Scroll bar is one of the most frequently used components of graphical user interfaces (GUIs). It is generally considered to provide overview + detail functionality. The scale ratio of a scroll bar refers to the rate o...
详细信息
Service Overlay Network (SON) was proposed to alleviate the difficulties encountered in providing end-to-end Quality of Service (QoS) guarantees. SON is able to provide QoS guarantees by purchasing bandwidth from indi...
详细信息
Service Overlay Network (SON) was proposed to alleviate the difficulties encountered in providing end-to-end Quality of Service (QoS) guarantees. SON is able to provide QoS guarantees by purchasing bandwidth from individual network domains and building a logical end-to-end data delivery infrastructure on top of the existing Internet. We focus on SON topology design problems under a generalized cost model. Earlier research in this topic considered two distinct cost models - fixed (leased) cost model and variable (usage-based) cost model. However in most applications, the costs of both nodes and links have a fixed component as well as a variable component that often depends on usage. Our generalized cost model takes this fact into account and our topology design algorithm uses this cost model to And the optimal topology. Since the SON topology design problem is NP-complete, we provide approximation algorithm with guaranteed performance bound. We validate the effectiveness of our algorithm through extensive simulation.
Systems based on service-oriented architecture are called service-based systems (SBS), and comprise of computing services offered by various organizations. Users of SBS often require these services to be composed into...
详细信息
Systems based on service-oriented architecture are called service-based systems (SBS), and comprise of computing services offered by various organizations. Users of SBS often require these services to be composed into complex workflows to perform their high-level tasks. The users usually have certain expectations on the overall QoS of their workflows. Due to the highly dynamic environments of SBS, in which temporary unavailability or quality- degradation of services may occur frequently and unexpectedly, monitoring the execution of workflows in SBS is necessary, and should be done in distributed and proactive manner. In this paper, a virtual machine-based architecture for the execution, monitoring and control of workflows in SBS is presented. Based on this architecture, an approach to automated generation of workflow monitors for adaptive distributed execution monitoring of workflows in SBS is discussed.
PKI-enabled smartcards hold the future of personal identity management and resilience against identity theft. These cards can hold multiple certified identities (e.g. credit card accounts) and provide: Authentication,...
详细信息
PKI-enabled smartcards hold the future of personal identity management and resilience against identity theft. These cards can hold multiple certified identities (e.g. credit card accounts) and provide: Authentication, Data Integrity, Confidentiality and Non-repudiation. Since the private key of the client certificates are stored in the card, and this key cannot be extracted from the card, it provides a high degree of security even when the card is used on an untrusted workstation (or point-of-sale). This paper shows that using PKI enabled smartcards on an un-trusted workstation can allow a variety of attacks to be performed by a malicious software. These attacks range from simple PIN phishing, to more serious attacks such as signatures on unauthorized transactions, authentication of users without consent, unauthorized secure access to SSL enabled web servers as well as remote usage of the smartcard by attackers. We also show that the root cause of such problems is the lack of a secure I/O channel between the user and the card and outline steps that can be taken to ensure such a channel is available making the documented attacks not feasible. We have prototyped the proposed solution and verified that the above attacks can be thwarted.
Traditional research in construction safety focused on accident data analysis, identification of root cause factors and safety climate modeling. These research efforts did not study the dynamic repetitive interaction ...
详细信息
ISBN:
(纸本)9788190423519
Traditional research in construction safety focused on accident data analysis, identification of root cause factors and safety climate modeling. These research efforts did not study the dynamic repetitive interaction among multiple root cause factors. Recently safety research focuses on developing accident causation models. These models attempt to explain how the interaction among multiple project factors gets translated into safety incidents. Agent based modeling and simulation (ABMS) is an appropriate technique to develop computational models of accidents causation because of its ability to model human factors and repetitive decentralized interactions. This paper presents a conceptual framework for developing agent based models of construction safety. The key components of the model such as construction crew, management, work environment, material and equipment related quality issues, project/process level complexities, interaction rules and adaptation have been discussed. Further the adaptation of agents in response to the safety culture has been demonstrated using a simple ABMS experiment.
Cell adjusts its regulatory machinery in response to environmental changes to maintain its basic functionality. Different cellular conditions require different regulatory mechanisms that tightly regulate genes. Due to...
详细信息
Most programming errors are reasonably simple to understand and detect. One of the benefits of a high-level language is its encapsulation of error-prone concepts such as memory access and stack manipulation. Assembly-...
详细信息
Most programming errors are reasonably simple to understand and detect. One of the benefits of a high-level language is its encapsulation of error-prone concepts such as memory access and stack manipulation. Assembly-language programmers do not have this luxury. In our quest to create automated error-prevention and error-detection tools for assembly language, we need to create a comprehensive list of possible errors. We are not considering syntax errors or algorithmic errors. Assemblers, simple testing, and automated testing can detect those errors. We want to deal with design errors that are direct byproducts of the assembly-language environment or result from a programmer's lack of understanding of the assembly-language environment. Over many years of assembly-language instruction, we have come across a plethora of errors. Understanding the different types of errors and how to prevent and detect them is essential to our goal of creating automated error-prevention and error-detection tools. In this paper we list and explain the types of errors we have cataloged.
作者:
Pein, Raoul Pascal
Fakultät Technik und Informatik Hochschule für Angewandte Wissenschaften Hamburg Berliner Tor 7 Hamburg20099 Germany Department of Informatics
School of Computing and Engineering University of Huddersfield Queensgate HuddersfieldHD1 3DH United Kingdom
In order to maximise the benefit of the colossal repository of digital images available both publicly and in private collections, intelligent matchmaking tools are required. Unfortunately, most image search engines re...
详细信息
暂无评论