Existing search engines like Google, Yahoo!, Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead, it is preferable to find and ask someone who...
详细信息
Existing search engines like Google, Yahoo!, Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead, it is preferable to find and ask someone who has related expertise or experience on a topic and thus Web-based online communities have become important places for people to seek and share expertise. We need to gather the data that describes these online communities. But extracting, aggregating and analyzing data from these communities for finding experts on a single framework is a challenging task. Also there is no universal standard data structure for the outline of user participation in these communities. In this paper, we present a Grid-enabled framework of expertise search (GREFES) engine which utilizes online communities as sources for experts on various topics. This is a work in progress. We also propose an open data structure called SNML (Social network Markup Language) to outline user participation in online communities. The architecture addresses major challenges in crawling of community data and query processing by utilizing Grid. An expert ranking algorithm is also discussed and evaluated.
Intrusion detection is an efficient method against attacks in computernetwork and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag...
详细信息
Intrusion detection is an efficient method against attacks in computernetwork and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection agents and suffered from a computation and memory usage overload. In this paper, we address this problem by proposing a lightweight algorithm to select and activate the intrusion detection modules on particular sensor nodes. We also apply over-hearing mechanism to reduce the redundant sending alert packets thus enhance network lifetimes.
Now-a-days, many high-end applications are turning to grid computing to meet their computational and data storage needs. High-end applications require a wide variety of computational resources as well as long time to ...
详细信息
Now-a-days, many high-end applications are turning to grid computing to meet their computational and data storage needs. High-end applications require a wide variety of computational resources as well as long time to produce the desired output. These resources should be utilized efficiently and effectively for overall performance improvement. In this paper, we present an efficient resource management architecture in grid environment using grid services. The basic technique is to monitor certain values of some parameters of grid services which provide imprecise or partial state information of the services during execution time and depending on the condition values of these parameters (specified earlier at job submission), services can be stopped at any time. Thus our architecture can save a great amount of computing resources as well as time from being wasted to produce wrong output and improves overall performance by utilizing available resources to run other services. Our proposed framework can also cope with the real- time applications. Experiment result shows that our architecture efficiently manages the computing resources and significantly saves valuable time.
Intrusion detection is an efficient method against attacks in computernetwork and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection ag...
详细信息
ISBN:
(纸本)9780769530482;0769530486
Intrusion detection is an efficient method against attacks in computernetwork and system. Most intrusion detection system for sensor networks and ad hoc networks are based on the cooperative of intrusion detection agents and suffered from a computation and memory usage overload. In this paper, we address this problem by proposing two algorithms to optimal select and activate the intrusion detection agents for sensor networks.
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solutions, especially electronic micropayment...
详细信息
This book presents the proceedings of the Third International Conference on Trust, Privacy and security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues f...
详细信息
ISBN:
(数字)9783540377528
ISBN:
(纸本)9783540377504
This book presents the proceedings of the Third International Conference on Trust, Privacy and security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.
暂无评论