The World Wide Web is a constantly changing environment in which academia, industry and interest groups participate to innovate and design the next evolution of online user interaction. The ad-hoc nature in which new ...
详细信息
ISBN:
(纸本)9789898425515
The World Wide Web is a constantly changing environment in which academia, industry and interest groups participate to innovate and design the next evolution of online user interaction. The ad-hoc nature in which new web-based systems and technologies have been developed has led to an increasingly diverse environment, with ill defined interactions and fuzzy classification systems. Recently, business pioneers in the industry have attempted to classify web applications into large groupings based on certain key characteristics. The high-level taxonomy presented in this paper provides a way to scientifically classify web applications. By classifying applications and studying the progression from one classification to the next, predictions can be made as to the direction of future web application development. After presenting a formal classification model this research discusses how this model can be used to compare existing web technologies and design the next generation of the World Wide Web.
From an consumer perspective the Cloud is opaque. Online storage and the rise of web applications are changing the way users work. There continues though to be no distinction from a user experience point of view betwe...
详细信息
ISBN:
(纸本)9789898425522
From an consumer perspective the Cloud is opaque. Online storage and the rise of web applications are changing the way users work. There continues though to be no distinction from a user experience point of view between accessing a Cloud-based application and accessing a web application deployed on a classic server. We propose a new paradigm for online application development which takes the best from web applications, thick client applications and the new "application store" market. This approach expands the cloud to encompass all resources that belong to a user;be it local client resources or server-farm resources procured using a traditional cloud model. By implementing these concepts we can bring the benefits of cloud computing directly to the end user while breaking developers out of the confines of the web browser.
In computer systems, printable characters include not only 62 alphanumeric characters (0-9, a-z and A-Z) but also non-alphanumeric characters (e.g. *, \, , %). Base64 is a commonly used encoding scheme that represents...
详细信息
One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques ...
详细信息
One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmission and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization.
In computer systems, printable characters include not only 62 alphanumeric characters (0-9, a-z and A-Z) but also non-alphanumeric characters (e.g. *, \, ∧, %). Base64 is a commonly used encoding scheme that rep...
详细信息
In computer systems, printable characters include not only 62 alphanumeric characters (0-9, a-z and A-Z) but also non-alphanumeric characters (e.g. *, \, ∧, %). Base64 is a commonly used encoding scheme that represents binary data in an ASCII string format However, for Base64, non-alphanumeric characters (e.g. *, \, ∧, %) are problematic for filenames and URLs. For example, “+” is error-prone in URL and “/” is not allowed in filenames. To address this issue, we propose a new method, Base62x, as an alternative approach to Base64. The proposed method is more effective in application development and fully compatible with symbol-sensitive applications, such as, file systems, IP addresses and safe transmission of non-ASCII over the Internet.
A relevant feature of online social networks like Facebook is the scope for users to share external information from the web with their friends by sharing an URL. The phenomenon of sharing has bridged the web graph wi...
详细信息
A relevant feature of online social networks like Facebook is the scope for users to share external information from the web with their friends by sharing an URL. The phenomenon of sharing has bridged the web graph with the social network graph and the shared knowledge in ego networks has become a source for relevant information for an individual user, leading to the emergence of social search as a powerful tool for information retrieval. Consideration of the social context has become an essential factor in the process of ranking results in response to queries in social search engines. In this work, we present InfoSearch, a social search engine built over the Facebook platform, which lets users search for information based on what their friends have shared. We identify and implement three distinct ranking factors based on the number of mutual friends, social group membership, and time stamp of shared documents to rank results for user searches. We perform user studies based on the Facebook feeds of two authors to understand the impact of each ranking factor on the result for two queries.
The license management is one of the main concerns when Independent Software Vendors (ISV) try to distribute their software in computing platforms such as Clouds. They want to be sure that customers use their software...
详细信息
The license management is one of the main concerns when Independent Software Vendors (ISV) try to distribute their software in computing platforms such as Clouds. They want to be sure that customers use their software according to their license terms. The work presented in this paper tries to solve part of this problem extending a semantic resource allocation approach for supporting the scheduling of job taking into account software licenses. This approach defines the licenses as another type of computational resource which is available in the system and must be allocated to the different jobs requested by the users. License terms are modeled as resource properties, which describe the license constraints. A resource ontology has been extended in order to model the relations between customers, providers, jobs, resources and licenses in detail and make them machine processable. The license scheduling has been introduced in a semantic resource allocation process by providing a set of rules, which evaluate the semantic license terms during the job scheduling.
distributedcomputing has many opportunities for Modeling and Simulation (M&S). Grid computing approaches have been developed that can use multiple computers to reduce the processing time of an application. In ter...
详细信息
distributedcomputing has many opportunities for Modeling and Simulation (M&S). Grid computing approaches have been developed that can use multiple computers to reduce the processing time of an application. In terms of M&S this means simulations can be run very quickly by distributing individual runs over locally or remotely available computing resources. distributed simulation techniques allow us to link together models over a network enabling the creation of large models and/or models that could not be developed due to data sharing or model reuse problems. Using real-world examples, this advanced tutorial discusses how both approaches can be used to benefit M&S researchers and practitioners alike.
This paper proposes a hash-based secure interface between two nodes on the Internet, especial between two interfaces or two web pages. Digital signatures and public-private keys are traditionally used to provide integ...
详细信息
ISBN:
(纸本)9781457701009
This paper proposes a hash-based secure interface between two nodes on the Internet, especial between two interfaces or two web pages. Digital signatures and public-private keys are traditionally used to provide integrity and authentication. This paper proposes an alternative method which uses a shared private key and a public hash function for a message that is sent over a plain connection without losing integrity and authentication. An additional private algorithm is needed when the message has been hashed based on the message and the salt (the shared private key), and the hashed value will be re-computed with the private algorithm to produce a string named as checksum. At the other end, when a message is received with a checksum the same process is followed to produce a new checksum. If the produced checksum is equal to the received checksum, the message is legitimate. For efficiency and reliability, a timestamp and validity period is introduced to the scheme. The salt gets more salty with time included and so does the secure interface.
In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various project...
详细信息
暂无评论