Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. this issue has received little attention since the emergence of distributed protocols like Bitcoin ...
详细信息
ISBN:
(纸本)9783319596655;9783319596648
Most online lotteries today fail to ensure the verifiability of the random process and rely on a trusted third party. this issue has received little attention since the emergence of distributed protocols like Bitcoin that demonstrated the potential of protocols with no trusted third party. We argue that the security requirements of online lotteries are similar to those of online voting, and propose a novel distributed online lottery protocol that applies techniques developed for voting applications to an existing lottery protocol. As a result, the protocol is scalable, provides efficient verification of the random process and does not rely on a trusted third party nor on assumptions of bounded computational resources. An early prototype confirms the feasibility of our approach.
Failure detectors are basic building blocks from which fault tolerance for distributedsystems is constructed. the Quality of Service (QoS) of failure detectors refers to the speed and accuracy of detections and is de...
详细信息
ISBN:
(纸本)9783642136443
Failure detectors are basic building blocks from which fault tolerance for distributedsystems is constructed. the Quality of Service (QoS) of failure detectors refers to the speed and accuracy of detections and is defined from the applications and computing environment under consideration. Existing failure detection approaches for distributedsystems do not support the automatic (re)configuration of failure detectors from QoS requirements. However, when the behavior of the computing environment is unknown and changes over time, or when the application itself changes, self-configuration is a basic issue that must be addressed - particularly for those applications requiring response time and high availability requirements. In this paper we present the design and implementation of a novel autonomic failure detector based on feedback control theory, which is capable of self-configuring its QoS parameters at runtime from previously specified QoS requirements.
distributed multimedia applications are very sensitive to resource variations. An attractive way for dealing with dynamic resource variations consists in making applications adaptive, and even self-adaptive. the objec...
详细信息
ISBN:
(纸本)3540262628
distributed multimedia applications are very sensitive to resource variations. An attractive way for dealing with dynamic resource variations consists in making applications adaptive, and even self-adaptive. the objective is to grant applicationsthe ability to observe themselves and their environment, to detect significant changes and to adjust their behavior accordingly. this issue has been the subject of several works;however the proposed solutions lack flexibility and a high-level support that eases the development of adaptive applications. this paper presents PLASMA, a component-based framework for building multimedia applications. PLASMA relies on a hierarchical composition and reconfiguration model which provides the expected support. the experimental evaluation shows that adaptation can be achieved with a very low overhead, while significantly improving QoS of multimedia applications as well as resource usage on mobile equipments..
distributed highly-available key-value stores have emerged as important building blocks for applications handling large amounts of data. the Apache Cassandra system is one such popular store combining a key distributi...
详细信息
Byzantine fault tolerant (BFT) applications are usually implemented with dedicated clients that interact with a set of replicas with some BFT protocol. In this paper, we explore the possibility of using web-based clie...
详细信息
ISBN:
(数字)9783319937670
ISBN:
(纸本)9783319937670;9783319937663
Byzantine fault tolerant (BFT) applications are usually implemented with dedicated clients that interact with a set of replicas with some BFT protocol. In this paper, we explore the possibility of using web-based clients for interaction with a BFT service. Our contributions address the trustworthy deployment of client code and configuration in a browser-based execution environment (client bootstrapping), the design and implementation of a BFT client within the constraints of a browser-based JavaScript execution environment, and publish-subscribe extensions to the standard request/reply interaction model of BFT state machine model to simplify the implementation of efficient interactive web applications.
this book constitutes the refereed proceedings of the 8thifip WG 12.5 internationalconference on Artificial Intelligence applications and Innovations, AIAI 2012, held in Halkidiki, Greece, in September 2012. the 44 ...
ISBN:
(数字)9783642334092
ISBN:
(纸本)9783642334085
this book constitutes the refereed proceedings of the 8thifip WG 12.5 internationalconference on Artificial Intelligence applications and Innovations, AIAI 2012, held in Halkidiki, Greece, in September 2012. the 44 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 98 submissions. the papers are organized in topical sections on ANN-classification and pattern recognition, optimization - genetic algorithms, artificial neural networks, learning and mining, fuzzy logic, classification - pattern recognition, multi-agent systems, multi-attribute DSS, clustering, image-video classification and processing, and engineering applications of AI and artificial neural networks.
Especially for the creation of Service-Oriented Architectures (SOA), Web service technologies are often the technology of choice. In this context, solutions for the management of Web services are becoming more and mor...
详细信息
ISBN:
(纸本)3540351264
Especially for the creation of Service-Oriented Architectures (SOA), Web service technologies are often the technology of choice. In this context, solutions for the management of Web services are becoming more and more important. this paper describes an approach to performance monitoring of Web services, which is based on the Application Response Measurement (ARM) standard. this approach enables generic (application source code-independent) and customizable instrumentation of synchronous, asynchronous and one-way Web service messages by attaching meta-data to messages.
Context management in pervasive computing environments must reflect the specific characteristics of these environments, e.g. distribution, mobility, resource-constrained devices, or heterogeneity of context sources. A...
详细信息
ISBN:
(数字)9783540686422
ISBN:
(纸本)9783540686392
Context management in pervasive computing environments must reflect the specific characteristics of these environments, e.g. distribution, mobility, resource-constrained devices, or heterogeneity of context sources. Although a number of context models have been presented in the literature, none of them supports all of these requirements to a sufficient extent at the same time. In this paper, we present a comprehensive and integrated approach for context modeling in pervasive computing environments. It combines the advantages of existing approaches and addresses the need for supporting effective software development. the proposed context model follows an ontology-based approach and has three layers of abstraction, i.e. conceptual layer, exchange layer, and functional layer. this layered approach facilitates a model-driven development of context-aware applications. throughout the paper we compare our solution withthe related work in order to clearly demonstrate why we needed to develop a new context management framework and where we have adopted existing ideas.
Middleware enables developers to build more complex applications by shielding them from the complexity of the underlying platform and environment. However, when inspecting software at run-time, the abstractions offere...
详细信息
暂无评论