The proceedings contain 18 papers. The special focus in this conference is on autonomic and trustedcomputing. The topics include: Hierarchical-CPK-based trustedcomputing cryptography scheme;Facilitating the use of T...
ISBN:
(纸本)9783642234958
The proceedings contain 18 papers. The special focus in this conference is on autonomic and trustedcomputing. The topics include: Hierarchical-CPK-based trustedcomputing cryptography scheme;Facilitating the use of TPM technologies using the serenity framework;spam detection on twitter using traditional classifiers;true trustworthy elections: Remote electronic voting using trustedcomputing;a survey of security issues in trust and reputation systems for e-commerce;copyright Protection in P2P networks by false pieces pollution;detection and classification of different Botnet C&C channels;A method for constructing fault trees from AADL models;concept of a reflex manager to enhance the planner component of an autonomic/ organic system;safe runtime validation of behavioral adaptations in autonomic software;a configurable environment simulation tool for embedded software;an adaptive management mechanism for resource scheduling in multiple virtual machine system;virtualization with automated services catalog for providing integrated information technology infrastructure;Research on modeling and analysis of CPS;towards a protocol for autonomic covert communication;autonomous online expansion technology for wireless sensor network based manufacturing system.
The proceedings contain 155 papers. The topics discussed include: treatment of missing data in intelligent lighting applications;development of the smart toilet equipment with measurements of physiological parameters;...
The proceedings contain 155 papers. The topics discussed include: treatment of missing data in intelligent lighting applications;development of the smart toilet equipment with measurements of physiological parameters;downlink scheduling and resource allocation in EPON-WiMAX integrated networks;sociotelematics: leveraging interaction-relationships in developing telematics systems to support cooperative convoys;data gathering in a hybrid wireless sensor network;anycast routing based on connectivity metric for sensor and ad hoc networks;a content-based publish/subscribe system for efficient event notification over vehicular ad hoc networks;performance analysis of LTE smartphones-based vehicle-to-infrastructure communication;improving the estimation of residual delay based forwarding method in opportunistic vehicular networks;and exploiting ultrasonic reflections for improving accuracy of indoor location tracking.
The proceedings contain 136 papers. The topics discussed include: situation inference by fusion of opportunistically available contexts;detecting cruising flagged taxis' passenger-refusal behaviors using traffic d...
ISBN:
(纸本)9781479976461
The proceedings contain 136 papers. The topics discussed include: situation inference by fusion of opportunistically available contexts;detecting cruising flagged taxis' passenger-refusal behaviors using traffic data and crowdsourcing;scalable security analysis using a partition and merge approach in an infrastructure as a service cloud;RPC: a localization method based on regional partition and cooperation;recognizing semantic locations from smartphone log with combined machine learning techniques;a management system for cyber individuals and heterogeneous;design of lower limb chair exercise support system with depth sensor;AR Go-Kon: a system for facilitating a smooth communication in the first meeting;intuitive appliance control system based on a high-accuracy indoor positioning system;discovering latent structures for activity recognition in smart environments;behaviors and communications in working support through first person vision communication;and a cross-space, multi-interaction-based dynamic incentive mechanism for mobile crowd sensing.
The proceedings contain 99 papers. The topics discussed include: hybrid localization for ubiquitous services;DE2: localization with the rotating RSS using a single beacon;user travelling pattern prediction via indisti...
ISBN:
(纸本)9781479924813
The proceedings contain 99 papers. The topics discussed include: hybrid localization for ubiquitous services;DE2: localization with the rotating RSS using a single beacon;user travelling pattern prediction via indistinct cellular data mining;BodyGuards: a clairvoyant location predictor using frequent neighbors and markov model;privacy preserving path recommendation for moving user on location based service;constructing adaptive indoor radio maps for dynamic wireless environments;exploring a new dimension in code mobility for ubiquitous embedded systems;PathSim: a tool for finding minimal energy device operation sequence for reaching a target context in a smart-home;using virtualization and guacamole/VNC to provide adaptive user interfaces to disabled people in cloud computing;towards physical activity recognition using smartphone sensors;and uOS: a resource rerouting middleware for ubiquitous games.
The proceedings contain 23 papers. The special focus in this conference is on autonomic and trustedcomputing. The topics include: Opportunistic trust based P2P services framework for disconnected MANETs;a risk-aware ...
ISBN:
(纸本)9783642165757
The proceedings contain 23 papers. The special focus in this conference is on autonomic and trustedcomputing. The topics include: Opportunistic trust based P2P services framework for disconnected MANETs;a risk-aware resource service decision strategy for global computing;Message race detection for Web Services by an SMT-based analysis;a user-oriented approach to assessing Web service trustworthiness;improving the trustworthiness of service QoS information in service-based systems;Using ELECTRE TRI outranking method to evaluate trustworthy software;the testing method for interface customized component;a new monitor model for enhancing trust-based systems;design and analysis of “Flexible” k-out-of-n signatures;a formal framework for compositional verification of Organic computing systems;a formal framework for trust policy negotiation in autonomic systems: Abduction with soft constraints;towards autonomic mode control of a scalable intrusion tolerant architecture;agent-augmented Co-Space: Toward merging of real world and cyberspace;On alleviating reader collisions towards high efficient RFID systems;on-line adaptive algorithms in autonomic restart control;designing self-healing in automotive systems;trustworthy Organic computing systems: Challenges and perspectives;adaptive control of sensor networks;Design of location-based hierarchical overlay network supporting P2PSIP conferencing service;effects of displaying trust information on mobile application usage;context based trust normalization in service-oriented environments.
