this book constitutes the thoroughly refereed post-conference proceedings of the 9thinternational ICST conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. the 2...
ISBN:
(纸本)9783319042824
this book constitutes the thoroughly refereed post-conference proceedings of the 9thinternational ICST conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. the 26 revised full papers presented were carefully reviewed and selected from 70 submissions. the papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.
the proliferation of data acquisition devices like 3D laser scanners had led to the burst of large-scale spatial terrain data which imposes many challenges to spatial data analysis and computation. Withthe advent of ...
详细信息
ISBN:
(纸本)9781631900433
the proliferation of data acquisition devices like 3D laser scanners had led to the burst of large-scale spatial terrain data which imposes many challenges to spatial data analysis and computation. Withthe advent of several emerging collaborative cloud technologies, a natural and cost-effective approach to managing such large-scale data is to store and share such datasets in a publicly hosted cloud service and process the data within the cloud itself using modern distributedcomputing paradigms such as MapReduce. For several key spatial data analysis and computation problems, polygon retrieval is a fundamental operation which is often computed under real-time constraints. However, existing sequential algorithms fail to meet this demand effectively given that terrain data in recent years have witnessed an unprecedented growth in both volume and rate. In this work, we develop a MapReduce-based parallel polygon retrieval algorithm which aims at minimizing the 10 and CPU loads of the map and reduce tasks during spatial data processing. the results of the preliminary experiments on a Hadoop cluster demonstrate that the proposed techniques are scalable and lead to more than 35% reduction in execution time of the polygon retrieval operation over existing distributed algorithms.
this paper introduces a novel Medium Access Control (MAC) scheme for ad hoc Wireless Sensor Networks. It is based upon the emergent properties of complex systems, exploiting the concept of swarm intelligence. the bene...
详细信息
ISBN:
(纸本)9781479986613
this paper introduces a novel Medium Access Control (MAC) scheme for ad hoc Wireless Sensor Networks. It is based upon the emergent properties of complex systems, exploiting the concept of swarm intelligence. the benefits brought about by this approach are node simplicity and improved network scalability given very low implementation overheads. through the co-operative operation of nodes, a network can exhibit emergent self-initialisation and organisation and is adaptive to environmental and structural changes. the protocol was developed using social concepts drawn from the field of particle swarm optimisation, alongside negative feedback concepts from control system engineering. It offers comparable or better performance (in throughput and delay) with lower complexity and less overheads for larger scale networks when compared to the widely used and simple but still very effective IEEE 802.11 CSMA/CA standard.
Epidemic data replication protocols are an interesting approach to address the scalability limitations of classic distributed databases. However, devising a system layout that takes full advantage of epidemic replicat...
详细信息
ISBN:
(纸本)9789897580369
Epidemic data replication protocols are an interesting approach to address the scalability limitations of classic distributed databases. However, devising a system layout that takes full advantage of epidemic replication is a challenging task due to the high number of associated configuration parameters (e.g., replication layers, number of replicas per layer, etc.). the purpose of this paper is to present a Java-based simulation tool that simulates the execution of epidemic data replication protocols on user-defined configurations under different workloads. Conducted experiments show that by using the proposed approach (1) the internal dynamics of epidemic data replication protocols under a specific scenario are better understood, (2) the distributed database system design process is considerably speeded up, and (3) different system configurations can be rapidly prototyped.
Paraphrases extracted from parallel corpora by the pivot method (Bannard and Callison-Burch, 2005) constitute a valuable resource for multilingual NLP applications. In this study, we analyse the semantics of unigram p...
详细信息
ISBN:
(纸本)9782951740884
Paraphrases extracted from parallel corpora by the pivot method (Bannard and Callison-Burch, 2005) constitute a valuable resource for multilingual NLP applications. In this study, we analyse the semantics of unigram pivot paraphrases and use a graph-based sense induction approach to unveil hidden sense distinctions in the paraphrase sets. the comparison of the acquired senses to gold data from the Lexical Substitution shared task (McCarthy and Navigli, 2007) demonstrates that sense distinctions exist in the paraphrase sets and highlights the need for a disambiguation step in applications using this resource.
