The support of reliability as adopted in conventional replication or transaction processing techniques is not enough due to their distinct objectives: Replication guarantees the liveness of computational operations by...
详细信息
The support of reliability as adopted in conventional replication or transaction processing techniques is not enough due to their distinct objectives: Replication guarantees the liveness of computational operations by using forward error recovery, while transaction processing guarantees the safety of application data by using backward error recovery. Combining the two mechanisms for stronger reliability is a challenging task. Current solutions, however, are typically on the assumption of simple transaction pattern where only a server transaction exists at the middle-tier application server, and seldom think about some complex patterns, such as client transaction or nested transaction. To address this problem, four typical transaction patterns in J2EE application are recognized first. Then a Web application server replication scheme based state synchronization point concept, RSCTP (replication scheme for complex transaction pattern), is presented to uniformly provide exactly-once semantic reliability support for these complex transaction patterns. In this scheme, EJB components are replicated to endow business logics with high availability. In addition, by replicating transaction coordinator, the blocking problem of 2PC protocol during distributed transactions processing is eliminated. Different transaction scenarios are also discussed to illustrate the effectivity of this scheme. This scheme has been implemented, and it has been integrated into J2EE compatible application server, OnceAS, and the performance evaluation shows that its overhead is acceptable.
Covert channels cause serious security threat to information systems, and the research on the information transmission principle of the channels is crucial to detect and eliminate them. Covert channel is essentially a...
详细信息
Covert channels cause serious security threat to information systems, and the research on the information transmission principle of the channels is crucial to detect and eliminate them. Covert channel is essentially a communication channel to transmit information illegally. In the paper, an information system is firstly regarded as a communication channel, and the information transmission in it is considered as a regular communication process. Then, an information transmission model is introduced, and it can present clearly the information transmission principle and the communication process including encoding, concocting and decoding. Lastly, a method of calculating the communication bandwidth is discussed.
The task of Aircraft Landing Scheduling (ALS) is to give a landing sequence and landing times for a given set of aircrafts where many constraints must be satisfied. ALS is an NP-hard problem with large-scale and multi...
详细信息
Magnetic measurements were performed on apparently deformed igneous rocks of 23 sites from the southeastern part of the Taimyr Peninsula. Rock magnetism and reflected light microscopy analyses reveal that fine-grained...
详细信息
Magnetic measurements were performed on apparently deformed igneous rocks of 23 sites from the southeastern part of the Taimyr Peninsula. Rock magnetism and reflected light microscopy analyses reveal that fine-grained titanomagnetites up to pure magnetites mainly carry the majority of magnetic fabrics in the sills, and that the slightly coarser Ti-poor or -medium titanomagnetites carry most mag-netic fabrics in the basaltic flows. Magnetic anisotropies were determined by applying anisotropy of low-field magnetic susceptibility (AMS) on 180 unheated samples and 128 samples that had been pre-viously heated to 600°C during a paleomagnetic study to detect heating effects on the anisotropy of magnetic susceptibility (AMS) properties of volcanic rocks. laboratory heating significantly affects anisotropy variations of these igneous rocks corresponding to the mineralogical changes during the heat treatment.
This paper presents a novel method for classification problems. Firstly, entropy is introduced to select the best discretization solution from Chi-merge for each feature to guide grid partition. Afterwards one simple ...
详细信息
This paper presents a novel method for classification problems. Firstly, entropy is introduced to select the best discretization solution from Chi-merge for each feature to guide grid partition. Afterwards one simple rule is generated from each data point, and the combination of simple rules with the same antecedent yields the consequent of an aggregated rule for each grid. Because grid partition is based on rational discretization, the extracted rules are not only easy to understand but also produce accurate results even without tuning. In addition to quick learning, the method accommodates incremental learning, namely, rules can be updated quickly once new data are obtained. A benchmark case is studied to demonstrate the effectiveness of the proposed method.
To study the transversal oscillation response of the tether under vortex-induced vibration and parametric vibration, a nonlinear tether-tube model of submerged floating-tunnels is proposed by the basis of taking the s...
