In distributed environments like peer-to-peer networks and Grids, where the resources to be shared are provided by many different nodes generally spanned across multiple organizations, dynamic resource discovery is a ...
详细信息
In distributed environments like peer-to-peer networks and Grids, where the resources to be shared are provided by many different nodes generally spanned across multiple organizations, dynamic resource discovery is a central problem. In this paper, we propose a semantic approach for the dynamic resource discovery based on ontologies for a semantically rich description of the metadata characterizing the resources to be shared, and on semantic matching techniques for dynamically and flexibly comparing ontological resource descriptions against a target resource request.
As distributed computing is going to take an important role in business automation through Bangladesh, software used here must be secured enough to provide a reliable business automation environment. Software giant Mi...
详细信息
As distributed computing is going to take an important role in business automation through Bangladesh, software used here must be secured enough to provide a reliable business automation environment. Software giant Microsoft Corp. recently offered a completely new development platform, named .NET framework, which contains new and innovative idea considering software security issues and easy-to-use toolset to build highly customized and secure distributed business applications. As .NET framework reliefs developers from writing huge lines of code and making complicated security decisions, it can be the best and intelligent choice for the software engineers and architects of Bangladesh.
A text generation approach is proposed for e-learning purposes, based on the idea that the text should include some features in the way that its different perspectives can be described efficiently. In the meantime a m...
详细信息
A text generation approach is proposed for e-learning purposes, based on the idea that the text should include some features in the way that its different perspectives can be described efficiently. In the meantime a method is discussed for composing the significant concepts, in order to produce new ideas for the learner based on his/her learning conditions.
Inclusion dependencies express subset-relationships between databases and are thus important indicators for redundancies between databases. In the context of database integration, it can help to solve a very common an...
详细信息
Inclusion dependencies express subset-relationships between databases and are thus important indicators for redundancies between databases. In the context of database integration, it can help to solve a very common and difficult problem: "discovering redundancies across crisp databases ". Inclusion dependencies in crisp databases are well known and some related work can be found in the literature, however, the idea of fuzzy inclusion dependencies in fuzzy relational databases is new that we have introduced in this paper and derived the inference rules on such dependencies.
We illustrate the close connection between cryptographic protocols and games. Several two-person game theoretic concepts and techniques are used here to model and analyze different two-party cryptographic protocols in...
详细信息
We illustrate the close connection between cryptographic protocols and games. Several two-person game theoretic concepts and techniques are used here to model and analyze different two-party cryptographic protocols in a malicious model in order to find equilibrium conditions that allow to protect honest parties against all possible strategies of adversaries.
The Internet is currently being used to support increasingly complex interactions. The entities, with which applications and services need to interact, span a wide spectrum that includes desktops, PDAs, appliances, an...
详细信息
The Internet is currently being used to support increasingly complex interactions. The entities, with which applications and services need to interact, span a wide spectrum that includes desktops, PDAs, appliances, and other networked resources. Clients - which abstract users, resources and proxies thereto - within these systems communicate with each other through the exchange of events, which are essentially messages with timestamps. We explore matching, routing and network utilization issues in the context of our research prototype NaradaBrokering, which provides support for centralized, distributed and P2P interactions.
作者:
A. CristeaInfo Systems
Department of Mathematics & Computer Science Eindhovan University of Technology Netherlands
Personalization in education is supposed to be the answer to enhanced learning. Adaptive hypermedia (AH) is a means to this end. However, authoring of AH is still complicated. This paper presents a system that tries t...
详细信息
Personalization in education is supposed to be the answer to enhanced learning. Adaptive hypermedia (AH) is a means to this end. However, authoring of AH is still complicated. This paper presents a system that tries to tackle this problem, by allowing leveled authoring of the adaptive behavior of AH, for beginner authors as well as advanced authors. This approach allows authors to implement their own conceptions about instructional strategies, aimed at, e.g., specific learning styles.
A steganographic technique that uses animation to encode the message is proposed. When the technique is combined with cryptography (to encrypt the secret message before it is encoded into animation), error-control cod...
详细信息
A steganographic technique that uses animation to encode the message is proposed. When the technique is combined with cryptography (to encrypt the secret message before it is encoded into animation), error-control coding, and ASCII text embedding into frames of the animation, a very robust steganography system is obtained. Steganalysis of this proposed technique is discussed in terms of both active and passive wardens.
A new algorithm for modular multiplication for public key cryptography is presented. The algorithm is optimised with respect to area and time by use of a combination of adders and fast lookup tables. This leads to a m...
详细信息
A new algorithm for modular multiplication for public key cryptography is presented. The algorithm is optimised with respect to area and time by use of a combination of adders and fast lookup tables. This leads to a multiplication method that can significantly speed up exponentiation, because the values of the lookup table do not depend on the operands of the individual multiplication. The speedup is achieved by continuous modification of one operand.
Statistical image analysis is simple to implement, but rarely achieves high levels of significance in image similarity searches except on contrived image collections. It is proposed that simple geometric features and ...
详细信息
Statistical image analysis is simple to implement, but rarely achieves high levels of significance in image similarity searches except on contrived image collections. It is proposed that simple geometric features and measure of grey level and color can be combined to form a similarity-based retrieval system that is both efficient and effective.
暂无评论