The proceedings contain 11 papers. The topics discussed include: support for multi-level security policies in DRM architectures;a collaborative approach to autonomic security protocols;a qualitative framework for Shan...
详细信息
The proceedings contain 11 papers. The topics discussed include: support for multi-level security policies in DRM architectures;a collaborative approach to autonomic security protocols;a qualitative framework for Shannon information theories;the user non-acceptance paradigm: INFOSEC's dirty little secret;towards agile security assurance;information exposure control through data manipulation for ubiquitous computing;property based attestation for computing platforms: caring about properties, not mechanisms;symmetric behavior-based trust: a new paradigm for Internet computing;the role of suspicion in model-based intrusion detection;Omnivore: risk management through bidirectional transparency;and profiling the defenders.
This paper describes a new method for computing the normal form of a polynomial modulo a zero-dimensional ideal I. We give a detailed description of the algorithm, a proof of its correctness, and finally experimentati...
详细信息
ISBN:
(纸本)1595930957
This paper describes a new method for computing the normal form of a polynomial modulo a zero-dimensional ideal I. We give a detailed description of the algorithm, a proof of its correctness, and finally experimentations on classical benchmark polynomial systems. The method that we propose can be thought as an extension of both the Gröbner basis method and the Macaulay construction. We have weaken the monomial ordering requirement for Gröbner bases computations, which allows us to construct new type of representations for the quotient algebra. This approach yields more freedom in the linear algebra steps involved, which allows us to take into account numerical criteria while performing the symbolic steps. This is a new feature for a symbolic algorithm, which has a huge impact on the practical efficiency. Copyright 2005 acm.
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort is the Trusted computing Group (TCG) ...
详细信息
The Earth ionosphere variations are considered after tsunami associated with the long-period Rayleigh waves occurred December 26, 2004 in Indonesia (Ms = 9.0). In this paper we focus on the relative variations in iono...
详细信息
ISBN:
(纸本)0780394313
The Earth ionosphere variations are considered after tsunami associated with the long-period Rayleigh waves occurred December 26, 2004 in Indonesia (Ms = 9.0). In this paper we focus on the relative variations in ionospheric parameters (Total Electron Content (TEC) and scintillation parameter, S4) with respect to a quiet period. Differential ionospheric parameters was made by computing the percent change of seismic-time parameter relative to ionospheric parameters computed for quiet conditions.
A common approach to visualise multidimensional data sets is to map every data dimension to a separate visual feature. It is generally assumed that such visual features can be judged independently from each other. How...
详细信息
ISBN:
(纸本)1595931392
A common approach to visualise multidimensional data sets is to map every data dimension to a separate visual feature. It is generally assumed that such visual features can be judged independently from each other. However, we have recently shown that interactions between features do exist [Hannus et al. 2004;van den Berg et al. 2005]. In those studies, we first determined individual colour and size contrast or colour and orientation contrast necessary to achieve a fixed level of discrimination performance in single feature search tasks. These contrasts were then used in a conjunction search task in which the target was defined by a combination of a colour and a size or a colour and an orientation. We found that in conjunction search, despite the matched feature discriminability, subjects significantly more often chose an item with the correct colour than one with correct size or orientation. This finding may have consequences for visualisation: the saliency of information coded by objects' size or orientation may change when there is a need to simultaneously search for colour that codes another aspect of the information. In the present experiment, we studied whether a colour bias can also be found in a more complex and continuous task, Subjects had to search for a target in a node-link diagram consisting of SO nodes, while their eye movements were being tracked, Each node was assigned a random colour and size (from a range of 10 possible values with fixed perceptual distances). We found that when we base the distances on the mean threshold contrasts that were determined in our previous experiments, the fixated nodes tend to resemble the target colour more than the target size (Figure 1a). This indicates that despite the perceptual matching, colour is judged with greater precision than size during conjunction search. We also found that when we double the size contrast (i.e. the distances between the 10 possible node sizes), this effect disappears (Figure 1b). Our fin
Imprecise, frequently changing requirements and short time-to-market create challenges for application of conventional software methods in Web Portal engineering. To address these challenges, ST Electronics (Info-Soft...
详细信息
ISBN:
(纸本)1595930140
Imprecise, frequently changing requirements and short time-to-market create challenges for application of conventional software methods in Web Portal engineering. To address these challenges, ST Electronics (Info-Software Systems) Pte. Ltd. applied a lightweight, reactive approach to support a Web Portal product line. Unique characteristics of the approach were fast, low-cost migration from a single conventional Web Portal towards a reusable "generic Web Portal" solution, effective handling of large number of functional variants and their dependencies, the ability to rapidly develop new Web Portals from the generic one, and to independently evolve multiple Web Portals without ever losing a connection between them and the "generic Web Portal". The initial Web Portal was built using state-of-the-art conventional methods. The Web Portal was not flexible enough to reap the benefits of new business opportunities that required the company to rapidly develop and further maintain many similar Web Portals. To overcome the limitations of the conventional solution, a reuse technique called XVCL was applied incrementally. Over a period of three weeks, the conventional solution was converted into a Web architecture capable of handling nine Web Portals from a base of code smaller than the original Web Portal. In the paper, we describe the process that led to building the above Web Portal product line. We explain the difficulties in building an effective generic Web solution using conventional techniques. We analyze our reuse-based solution in qualitative and quantitative ways. Copyright 2005 acm.
暂无评论