By immersing computational systems into the physical world, pervasive computing brings us from traditional desktop computing interactions into a form closer to human interactions, which are characterized by their depe...
详细信息
ISBN:
(纸本)9781581139648
By immersing computational systems into the physical world, pervasive computing brings us from traditional desktop computing interactions into a form closer to human interactions, which are characterized by their dependance on the environment. Furthermore, acting within the environment can contribute in many cases to a form of implicit interaction in which no explicit communication message is exchanged. However, this way of interacting cannot be achieved without a shared common knowledge with a well defined semantic. this appeals to explore a new approach of interaction mediated by the environment, closer to human interactions, and therefore, more suitable to achieve the intended silent computation of pervasive computing. To address this issue, we present in this paper XCM;a generic coordination model for pervasive computing. XCM is organized around few abstract concepts (entity, environment, social law and port) and is expressed as an ontology. While the abstract concepts of XCM deal withthe environmental representation and context-dependency, the ontological representation allows to achieve knowledge sharing and context reasoning. Copyright 2005 acm.
Android OS have several security vulnerabilities. Most of existing proposals require extensive modification of Android kernel or application framework. So, they are not feasible for end users which use stock Android O...
详细信息
ISBN:
(纸本)9781450316569
Android OS have several security vulnerabilities. Most of existing proposals require extensive modification of Android kernel or application framework. So, they are not feasible for end users which use stock Android OS. In this paper, we present a novel application market system which protect users from piracy by malicious third-party applications installed in their devices without any modification of Android system. Our market system grants users the ability to monitor and control applications' malicious behaviors at runtime by inserting instrumentation codes into each application in its repository. Experimental results show that our market system is effective at preventing applications' malicious behaviors. Copyright 2013 acm.
Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forens...
详细信息
ISBN:
(纸本)9781581139648
Network forensics and honeynet systems have the same features of collecting information about the computer misuses. Honeynet system can lure attackers and gain information about new types of intrusions. Network forensics system can analysis and reconstruct the attack behaviors. these two systems integrating together can help to build an active self-learning and response system to profile the intrusion behavior features and investigate the attack original source. In this paper, we present a design of honeynet based active network intrusion response system. the features of our system are distributed adaptive network forensics and active real time network investigation. Copyright 2005 acm.
In many practical applications, we are interested in computingthe product of given matrices and/or a power of a given matrix. In some cases, the initial matrices are only known with interval uncertainty. It turns out...
详细信息
ISBN:
(纸本)9781581139648
In many practical applications, we are interested in computingthe product of given matrices and/or a power of a given matrix. In some cases, the initial matrices are only known with interval uncertainty. It turns out that under this uncertainty, there is a principal difference between the product of two matrices and the product of three (or more) matrices: on the one hand, it is more or less known that the problems of computingthe exact range for the product of two matrices - and for the square of a matrix - are computationally feasible;on the other hand, we prove that the problems of computingthe exact ranges for the product of three matrices - and for the third power of a matrix - are NP-hard. Copyright 2005 acm.
Advances in spatially enabled semantic computing can provide situation aware assistance for mobile users. this intelligent and context-aware technology presents the right information at the right time, place and situa...
详细信息
ISBN:
(纸本)9781581138122
Advances in spatially enabled semantic computing can provide situation aware assistance for mobile users. this intelligent and context-aware technology presents the right information at the right time, place and situation by exploiting semantically referenced data for knowledge discovery. the system takes advantage of new metadata standards to enable semantic, user, and device adapted transactions on multimedia datasets. Information accessed in the past and the activities planned by the user, the situation dependencies (e.g. location) of these activities are used to infer future information requirements. the focus of this paper describes an application of the above functionalities for performing mobile context-aware queries and updating of a multimedia spatial database of cultural heritage artifacts concerning early 20th century Dublin. It aims to exploit current consumer trends in mobile device usage by opening new markets for the increasing number of visitors to Dublin's streets. An on-going development of this technology, the project MoCHA (Mobile Cultural Heritage Adventures), will allow the mobile cultural heritage consumer to explore a personally tailored view of Dublin's treasured artefacts, historical events and districts in an interactive and intuitive way directly on their spatially enabled PDA.
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previ...
详细信息
ISBN:
(纸本)9781450316569
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previous software watermarking schemes in mobile applications. To decrease the watermarking overhead in a watermarking scheme, such as a slowdown in the execution of applications after embedding a watermark, we proposed a different approach that applies steganography-based techniques in software watermarking. the proposed scheme embeds watermarks by reordering the sequence of instructions in the basic blocks in Dalvik executable files. Copyright 2013 acm.
this paper provides a new method for computing numerical approximations of the roots of a zero-dimensional system. It works on general systems, even those with multiple roots, and avoids any arbitrary choice of linear...
详细信息
ISBN:
(纸本)9781605586090
this paper provides a new method for computing numerical approximations of the roots of a zero-dimensional system. It works on general systems, even those with multiple roots, and avoids any arbitrary choice of linear combination of the multiplication operators. It works by computing eigenvectors (or a basis of the full invariant;subspaces). the sparsity/structure of the multiplication operators by one variable can also be taken into account.
Spam has become an increasingly important problem with a big economic impact in society. Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an acti...
详细信息
In this paper, we present a dynamic channel assignment scheme for highway macrocellular networks that is suitable for real-time services in terms of execution overhead and efficient in terms of reducing call blocking....
详细信息
ISBN:
(纸本)1581130864
In this paper, we present a dynamic channel assignment scheme for highway macrocellular networks that is suitable for real-time services in terms of execution overhead and efficient in terms of reducing call blocking. the scheme can be used in a large segment of global highways, namely, linear macrocells in which the radio channels used in a given cell cannot be simultaneously used in two neighboring cells to its left and to its right. the scheme has the advantage of low execution time, small number of transmitted messages per request and low space overhead. By using a non-compact initial assignment of nominal channels, the scheme greatly simplifies the channel selection process and avoids the expensive computation and message exchanges typically used in dynamic channel allocation schemes. Performance simulation results show that the scheme also achieves low blocking probability and is therefore suitable for real-time connections in highway cellular networks.
WiMAX is a technology that provides continuous high data throughput with low delays for various user types and modes of operation. the security protocols proposed for WiMAX impose a heavy performance overhead, especia...
详细信息
暂无评论