Pervasive computing is converging with cloud computing as with the development of smart cities. There arise the complexities from this convergence, like unprecedented large number of computing devices, flexibilities a...
详细信息
Pervasive computing is converging with cloud computing as with the development of smart cities. There arise the complexities from this convergence, like unprecedented large number of computing devices, flexibilities and adaptation of services for fitting personalization requirements from end users, expectations of powerful computing and storage capabilities of handhold devices, and so on. Therefore, a supporting infrastructure that can handle big data arisen from large number of devices, and can flexibly switch services at run time, is needed. Henceforth, in this paper, we propose an OSGi based pervasive cloud (OSGi-PC) infrastructure which can make use both of the cloud computing capabilities and component flexibilities from OSGi. We have evaluated the OSGi-PC in terms of performance and power consumption to show its usability.
作者:
Clements-Croome, DerekComputer Science Department
Escuela Politecnica Superior Universidad Autonoma de Madrid C/Francisco Tomás y Valiente 28049 Madrid Spain Software Engineering Department
Faculty of Automatics Computers and Electronics University of Craiova Bvd. Decebal 107 200440 Craiova Romania Applied Research Laboratory
Information Science and Technology Division Pennsylvania State University 204 V Applied Science Building University Park PA 16802 United States Systems Engineering Section
Faculty of Technology Policy and Management Delft University of Technology Jaffalaan 5 2628BX Delft Netherlands
Click to increase image sizeClick to decrease image size
Click to increase image sizeClick to decrease image size
Traceability benchmarks are essential for the evaluation of traceability recovery techniques. This includes the validation of an individual traceability technique itself and the objective comparison of the technique w...
详细信息
ISBN:
(纸本)9781479902262
Traceability benchmarks are essential for the evaluation of traceability recovery techniques. This includes the validation of an individual traceability technique itself and the objective comparison of the technique with other traceability techniques. However, it is generally acknowledged that it is a real challenge for researchers to obtain or build meaningful and robust benchmarks. This is because of the difficulty of obtaining or creating suitable benchmarks. In this paper, we describe an approach to enable researchers to establish affordable and robust benchmarks. We have designed rigorous manual identification and verification strategies to determine whether or not a link is correct. We have developed a formula to calculate the probability of errors in benchmarks. Analysis of error probability results shows that our approach can produce high quality benchmarks, and our strategies significantly reduce error probability in them.
In this paper, we perform sparse signal analysis by using the Ramanujan Sums (RS). The RS are orthogonal in nature and therefore offer excellent energy conservation. Our analysis shows that the RS can compress the ene...
详细信息
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ...
详细信息
Markov decision processes (MDPs) are often used for modelling distributed systems with probabilistic failure or randomisation. We consider the problem of model repair for MDPs defined as follows: if the MDP fails to s...
详细信息
Markov decision processes (MDPs) are often used for modelling distributed systems with probabilistic failure or randomisation. We consider the problem of model repair for MDPs defined as follows: if the MDP fails to satisfy a property, we aim to find new values for the transition probabilities so that the property is guaranteed to hold, while at the same time the cost of repair is minimised. Because solving the MDP repair problem exactly is infeasible, in this paper we focus on approximate solution methods. We first formulate a region-based approach, which yields an interval in which the minimal repair cost is contained. As an alternative, we also consider sampling based approaches, which are faster but unable to provide lower bounds on the repair cost. We have integrated both methods into the probabilistic model checker PRISM and demonstrated their usefulness in practice using a computer virus case study.
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases w...
详细信息
ISBN:
(纸本)9781467352543
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases with the size of a square. In this paper we have shown that, for the size of 20 × 20, the number of such grids exceeds the number of 1.6 × 2 60 Therefore, these systems have sufficient cryptographic resistance. Application of these systems in conjunction with substitution cipher can still more resist cryptographic attacks.
Anomaly detection is indispensable for satisfying security services in mobile ad hoc network (MANET) applications. Often, however, a highly secure mechanism consumes a large amount of network resources, resulting in n...
详细信息
Service-Oriented Programming (SOP) is a relatively new programming paradigm that supports the development of new software applications using existing services as building blocks. SOP has gained significant popularity ...
详细信息
Service-Oriented Programming (SOP) is a relatively new programming paradigm that supports the development of new software applications using existing services as building blocks. SOP has gained significant popularity in industry as it increases software reuse and productivity. As the SOP paradigm can improve modern software development, the presenters have created a course-module based approach for incorporating SOP into computerscience (CS) and softwareengineering (SE) curricula; a course module is a distinct curricular unit such as a lab or teaching component that an instructor may incorporate into an existing course typically without requiring formal curricular approval. SOP course modules have been developed for inclusion in standard courses in many CS and SE programs; for example, an introductory SOP course module in a CS2 course while advanced modules for courses such as Programming language Concepts, softwareengineering, or Web Services. This workshop will present basic concepts and techniques of SOP and describe how the course-module approach toward SOP can be adapted for the participants' own teaching. The typical participant would be a faculty member with some background in programming, and is interested in learning more about SOP but does need not to have prior web service programming experience.
Participants of this pre-conference workshop will learn about the development of computerengineering curricula reports. They will also learn about the revision process and will have the opportunity to provide comment...
详细信息
Participants of this pre-conference workshop will learn about the development of computerengineering curricula reports. They will also learn about the revision process and will have the opportunity to provide comment and opinion on drafting an update of the joint ACM and IEEE computer Society document from 2004 titled, “Curriculum Guidelines for Undergraduate Degree Programs in computerengineering” known also as CE2004. The authors of this workshop welcome all participation including overall comments and targeted editing assistance from the computerengineering education community. This activity will ensure that an updated document is a forward-looking summary of state-of-the-art educational practices in the computerengineering field.
暂无评论