Finding all justifications of an OWL entailment is an important reasoning service for explaining logical inconsistencies. In this paper, we consider finding all justifications of an entailment in OWL pD*fragment, whic...
详细信息
In a proof of retrievability (POR) system, interactive POR protocols are executed between a storage server and clients, so that clients can be convinced that their data is available at the storage server, ready to be ...
详细信息
Ubiquitous computing heralds an era marked by the increasing pervasiveness of computational hardware throughout a given environment. In order to capitalize on the increased abundance of the underlying infrastructure m...
详细信息
Ubiquitous computing heralds an era marked by the increasing pervasiveness of computational hardware throughout a given environment. In order to capitalize on the increased abundance of the underlying infrastructure multi-agent systems will be required to reflect the characteristics of the ubiquitous networks upon which they operate. Due to the potential for limited communication capacity experienced by agents in the wild it will become increasingly important for mobile agents to migrate to devices in greater proximity to the problem upon which they are working or the resources they require. A result of highly mobile agents operating in potentially constrained computational and communication environments is that widely used command and coordination structures are no longer able to scale efficiently. Engineers are currently struggling with aspects of managing the physical devices which comprise such networks, particularly the obsolescence management of their constituent, highly dispersed, hardware. Analogously, the obsolescence management of deployed agents is of increasing concern. The paper examines and synthesizes several biological metaphors which may be employed in order to mitigate the inherent complexity of managing deployed mobile agent systems and presents this functionality in a service oriented manner.
Bluetooth-enabled cellphones are found in abundance today. Since cellphones are inherently mobile, they present obstacles for traditional Bluetooth multi-hop structures, namely scatternets. The main issue concerning s...
详细信息
Bluetooth-enabled cellphones are found in abundance today. Since cellphones are inherently mobile, they present obstacles for traditional Bluetooth multi-hop structures, namely scatternets. The main issue concerning scatternets is mobility and the overhead in replacing broken node links. This research proposes an approach for Bluetooth multi-hop message transport in crowded areas where mobility is considered to be walking speed. Here, opportunities for piconet links are plausible. Message transport by means of piconet message hopping is achievable by means of a novel algorithm and procedures presented.
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will ...
详细信息
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will satisfy both the service provider and consumer. Not only are there numerous problems with this approach, but is it also difficult for administrators to evaluate the resultant security level supported by such a policy. In contrast to this approach, security policy trade-off analysis can allow parties to make compromises to accommodate each other, while still achieving a satisfactory security level. This paper focuses on modeling the decisions and compromises to be made by web services providers or consumers to be able to interact with each other securely. The security policy support system built to model this problem employs domain vocabularies, fuzzy techniques and domain-specific preferences.
This paper will present a method for generating immune detectors inspired by the working of charged particle swarm optimisation and negative selection in the artificial immune system. The paper will also test the effi...
详细信息
This paper will present a method for generating immune detectors inspired by the working of charged particle swarm optimisation and negative selection in the artificial immune system. The paper will also test the efficiency of the proposed method against a benchmark in order to prove that the proposed method is superior to stochastic generation.
Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to root...
Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such that it can distribute other malware, hide existing malware, steal information, hide itself, disable anti-malware software etc all without the knowledge of the user. This paper will demonstrate the steps required in order to create two rootkits. We will demonstrate that by implementing rootkits or any other type of malware a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful when implementing anti-malware techniques.
Digital Business Ecosystem (DBE) is a decentralised environment where very small enterprises (VSEs) and small to medium sized enterprises (SMEs) interoperate by establishing collaborations with each other. Collaborati...
详细信息
Digital Business Ecosystem (DBE) is a decentralised environment where very small enterprises (VSEs) and small to medium sized enterprises (SMEs) interoperate by establishing collaborations with each other. Collaborations play a major role in the development of DBEs where it is often difficult to select partners, as they are most likely strangers. Even though trust forms the basis for collaboration decisions, trust and reputation information may not be available for each participant. Recommendations from other participants are therefore necessary to help with the selection process. Given the nature of DBEs, social network centrality measures that can influence power and control in the network need to be considered for DBE trust and reputation. A number of social network centralities, which influence reputation in social graphs have been studied in the past. This paper investigates an unexploited centrality measure, betweenness centrality, as a metric to be considered for trust and reputation.
Exception handling is a vital but often poorly tested part of a program. Static analysis can spot bugs on exceptional paths without actually making the exceptions happen. However, the traditional methods only focus on...
详细信息
Exception handling is a vital but often poorly tested part of a program. Static analysis can spot bugs on exceptional paths without actually making the exceptions happen. However, the traditional methods only focus on null dereferences on exceptional paths, but do not check the states of variables, which may be corrupted by exceptions. In this paper we propose a static analysis method that combines forward flow sensitive analysis and backward path feasibility analysis, to detect bugs caused by incorrect exception handling in Java programs. We found 8 bugs in three open source server applications, 6 of which cannot be found by Find Bugs. The experiments showed that our method is effective for finding bugs related to poorly handled exceptions.
SAT problem is one of important NP-complete problems with widespread applicationIn this paper, a new DNA computing model based on self-assembled nanoparticle probes is presented to solve this problemIts essence is tha...
详细信息
SAT problem is one of important NP-complete problems with widespread applicationIn this paper, a new DNA computing model based on self-assembled nanoparticle probes is presented to solve this problemIts essence is that all possible combinations of variables for given problem are encoded in the recognition zone of self-assembled nanoparticle probesMajor benefits of this method include vast parallelism, extraordinary information density and easy controllable operationThe result reveals the potential of DNA computation based on nano technology in solving complex problem.
暂无评论