Grid computing is a type of distributedcomputingthat has shown promising applications in many fields. A great concern in grid computing is the cheating problem described in the following: a participant is given D = ...
详细信息
ISBN:
(纸本)0769520863
Grid computing is a type of distributedcomputingthat has shown promising applications in many fields. A great concern in grid computing is the cheating problem described in the following: a participant is given D = {x(1),...,x(n)}, it needs to compute f(x) for all x c D and return the results of interest to the supervisor How does the supervisor efficiently ensure that the participant has computed f(x) for all the inputs in D, rather than a subset of it? If participants get paid for conducting the task, there are incentives for cheating. In this paper we propose a novel scheme to achieve the uncheatable grid computing. Our scheme uses a sampling technique and the Merkle-tree based commitment technique to achieve efficient and viable uncheatable grid computing.
this paper addresses the impacts of performance on scheduling tasks in heterogeneous computingsystems. A heuristic, called the Enhanced Communication-Aware Task Scheduling algorithm, is proposed to exploit the potent...
详细信息
this paper addresses the impacts of performance on scheduling tasks in heterogeneous computingsystems. A heuristic, called the Enhanced Communication-Aware Task Scheduling algorithm, is proposed to exploit the potential of parallel processing, allowing for system heterogeneity. this paper also shows that the scheduling performance is affected by the heterogeneity of computational power and that of communication mechanisms. the experimental results reveal the superiority of the proposed algorithm to those presented previously.
A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. these characteristics make it vulnerable to security attack, so ...
详细信息
ISBN:
(纸本)0769520871
A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. these characteristics make it vulnerable to security attack, so protecting the security of the network is essential. Like many distributedsystems, security in ad hoc networks widely relies on the use of key management mechanisms. However, traditional key management systems are not appropriate for them. this work aims at providing a secure and distributed authentication service in ad hoc networks. We propose a secure public key authentication service based on our trust model and network model to prevent nodes from obtaining false public keys of the others when there are malicious nodes in the network. We perform an overall evaluation of our proposed approach by simulations. the experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc networks.
this paper discusses the mobile Internet access in the context of project BAS (Business As uSual), which plans to develop a system that connects all the public service buses as nodes in an ad hoc network and use this ...
详细信息
ISBN:
(纸本)0769520871
this paper discusses the mobile Internet access in the context of project BAS (Business As uSual), which plans to develop a system that connects all the public service buses as nodes in an ad hoc network and use this network to provide a wide range of services that are perceived to be useful to commuters. In our system, the heterogeneous communication between wireless bus ad hoc network and Internet is established withthe installation of specific access routers along the road, which serves as gateways between these two types of networks. However, the integration of wireless bus ad hoc net-work withthe Internet faces many challenges, such as gateway discovery, mobility management and routing. In this paper, we propose an architecture that addresses these issues. Additionally, this architecture allows passengers to access the Internet withtheir mobile devices via this bus ad hoc network, and possibly reducing their access and usage costs.
Blockchain technology provides an auditable and tamper-proof distributed infrastructure that can support distributed workflow management. Blockchains based on a Byzantine Fault Tolerance (BFT) ordering consensus proto...
详细信息
ISBN:
(纸本)9781728164717
Blockchain technology provides an auditable and tamper-proof distributed infrastructure that can support distributed workflow management. Blockchains based on a Byzantine Fault Tolerance (BFT) ordering consensus protocol address many of the shortcomings of proof-of-work chains, such as latency and non-finality of consensus. they are a suitable technology to support workflow execution, in large part because applications do not need to be adapted to deal with eventual consistency and delayed consensus of proof-of-work blockchains. Moreover, in contrast to earlier work that has typically developed custom workflow engines using smart contracts, we port an existing, full-featured workflow engine, the YAWL workflow engine, to a blockchain-based workflow management system (WfMS) without smart contracts.
