Search engines are among the most-used resources on the internet. However, even today's most successful search engines struggle to provide high quality search results. According to recent studies as many as 50 per...
详细信息
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong ti...
详细信息
ISBN:
(纸本)9780769531328
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong timeliness and security demands. In particular, we address the following challenges: (1) propose a real-time dependable execution model by extending the component-based execution model with real-time and dependability properties, and (2) develop QoS-aware application composition and adaptation techniques that employ resource management strategies and security policies when discovering and selecting application components. Our approach enables us to develop a distributed stream processing environment that is predictable, secure, flexible and adaptable.
We propose a new linear array for multiplication in GF(2m) which outperforms most of the existing linear multipliers in terms of the area and time complexity. Moreover we will give a very detailed comparison of our ar...
详细信息
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without aid of any established infrastructure or centralized administration. The conventional security solutions t...
详细信息
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without aid of any established infrastructure or centralized administration. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new environment since mobile ad hoc networks are characterized by the absence of any infrastructure, frequent mobility, and wireless links. In this paper, we propose an on-demand, fully localized, and hop-by-hop public key management scheme for MANETs. It can be performed by generating public/private key pairs by nodes themselves, issuing certificates to neighboring nodes, holding these certificates in their certificate repositories, and providing an authentication service quickly adaptive to the dynamic topology of the network without relying on any servers. Also, our scheme can be performed successfully as long as there is a physical communication line between two nodes, and it is accustomed well to the on-demand routing of MANETs.
With the widespread application of sequential pattern mining (SPM) algorithms, sequential patterns that allow gap constraints are valuable for discovering knowledge from biological data such as DNA and protein sequenc...
详细信息
With the widespread application of sequential pattern mining (SPM) algorithms, sequential patterns that allow gap constraints are valuable for discovering knowledge from biological data such as DNA and protein sequences and some non-biological data. This approach achieves a balance between contiguous constraint SPM and traditional SPM, enabling the discovery of a wider range of patterns while accommodating user-defined gaps as needed. Among all kinds of gap-constrained mining, non-overlapping SPM, which involves discovering interesting patterns where occurrences do not overlap with each other, satisfies the anti-monotonic property (the Apriori property, i.e., the support of a pattern is not larger than that of its sub-patterns). However, existing algorithms do not search for target sequential patterns, resulting in unnecessary and redundant pattern generation. Targeted pattern mining is a technique employed to discover itemsets or sequential patterns that are directly related to items of interest to the user. In this paper, we define and formalize the problem of targeted non-overlapping SPM and propose an algorithm named TALENT (TArgeted mining of SequentiaL PattErN with ConsTraints). Two search methods, including breadth-first and depth-first searching, are designed to address the generation of patterns. Furthermore, several pruning strategies are presented to reduce the reading of sequences and items in the data and terminate redundant pattern extensions. Finally, we conduct extensive experiments to compare the TALENT algorithm with the existing algorithms for mining non-overlapping sequential patterns. The experimental results demonstrate that TALENT has excellent mining efficiency and can deal efficiently with different query settings. In the best-case scenario, TALENT exhibits a three-order-of-magnitude reduction in time and a memory decrease to 20% of the original consumption compared to the baseline algorithm, NOSEP\(\rm _{Ta}\).
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. ...
详细信息
ISBN:
(数字)9783642311253
ISBN:
(纸本)9783642311246
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. The four volumes contain papers presented in the following workshops: 7333 - advances in high performance algorithms and applications (AHPAA); bioinspired computing and applications (BIOCA); computational geometry and applicatons (CGA); chemistry and materials sciences and technologies (CMST); cities, technologies and planning (CTP); 7334 - econometrics and multidimensional evaluation in the urban environment (EMEUE); geographical analysis, urban modeling, spatial statistics (Geo-An-Mod); 7335 - optimization techniques and applications (OTA); mobile communications (MC); mobile-computing, sensind and actuation for cyber physical systems (MSA4CPS); remote sensing (RS); 7336 - software engineering processes and applications (SEPA); software quality (SQ); security and privacy in computational sciences (SPCS); soft computing and data engineering (SCDE). The topics of the fully refereed papers are structured according to the four major conference themes: 7333 - computational methods, algorithms and scientific application; 7334 - geometric modelling, graphics and visualization; 7335 - information systems and technologies; 7336 - high performance computing and networks.
Online learning, where feature spaces can change over time, offers a flexible learning paradigm that has attracted considerable attention. However, it still faces three significant challenges. First, the heterogeneity...
详细信息
Online learning, where feature spaces can change over time, offers a flexible learning paradigm that has attracted considerable attention. However, it still faces three significant challenges. First, the heterogeneity of real-world data streams with mixed feature types presents challenges for traditional parametric modeling. Second, data stream distributions can shift over time, causing an abrupt and substantial decline in model performance. Additionally, the time and cost constraints make it infeasible to label every data instance in a supervised setting. To overcome these challenges, we propose a new algorithm Online Learning from Mix-typed, Drifted, and Incomplete Streaming Features (OL-MDISF), which aims to relax restrictions on both feature types, data distribution, and supervision information. Our approach involves utilizing copula models to create a comprehensive latent space, employing an adaptive sliding window for detecting drift points to ensure model stability, and establishing label proximity information based on geometric structural relationships. To demonstrate the model’s efficiency and effectiveness, we provide theoretical analysis and comprehensive experimental results.
This book explores the dynamically developing areas of quantum computing and quantum cryptography. The book offers an in-depth examination of the possibilities and difficulties presented by these revolutionary technol...
详细信息
ISBN:
(数字)9783031771453
ISBN:
(纸本)9783031771446;9783031771477
This book explores the dynamically developing areas of quantum computing and quantum cryptography. The book offers an in-depth examination of the possibilities and difficulties presented by these revolutionary technologies, with the goal of connecting abstract ideas with real-world applications. The book is an extremely helpful resource in the context of the upcoming quantum age. This highlights the importance of creating cryptographic techniques that can withstand the power of quantum computers to protect digital communications and vital infrastructures. This work makes a substantial contribution to the topic of cybersecurity by doing a comprehensive analysis of classical and quantum cryptography approaches, as well as actual implementations and performance evaluations. The book plays a vital role in providing valuable guidance to researchers, practitioners, and policymakers. It offers valuable insights that are necessary for effectively managing the shift towards quantum-secure technology and safeguarding the future security of digital information.
暂无评论