information quality assurance despite uncertainty can be investigated in the context of soft security where an agent maintains trustworthiness evaluations of its information sources to assist in the evaluation of inco...
详细信息
ISBN:
(纸本)0769521088
information quality assurance despite uncertainty can be investigated in the context of soft security where an agent maintains trustworthiness evaluations of its information sources to assist in the evaluation of incoming information quality. Dependency inherently exists in a system where agents do not have se self-sufficient sensing or data collection capabilities. In other words, an agent requires information from others to achieve its goals. Finding the best partners to form an information sharing network using the notion of trustworthiness can be triggered by dependency adaptation. This research experimentally demonstrates that dependency adaptation can lead a system to form an information sharing network which results in high efficiency and information quality.
New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are u...
详细信息
ISBN:
(纸本)0769521088
New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. This paper considers recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes.
Today many Data Grid applications need to manage and process a very large amount of data distributed across multiple grid nodes and stored in relational databases. The Grid Relational Catalog Project (GRelC) developed...
详细信息
ISBN:
(纸本)0769521088
Today many Data Grid applications need to manage and process a very large amount of data distributed across multiple grid nodes and stored in relational databases. The Grid Relational Catalog Project (GRelC) developed at the CACT/ISUFI of the University of Lecce, represents an attempt to design and deploy a Grid-DBMS for the Globus Community. In this paper, after defining the Grid-DBMS concept, we describe the GRelC library which is layered on top of the Globus Toolkit. The user can build client applications on top of it that can easily get access to and interact with data resources.
Today's workforce is becoming increasingly mobile. Handheld devices have evolved into indispensable enterprise tools, which enhance the mobile knowledge workers' ability to remain connected and productive. A W...
详细信息
ISBN:
(纸本)0769521088
Today's workforce is becoming increasingly mobile. Handheld devices have evolved into indispensable enterprise tools, which enhance the mobile knowledge workers' ability to remain connected and productive. A WPAN (Wireless Personal Area Network) is intended for mobility and simple, short-range point-to-point communication with personal devices. The usage of Bluetooth wireless network technology is growing as it exploits low-cost, power efficient radio technology to support both point-to-point and point-to-multipoint connections. However, knowledge workers may find out that Bluetooth devices work with some products and not with others. The study will report on compatibility and interoperability issues experienced during the setting up of a Mobile Enterprise Bluetooth anti WLAN Laboratory at the University of technology in Sydney. It examines whether Bluetooth could be an adequate mobile solution in m-enterprises.
As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources....
详细信息
ISBN:
(纸本)0769521088
As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.
The significant computational overhead associated with the iterative reconstruction process of biomedical optical imaging is one of the major factors that hinder its application in clinical diagnosis, especially for l...
详细信息
ISBN:
(纸本)0769521088
The significant computational overhead associated with the iterative reconstruction process of biomedical optical imaging is one of the major factors that hinder its application in clinical diagnosis, especially for large tissue volumes. Based on previous studies, the paper presents a general purpose biomedical optical image reconstruction model along with components and data flow diagram, and proposes a modified model taking into account the information feedback during the iterative image reconstruction process to control the image resolution in the subdomain of interest, and hence to detect interior targets, such as tumors, from the discrete measurements collected on the surface of clinically relevant tissue. The modified image reconstruction model (MIRM) may provide a means to detect small targets and improve the image quality at relatively low computational cost.
With increasing amount of text data being stored in the compressed format, efficient information retrieval in the compressed domain has become a major concern. Being able to randomly access the compressed data is high...
详细信息
ISBN:
(纸本)0769521088
With increasing amount of text data being stored in the compressed format, efficient information retrieval in the compressed domain has become a major concern. Being able to randomly access the compressed data is highly desirable for efficient retrieval and is required in many applications. For example, in a library information retrieval system, only the records that are relevant to the query are displayed. We present modified LZW algorithms that support fast random access to the compressed text. Instead of fully decompressing the text and outputing the results selectively, we allow random access and partial decoding of the compressed text and displaying the relevant portion. The compression ratio can also be improved using the modified LZW algorithm. Preliminary results on the time and storage performance are given.
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning p...
详细信息
ISBN:
(纸本)0769521088
The Intrusion Detection System architecture commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency. In this paper, two machine-learning paradigms, Artificial Neural Networks and Fuzzy Inference System, are used to design an Intrusion Detection System. SNORT is used to perform real time traffic analysis and packet logging on IP network during the training phase of the system. Then a signature pattern database is constructed using protocol analysis and Neuro-Fuzzy learning method. Using 1998 DARPA Intrusion Detection Evaluation Data and TCP dump raw data, the experiments are deployed and discussed.
The proceedings contains 145 papers from the conference on the internationalconference on informationtechnology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer net...
详细信息
ISBN:
(纸本)0769521088
The proceedings contains 145 papers from the conference on the internationalconference on informationtechnology: itcc 2004: Volume I. The topics discussed include: Jigsaw-based secure data transfer over computer networks;semi-fragile watermarking scheme for authentication of JPEG images;mitigating the untrusted terminal problem using conditional signatures;a security protocol for certified e-goods delivery;enhancing anonymity via market competition;a secure account-based mobile payment protocol and accountability logic for mobile payment protocols.
The proceedings contains 160 papers from the internationalconference on informationtechnology. The topics discussed include: performance evaluation of block-based motion estimation algorithms and distortion measures...
详细信息
ISBN:
(纸本)0769521088
The proceedings contains 160 papers from the internationalconference on informationtechnology. The topics discussed include: performance evaluation of block-based motion estimation algorithms and distortion measures;language model-based retrieval for farsi documents;a framework for trajectory based visual event retrieval;detecting anomalies in high-performance parallel programs;grid workflow based on dynamic modeling and scheduling;and extensible communication architecture for grid nodes.
暂无评论