this paper describes a security model we refer to as the Probabilistic Multi-Lateral Security Model (P-MLSM). the P-MLSM is designed to analyze security issues in Ubiquitous Multimedia Services, envisioned to be flexi...
详细信息
ISBN:
(纸本)0769520871
this paper describes a security model we refer to as the Probabilistic Multi-Lateral Security Model (P-MLSM). the P-MLSM is designed to analyze security issues in Ubiquitous Multimedia Services, envisioned to be flexible digital systems built upon the global broadband network. there is interest on a broad range of security issues concerning such services. A comprehensive, flexible and reliable model that addresses these issues is greatly needed. the P-MLSM considers security as a multi-lateral mutual measure between different objectives, perspectives and knowledge concerning the system. We will then describe a probabilistic nature of the P-MLSM. Lastly, via an example, we will illustrate how various security related phenomena and design criteria can be analyzed using the model.
In this paper we present CHIARA, the programming language used to program CODACS (a general purpose dataflow architecture exploiting FPGA technology), and describe the compiling strategies leading from CHIARA programs...
详细信息
ISBN:
(纸本)0769520871
In this paper we present CHIARA, the programming language used to program CODACS (a general purpose dataflow architecture exploiting FPGA technology), and describe the compiling strategies leading from CHIARA programs to the CODACS dataflow graphs. CHIARA is a functional programming language based on Backus' FP. We designed boththe language and the compiling tools in such a way that CHIARA programs can be efficiently compiled and run onto the overall architecture and CODACS platform-processors being, for the latter also the low-level (assembly) programming language. Some preliminary experimental results are discussed, demonstrating that the CHIARA approach to CODACS programming is feasible and promising.
Many people have studied formal specification and verification methods of real-time systems all over the world. We can specify real-time systems using timed automata, and verify them using model-checking. Especially, ...
详细信息
ISBN:
(纸本)0769520871
Many people have studied formal specification and verification methods of real-time systems all over the world. We can specify real-time systems using timed automata, and verify them using model-checking. Especially, recently, probabilistic timed automata and their model-checking have been developed in order to express the relative likelihood of the system exhibiting certain behavior. Moreover model-checking and probabilistic timed simulation verification methods of probabilistic timed automata have been developed. In this paper we propose probabilistic timed transition systems by generalizing probabilistic timed automata, and propose deductive verification rules of probabilistic real-time linear temporal logic over probabilistic timed transition systems. As our proposed probabilistic timed transition system is a general computational model, we have developed general verification methods.
Today many documents are held in parallel as electronic files and as paper based documents. Keeping the properties of both versions in sync is important to assure consistency between the physical and virtual instances...
详细信息
ISBN:
(纸本)0769520871
Today many documents are held in parallel as electronic files and as paper based documents. Keeping the properties of both versions in sync is important to assure consistency between the physical and virtual instances of one document. this paper introduces the DigiClip system that provides a solution to automatically enforce such consistency by converting passive paper documents to active physical documents. the main component of the system is the DigiClip device, a clip with embedded computing, sensing and communication technology that is attached to a paper document. the device is able to supervise the status of the document and to communicate to a software component that supervises the electronic instance of the same document. In this way the DigiClip system enables applications to automatically coordinate properties like integrity and access restrictions and to keep track of changes both of the physical and the virtual document.
Due to the lack of infrastructure and vulnerability of wireless links, security in ad hoc networks is considered to be much more difficult than in traditional hierarchical networks. Building the trust relationship bet...
