Online Social Networks (OSNs) are becoming more important in the web 2.0 paradigm. Although most implementations of OSN are not distributed applications, users conforming an OSN work autonomously posting their informa...
详细信息
Service modeling and composition is a fundamental method for offering advanced functionality by combining a set of primitive services provided by the system. Unlike in the case of web services for which there is an ab...
详细信息
The move towards Network Enabled Capability (NEC) by the UK Ministry of Defence (MoD) is designed to achieve enhanced military effect through the networking and coherent integration of existing and future resources in...
详细信息
This paper proposes distributed data acquisition system based on Personal Digital Assistant that can process data by calling the Web Service. The system implements distributed data processing by calling the Web Servic...
详细信息
This paper proposes distributed data acquisition system based on Personal Digital Assistant that can process data by calling the Web Service. The system implements distributed data processing by calling the Web Service. Lots of experiments are conducted on it in several wildlife monitoring sites in Zhejiang Province, the result shows that it is effective and can meet the needs of data collection in the wild.
The concept of the Internet of Things provides a new model to access the information of the objective world. A new approach based on the Internet of Things for traffic emergent events is proposed. The network architec...
详细信息
The Integrated Tokamak Modelling Task Force (ITM-TF) is developing an infrastructure where the validation needs, as being formulated in terms of multi-device data access and detailed physics comparisons aiming for inc...
详细信息
ISBN:
(纸本)9780769539393
The Integrated Tokamak Modelling Task Force (ITM-TF) is developing an infrastructure where the validation needs, as being formulated in terms of multi-device data access and detailed physics comparisons aiming for inclusion of synthetic diagnostics in the simulation chain, are key components. A device independent approach to data transport and a standardized approach to data management (data structures, naming, and access) is being developed in order to allow cross validation between different fusion devices using a single toolset. The effort is focused on ITER plasmas and ITER scenario development on current fusion device. The modeling tools are, however, aimed for general use and can be promoted in other areas of modelling as well. Extensive work has already gone into the development of standardized descriptions of the data (Consistent Physical Objects) providing initial steps towards a complete fusion modelling ontology. The longer term aim is a complete simulation platform which is expected to last and be extended in different ways for the coming 30 years. The technical underpinning is therefore of vital importance. In particular, the platform needs to be extensible and open-ended to be able to take full advantage of not only today's most advanced technologies but also be able to marshal future developments. A full level comprehensive prediction of ITER physics rapidly becomes expensive in terms of computing resources and may cover a range of computing paradigms. The simulation framework therefore needs to be able to use both grid and HPC computing facilities. Hence, data access and code coupling technologies are required to be available for a heterogeneous, possibly distributed, environment. The developments in this area are pursued in a separate project - EUFORIA (EU Fusion for ITER Applications). The current status of ITM-TF and EUFORIA is presented and discussed.
This paper presents a semantic P2P framework for simulation of quantized virtual society. The quantized virtual society is the virtual society in which things are quantized and the actions to be taken are chosen by sc...
详细信息
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the...
详细信息
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the number of the participants and t is the number of the fault participants. The security of this scheme bases on discrete logarithm intractability assumption. We give the security analysis of our proposed threshold signature scheme.
The objective of many applications with the surveillance missions in wireless sensor networks is to provide long-term monitoring of the specific environments, such as disaster-hit regions. These applications usually p...
详细信息
The proceedings contain 22 papers. The topics discussed include: evaluating a novel cellular automata-based distributed power management approach for mobile wireless sensor networks;effects of feature selection using ...
ISBN:
(纸本)3642166989
The proceedings contain 22 papers. The topics discussed include: evaluating a novel cellular automata-based distributed power management approach for mobile wireless sensor networks;effects of feature selection using binary particle swarm optimization on wheat variety classification;a comparison of artificial intelligence methods on determining coronary artery disease;secure medical diagnosis using rule based mining;factors affecting intention to use in social networking sites: an empirical study on Thai society;a general Bayesian network approach to analyzing online game item values and its influence on consumer satisfaction and purchase intention;U-BASE: general Bayesian network-driven context prediction for decision support;and a dynamic Bayesian network approach to location prediction in ubiquitous computing environments.
暂无评论