详细信息
To study the transversal oscillation response of the tether under vortex-induced vibration and parametric vibration, a nonlinear tether-tube model of submerged floating-tunnels is proposed by the basis of taking the sag of the tether into account. Numerical analysis and solutions are presented by Galerkin method and Runge-Kuta integration method. It may be concluded that the vortex-induced vibration of the tether may excite the parametric vibration of the system;the initial disturbance of the system has a significant effect on the transient amplitude of the tether;the steady-state vibration amplitude of the tether is determined by the vortex-induced vibration;the response under the combined action of vortex-induced vibrations and parametric vibrations is larger than that of any single vibration.
In Wyner-Ziv video coding, efficient compression is achieved by exploiting source statistics at the decoder only, which is radically different from conventional video coding. Prior work on this topic has been restrict...
In Wyner-Ziv video coding, efficient compression is achieved by exploiting source statistics at the decoder only, which is radically different from conventional video coding. Prior work on this topic has been restricted to a basic framework based on algebraic channel coding principles. In this paper, we propose a novel distributed source coding method based on the signal denoising and channel coding approaches that exploit denoising technique to separate the correlation portion of data which is encoded by channel codec, and then encodes the other portion using entropy codec. Our contributions are mainly as follows: (1) To utilize signal denoising and channel coding techniques to implement distributed source coding, a simple correlation structure between the source and the side information is given. (2) A new distributed source coding framework is proposed. (3) To apply the proposed framework in video coding systems, we propose a novel distributed video coding method. Our experimental results show that, comparing to prior distributed video scheme, the proposed scheme can achieve comparable or even better compression efficiency while coding at the same bit rate.
Much attention has been paid to the theoretical explanation of the empirical success of AdaBoost. The most influential work is the margin theory, which is essentially an upper bound for the generalization error of any...
详细信息
Much attention has been paid to the theoretical explanation of the empirical success of AdaBoost. The most influential work is the margin theory, which is essentially an upper bound for the generalization error of any voting classifier in terms of the margin distribution over the training data. However, Breiman raised important questions about the margin explanation by developing a boosting algorithm arc-gv that provably generates a larger minimum margin than AdaBoost. He also gave a sharper bound in terms of the minimum margin, and argued that the minimum margin governs the generalization. In experiments however, arc-gv usually performs worse than Ad-aBoost, putting the margin explanation into serious doubts. In this paper, we try to give a complete answer to Breiman's critique by proving a bound in terms of a new margin measure called Equilibrium margin (Emargin). The Emargin bound is uniformly sharper than Breiman's minimum margin bound. This result suggests that the minimum margin is not crucial for the generalization error. We also show that a large Emargin implies good generalization. Experimental results on benchmark datasets demonstrate that AdaBoost usually has a larger Emargin and a smaller test error than arc-gv, which agrees well with our theory.
To improve the security and applicable capability of the group key management in 802.16e standard, the traditional group key management mechanism is discussed and the current security solutions for group key managemen...
详细信息
To improve the security and applicable capability of the group key management in 802.16e standard, the traditional group key management mechanism is discussed and the current security solutions for group key management in WiMax is analyzed. By using key tree and one-way function, an improved tree-shape group key management scheme is proposed, and the key updating process during node joining in or leaving Wimax network is also designed. Analysis result shows that, compared with the conventional method of logical key hierarchy (LKH), the proposed scheme has better performance in key storage, key updating and key calculation cost, which provides an effective solution for group key management in Wimax network and has better application value.
PKI-based security frameworks for Email systems, such as S/MIME, are all good at working for content protects but not efficient because of the high cost for public key certificate management. In others, PGP-based solu...
详细信息
PKI-based security frameworks for Email systems, such as S/MIME, are all good at working for content protects but not efficient because of the high cost for public key certificate management. In others, PGP-based solutions are also popularly studied, but the problem on credential trust management is still in challenging. In this paper, the identity-based encryption mechanism, shortly for IBE, is investigated first. Then, a novel security proxy scheme using IBE is proposed for providing secure Email encryption service. It needs no public key management, and the proxy service can automatically decrypt the encrypted Email contents for the general email users. If only the IDs of the users used for IBE encryption are given, the decryption private key can be requested on-the-demand by the proxy. At last, the security and performance for the proposed system are both discussed.
暂无评论