This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the international Conference on Digital Information Processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in J...
ISBN:
(数字)9783642224102
ISBN:
(纸本)9783642224096
This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the international Conference on Digital Information Processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in July 2011. The 91 revised full papers of both volumes presented together with 4 invited talks were carefully reviewed and selected from 235 submissions. The papers are organized in topical sections on network security; Web applications; data mining; neural networks; distributed and parallel processing; biometrics technologies; e-learning; information ethics; image processing; information and data management; softwareengineering; data compression; networks; computer security; hardware and systems; multimedia; ad hoc network; artificial intelligence; signal processing; cloud computing; forensics; security; software and systems; mobile networking; and some miscellaneous topics in digital information and communications.
In this paper we discuss the end-to-end schedulability analysis for the bi-directional multistage pipeline systems, in which the arriving tasks could traverse the pipeline nodes in either of the two opposite direction...
详细信息
This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the international Conference on Digital Information Processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in J...
ISBN:
(数字)9783642223891
ISBN:
(纸本)9783642223884
This two-volume-set (CCIS 188 and CCIS 189) constitutes the refereed proceedings of the international Conference on Digital Information Processing and Communications, ICDIPC 2011, held in Ostrava, Czech Republic, in July 2011. The 91 revised full papers of both volumes presented together with 4 invited talks were carefully reviewed and selected from 235 submissions. The papers are organized in topical sections on network security; Web applications; data mining; neural networks; distributed and parallel processing; biometrics technologies; e-learning; information ethics; image processing; information and data management; softwareengineering; data compression; networks; computer security; hardware and systems; multimedia; ad hoc network; artificial intelligence; signal processing; cloud computing; forensics; security; software and systems; mobile networking; and some miscellaneous topics in digital information and communications.
Massively parallel simulation application software running on high performance computers is composed by a number of distributed sub-systems which have close interaction and logic processing relationship. How to analyz...
详细信息
The performance of computationally intensive scientific applications on the underlying system can be maximized by providing application-level load balancing of loop iterates via the use of dynamic loop scheduling (DLS...
详细信息
As cloud services proliferate, it becomes difficult to facilitate service composition and testing in clouds. In traditional service-oriented computing, service composition and testing are carried out independently. Th...
详细信息
ISBN:
(纸本)9780769543499
As cloud services proliferate, it becomes difficult to facilitate service composition and testing in clouds. In traditional service-oriented computing, service composition and testing are carried out independently. This paper proposes a new approach to manage services on the cloud so that it can facilitate service composition and testing. The paper uses service implementation selection to facilitate service composition similar to Google's Guice and Spring tools, and apply the group testing technique to identify the oracle, and use the established oracle to perform continuous testing for new services or compositions. The paper extends the existing concept of template based service composition and focus on testing the same workflow of service composition. In addition, all these testing processes can be executed in parallel, and the paper illustrates how to apply service-level MapReduce [1] technique to accelerate the testing process.
A smart meter is one of the key elements of smart girds. An attacker can compromise smart meters by injecting malicious codes, and take financial benefits by modifying memory contents of the smart meters. An attestati...
详细信息
ISBN:
(纸本)9780769544298
A smart meter is one of the key elements of smart girds. An attacker can compromise smart meters by injecting malicious codes, and take financial benefits by modifying memory contents of the smart meters. An attestation scheme can prevent such a memory forgery attack as verifying memory contents. In smart grids, however, attestation processes are remotely performed through networks by a faraway utility. Therefore, attestation processes are exposed to network attacks such as man-in-the-middle (MITM) attacks. Even though existing attestation mechanisms detect local attacks such as the memory forgery, they are vulnerable to network attacks since they adopt a two-way attestation so-called a challenge-response protocol. In this paper, we propose a novel attestation mechanism, termed One-way Memory Attestation Protocol(OMAP), not only to detect local attacks, but also to defend against network attacks. Instead of using the two-way attestation, OMAP adopts an one-way attestation protocol;OMAP conducts a pre-defined internal algorithm, generates a checksum, and sends it to a verifier in one direction. Thus, OMAP does not require any information (e. g., challenges) from a verifier that can be exploitable by an adversary. In our experiments, as a smart meter scans only 0.004% of its memory, OMAP enables a verifier to detect memory modification with 95% probability if an attacker changes 20% of the memory.
With the increasing growth of technology and the entrance into the digital age, a huge amount of image data needs to have handled every time which often presents difficulties. So, these data must be stored and retriev...
详细信息
The proceedings contain 6 papers. The topics discussed include: performance engineering: a must for petascale and beyond;comparison of lock thrashing avoidance methods and its performance implications for lock design;...
ISBN:
(纸本)9781450307031
The proceedings contain 6 papers. The topics discussed include: performance engineering: a must for petascale and beyond;comparison of lock thrashing avoidance methods and its performance implications for lock design;making a case for distributed file systems at exascale;visual analysis of I/O system behavior for high-end computing;multi-scale analysis of large distributed computing systems;and an analysis of social gaming networks in online and face to face bridge communities.
One cannot image today's life without mechatronic systems, which have to be developed in a joint effort by teams of mechanical engineers, electrical engineers, control engineers and software engineers. Often these...
详细信息
暂无评论