This paper presents a service-based grid computing model which emphasizes that a grid is a special computing system. By comparing this model with the traditional computing system model, we analyze their similarities a...
详细信息
ISBN:
(纸本)0769523153
This paper presents a service-based grid computing model which emphasizes that a grid is a special computing system. By comparing this model with the traditional computing system model, we analyze their similarities and differences, which is important for related grid study. The proposed model is very useful for future study in grid computing: it not only provides instructions for developing a grid system, but also provides a framework for the theoretical grid research.
In card games, two or more players can act as colluders: they exchange information in order to collectively win the game. Electronic games (e-gaming) are supposed to be played under secure e-gaming protocols. Hence so...
详细信息
ISBN:
(纸本)0769523153
In card games, two or more players can act as colluders: they exchange information in order to collectively win the game. Electronic games (e-gaming) are supposed to be played under secure e-gaming protocols. Hence some tricks cannot be performed: card exchange, knowledge of opponent cards without their consent, shuffling and dealing the deck for one's own benefit, etc. Therefore, if two or more players collude, all they can do is exchange information. In the real world, other players can usually discover such colluders but, in a virtual world, colluders can use several ways to collude: cellular phones, instant messaging software,... they could even be seating next to each other while playing. In this paper several methods to detect collusion in virtual card games are described.
In this paper, a simple approach is proposed to improve the performance of JPEG. In the proposed approach, the coding scheme is identical to the JPEG except only a fixed number of coefficients are coded for each image...
详细信息
The emergence of the service-oriented computing paradigm has opened the possibility of using dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive co...
详细信息
ISBN:
(纸本)0769523153
The emergence of the service-oriented computing paradigm has opened the possibility of using dynamic binding of application requirements to the resources needed to fulfill application tasks. Especially in pervasive computing that is characterized by disconnected operation and mobility, the process of using service specifications and dynamic binding becomes critical. In this paper, we summarize our ongoing work in the area of integrating service orientation into pervasive computing using the notion of specifying service requirements and using these specifications to bind to the available resources dynamically instead of hardwiring them statically. We term these specifications programmable requirements since they can be interpreted at ran time to bind to a resource satisfying those specifications. Interestingly this approach also satisfies the basis for two key types of adaptation prevalent in pervasive computing systems -functional and architectural - as we show in this paper.
This paper focuses on the development of a maintainable information filtering system. The simple and efficient solution to this problem is to block the Web sites by URL, including IP address. However, it is not effici...
详细信息
ISBN:
(纸本)0769523153
This paper focuses on the development of a maintainable information filtering system. The simple and efficient solution to this problem is to block the Web sites by URL, including IP address. However, it is not efficient for unknown Web sites and it is difficult to obtain complete block list. Content based filtering is suggested to overcome this problem as an additional strategy of URL filtering. The manual rule based method is widely applied in current content filtering systems, but they overlook the knowledge acquisition bottleneck problems. To solve this problem, we employed the Multiple Classification Ripple-Down Rules (MCRDR) knowledge acquisition method, which allows the domain expert to maintain the knowledge base without the help of knowledge engineers. Throughout this study, we will prove the MCRDR based information filtering system can easily prevent unknown Web information from being delivered and easily maintain the knowledge base for the filtering system.
Suppose a weak power device Alice (e.g. a smart card) has some private program p. When carried outside, she may capture some private data x and want to compute p(x) but lacks the resources to do it. This paper present...
详细信息
ISBN:
(纸本)0769523153
Suppose a weak power device Alice (e.g. a smart card) has some private program p. When carried outside, she may capture some private data x and want to compute p(x) but lacks the resources to do it. This paper presents a solution that allows a semi-honest Bob to execute the program in such an oblivious way that both x and p are computationally hidden and p(x) is disclosed to Bob only if Alice so wishes. We describe a procedure of encrypting a general program as well as explore the information hiding properties. Our solution is generic for most deterministic polynomial-time programs and it provides a programming interface for Alice, a compiler for Carol and a circuit evaluator program for Bob.
The idea developed in this paper is the creation of standard information retrieval modules in a distributed manner in order to create testing systems to validate methods and algorithms. An investigator in information ...
详细信息
Multiple query formulations (MQF) have been extensively explored and when used, provide considerable improvements in quality of information retrieval on the Web. However, the question of how to formulate a variety of ...
详细信息
ISBN:
(纸本)0769523153
Multiple query formulations (MQF) have been extensively explored and when used, provide considerable improvements in quality of information retrieval on the Web. However, the question of how to formulate a variety of distinctive queries and how many queries are needed in each unique case remains essentially unanswered In this research we present a process for selecting search terms and formulating multiple short queries from the original long query. We introduce a Scaled Cumulative Query Weight (t) function which is based exclusively on the submitted long query. We demonstrate that this Junction can serve as a predictive variable for the effectiveness of various multiple query formulation methods and can be used algorithmically to determine the operational parameters for a multiple query formulation process.
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict...
详细信息
ISBN:
(纸本)0769523153
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict the direction of both Microsoft and Intel stock prices over a period of thirteen years. We explored the performance of artificial neural networks trained using backpropagation and conjugate gradient algorithm and a Mamdani and Takagi Sugeno Fuzzy inference system learned using neural learning and genetic algorithm. Once all the different models were built the last part of the experiment was to determine how much profit can be made using these methods versus a simple buy and hold technique.
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditional text-based documents. However, us...
详细信息
ISBN:
(纸本)0769523153
These days, billions of Web pages are created with HTML or other markup languages. They only have a few uniform structures and contain various authoring styles compared to traditional text-based documents. However, users usually focus on a particular section of the page that presents the most relevant information to their interest. Therefore, Web documents classification needs to group and filter the pages based on their contents and relevant information. Many researches on Web mining report on mining Web structure and extracting information from web contents. However, they have focused on detecting tables that convey specific data, not the tables that are used as a mechanism for structuring the layout of Web pages. Case modeling of tables can be constructed based on structure abstraction. Furthermore, Ripple Down Rules (RDR) is used to implement knowledge organization and construction, because it supports a simple rule maintenance based on case and local validation.
暂无评论