outdoor scenarios make the detection of real-world states using these lousy cameras a challenging problem. In this paper we introduce a framework that addresses this problem by providing an end-to-end solution that includes energy-efficient image capture, image enhancement to mitigate low picture quality, object detection with low frame rates, inference of high-level states, and publishing of these states on the IoT. the framework can be flexibly configured by end-users without programming skills and supports a variety of different applications.
Withthe increasing complexity and scale of business processes, and the underlying information systems, there is a demand for monitoring the complicated business processes spanning multiple enterprise information syst...
详细信息
Withthe increasing complexity and scale of business processes, and the underlying information systems, there is a demand for monitoring the complicated business processes spanning multiple enterprise information systems distributed in a heterogeneous IT environment. this paper presents a unified monitoring framework for such distributed information system management. this framework utilizes Web service and messaging queue technologies to collect log data for business process visualization and monitoring and decouples the tight links between the monitoring tool and the components to be monitored. XML is used to define a universal data format for different types of information to be monitored. A prototype tool is implemented and presented to demonstrate the feasibility and usability of the proposed framework, and experiments are conducted to evaluate the performance overhead introduced by the monitoring.
暂无评论