In this paper we study the Station Placement problem on directed graphs, a problem that has applications to efficient multicasting in circuit-switched networks. We first argue that the problem on general directed grap...
详细信息
Designing and maintaining Web applications is one of the major challenges that software industry has to face. Several modeling techniques have been proposed to support this process. In this work we present a methodolo...
详细信息
ISBN:
(纸本)0889864802
Designing and maintaining Web applications is one of the major challenges that software industry has to face. Several modeling techniques have been proposed to support this process. In this work we present a methodology for identifying design patterns within an application modelled using WebML, a modelling language for designing data-intensive Web applications. We extend the set of design patterns supported by WebML and exemplify the application of the methodology using an e-learning scenario.
The implementation of successful assured forwarding (AF) services according to the DiffServ framework remains a challenging problem today, despite the numerous proposals for AF PHB mechanisms and AF-based service impl...
详细信息
The implementation of successful assured forwarding (AF) services according to the DiffServ framework remains a challenging problem today, despite the numerous proposals for AF PHB mechanisms and AF-based service implementations. In this work, we propose two modules, the TCP-window aware marker (TWAM) and the dynamic WRED (DWRED) mechanism for implementing the DiffServ AF PHB. We provide analytical models and an experimental evaluation in order to demonstrate how they succeed in enhancing the quality, increasing fairness, improving the performance and easing the deployment of a production- level AF-based service.
This paper presents the work that is taking place in the Region of Western Greece in order to develop state-of-the-art broadband infrastructure. The current status of broadband infrastructure in the region is being an...
详细信息
This paper presents the work that is taking place in the Region of Western Greece in order to develop state-of-the-art broadband infrastructure. The current status of broadband infrastructure in the region is being analyzed and the main principles on which the deployment of the networks will be based on is being described, by presenting the metropolitan area networks and the wireless access networks that will be developed. Two case studies of such municipal networks are also presented in this paper
This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS categorizes each small block within cover images into either a "noi...
详细信息
This paper discusses a visual attack to BPCS-Steganography (Bit-Plane Complexity Segmentation-Steganography) and presents a countermeasure. BPCS categorizes each small block within cover images into either a "noise-like region" or an "informative region" by means of the binary-image feature called complexity and replaces noisy blocks with the binary patterns mapped from the bit sequences of secret data. The binary patterns must be complex because it is replacing complex regions. If the binary patterns to be inserted are simple, then the logical operation called conjugate operation is applied that transforms a simple pattern to a complex pattern. We need to keep, for each block, the flag called a conjugation flag representing whether or not conjugation had been applied to correctly extract the embedded information. In the case where the conjugation flags must be embedded within cover images, we are unable to use the complexity thresholding for the embedding of the flags. Thus the flags must be embedded into a fixed area. To this effect it is easy to recognize unnatural patterns on the LSB plane of stego-images. It can be used as a signature or a distinguishing mark between natural images and images with information embedded by BPCS. We propose secure BPCS which is robust against the visual attack. It is realized by assigning the meaning of the conjugation flag to a pixel of each block and making the specific rule to embed and extract it
In agent-mediated marketplaces, autonomous agents deploy automated bidding mechanisms in order to increase revenue for humans. The ability of agents to estimate the next prices to be revealed in an auction, by applyin...
详细信息
In agent-mediated marketplaces, autonomous agents deploy automated bidding mechanisms in order to increase revenue for humans. The ability of agents to estimate the next prices to be revealed in an auction, by applying forecasting, is a key element for efficient and successful bidding. In open outcry auctions, such as English and Dutch, information about bidders behavior is revealed at each round. This paper proposes a bid calculation function based on forecasting of the next price in English and Dutch auctions. The forecasting is based on two linear adaptive filters for stochastic estimation, whose parameters are calculated using a genetic algorithm. In order to test the efficiency of the two bidding methods and to benchmark the performance of the two filters, we conduct a set of experiments and present the results.
Interest in context-aware computing has expanded the use of sensing technologies. The accelerometer is one of the most widely used sensors for capturing context because it is small, inexpensive, lightweight, and self-...
详细信息
ISBN:
(纸本)1595930892
Interest in context-aware computing has expanded the use of sensing technologies. The accelerometer is one of the most widely used sensors for capturing context because it is small, inexpensive, lightweight, and self-operable. In efforts to obtain behavioral patterns, many studies have reported the use of multiple accelerometers attached to the human body. However, this is difficult to implement in real-life situations and may not fully address the context of user interaction. In contrast, the present study employed a single tri-axial accelerometer attached to a handheld computing device instead of to a user. The objective was to determine what contextual information could be obtained from this more feasible, albeit limited, source of acceleration data. Data analyses confirmed that changes in both mobility and lighting conditions induced statistically significant differences in the output of the accelerometer. Copyright 2005 ACM.
Web services are becoming an important enabler of the semantic Web. Besides the need for a rich description mechanism, Web service information should be made available in an accessible way for machine processing. In t...
详细信息
Web services are becoming an important enabler of the semantic Web. Besides the need for a rich description mechanism, Web service information should be made available in an accessible way for machine processing. In this paper, we propose a new P2P based approach for Web services discovery. Peers that store Web services information, such as data item descriptions, are efficiently located using a scalable and robust data indexing structure for peer-to-peer data networks, NIPPERS. We present a theoretical analysis which shows that the communication cost of the query and update operations scale double-logarithmically with the number of NIPPERS nodes. Furthermore, we show that the network is robust with respect to failures fulfilling quality of Web services requirements.
In this paper, an approach for providing unified access to heterogeneous distributed cultural heritage collections is presented. The proposed approach is developed within the framework of the REACH Greek National Proj...
详细信息
In this paper, an approach for providing unified access to heterogeneous distributed cultural heritage collections is presented. The proposed approach is developed within the framework of the REACH Greek National Project with the overall aim to provide a Web portal enabling access to different databases of cultural content with emphasis on multimedia material. In order to achieve this, the project employs ontology-based representation of cultural content, multimedia content-based search algorithms, hybrid ontology and content-based access and user-friendly search interfaces. This fusion approach provides users with resources for building queries of multimedia repositories sequentially using multiple individual search tools, and performs higher quality searching. In the current stage of development, real content such as inscriptions and coins from the Greco-Roman time period, has successfully been incorporated in the system
暂无评论