As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key manageme...
详细信息
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism is applied here not only to provide end-to-end authenticity and confidentiality, but also to save network bandwidth and computational power of wireless nodes.
Since cross traffic in inner city intersections is potentially dangerous, its early detection is desirable. In this paper an image-based driver-assistant system is presented. The investigation of optical flow, compute...
详细信息
Since cross traffic in inner city intersections is potentially dangerous, its early detection is desirable. In this paper an image-based driver-assistant system is presented. The investigation of optical flow, computed from an image sequence, recorded by a single pan-tilt camera, is used as basis to this system. Its goal is to direct the driver's attention to moving objects in inner city intersections.
In recent years,the volume of datasets in modern large-scale scientific researches,information services and digital media applications is growing explosively,and the research about data grid technology becomes the new...
详细信息
In recent years,the volume of datasets in modern large-scale scientific researches,information services and digital media applications is growing explosively,and the research about data grid technology becomes the new hotspot in the computer science all over the *** 1990 some great progresses,about the basic theoretical research and test-bed environment construction, have been made allover the *** now researches on the Grid computing and web-based simulation and computing technologies have been made and have already made a rapid progress. With the development of these technologies,the Java platform has been expanded rapidly and used *** the Java technology and platform have applied widely in grid computing and services,distributed computing,Web services and Web-based simulation and computing,etc.
Natural distributed systems are adaptive, scalable and fault-tolerant. Emergence science describes how higher-level self-regulatory behaviour arises in natural systems from many participants following simple rule-sets...
详细信息
Natural distributed systems are adaptive, scalable and fault-tolerant. Emergence science describes how higher-level self-regulatory behaviour arises in natural systems from many participants following simple rule-sets. Emergence advocates simple communication models, autonomy and independence, enhancing robustness and self-stabilization. High-quality distributed applications such as autonomic systems must satisfy the appropriate nonfunctional requirements which include scalability, efficiency, robustness, low-latency and stability. However the traditional design of distributed applications, especially in terms of the communication strategies employed, can introduce compromises between these characteristics. This paper discusses ways in which emergence science can be applied to distributed computing, avoiding some of the compromises associated with traditionally-designed applications. To demonstrate the effectiveness of this paradigm, an emergent election algorithm is described and its performance evaluated. The design incorporates nondeterministic behaviour. The resulting algorithm has very low communication complexity, and is simultaneously very stable, scalable and robust.
This paper gives a brief overview of version 2.0 of PRISM, a tool for the automatic formal verification of probabilistic systems, and some of the case studies to which it has already been applied.
This paper gives a brief overview of version 2.0 of PRISM, a tool for the automatic formal verification of probabilistic systems, and some of the case studies to which it has already been applied.
In this paper we present method for finding similarities in a pair of three-dimensional objects. The method involves obtaining boundary cubes approximations to the two objects, see (Maple and Donafee, 2002). The bound...
详细信息
In this paper we present method for finding similarities in a pair of three-dimensional objects. The method involves obtaining boundary cubes approximations to the two objects, see (Maple and Donafee, 2002). The boundary cubes algorithm is a modification to the well-known marching cubes algorithm of Lorensen and Cline (1987). Having obtained the approximations we can apply exact and inexact graph-matching algorithms to quantify the similarity between two objects. This paper considers methods for exact and inexact graph matching and provides novel and efficient algorithms for graph matching applied to boundary cubes representations.
Advances in wireless solutions and portable devices are enabling new challenging service scenarios where mobile users are willing to access ubiquitous and continuous services. This calls for novel middleware capable o...
详细信息
Advances in wireless solutions and portable devices are enabling new challenging service scenarios where mobile users are willing to access ubiquitous and continuous services. This calls for novel middleware capable of tailoring service contents to client characteristics and of following client movements at provision time. The paper proposes MUM, a dynamic and flexible middleware to support continuous services to mobile users in ubiquitous scenarios. MUM performs service configuration by dynamically distributing middleware components to intermediate nodes along the client-server path and provides service session continuity by automatically migrating the session state in response to user movements during service provisioning. MUM exploits mobile agents to move both middleware components and session state, where and when needed, while it allows service developers to continue using the traditional client/server model for MUM-based application components. In addition, The work presents the implementation of a Video-on-Demand service on top of MUM, with the goal of verifying the feasibility of our approach when applied to the challenging multimedia application area. First experimental results show that, notwithstanding the application-level approach, the MUM configuration/session migration times are compatible even with the strict requirements imposed by multimedia distribution over the best-effort Internet.
As a result of widespread of peer-to-peer (P2P) file sharing applications, it is a serious problem that inter-domain traffic between Internet service provider (ISP) networks increases. We present a novel inter-domain ...
详细信息
As a result of widespread of peer-to-peer (P2P) file sharing applications, it is a serious problem that inter-domain traffic between Internet service provider (ISP) networks increases. We present a novel inter-domain traffic flow model focusing on the presence of a passive peer, and proposes a new P2P traffic control method based on the model. This method uses a filter considering P2P flow characteristics and can be applied to the P2P networks whose protocol is closed. We also evaluate both validity and effectiveness of our proposals by performing more than 20 days experiments using real P2P network environment. The results prove that our model is reasonable enough and the proposed method is promising for decreasing inter-domain P2P traffic.
In a previous paper some metrics were proposed to compute gradient from color images by exploiting the intuitive notion of dissimilarity among colors. The weighted gradient, one of the six methods introduced, provided...
详细信息
In a previous paper some metrics were proposed to compute gradient from color images by exploiting the intuitive notion of dissimilarity among colors. The weighted gradient, one of the six methods introduced, provided the best segmentation results (following a subjective visual criterion) when applied in conjunction with the watershed from markers technique. Despite the excellent results achieved by the linear combination of the gradients from each band of the original image under the HSI color space model, the weighted gradient lacked a systematic method to give weights to each gradient. The goal of this work is to propose such a systematic method, by computing the similarity between the image to compute the gradient and an "ideal image", whose histogram has a uniform distribution. Some segmentation experiments were done and the automatic weighted gradient provides results as good as the manual one.
Automatic semantic summarisation of human activity and detection of unusual inactivity are useful goals for a vision system operating in a supportive home environment. Learned models of spatial context are used in con...
详细信息
Automatic semantic summarisation of human activity and detection of unusual inactivity are useful goals for a vision system operating in a supportive home environment. Learned models of spatial context are used in conjunction with a tracker to achieve these goals. The tracker uses a coarse ellipse model and a particle filter to cope with cluttered scenes with multiple sources of illumination. Summarisation in terms of semantic regions is demonstrated using acted scenes through automatic recovery of the instructions given to the actor. The use of 'unusual inactivity' detection as a cue for fall detection is also demonstrated.
暂无评论