This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrat...
详细信息
ISBN:
(纸本)0769521088
This work discusses a conceptual model for automatic acquisition and processing of knowledge about users and devices in computer networks. It employs autonomous agents for distributed knowledge management and integrates them into an autonomic middleware component. Agents grouped into distributed communities act as mediators between users, devices, and network resources. Communicating between each other they make decisions on whether a certain user or device can be given access to a requested resource. In other words, agents in our system perform user/device authentication, authorisation, and maintenance of user credentials.
Face routing is one of the effective techniques for constructing source destination route in mobile ad-hoc networks (MANET). Face routing can always construct path if the MANET is connected. However, face routing can ...
详细信息
ISBN:
(纸本)0769521088
Face routing is one of the effective techniques for constructing source destination route in mobile ad-hoc networks (MANET). Face routing can always construct path if the MANET is connected. However, face routing can generate routes with large number of hops. We propose an improved face routing algorithm that constructs shorter routes even when the route is forced to go through a face with large number of edges. We propose a new data structure ExtDCEL that can be used to represent both planar and non-planar networks. We present an implementation of several location based routing algorithms by using the proposed data structure.
information system development is often in connection to functional requirements and business processes in organization. The development of the basic informationtechnology infrastructure (IT infrastructure) is theref...
详细信息
ISBN:
(纸本)0769515061;076951507X
information system development is often in connection to functional requirements and business processes in organization. The development of the basic informationtechnology infrastructure (IT infrastructure) is therefore easily forgotten. However, a reliable infrastructure is the key to successful operations. As business requirements the flexibility of the IT infrastructure becomes important. Here we argue that standards are in a key role in development of IT infrastructure that is flexible and adapts to future business needs.
Rapid development of E-Learning applications brings large requirements of learning resources, especially web-based courseware. However, the high technical requirement of courseware developers, and low reusability of l...
详细信息
ISBN:
(纸本)0769521088
Rapid development of E-Learning applications brings large requirements of learning resources, especially web-based courseware. However, the high technical requirement of courseware developers, and low reusability of learning resources heavily impede the process of courseware development. There is an urgent need for courseware authoring system to assist teachers who have no professional knowledge of computer technology to develop standard and reusable web-based coursewares. In this paper we presented such a tool named standard visual courseware authoring tool based content packaging specification. This authoring system has two major features. One is providing visual courseware organization, which achieves the aim that "What you see is what you get". The other one is standardization function based on content Packaging specification for coursewares and inner learning resources. This authoring tool provides a standard way for web-based courseware development.
To distinguish the reliabilities of different resources is difficult in the grid environment. For the first time the signaling game theory is applied to the research on grid resource reliability, and a grid resource r...
详细信息
ISBN:
(纸本)0769523153
To distinguish the reliabilities of different resources is difficult in the grid environment. For the first time the signaling game theory is applied to the research on grid resource reliability, and a grid resource reliability model based on promise is proposed in this paper. The analyses and the emulation results indicate that the resource provider should abandon the cheating motivation voluntarily. The resource demander could make right decision without other nodes' recommendations, the calculation and communication is reduced remarkably. This is a new solution to the problem of distinguishing resources reliabilities in the grid environment.
Grid is becoming a new infrastructure for scientific computing and cooperative work, it becomes more important and urgent to provide grid workflow to construct and manage the grid applications. The grid workflow based...
详细信息
ISBN:
(纸本)0769521088
Grid is becoming a new infrastructure for scientific computing and cooperative work, it becomes more important and urgent to provide grid workflow to construct and manage the grid applications. The grid workflow based on dynamic modeling and scheduling is presented, which consists of user portal, resource management component, grid services management, performance management, grid workflow engine, and its advantages cover the dynamic modeling according to changing grid running environment and dynamic scheduling adopting to the performance of grid system by performance evaluation and optimization. Then the prototype implemented on the Globus is introduced. Finally the experiments of genome sequencing based on shotgun algorithm are analyzed and the results are promising.
In this paper a parallel architecture for the computation of Hessian elliptic curve scalar multiplication over binary fields is presented. The architecture was designed as general as possible trying to make no assumpt...
详细信息
ISBN:
(纸本)0769521088
In this paper a parallel architecture for the computation of Hessian elliptic curve scalar multiplication over binary fields is presented. The architecture was designed as general as possible trying to make no assumptions about the specific hardware platform to be used by the designers. The idea of using parallel strategies was considered in every design stage and implemented as much as hardware resources allowed us to do it so. The design results reported in this work allow us to compute GF(2(191)) elliptic curve scalar multiplication operations in about 114.7mu Secs.
Transmission of block-based transform coded images over lossy packet networks is subject to packet losses, causing blocks to be lost or damaged. In this paper we propose a new hybrid error concealment algorithm to ach...
详细信息
ISBN:
(纸本)0769521088
Transmission of block-based transform coded images over lossy packet networks is subject to packet losses, causing blocks to be lost or damaged. In this paper we propose a new hybrid error concealment algorithm to achieve continuous QoS in terms of both image quality and reconstruction time. It integrates the dc concealment with the information-restoration scheme, and provides a continuous range of time-quality trade-offs by controlling percentage of the missing blocks to be reconstructed by the dc concealment. Extensive experimental results show that our approach works well for both homogeneous and textured images, and achieves high-quality images in short time.
In mobile computing environments, many real life applications involve transaction processing with temporal data objects which are updated periodically by external environment. Transaction in temporal database not only...
详细信息
ISBN:
(纸本)0769521088
In mobile computing environments, many real life applications involve transaction processing with temporal data objects which are updated periodically by external environment. Transaction in temporal database not only has to meet the transaction deadline, but also the data deadline of temporal objects. Traditional concurrency control algorithms used in real-time database are no longer suitable for temporal database. In this paper, a new optimistic concurrency control algorithm, OCC-AVI is devised for processing mobile read-only transactions with the above deadline requirements. Based on the absolute validity interval (AVI) information, read-only transactions at mobile clients can autonomously choose to read a valid value of a temporal object from local cache or pull an updated value from the server. Experimental results show that OCC-AVI can significantly improve the system performance.
暂无评论