This paper describes a safe and efficient combination of the object-based message-driven execution and shared array parallel programming models. In particular, we demonstrate how this combination engenders the composi...
详细信息
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, processed and visualised. Scientific experiment...
详细信息
The paper is concerned with data transmission via channels composed of a memoryless binary symmetric channel and the erasure channel of Peter Elias. Channels of this type play an important role in modelling different ...
The paper is concerned with data transmission via channels composed of a memoryless binary symmetric channel and the erasure channel of Peter Elias. Channels of this type play an important role in modelling different types of networks especially wireless networks, and have been investigated using, amongst others, the theory of Markov chains. Channel Capacities and network flows have been determined. The authors focus their interest on some aspects of coding theory. They assume the data transmission to be protected by a linear code, a CRC for example, and determine the probability of undetected error of the code. They then consider redundant transmission via two or more channels with bit inversion, and calculate the probability of undetected error. They prove some inequalities that are useful instruments to estimate the rate of transmission errors and to determine safety integrity levels according to the standards. Finally the authors apply their results to Bluetooth channels suffering from different types of noise.
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the syste...
详细信息
ISBN:
(纸本)9781618040282
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach - security services that can be developed and tested and applied against many types of applications or scenarios. The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment. In this model, the access control decision and (ideally) enforcement functionality is not embedded within an application. The split of enforcement and decision point has its advantages.
Maximum Distance Separable (MDS) codes are used as diffusion layers in the design of the well known block ciphers like the Advanced Encryption Standard (AES) and Khazad. The reason for the use of MDS codes in the desi...
详细信息
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to prop...
详细信息
ISBN:
(纸本)9789604742974
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to propose an ontology dependent approach to transform XML based scientific data description into RDF instances in order to using them as a complete resource on the Semantic Web. The transforming process includes: establishing an ontology describing the data semantic and links between the elements of the output RDF file;establishing a mapping document defining the relationship between the input XML Schema file and the OWL ontology. The proposed approach has been verified successfully as web service implementation utilizing specific scientific experimental data.
Access control is a vital security mechanism in today's operating systems and the security policies dictating the security relevant behaviors is lengthy and complex for example in Security-Enhanced Linux (SELinux)...
详细信息
The efficient use of future MPSoCs with f 000 or more processor cores requires new means of resource-aware programming to deal with increasing imperfections such as process variation, fault rates, aging effects, and p...
详细信息
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
暂无评论