Low-temperature plasma(LTP) treatment was applied to stimulate the seed of alfalfa(Medicago sativa L.) for better germination rates and vigor withthe use of an inert gas, namely neon, at various discharge power level...
详细信息
ISBN:
(纸本)9783319483535
Low-temperature plasma(LTP) treatment was applied to stimulate the seed of alfalfa(Medicago sativa L.) for better germination rates and vigor withthe use of an inert gas, namely neon, at various discharge power levelsthe seed passed through a neon-plasma glowing zone between two horizontally parallel electrode plates within the glow discharge chamber of a seed processing machine with an internal 2*8 mm atmospheric pressurethe seed were treated for 20 sthe LTP-treated seeds were germinated at 20 o C in a germination chamber, and seedling emergence was evaluated at 24-h intervals for up to 10 daysLTP stimulation signi ficantly increased the germination rate and vigor versus an untreated sampleAmong ten discharge power levels, the 20 W treatment had the most signi ficant effect on the rate and vigorthe use of 20 W treatment increased the germination rate and vigor by 11 % and 22 %,respectively, relative to the controlLTP treated seeds that were stored for20 days also had higher germination vigor than those stored for 4 daysthese results suggest that the use of the LTP technique with a seed processing machine is effective and practical for the purpose of stimulating crop seeds for improved germination.
In order to reduce the time to market and improve the qualities during the service construction activities, we provide the designers with integrated tools that help them to construct services. they are able to evaluat...
详细信息
ISBN:
(纸本)9789897580369
In order to reduce the time to market and improve the qualities during the service construction activities, we provide the designers with integrated tools that help them to construct services. they are able to evaluate their designs earlier according to functional, performance non-functional, and QoS requirements. the contribution of this paper is concerned with representing the different viewpoints of a design model in the simulation scenario through code generation. the main benefits of our approach based on separation of concerns are to better manage the complexity of the design and to improve the fine-tuning level of simulation scenarios. We illustrate our approach with a video conference service relying on the IP Multimedia Subsystem platform.
the paper presents an optimality condition for a distributed optimal control problem arising in economics, where the (one-dimensional) spatial domain can be influenced by the control. the result enables analytical and...
详细信息
ISBN:
(纸本)9783662438800;9783662438794
the paper presents an optimality condition for a distributed optimal control problem arising in economics, where the (one-dimensional) spatial domain can be influenced by the control. the result enables analytical and numerical investigation of a class of endogenous growth models with investment-dependent technological frontier and heterogeneous capital stock.
It is well known that word aligned parallel corpora are valuable linguistic resources. Since many factors affect automatic alignment quality, manual post-editing may be required in some applications. While there are s...
详细信息
ISBN:
(纸本)9782951740884
It is well known that word aligned parallel corpora are valuable linguistic resources. Since many factors affect automatic alignment quality, manual post-editing may be required in some applications. While there are several state-of-the-art word-aligners, such as GIZA++ and Berkeley, there is no simple visual tool that would enable correcting and editing aligned corpora of different formats. We have developed SWIFT Aligner, a free, portable software that allows for visual representation and editing of aligned corpora from several most commonly used formats: TALP, GIZA, and NAACL. In addition, our tool has incorporated part-of-speech and syntactic dependency transfer from an annotated source language into an unannotated target language, by means of word-alignment.
In event-driven sensor networks, when a critical event occurs, sensors should transmit messages back to base station in a secure and reliable manner. We choose Elliptic Curve Cryptography to secure the network since i...
详细信息
ISBN:
(纸本)9783642452482;9783642452499
In event-driven sensor networks, when a critical event occurs, sensors should transmit messages back to base station in a secure and reliable manner. We choose Elliptic Curve Cryptography to secure the network since it offers faster computation and good security with shorter keys. In order to minimize the running time, we propose to split and distribute the computation of scalar multiplications by involving neighboring nodes in this operation. In order to improve the reliability, we have also proposed a fault tolerance mechanism. It uses half of the available cluster members as backup nodes which take over the work of faulty nodes in case of system failure. parallelcomputing does consume more resources, but the results of simulation show that the computation can be significantly accelerated. this method is designed specially for applications where running time is the most important factor.
暂无评论