The QoS-aware web service composition is an important topic that is intensively discussed in the last ten years. The approach of Canfora, for example, solves this problem in an acceptable time period. The lack of most...
详细信息
The QoS-aware web service composition is an important topic that is intensively discussed in the last ten years. The approach of Canfora, for example, solves this problem in an acceptable time period. The lack of most of the approaches for a QoS-aware composition is, however, that they completely ignore monitoring and user feedback for single web services. In this paper the idea of taking monitoring and user feedback into account while composing web services will be introduced.
Current high speed networks cannot be fully utilized by today's high end systems. The processing requirements of next generation network protocols require intelligent network cards with network protocol offload en...
详细信息
ISBN:
(纸本)0889864470
Current high speed networks cannot be fully utilized by today's high end systems. The processing requirements of next generation network protocols require intelligent network cards with network protocol offload engines, for example based on a network processor. To reduce development time, we reuse existing software protocol stack implementations for partitioning and implementing on the network card. Though, manual partitioning is very time-consuming due to the complex protocol stacks. We outline an approach for tool supported software partitioning even for complex C source code.
Gigabit networks can not be fully utilized by today's end systems. The processing requirements of next generation network protocols with enabled encryption features will aggravate this situation. To overcome these...
详细信息
ISBN:
(纸本)0889863989
Gigabit networks can not be fully utilized by today's end systems. The processing requirements of next generation network protocols with enabled encryption features will aggravate this situation. To overcome these shortcomings this paper presents an approach and prototype implementation for hardware support of IP/IPsec protocols. We out-line a hardware/software partitioning, where the data path of the IP/IPsec protocol is accelerated by a network processor. In contrast to other approaches, we reuse existing software protocol stack implementations.
The user interface generation process is still a complex issue. The manual creation process is time consuming and complex because it requires the combination of the application developer work and the user interface de...
Crowdsourcing has gained increasing interest during the last years as means for solving complex tasks with the help of a flexible group of contributors. The crowd can contribute with collecting data in the field, comp...
详细信息
Rang-Instaneous-Doppler (RID) processing is widely used in ISAR imaging of maneuvering target and acceptable image can be achieved when the amplitude modulation effect of scatterers echoes can be neglected during inte...
详细信息
The article presents the architecture of a distributed platform for the future Internet of Services, where services can be provided and sold over so-called service market places. We focus on the description of the mon...
详细信息
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of ...
ISBN:
(纸本)9781605584393
This year, the 3rd ACM International Workshop on Context-Awareness for Self-Managing Systems (Devices, Applications and networks) (CASEMANS 2009) is organized in Nara, Japan. This article summarizes the objectives of the CASE-MANS 2009 workshop and gives an overview of the papers that are selected for presentation and publication. Copyright 2009 ACM.
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs...
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs on client side while transparently providing efficient caching of attributes that doesn't require any changes to existing code at all. Common object-oriented design facilities and code generation tools are leveraged to support seamless integration of these caching concepts into the development cycle.
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an ...
详细信息
Patarin proposed the dragon scheme, pointed out the insecurity of the dragon algorithm with one hidden monomial and suggested a candidate dragon signature algorithm with a complicated function. This paper presents an algebraic method to attack the candidate dragon signature algorithm. The attack borrows the basic idea of the attack due to Kipnis and Shamir, and utilizes the underlying algebraic structure of the candidate dragon signature algorithm over the extension field to derive a way to enable the variable Y be viewed as a fixed value. The attack recovers the private keys efficiently when the parameters are n≤2s and D=[logq^d]≤3.
暂无评论