Change can be observed in our environment and in the technology we build. While changes in the environment happen continuously and implicitly, our technology has to be kept in sync withthe changing world around it. A...
详细信息
ISBN:
(纸本)0769520871
Change can be observed in our environment and in the technology we build. While changes in the environment happen continuously and implicitly, our technology has to be kept in sync withthe changing world around it. Although for some of the changes we can prepare, for most of them we cannot. this is especially true for next generation mobile communication systemsthat are expected to support the creation of a ubiquitous society where virtually everything is connected and made available within an organic information network. Resources will frequently join or leave the network, new types of media or new combinations of existing ones will be used to interact and cooperate, and services will be tailored to preferences and needs of individual customers to better meet their needs. this paper outlines our research in the area of dynamic service adaptation to provide concepts and technologies allowing for such environments.
All existing routing protocols of Mobile Ad Hoc networks assume that IP addresses of hosts are already configured before the), join the network. Some papers proposed solutions to allow an automatic configuration of no...
详细信息
ISBN:
(纸本)0769520871
All existing routing protocols of Mobile Ad Hoc networks assume that IP addresses of hosts are already configured before the), join the network. Some papers proposed solutions to allow an automatic configuration of nodes, i.e. without human intervention. Unfortunately these processes, often inspired of the traditional wired networks, are not always well adapted to the MANET model and appear relatively resources greedy Moreover they apply only to ideal networks in which all nodes can trust each other In this manner they do absolutely not consider the security aspects and are thus not adapted to a real use. In this paper we propose a node auto-configuration algorithm which uses the Buddy systems technique to allocate the addresses, as well as a scheme allowing to authenticate the participants inside the network.
On distributed multimedia systems, we have been able to communicate with each others by using audio and video streams. If we can use super high speed network we may construct intercommunication environments by high qu...
详细信息
ISBN:
(纸本)0769520871
On distributed multimedia systems, we have been able to communicate with each others by using audio and video streams. If we can use super high speed network we may construct intercommunication environments by high quality video multicast streams such as DV(Digital Video) that uses about 30Mbps per a stream. Moreover, if translator and mixer functions defined by RTP are available on the intercommunication environments, it is able to transcode the high quality video streams into another format of stream. We can get usefulness peer-to-peer communication environments. However, it is difficult for us to prepare the suitable transcoding node in advance because the required intercommunication environments are not always static. Accordingly, we should consider on demand transcoding functions with relocatable decision method. In this paper we propose a mobile agent based novel middleware system that realizes media processing and session management by using mobile agents.
Peer-to-peer systems can be used to form a low-latency decentralized data delivery system. Structured peer-to-peer systems provide both low latency and excellent load balance with uniform query and data distributions....
详细信息
ISBN:
(纸本)0769520863
Peer-to-peer systems can be used to form a low-latency decentralized data delivery system. Structured peer-to-peer systems provide both low latency and excellent load balance with uniform query and data distributions. Under the more common skewed access distributions, however individual nodes are easily overloaded, resulting in poor global performance and lost messages. this paper describes a lightweight, adaptive, and system-neutral replication protocol, called LAP, that maintains low access latencies and good load balance even under highly skewed demand. We apply LAR to Chord and show that it has lower overhead and better performance than existing replication strategies.
Autonomous agents are well established to assist customers in contract negotiations on electronic markets. Recently, AI-based conversational agents provide more natural customer communication. Yet, on markets with var...
详细信息
ISBN:
(纸本)9781728164717
Autonomous agents are well established to assist customers in contract negotiations on electronic markets. Recently, AI-based conversational agents provide more natural customer communication. Yet, on markets with varying negotiation items natural conversation can not be guaranteed to include all possible customer preferences for optimum negotiation results. In this paper, we propose a negotiation model supporting dynamic interactive preference post-specification and present a Hybrid Alternating Offers Protocol for that purpose. We demostrate it for conversationally initiated negotiations in the context of an app-market.
暂无评论