While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors f...
详细信息
ISBN:
(纸本)9781605581668
While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors for potential vulnerabilities they may invite to the total system. In this paper, we propose an Automatic Trust Monitoring algorithm called ATM based on the specification of trust relationships in trust scenarios and the quantification of the relationships through trust calculation schemes. Trust rules are generated from the trust scenarios ready to be deployed at run-time. A service requestor is penalized for the violation of a trust rule and rewarded for no such violation. this analysis facilitates the quantification of the trustworthiness of service requestors and the accuracy of the recommendations from other service providers that can be used to make dynamic decisions on the corresponding requestors. the monitor is implemented in a prototype file sharing grid and evaluated using file sharing applications. Copyright 2009 acm.
BFT protocols in the synchronous setting rely on a strong assumption: every message sent by a party will arrive at its destination within a known bounded time. To allow some degree of asynchrony while still tolerating...
详细信息
ISBN:
(纸本)9781450385480
BFT protocols in the synchronous setting rely on a strong assumption: every message sent by a party will arrive at its destination within a known bounded time. To allow some degree of asynchrony while still tolerating a minority corruption, recently, in Crypto'19, a weaker synchrony assumption called mobile sluggish faults was introduced. In this work, we investigate the support for mobile sluggish faults in existing synchronous protocols such as Dfinity, Streamlet, Sync HotStuff, OptSync and the optimal latency BFT protocol. We identify key principles that can be used to "compile" these synchronous protocols to tolerate mobile sluggish faults.
there is an imbalance in the supply and demand for computing professionals that has generated shortages in meeting personnel needs within industry. A major program was developed by the U.S. National Science Foundation...
详细信息
ISBN:
(纸本)9781605585048
there is an imbalance in the supply and demand for computing professionals that has generated shortages in meeting personnel needs within industry. A major program was developed by the U.S. National Science Foundation to encourage innovations in undergraduate computing education. there are a variety of new projects that are revitalizing undergraduate computing education. One approach to such revitalization is the introduction of interdisciplinary courses to expand the scope of computing education. the basic idea is to have students from various disciplines work together on computing projects to expand their educational horizons and make computing courses more appealing. this panel brings together research managers with educators who have developed and taught interdisciplinary courses withthese goals in mind. the panelists will share their experiences and solicit new ideas from the audience.
Withthe widespread of rich mobile applications, the usage of mobile devices, especially smart phones and tablets, has become popular nowadays. However, battery in the mobile devices often limits continuous usages wit...
详细信息
ISBN:
(纸本)9781450324694
Withthe widespread of rich mobile applications, the usage of mobile devices, especially smart phones and tablets, has become popular nowadays. However, battery in the mobile devices often limits continuous usages with its small size and capacity. therefore, power consumption of mobile devices is a critical issue, not only for extending lifetime use of mobile devices, but also for creating a green IT which is a raising concern in academic and industrial communities. the goal of this paper is to investigate the power consumption of mobile devices and resource usages for various applications. To meet the goal, we have performed a number of experiments and detailed evaluations of resource usages and power consumption for various applications using a number of tools. In addition, we have measured performance metrics for applications either using a mobile device or running in the Amazon cloud. We examine the impact of various factors and provide insights on power consumption for different mobile applications. Copyright 2014 acm.
Ubiquitous Learning (UbiLearning) environments heavily employ mobile devices to empower users with mobility and tooling support to learn anytime, anywhere. Introducing mobile devices in educational settings imposes co...
详细信息
ISBN:
(纸本)9781605581668
Ubiquitous Learning (UbiLearning) environments heavily employ mobile devices to empower users with mobility and tooling support to learn anytime, anywhere. Introducing mobile devices in educational settings imposes constraints on search behavior due to limited resources on these devices such as small screens and restricted input functionalities. Targeting this scenario, this paper proposes an architecture for implicit relevance feedback which considers users' work context to expand search queries in order to satisfy information needs with greater precision. Evaluation results conducted over a local test collection enriched with contextual features reveal improvements on average precision when compared to a pseudo relevance feedback baseline. Copyright 2009 acm.
Applications are increasingly using XML to represent semi-structured data and, consequently, a large amount of XML documents is available worldwide. As XML documents evolve over time, comparing XML documents to unders...
详细信息
ISBN:
(纸本)9781450324694
Applications are increasingly using XML to represent semi-structured data and, consequently, a large amount of XML documents is available worldwide. As XML documents evolve over time, comparing XML documents to understand their evolution becomes fundamental. the main focus of existing research for comparing XML documents resides in identifying syntactic changes. However, a deeper notion of the change meaning is usually desired. this paper presents an inference-based XML evolution approach using Prolog to deal withthis problem. Differently from existing XML diff approaches, our approach composes multiple syntactic changes, which usually have a common purpose, to infer semantic changes. We evaluated our approach through ten versions of an employment XML document. In this evaluation, we could observe that each new version introduced syntactic changes that could be summarized into semantic changes. Copyright 2014 acm.
there is a high rate of software development projects that fails. Whenever problems can be detected ahead of time, software development projects may have better chances of success, and therefore save money and time. I...
详细信息
ISBN:
(纸本)9781450316569
there is a high rate of software development projects that fails. Whenever problems can be detected ahead of time, software development projects may have better chances of success, and therefore save money and time. In this paper, we present a probabilistic model to help ScrumMasters to apply Scrum in organizations. the model's goal is to provide information to the project's ScrumMaster to help him to be aware of the project's problems and have enough information to guide the team and improve the project's chances of success. We published a survey to collect data for this study and validated the model by applying it to scenarios. the results obtained so far show that the model is promising. Copyright 2013 acm.
As Cloud computing is a very well developed domain, many companies tend to move their entire activity in Cloud. At the same time, there is a tendency to move some of the data processing from Cloud to Edge as close as ...
详细信息
ISBN:
(纸本)9781450359337
As Cloud computing is a very well developed domain, many companies tend to move their entire activity in Cloud. At the same time, there is a tendency to move some of the data processing from Cloud to Edge as close as possible to the end devices. One main advantage of this approach is minimizing the latency in communication between the end devices and Cloud. Better usage of on premise devices is also a good achievement of the Edge offload. In this paper, we propose an architecture for applications that are connected to ROBIN-Cloud or to a general Cloud. We present how we have encapsulated Python-based microservices in Docker containers. We provide an implementation for the My Cloudy Time Machine application - GIGEL (Guided Intelligent GEared Legend), a nearby autonomous assistive robot. We use this prototype to evaluate the scalability of the proposed architecture. We also present results that show how to gain high performance by tuning a container-based embedded system.
the vast number of on-line biological and medical databases available can be a great resource for biomedical researchers. However, the different types of data and interfaces available can be overwhelming for many biom...
详细信息
Pegasus is a planning framework for mapping abstract workflows for execution on the Grid. this paper presents the implementation of a web-based portal for submitting workflows to the Grid using Pegasus. the portal als...
详细信息
ISBN:
(纸本)9781581139648
Pegasus is a planning framework for mapping abstract workflows for execution on the Grid. this paper presents the implementation of a web-based portal for submitting workflows to the Grid using Pegasus. the portal also includes components for generating abstract workflows based on a metadata description of the desired data products and application-specific services. We describe our experiences in using this portal for two Grid applications. A major contribution of our work is in introducing several components that can be useful for Grid portals and hence should be included in Grid portal development toolkits. Copyright 2005 acm.
暂无评论