Today, it has become more difficult for individual designer to fulfill the complicated design work due to the complexity of modern products. Grid provides a supporting environment for collaborative design. Cooperating...
详细信息
ISBN:
(纸本)184000025
Today, it has become more difficult for individual designer to fulfill the complicated design work due to the complexity of modern products. Grid provides a supporting environment for collaborative design. Cooperating work is the key to ensure the success of products design. Developing within the grid-based environment that is suitable to the demand of manufacturing design on special area is a challenge to the traditional methods of software development. In this paper, it creates a framework based manufacturing grid that uses peer-to-peer technology. According to this framework, there is a cooperating design environment, in which designers can make designing of machine tools. It also discusses the schedule of cooperating.
This paper presents a SOAP request scheduling algorithm for differentiated quality of service. The scheduling algorithm can be deployed on a Web services server or any server that processes SOAP requests. Due to the r...
详细信息
The variable, uncertain nature of climate imposes risk in using solar and building technologies, such as natural ventilation (NV). To maximize the potential benefit from NV while reducing risk, a building could be des...
详细信息
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for active application communication for active networks. JASIAC can work against &qu...
详细信息
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for active application communication for active networks. JASIAC can work against "un-authorization access" and "masquerading" quite well and work efficiently with "malicious access " and "direct DoS attack". It stores the variables and methods to be published in a public variable pool and public method pool respectively, so it makes the security manageable and efficient; it also provides multilevel security mechanisms such as timed variable, hiding inner name, parameter by value and read-only parameter to make the security reliable and flexible.
In distributed diagnosis it may be useful to achieve local consistency among local estimates. For that purpose the Computational Procedure for Local Consistency (CPLC) was proposed to achieve the supremal local suppor...
详细信息
In distributed diagnosis it may be useful to achieve local consistency among local estimates. For that purpose the Computational Procedure for Local Consistency (CPLC) was proposed to achieve the supremal local support, which represents one type of local consistency. It has been shown that if CPLC terminates then the result is in fact the supremal local support. However, in this paper it is shown that, even if all initial estimates are regular languages, the termination of CPLC is undecidable. Moreover, these difficulties are not confined to this specific procedure: it is undecidable whether the supremal local support corresponding to an arbitrary collection of regular initial languages is componentwise empty; consequently, the supremal local support is effectively uncomputable.
The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed f...
详细信息
The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed for DNS in terms of security and dependability. However, the current secure DNS (DNSSEC) standard has still several problems that need further consideration. For example, online updates and denial of service attacks are not sufficiently addressed. These problems are serious obstacles that might prevent DNSSEC from replacing the traditional DNS. In this paper we discuss several of these technical and economic problems. To address these issues, we propose a simple extension to the existing DNS. It is SSL based and individual domains can decide independently of each other if and when to adopt the extensions. We show how to implement these extensions with the help of a simple proxy DNS server.
This paper develops a wavelet based distributed ID model approach to analyses network traffic in detail. We adopt wavelet technique to analyze and model ID system to find the attack behavior in network. Our model can ...
详细信息
This paper develops a wavelet based distributed ID model approach to analyses network traffic in detail. We adopt wavelet technique to analyze and model ID system to find the attack behavior in network. Our model can post attack characteristic more clearly and, by way of improve the veracity, we compare corresponding network node signals of wavelet decomposition. We simulate attacks and the model can detect attack more precisely than the previous model does.
This paper presents novel algorithm for mining frequent itemsets in sparse database, compared with existing algorithm our algorithm has visible advantage. With this algorithm, the scans is less in transaction database...
详细信息
This paper presents novel algorithm for mining frequent itemsets in sparse database, compared with existing algorithm our algorithm has visible advantage. With this algorithm, the scans is less in transaction database, only one time in little and middle transaction database, and not more than two times in large database. In the algorithm, when the transaction database is scanned, the transaction items are saved in unit triplet, and the count of every transaction item is saved in 1-dimension array so that the frequent itemsets are generated in memory. So I/O spending is reduced greatly. The experimental results show that our algorithm is very promising.
Monitoring of relevant performance indicators can greatly contribute to the success of a logistics service provider. In practice, however, this is often done in an ad-hoc manner, leaving huge potential for improvement...
详细信息
Monitoring of relevant performance indicators can greatly contribute to the success of a logistics service provider. In practice, however, this is often done in an ad-hoc manner, leaving huge potential for improvement through adequate IT support. This paper proposes an approach to build an agent-based information system with emphasis on the interaction between the operational and strategic goals of the company. We present an example of the applied approach for the context of schedule generation and selection.
The growing complexity of MEMS devices and their increased used in embedded systems (e.g., wireless integrated sensor networks) demands a disciplined approach for MEMS design as well as the development of techniques f...
详细信息
The growing complexity of MEMS devices and their increased used in embedded systems (e.g., wireless integrated sensor networks) demands a disciplined approach for MEMS design as well as the development of techniques for system-level modeling of these devices so that a seamless integration with the existing embedded system design methodologies is possible. In this paper, we present a MEMS design methodology that uses VHDL-AMS based system-level model of a MEMS device as a starting point and combines the top-down and bottom-up design approaches for design, verification, and optimization. The capabilities of our proposed design methodology are illustrated through the design of a microaccelerometer
暂无评论