详细信息
ISBN:
(纸本)0769520871
Due to the lack of infrastructure and vulnerability of wireless links, security in ad hoc networks is considered to be much more difficult than in traditional hierarchical networks. Building the trust relationship between entities is a fundamental problem in ad hoc networks, since the availability of servers, which distribute trust certificates, is not guaranteed. Furthermore, the existence of any trusted server might not be assumed either. therefore, the commonly used key distribution center (KDC) and certification authority (CA) are not applicable in such highly autonomous environments. In this paper, we propose a scheme for the distribution of trust certificates, which is completely distributed and adaptive to mobility. Our scheme is based on the swarm intelligence paradigm, which has been used for routing both in wired and wireless networks. Our simulations in ns-2 show that it performs very well in ad hoc environments.
this paper describes a proposal to improve the negotiation of value-added services. the approach aims at supporting user-network interactions in an automatic fashion. Stemming from the concept of metadata, we designed...
详细信息
ISBN:
(纸本)0769520871
this paper describes a proposal to improve the negotiation of value-added services. the approach aims at supporting user-network interactions in an automatic fashion. Stemming from the concept of metadata, we designed a specific model for on-line delivery of digital multimedia resources with provisioning of guaranteed performance. We exploited such features in an architecture that provides network operators and service providers withthe capability to perform a service creation and delivery process on top of a QoS-enabled infrastructure, with automated configuration of the underlying communication network. In this architecture neither the users nor the service operators need to have information about the QoS requirements of service content since the QoS related network operations are performed transparently and can be dynamically managed during the trading of the service.
this paper addresses a key issue that arises in run-time recomposition of software: the transfer of nontransient state between old components and their replacements. We focus on the concept of collateral change, which...
详细信息
ISBN:
(纸本)0769520871
this paper addresses a key issue that arises in run-time recomposition of software: the transfer of nontransient state between old components and their replacements. We focus on the concept of collateral change, which refers to the set of recomposition actions that must be applied atomically for continued correct execution of the system. We describe Perimorph, a system that supports compositional adaptation of both functional and nonfunctional concerns by explicitly addressing collateral change. the operation of Perimorph is demonstrated through the implementation and testing of a 2D/3D digital elevation mapping application that supports recomposition and handoff among networked devices with varying capabilities.
In this paper we propose a new model of message proliferation among many people. We assume that these people carry short-range wireless devices and move around in a certain area such as a shopping mall. By utilizing t...
详细信息
ISBN:
(纸本)0769520871
In this paper we propose a new model of message proliferation among many people. We assume that these people carry short-range wireless devices and move around in a certain area such as a shopping mall. By utilizing the intrinsic nature of mobility of people, messages originated from service providers are disseminated in such a way that a person transmits the retained messages to neat-by people who have interest in the messages. We call such a system SSWD, which stands for Selection of Advertised Services Using Wireless Devices. this paper describes the design of SSWD and discusses designing issues for people-supporting ad hoc networks.
In this paper, we describe our methodology for co-simulation at a high level of abstraction, to validate the execution of real time applications on simulated H/W using a simulation wrapper of a real time operating sys...
详细信息
ISBN:
(纸本)0769520871
In this paper, we describe our methodology for co-simulation at a high level of abstraction, to validate the execution of real time applications on simulated H/W using a simulation wrapper of a real time operating system (RTOS). the simulation wrapper is built on kernel target specification described in a kernel framework model (KFM), by adding the constructs needed for simulation dynamics to create a simulation model of an RTOS. We describe these dynamics and then show the interaction of the embedded S/W consisting of the simulation model of the RTOS and the application running above, with a bus functional model (BFM) of a micro-controller. Our methodology is demonstrated by S/W application.
In this paper, we introduce our geographic information system using a mobile phone that is equipped with a camera and a GPS and its exhibitions. We aim to provide a social information spaces for local communities or t...
详细信息
ISBN:
(纸本)0769520871
In this paper, we introduce our geographic information system using a mobile phone that is equipped with a camera and a GPS and its exhibitions. We aim to provide a social information spaces for local communities or towns. Users can annotate not only text notes but also photos to physical spaces by sending emails with photos and location information by GPS attached from mobile phones. Any users using such mobile phones can annotate information to physical spaces when and where they want to do it and act as content provider. We exhibited our system as a photography exhibition in Tokyo and Sendai.
暂无评论