The aim of the ERAMIS project is to set up a network of Master's degree Informatics as a Second Competence among 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia, and 5 European universities. This c...
详细信息
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major chal...
详细信息
It is well recognized that visualizing traceability links between software artifacts helps developers to recover, browse, and maintain these inter-relationships effectively and efficiently. However, it is a major challenge for researchers to efficiently visualize traceability links for big softwaresystems because of scalability and visual clutter issues. In this paper we present a new approach that combines treemap and hierarchical tree visualization techniques to provide a global structure of traces and a detailed overview of each trace. These both reduce visual clutter while still being highly scalable and interactive. Our usability study shows that our approach can support comprehension, browsing, and maintenance of traceability links.
Relaying is a very promising technique to improve the reliability of data transmission in wireless (industrial) networks. With relaying, relay nodes support source nodes in carrying out retransmissions. A common assum...
详细信息
Relaying is a very promising technique to improve the reliability of data transmission in wireless (industrial) networks. With relaying, relay nodes support source nodes in carrying out retransmissions. A common assumption is that relayers should be placed at “good” positions (e.g. in the middle between source and destination) to achieve benefits. In this paper we tackle the question of whether it is strictly necessary to place relayers at “good” positions (which often requires extensive measurements). We present results indicating that the benefits of relaying are achievable even with randomly placed relayers, as long as enough of them are deployed. Specifically, we present results suggesting that with a sufficient (and still not too high) number of randomly deployed relayers, the probability that all packets, sent by source nodes to a central controller in a TDMA round, reach the controller is larger than for the case with source-only retransmissions. This finding holds true both in the absence and the presence of feedback.
The aim of the ERAMIS project is to create a Master degree computer as a Second Competence in 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia. This contribution presents how faculty development is orga...
详细信息
We propose a new and efficient scheme for broadcast encryption. A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS|=n, of a given set of users, such ...
详细信息
ISBN:
(纸本)9781479902194
We propose a new and efficient scheme for broadcast encryption. A broadcast encryption system allows a broadcaster to send an encrypted message to a dynamically chosen subset RS, |RS|=n, of a given set of users, such that only users in this subset can decrypt the message. An important component of broadcast encryption schemes is revocation of users by the broadcaster, thereby updating the subset RS. Revocation may be either temporary, for a specific cipher text, or permanent. In the existing public key schemes which support temporary revocation of the users, the broadcaster is required to keep track of the revoked users. We present the first public key broadcast encryption scheme that supports permanent revocation of users. Unlike previous schemes, the broadcaster in our scheme should not keep track of the revoked users (saving memory and computation power). Our scheme is fully collusion-resistant. In other words, even if all the revoked users collude, the revoked user cannot encrypt messages without receiving new keys from the broadcaster. The procedure is based on Cipher-text Policy Attribute-Based Encryption (CP-ABE). The overhead of revocation in our system is constant in all major performance measures including length of private and public keys, computational complexity, user's storage space, and computational complexity of encryption and decryption. The scheme we construct improves on our original scheme in a poster presentation [7] by a factor of O(log n) in all major performance measures.
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio...
详细信息
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replication overheads. On the other hand, machine state replication is an overly strong (and therefore less efficient) requirement for high availability in the networked client-server system. In this paper, we propose a generic and highly efficient high availability solution through output continuity. Output continuity considers a backup server as a valid replica as long as the responses generated so far are the same between the backup and primary servers, the server state is propagated from the primary server to the backup server if and only if the previous outputs from the backup and primary servers are different.
In this paper, cross-corpora evaluations are used to analyze the bias of spontaneous facial expression databases. Local binary pattern, Gabor, eigenface and fisherface features are extracted and applied to the four sp...
详细信息
ISBN:
(纸本)9781467322164
In this paper, cross-corpora evaluations are used to analyze the bias of spontaneous facial expression databases. Local binary pattern, Gabor, eigenface and fisherface features are extracted and applied to the four spontaneous expression databases: USTC-NVIE, VAM, Belfast Naturalistic and SEMAINE to recognize arousal (high/low) and valance (positive/negative) respectively. Experimental results indicate that there exists bias among different spontaneous expression databases. The emotion-induction methods, the variety of subjects and the quantity of raters may have caused such a bias.
A good systematic input and output management system is more essential for ship maneuvering simulation to eliminate unnecessary error due to many considered factors such as hull shapes, shallow water, narrow channel, ...
详细信息
A good systematic input and output management system is more essential for ship maneuvering simulation to eliminate unnecessary error due to many considered factors such as hull shapes, shallow water, narrow channel, trim in loading and ballast condition, and propulsion system. In this paper, we proposed an Integrated Ship Maneuverability Simulation (SMS) tool to be used in investigating turning circle characteristics of a very large crude oil carrier (VLCC) at 35 degree of rudder angle. The input and output datasets from the surrounding environments of VLCC have been captured using special sensors and converted as input file to the Integrated Ship Maneuverability Simulation tool. The forces and moments acting on the hull which have been induced by propeller and rudder during maneuvering are calculated independently. Then, these forces and moments are integrated to the SMS tool in order to get a total dynamic effect on ship maneuvering performance. The simulation results using SMS tool have been compared with the experimental datasets for validation. From the comparison, the proposed SMS tool has been able to simulate ship maneuvering performance good agreement with the experimental dataset.
To enhance classification performance by making use of easily available unlabelled data to overcome the scarcity of labelled data, this paper proposes an Embedded Co-Adaboost algorithm that integrates multi-view learn...
详细信息
To enhance classification performance by making use of easily available unlabelled data to overcome the scarcity of labelled data, this paper proposes an Embedded Co-Adaboost algorithm that integrates multi-view learning into the Adaboost learning framework and at the same time leverages the advantages of Co-training algorithm for performance enhancement. Experimental results demonstrate the effectiveness of the proposed algorithm in terms of the convergence rate, the accuracy, and the steady performance as compared to the original AdaBoost algorithm, without relying on redundant and sufficient feature sets. As a algorithm application in softwareengineering, the Embedded Co-AdaBoost has been applied to the classification of software document relations to improve the quality of the architecture design documents and the reusability of design knowledge.
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clou...
详细信息
Cloud computing will be a main information infrastructure in the future;it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing.
暂无评论