For solving large instances of the Travelling Salesman Problem (TSP), the use of a candidate set (or candidate list) is essential to limit the search space and reduce the overall execution time when using heuristic se...
详细信息
the Future Internet will be populated by not just data and devices, but also services. Approaches in Service-Oriented architectures are allowing new ways for users and developers to manage, control and benefit from th...
详细信息
ISBN:
(纸本)9781479934881
the Future Internet will be populated by not just data and devices, but also services. Approaches in Service-Oriented architectures are allowing new ways for users and developers to manage, control and benefit from the services that are being made available. However, this also introduces new threats for service ecosystems and with wider deployment comes a greater need to identify and tackle threats before they become attacks. In this paper we introduce a new threat Monitoring approach based on filtering and pattern-detection of a variety of event types. the approach enables threat monitoring across multiple composite services with a capability to integrate dynamic changes from various subsystems and offers high flexibility through the use of CEP (Complex Event processing). Appropriate events are identified in the context of Service-Oriented architectures and the threat Monitoring Module described and implemented as part of the Aniketos platform. this module is able to pull threat descriptions from a repository and apply appropriate detection techniques at run-time in order to identify potential problems. the approach is novel in both its flexibility and applicability. threats can be chosen by service developers from a community-managed repository and the process extends to boththe identification and prediction of threats. the solution is evaluated through a future telecommunication services case study.
Geoinformation technologies require fast processing of high and quickly increasing volumes of all types of spatial data. parallel computational approach and distributed systems represent technologies which are able to...
详细信息
the numerical solution of a computationally intensive model becomes more complex in terms of execution time required by a single processor. To speedup the computation, a suitable parallel computing architecture is req...
详细信息
the proceedings contain 51 papers. the topics discussed include: McDisc: a reliable neighbor discovery protocol in low duty cycle and multi-channel wireless networks;e-HiLow: extended hierarchical routing protocol in ...
ISBN:
(纸本)9780769550343
the proceedings contain 51 papers. the topics discussed include: McDisc: a reliable neighbor discovery protocol in low duty cycle and multi-channel wireless networks;e-HiLow: extended hierarchical routing protocol in 6LoWPAN wireless sensor network;a HW/SW co-design of execution migration for shared-ISA heterogeneous chip multiprocessors;spontaneous reload cache: mimicking a larger cache with minimal hardware requirement;improve effective capacity and lifetime of solid state drives;a new metadata update method for fast recovery of SSD cache;a mechanism of maintaining the survivability of streaming media service in overlay networks;a specific scheme for rate-controlled smooth scheduling based on timeslot-iteration;MCD: overcoming the data download bottleneck in data centers;PEAM: predictive energy-aware management for storage systems;and DynaM: dynamic multiresolution data representation for large-scale scientific analysis.
this paper introduces a low complexity frame-based object detection algorithm for H.264/AVC video streams. the method solely parses and evaluates H.264/AVC macroblock types extracted from the video stream, which requi...
详细信息
ISBN:
(纸本)9789898565471
this paper introduces a low complexity frame-based object detection algorithm for H.264/AVC video streams. the method solely parses and evaluates H.264/AVC macroblock types extracted from the video stream, which requires only partial decoding. Different macroblock types indicate different properties of the video content. this fact is used to segment a scene in fore- and background or, more precisely, to detect moving objects within the scene. the main advantage of this algorithm is that it is most suitable for massively parallelprocessing, because it is very fast and combinable with several other pre- and post-processingalgorithms, without decreasing their performance. the actual algorithm is able to process about 3600 frames per second of video streams in CIF resolution, measured on an Intel® Core™ i5-2520M CPU @ 2.5 GHz with 4 GB RAM.
With a suitable method to rank the user influence in micro-blogging service, we could get influential individuals to make information reach large populations. Here a novel parallel social influence model is proposed t...
详细信息
the programming model of parallel tasks is a suitable programming abstraction for parallel applications running on heterogeneous clusters, which are clusters composed of multiple subclusters. In this model, an applica...
详细信息
the information revolution has radically changed the way we make decisions and has expanded into mobile devices capable of informing choices at the point at which they are made. However, it is arguable whether the exp...
详细信息
ISBN:
(纸本)9780769550947
the information revolution has radically changed the way we make decisions and has expanded into mobile devices capable of informing choices at the point at which they are made. However, it is arguable whether the explosion of available information helps or hinders decision making, including in important domains such as healthcare and sustainability. Improving on that is the domain of choice architecture, intended to provide decision-knowledge through understanding choice-implications and so guiding actions in effective and ethical directions (i.e. 'nudging'). Social media has largely evolved as the significant means of choice architecture, but the question remains as to whether decisions based on it are truly effective and ethical, or attracted toward social norms that reinforce poor judgment. this paper explores those issues, including how technologies can be shaped to improve decision-making, and how academic models can be used to nudge toward improved norms.
this paper introduces a heuristic-based scheduler to optimise the throughput and latency of stream programs with dynamic network structure. the novelty is the utilisation of positive and negative demands of the stream...
详细信息
暂无评论