Grid is becoming a new infrastructure for scientific computing and cooperative work, it becomes more important and urgent to provide grid workflow to construct and manage the grid applications. The grid workflow based...
详细信息
ISBN:
(纸本)0769521088
Grid is becoming a new infrastructure for scientific computing and cooperative work, it becomes more important and urgent to provide grid workflow to construct and manage the grid applications. The grid workflow based on dynamic modeling and scheduling is presented, which consists of user portal, resource management component, grid services management, performance management, grid workflow engine, and its advantages cover the dynamic modeling according to changing grid running environment and dynamic scheduling adopting to the performance of grid system by performance evaluation and optimization. Then the prototype implemented on the Globus is introduced. Finally the experiments of genome sequencing based on shotgun algorithm are analyzed and the results are promising.
Transmission of block-based transform coded images over lossy packet networks is subject to packet losses, causing blocks to be lost or damaged. In this paper we propose a new hybrid error concealment algorithm to ach...
详细信息
ISBN:
(纸本)0769521088
Transmission of block-based transform coded images over lossy packet networks is subject to packet losses, causing blocks to be lost or damaged. In this paper we propose a new hybrid error concealment algorithm to achieve continuous QoS in terms of both image quality and reconstruction time. It integrates the dc concealment with the information-restoration scheme, and provides a continuous range of time-quality trade-offs by controlling percentage of the missing blocks to be reconstructed by the dc concealment. Extensive experimental results show that our approach works well for both homogeneous and textured images, and achieves high-quality images in short time.
information quality assurance despite uncertainty can be investigated in the context of soft security where an agent maintains trustworthiness evaluations of its information sources to assist in the evaluation of inco...
详细信息
ISBN:
(纸本)0769521088
information quality assurance despite uncertainty can be investigated in the context of soft security where an agent maintains trustworthiness evaluations of its information sources to assist in the evaluation of incoming information quality. Dependency inherently exists in a system where agents do not have se self-sufficient sensing or data collection capabilities. In other words, an agent requires information from others to achieve its goals. Finding the best partners to form an information sharing network using the notion of trustworthiness can be triggered by dependency adaptation. This research experimentally demonstrates that dependency adaptation can lead a system to form an information sharing network which results in high efficiency and information quality.
In this paper a parallel architecture for the computation of Hessian elliptic curve scalar multiplication over binary fields is presented. The architecture was designed as general as possible trying to make no assumpt...
详细信息
ISBN:
(纸本)0769521088
In this paper a parallel architecture for the computation of Hessian elliptic curve scalar multiplication over binary fields is presented. The architecture was designed as general as possible trying to make no assumptions about the specific hardware platform to be used by the designers. The idea of using parallel strategies was considered in every design stage and implemented as much as hardware resources allowed us to do it so. The design results reported in this work allow us to compute GF(2(191)) elliptic curve scalar multiplication operations in about 114.7mu Secs.
Today's workforce is becoming increasingly mobile. Handheld devices have evolved into indispensable enterprise tools, which enhance the mobile knowledge workers' ability to remain connected and productive. A W...
详细信息
ISBN:
(纸本)0769521088
Today's workforce is becoming increasingly mobile. Handheld devices have evolved into indispensable enterprise tools, which enhance the mobile knowledge workers' ability to remain connected and productive. A WPAN (Wireless Personal Area Network) is intended for mobility and simple, short-range point-to-point communication with personal devices. The usage of Bluetooth wireless network technology is growing as it exploits low-cost, power efficient radio technology to support both point-to-point and point-to-multipoint connections. However, knowledge workers may find out that Bluetooth devices work with some products and not with others. The study will report on compatibility and interoperability issues experienced during the setting up of a Mobile Enterprise Bluetooth anti WLAN Laboratory at the University of technology in Sydney. It examines whether Bluetooth could be an adequate mobile solution in m-enterprises.
As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources....
详细信息
ISBN:
(纸本)0769521088
As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.
The increasing number of requirements for a Web information System asks for an engineered process in designing such a system. In this paper we focus on two of these requirements: presentation adaptation based on user ...
详细信息
ISBN:
(纸本)0769521088
The increasing number of requirements for a Web information System asks for an engineered process in designing such a system. In this paper we focus on two of these requirements: presentation adaptation based on user preferences/device capabilities and reusability of the different design artifacts. Hera is a model-based design methodology for Web information Systems. Adaptation and reuse can be tackled at different design levels in Hera. We illustrate by means of examples how adaptation and reuse can be achieved in the conceptual model, the application model, and the presentation model. Based on a static user profile, adaptation is realized by attaching appearance conditions to model elements. With respect to reusability we do focus on one mechanism that supports it, namely inheritance.
The proceedings contains 145 papers from the conference on the internationalconference on informationtechnology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer net...
详细信息
ISBN:
(纸本)0769521088
The proceedings contains 145 papers from the conference on the internationalconference on informationtechnology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer networks;semi-fragile watermarking scheme for authentication of JPEG images;mitigating the untrusted terminal problem using conditional signatures;a security protocol for certified e-goods delivery;enhancing anonymity via market competition;a secure account-based mobile payment protocol and accountability logic for mobile payment protocols.
Today many Data Grid applications need to manage and process a very large amount of data distributed across multiple grid nodes and stored in relational databases. The Grid Relational Catalog Project (GRelC) developed...
详细信息
ISBN:
(纸本)0769521088
Today many Data Grid applications need to manage and process a very large amount of data distributed across multiple grid nodes and stored in relational databases. The Grid Relational Catalog Project (GRelC) developed at the CACT/ISUFI of the University of Lecce, represents an attempt to design and deploy a Grid-DBMS for the Globus Community. In this paper, after defining the Grid-DBMS concept, we describe the GRelC library which is layered on top of the Globus Toolkit. The user can build client applications on top of it that can easily get access to and interact with data resources.
The significant computational overhead associated with the iterative reconstruction process of biomedical optical imaging is one of the major factors that hinder its application in clinical diagnosis, especially for l...
详细信息
ISBN:
(纸本)0769521088
The significant computational overhead associated with the iterative reconstruction process of biomedical optical imaging is one of the major factors that hinder its application in clinical diagnosis, especially for large tissue volumes. Based on previous studies, the paper presents a general purpose biomedical optical image reconstruction model along with components and data flow diagram, and proposes a modified model taking into account the information feedback during the iterative image reconstruction process to control the image resolution in the subdomain of interest, and hence to detect interior targets, such as tumors, from the discrete measurements collected on the surface of clinically relevant tissue. The modified image reconstruction model (MIRM) may provide a means to detect small targets and improve the image quality at relatively low computational cost.
暂无评论