Focusing on the problem that two HOS (Heterogeneous operating systems) of wireless sensor network can't communicate with each other, and based on the comparative analysis on common-use communication models for the...
详细信息
Focusing on the problem that two HOS (Heterogeneous operating systems) of wireless sensor network can't communicate with each other, and based on the comparative analysis on common-use communication models for the node operating system, we had brought forward a heterogeneous operating system communication model for a wireless sensor network. It consists of two tactics: scheduling tactic and processing tactic, which work together to finish the heterogeneous operating system communication. We introduced mobile-agent mechanism and first come first serve scheduling algorithm to co-operate task scheduling in the model. Experimental results and preliminary applications show that the model provides a good way for heterogeneous operating system communication.
Chinese software companies are increasingly using open source software (OSS) components in software development. Development with OSS components faces challenges with respect to component selection, component integrat...
详细信息
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organiza...
详细信息
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organization,we classify these parallel computational models into three *** models and their characteristics are discussed based on three generations *** believe that with the ever increasing speed gap between the CPU and memory systems,incorporating non-uniform memory hierarchy into computational models will become *** the emergence of multi-core CPUs,the parallelism hierarchy of current computing platforms becomes more and more *** this complicated parallelism hierarchy in future computational models becomes more and more important.A semi-automatic toolkit that can extract model parameters and their values on real computers can reduce the model analysis complexity,thus allowing more complicated models with more parameters to be *** memory and hierarchical parallelism will be two very important features that should be considered in future model design and research.
This paper presents a semi-naive classifier named RoughTree, which is designed to alleviate the attribute interdependence problem of Naive Bayesian Classifier. RoughTree uses the attribute dependence detecting measure...
详细信息
Web service composition lets developers create applications on top of service-oriented computing and its native description, discovery, and communication capabilities. This paper mainly focuses on the QoS when the con...
详细信息
Web service composition lets developers create applications on top of service-oriented computing and its native description, discovery, and communication capabilities. This paper mainly focuses on the QoS when the concrete composition structure is unknown. A QoS model of service composition is presented based on the fuzzy directed graph theory. According to the model, a recursive algorithm is also described for calculating such kind of QoS. And, the feasibility of this QoS model and the recursive algorithm is verified by a case study. The proposed approach enables customers to get a possible value of the QoS before they achieve the service.
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present ...
详细信息
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous protocols for determining whether a point is inside a circle are not secure enough. We present a two-round protocol for computing the distance between two private points and develop a more efficient protocol for the point-circle inclusion problem based on the distance protocol. In comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly.
The security of Web Services has become one of the important research topics about the application of Web Services. In this paper, we propose an agent-based policy aware framework for Web Services security. In this fr...
详细信息
ISBN:
(纸本)9780769529431
The security of Web Services has become one of the important research topics about the application of Web Services. In this paper, we propose an agent-based policy aware framework for Web Services security. In this framework, a policy language called ReiT which is a declarative language based on the rules and ontologies is introduced The non-structural knowledge is represented by rules and the structural temporal knowledge is represented by ontology. Moreover, we propose a mixed reasoning mechanism to evaluate the ReiT policy. The access control policy including the context of the user and Web Services is evaluated by the reasoner. In addition, we present a policy aware BOID agent to authorize the access control of the Web Services. And we implement the policy aware BOID agent by extending the JADE platform.
The assignment of the computation and communication is one of the important problems in the design of peer-to-peer (P2P) Massively Multi-player Online Game (MMOG). A reputation mechanism for P2P MMOG is proposed in th...
详细信息
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the trusted subjects it introduces to ha...
详细信息
How to resolve access control on Web Services has become one of the important research tasks about the application of Web Services. In this paper, we propose a policy based adaptive Web Services security framework. In...
详细信息
暂无评论