Derivative computation using Automatic Differentiation (AD) is often considered to operate purely serial. Performing the differentiation task in parallel may require the applied AD-tool to extract parallelization info...
High performance SIMD text processing using the method of parallel bit streams is introduced with a case study of UTF-8 to UTF-16 transcoding. A forward transform converts byte-oriented character stream data into eigh...
详细信息
This paper deals with the problem of protect the confidentiality of data manipulated by sequential programs. In this context, secure information flow refers to the guarantee that program executions are free of non aut...
详细信息
ISBN:
(纸本)9781595939791
This paper deals with the problem of protect the confidentiality of data manipulated by sequential programs. In this context, secure information flow refers to the guarantee that program executions are free of non authorized flows of secret information into public channels. There are two established means to enforce information flow policies: static analyses, that are performed at compile time and guarantee that all program executions are free of unauthorized flows;and runtime monitoring, that dynamically detects and neutralizes invalid flows for the current run. Both approaches have their advantages and disadvantages. The main disadvantages of static information flow control (IFC) is, that it does not differentiate between secure and insecure executions of the same program, therefore whole programs are rejected in presence of possible invalid flows. On the contrary, dynamic IFC rejects insecure executions only. This analysis precision comes at the price of the execution overload that imposes the dynamic tracking of information flow. This work presents secure slicing, a technique that statically transforms probably insecure (interfering) programs into secure (non-interfering) ones. Our approach combines static analysis of information flow and program transformation: if invalid flows are detected, instead of rejecting the whole program, we transform it to eliminate the invalid flows. This way, we alleviate drawbacks of static and dynamic approaches: neither we reject full programs nor we impose run-time overhead. The resulting program can be seen as a secure slice of the source program that can be executed without risk of information leaks. In this work we also show that secure slices can be computed for programs that intentionally release secret information, and that the technique can be applied to real programming languages such as Java. Copyright 2008 acm.
Ubiquitous computing has emerged as one of the principal information and communication technologies that could lead to the achievement of the Ambient Intelligence (AmI) vision. Ambient Intelligence places human beings...
ISBN:
(纸本)9781595937537
Ubiquitous computing has emerged as one of the principal information and communication technologies that could lead to the achievement of the Ambient Intelligence (AmI) vision. Ambient Intelligence places human beings at the centre of the future knowledge-based society and implies a seamless environment of computing, advanced networking technology and unobtrusive interfaces: interaction should be relaxing and enjoyable for people. In an AmI environment, humans will be surrounded by intelligent interfaces supported by computing and networking technology that is embedded in everyday objects such as furniture, clothes, vehicles, roads and smart materials - even particles of decorative substances like paint. The AmI world then, is a world largely defined by ubiquitous computing applications, which are designed and developed to operate at the background, to disappear in the different layers of the physical world, in order to serve the needs of people unobtrusively.
The proceedings contain 317 papers. The topics discussed include: reporting leadership patterns among trajectories;distortion-constrained compression of vector maps;an OLAP system for network-constrained moving object...
详细信息
ISBN:
(纸本)1595934804
The proceedings contain 317 papers. The topics discussed include: reporting leadership patterns among trajectories;distortion-constrained compression of vector maps;an OLAP system for network-constrained moving objects;structural similarity in geographical queries to improve query answering;HIS-KCWater: Context-aware geospatial data and service integration;a flexible representation of controllers for physically-based animation of virtual humans;applying a component-based framework to develop multi-agent environments: case study;a customizable multi-agent system for distributed data mining;guarding security sensitive content using confined mobile agents;and a crime simulation model based on social networks and swarm intelligence.
Riding on the success of the previous Mobile computing and Applications Track in 2003 to 2007, we are delighted to present the 2008 Mobile computing and Applications Track that features research papers drawn from a hi...
ISBN:
(纸本)9781595937537
Riding on the success of the previous Mobile computing and Applications Track in 2003 to 2007, we are delighted to present the 2008 Mobile computing and Applications Track that features research papers drawn from a highly diversified spectrum of mobile computing. We have been receiving an increasing number of submissions, hitting again a record high. The papers collected in this track cover three different and yet complementary areas: mobile applications that are supported by virtue of appropriate architectures and protocols, operating under specific mobile networks and devices. In particular, special attention was dedicated to draw upon research efforts and expertise from different areas of research, so as to promote better synergy and to bring forth not only core mobile communications and networking protocols for application development, but also important research applications to realize the benefits of anywhere, any place and anytime pervasive and ubiquitous computing.
With the widespread use of distributed computing in the enterprise, there have been significant advances in development paradigms for distributed computing applications. Server side component models have considerably ...
ISBN:
(纸本)9781595937537
With the widespread use of distributed computing in the enterprise, there have been significant advances in development paradigms for distributed computing applications. Server side component models have considerably simplified development and the complexity has instead shifted to the operational side of these applications. The increase in operational complexity has reached a point where it is no longer feasible for humans to manage the applications required to run an enterprise. This coupled with the lack of skills and skyrocketing costs associated with application management make it imperative to develop techniques to allow applications to manage themselves. The initial steps to provide self-managing applications are now being taken a paradigm known as "autonomic computing" is in its infancy of evolution. It has also been identified as one of the "grand challenges" of computer applications for the next decade. In addition, the exponential growth of handheld devices (e.g. PDAs, laptops, smart phones etc.) pose additional challenges since these devices themselves suffer from a number of limitations such as inadequate processing capability, restricted battery life, limited memory space, frequent line disconnection, and confined host bandwidth. Lack of fixed infrastructure support and the aforementioned limitations augment the complexity of the problems in autonomic computing.
暂无评论