The proceedings contain 142 papers. The topics discussed include: distributed caching strategies in peer-to-peer systems;a power-aware based storage architecture for high performance computing;a distributed reconfigur...
ISBN:
(纸本)9780769545387
The proceedings contain 142 papers. The topics discussed include: distributed caching strategies in peer-to-peer systems;a power-aware based storage architecture for high performance computing;a distributed reconfigurable active SSD platform for data intensive applications;a parallel processing scheme for large-size sliding-window applications;algebraic models for the cube connected cycles and shuffle exchange graphs;a high-performance and energy-efficient virtually tagged stack cache architecture for multi-core environments;providing quality of science in volunteer computing;an effective dynamic scheduling runtime and tuning system for heterogeneous multi and many-core desktop platforms;on the social aspects of personalized ranking for web services;stable adaptive work-stealing for concurrent multi-core runtime systems;rule pattern parallelization of packet filters on multi-core environments;and memory-intensive applications on a many-core processor.
The proceedings contain 18 papers. The topics discussed include: concept of a reflex manager to enhance the planner component of an autonomic/organic system;safe runtime validation of behavioral adaptations in autonom...
ISBN:
(纸本)9783642234958
The proceedings contain 18 papers. The topics discussed include: concept of a reflex manager to enhance the planner component of an autonomic/organic system;safe runtime validation of behavioral adaptations in autonomic software;a configurable environment simulation tool for embedded software;an adaptive management mechanism for resource scheduling in multiple virtual machine system;towards a protocol for autonomic covert communication;autonomous online expansion technology for wireless sensor network based manufacturing system;hierarchical-CPK-based trustedcomputing cryptography scheme;facilitating the use of TPM technologies using the serenity framework;true trustworthy elections: remote electronic voting using trustedcomputing;copyright protection in P2P networks by false pieces pollution;copyright protection in P2P networks by false pieces pollution;and detection and classification of different Botnet C&C channels.
The proceedings contain 59 papers. The topics discussed include: emergence in organic computing systems: discussion of a controversial concept;towards a standards-based autonomic context management system;formal model...
详细信息
ISBN:
(纸本)354038619X
The proceedings contain 59 papers. The topics discussed include: emergence in organic computing systems: discussion of a controversial concept;towards a standards-based autonomic context management system;formal modeling and verification of systems with self-x properties;a novel autonomic rapid application composition scheme for ubiquitous systems;autonomic interference avoidance with extended shortest path algorithm;multi-level model-based self-diagnosis of distributed object-oriented systems;from components to autonomic elements using negotiable contracts;interference-aware selfish routing in multi-ratio multi-channel wireless mesh networks;autonomic K-interleaving construction scheme for P2P overlay networks;and development and runtime support for situation-aware security in autonomiccomputing.
The proceedings contain 57 papers. The topics discussed include: an intelligent home system as a development and test platform for ubiquitous computing;zigbee security using identity-based cryptography;a digital signa...
详细信息
ISBN:
(纸本)9783540735465
The proceedings contain 57 papers. The topics discussed include: an intelligent home system as a development and test platform for ubiquitous computing;zigbee security using identity-based cryptography;a digital signature mechanism and authentification scheme for group communication in grid;service-context knowledge-based solution for autonomic adaptation;biology as inspiration towards a novel service life-cycle;establishing trust between mail servers to improve spam filtering;cooperative component testing architecture in collaborating network environment;an adaptive trust control model for a trustworthy component software platform;research on cost-sensitive learning in one-class anomaly detection algorithms;stepping-stone detection via request-response traffic analysis;ontology based hybrid access control for automatic interoperation;formal analysis of secure bootstrap in trustedcomputing;and calculating trust using aggregation rules in social networks.
The proceedings contain 23 papers. The topics discussed include: self-organizing computer vision for robust object tracking in smart cameras;a formal framework for compositional verification of organic computing syste...
ISBN:
(纸本)3642165753
The proceedings contain 23 papers. The topics discussed include: self-organizing computer vision for robust object tracking in smart cameras;a formal framework for compositional verification of organic computing systems;on-line adaptive algorithms in autonomic restart control;designing self-healing in automotive systems;trustworthy organic computing systems: challenges and perspectives;adaptive control of sensor networks;effects of displaying trust information on mobile application usage;context based trust normalization in service-oriented environments;a framework for trust enabled software asset retrieval;a risk-aware resource service decision strategy for global computing;a user-oriented approach to assessing web service trustworthiness;improving the trustworthiness of service QoS information in service-based systems;and the testing method for interface customized component.
暂无评论