Service-oriented computing and Web services are becoming the dominating computing model as internet and cloud computing become pervasive. More and more services with the same functionality are becoming available, and ...
详细信息
ISBN:
(纸本)9781467350693
Service-oriented computing and Web services are becoming the dominating computing model as internet and cloud computing become pervasive. More and more services with the same functionality are becoming available, and QoS (Quality of Service) is the main factor to differentiate them. The overall QoS of a business process must meet user's requirement. Our study proposes a proxy-based framework to facilitate the dynamic integration of Web services into business process and fast detection of abnormalities. The major functions of our dynamic proxy-based framework include service collection, composition, selection and adaptation. Our study concerns both functionality and QoS characteristics of Web services to identify the optimal business process solutions.
We present a fully ad-hoc, optical multi-hop underwater optical sensor network. All network nodes are identical, uncabled and battery operated with the exception of the master node which represents the terminal link t...
详细信息
ISBN:
(纸本)9781479913084
We present a fully ad-hoc, optical multi-hop underwater optical sensor network. All network nodes are identical, uncabled and battery operated with the exception of the master node which represents the terminal link to land for real-time monitoring capability. Multi-hop functionality allows for high-bandwidth underwater communication without sacrificing range. Ad-hoc capability allows for nodes to dynamically enter and exit the network, forming arbitrary topologies. Onboard sensors imbue every network node with monitoring capability. Redundant onboard data storage and automatic rerouting of communication paths create a mesh sensing network ideal for high-density, large-area sensor networks deployed to regions with high-risk of node loss and intermittent connectivity. Multi-hop and dynamic ad-hoc capabilities were tested in salt-water pools. The communications algorithm and high-level node design are presented.
Recovering a matrix from a sampling of its entries is a problem of rapidly growing interest and has been studied under the name of matrix completion. It occurs in many areas of engineering and applied science. In most...
详细信息
ISBN:
(纸本)9781479913282
Recovering a matrix from a sampling of its entries is a problem of rapidly growing interest and has been studied under the name of matrix completion. It occurs in many areas of engineering and applied science. In most machine learning and data mining applications, it is possible to leverage the expertise of human oracles to improve the performance of the system. It is therefore natural to extend this idea of "human-in-the-loop" to the matrix completion problem. However, considering the enormity of data in the modern era, manually completing all the entries in a matrix will be an expensive process in terms of time, labor and human expertise, human oracles can only provide selective supervision to guide the solution process. Thus, appropriately identifying a subset of missing entries (for manual annotation) in an incomplete matrix is of paramount practical importance, this can potentially lead to better reconstructions of the incomplete matrix with minimal human effort. In this paper, we propose novel algorithms to address this issue. Since the query locations are actively selected by the algorithms, we refer to these methods as active matrix completion algorithms. The proposed techniques are generic and the same frameworks can be used in a wide variety of applications including recommendation systems, transductive / multi-label active learning, active learning in regression and active feature acquisition among others. Our extensive empirical analysis on several challenging real-world datasets certify the merit and versatility of the proposed frameworks in efficiently exploiting human intelligence in data mining / machine learning applications.
Cloud computing is a new paradigm with a promising potential. However, issues of security, privacy, and trust raise concerns and discourage its adoption. In previous work we presented a framework for the selection of ...
详细信息
Service-Oriented Architecture (SOA) has attracted substantial research effort over the past decade. In service-based systems, where multiple services providing the same functionality are available, it is necessary to ...
详细信息
Service-Oriented Architecture (SOA) has attracted substantial research effort over the past decade. In service-based systems, where multiple services providing the same functionality are available, it is necessary to select the appropriate services to be used in service composition to provide better quality of service (QoS) for service consumers. In order to select the best service composition for concurrent service requests, we present an adaptive control strategy which performs service selection based on the historical usage information of all the candidate services. A case study of a data stream management system is presented to validate the effectiveness of the adaptive control strategy, and examine the effect of the concurrency level on the process of the strategy's decision.
Privacy of physiological data collected by a network of embedded sensors on human body is an important issue to be considered. Physiological signal-based security is a light weight solution which eliminates the need f...
详细信息
ISBN:
(纸本)9781479903313
Privacy of physiological data collected by a network of embedded sensors on human body is an important issue to be considered. Physiological signal-based security is a light weight solution which eliminates the need for security key storage and complex exponentiation computation in sensors. An important concern is whether such security measures are vulnerable to attacks, where the attacker is in close proximity to the BSN and senses physiological signals through processes such as electromagnetic coupling. Recent studies show that when two individuals are in close proximity, the electrocardiogram of one person gets coupled to the electroencephalogram of the other, thus indicating a possibility of proximity-based security attacks. This paper proposes a model-driven approach to proximity-based attack on security using physiological signals and evaluates its feasibility. Results show that a proximity-based attack can be successful even without the exact reconstruction of the physiological data sensed by the attacked BSN.
Revenues and profits from short life cycle products will depend upon careful formulation and execution of production plans in response to demands in the marketplace. This research contributes to the development of the...
详细信息
The expectations of adult children about their elderly parents regarding their care provision was surveyed. We found that the needs and expectations regarding their elderly parents included better information on entit...
详细信息
This paper elaborates on two radio resource management (RRM) algorithms exploited to optimally allocate radio spectrum and maintain maximum energy in cognitive radio (CR) network nodes of a centralized system architec...
详细信息
暂无评论