Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.最新文献

筛选
英文 中文
Situational reasoning - a practical OWL use case 情景推理——一个实用的OWL用例
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452111
M. Luther, B. Mrohs, M. Wagner, S. Steglich, W. Kellerer
{"title":"Situational reasoning - a practical OWL use case","authors":"M. Luther, B. Mrohs, M. Wagner, S. Steglich, W. Kellerer","doi":"10.1109/ISADS.2005.1452111","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452111","url":null,"abstract":"In this paper we study the case of situational reasoning on ontological descriptions in context-aware applications. We therefore discuss the logical foundations of W3C's standard ontology language OWL and examine how this modeling language can be used to express a user's situation. In a practical scenario and through the use of standard semantic Web components and toolkits, we exemplify how basic reasoning services can be utilized to build and maintain well-founded context models.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Certificateless group inside signature 无证书组内部签名
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452051
Chunbo Ma, FaLiang Ao, Dake He
{"title":"Certificateless group inside signature","authors":"Chunbo Ma, FaLiang Ao, Dake He","doi":"10.1109/ISADS.2005.1452051","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452051","url":null,"abstract":"In distributed networks, the signer wants his signature to be verified by anyone in the same group with him and the recipient wants to verify the signature independently. Motivated by this consideration, a certificateless group inside signature is presented in this paper. The signature scheme has the following properties: despite being without certificate, it can provide an assurance to the user about the relationship between a public key and the identity of the holder of the corresponding private key; a signature can be verified independently by any member in the same group with the signer; nobody outside the group can verify a signature. It is only the signer who knows his private key, even the PKG (private key generator) doesn't; any one in or outside the group can't forge a signature of others.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129458275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Behavioral analysis of a fault-tolerant software system with rejuvenation 具有返老还童特性的容错软件系统行为分析
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1093/ietisy/e88-d.12.2681
K. Rinsaka, T. Dohi
{"title":"Behavioral analysis of a fault-tolerant software system with rejuvenation","authors":"K. Rinsaka, T. Dohi","doi":"10.1093/ietisy/e88-d.12.2681","DOIUrl":"https://doi.org/10.1093/ietisy/e88-d.12.2681","url":null,"abstract":"In recent years, considerable attention has been devoted to continuously running software systems whose performance characteristics are smoothly degrading in time. Software aging often affects the performance of a software system and eventually causes it to fail. A novel approach to handle transient software failures due to software aging is called software rejuvenation, which can be regarded as a preventive and proactive solution that is particularly useful for counteracting the aging phenomenon. In this paper, we focus on a high assurance software system with fault-tolerance and preventive rejuvenation, and analyze the stochastic behavior of such a highly critical software system. More precisely, we consider a fault-tolerant software system with two-version redundant structure and random rejuvenation schedule, and evaluate quantitatively a dependability measure like the steady-state system availability based on the familiar Markovian analysis. In numerical examples, we examine the dependence of two system diversity techniques; design and environment diversity techniques, on the system dependability measure.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Re-integrating of architecture/component oriented general model of sub-domain 面向子领域的体系结构/组件通用模型的重新集成
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452135
LiYu-cai, Wang Ling
{"title":"Re-integrating of architecture/component oriented general model of sub-domain","authors":"LiYu-cai, Wang Ling","doi":"10.1109/ISADS.2005.1452135","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452135","url":null,"abstract":"In the process of research and development of speech recognize interface for Z+Z intelligence education platform, there are too many component interfaces and their usage is too difficult. A strategy for designing software, named re-integrating of architecture/component oriented general model of sub-domain, is proposed on the basis of domain-specific application system, in order to simplify architectures and system integration. Feasibility and design method are demonstrated, and a general component for recognizing voice-controlled command is designed. The DMDSS (Development Model of Domain-Specific Software) based on component/architecture is improved by Yajie and Junqiao, (2003). This idea of software design can be complemented of DMDSS.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing and assuring trustworthy Web services 开发和保证值得信赖的Web服务
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452016
W. Tsai, Xiao Wei, Yinong Chen, B. Xiao, R. Paul, H. Huang
{"title":"Developing and assuring trustworthy Web services","authors":"W. Tsai, Xiao Wei, Yinong Chen, B. Xiao, R. Paul, H. Huang","doi":"10.1109/ISADS.2005.1452016","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452016","url":null,"abstract":"Web services are emerging technologies that are changing the way we develop and use computer systems and software. Current Web services testing techniques are unable to assure the desired level of trustworthiness, which presents a barrier to WS applications in mission and business critical environments. This paper presents a framework that assures the trustworthiness of Web services. New assurance techniques are developed within the framework, including specification verification via completeness and consistency checking, specification refinement, distributed Web services development, test case generation, and automated Web services testing. Traditional test case generation methods only generate positive test cases that verify the functionality of software. The Swiss cheese test case generation method proposed in this paper is designed to perform both positive and negative testing that also reveal the vulnerability of Web services. This integrated development process is implemented in a case study. The experimental evaluation demonstrates the effectiveness of this approach. It also reveals that the Swiss cheese negative testing detects even more faults than positive testing and thus significantly reduces the vulnerability of Web services.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
AOA: an autonomous-oriented architecture 面向自治的体系结构
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452104
G. Pujolle, H. Chaouchi
{"title":"AOA: an autonomous-oriented architecture","authors":"G. Pujolle, H. Chaouchi","doi":"10.1109/ISADS.2005.1452104","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452104","url":null,"abstract":"IP networks are now well established. However, control, management and optimization schemes are provided in a static and basic way. Network control and management could be provided in a dynamic way using an autonomous-based architecture. This architecture could be built through intelligent software agents that offer a new way to master reliability, plug-and-play schemes, quality of service, security, and mobility management. This new paradigm allows a dynamic and intelligent control of the equipment in a local manner. In this paper, we provide an illustration of such an architecture through the AOA (autonomous-oriented architecture) project developed by the LIP6. Finally, we discuss the pros and cons of this new architecture.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The revolution of train control system in Japan 日本列车控制系统的革命
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452145
Masayuki Matsumo
{"title":"The revolution of train control system in Japan","authors":"Masayuki Matsumo","doi":"10.1109/ISADS.2005.1452145","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452145","url":null,"abstract":"The following report introduces train control systems applied in railway lines in Japan. The report also shows that train control systems have been developed and these are classified four levels from \"Level 0\" to \"Level 3\". We call these train control systems \"East Japan Train Control system\" (EJTC). \"Level 0\" system, the Automatic Train Stop device (ATS-S), was introduced into Japanese National Railways (JNR) to prevent train collision. This system has been replacing with Pattern type ATS (ATS-P); \"Level 1\" system. ATS-P was developed to eliminate the weaknesses of the ATS-S. Recent remarkable progress in the field of information technology makes possible a new train control system where train itself detects its location and communicates with other trains through radio transmission. Therefore, we have been developing the \"Level 3\" train control system called ATACS (Advanced Train Administration and Communications System). ATACS is the new train control system using information technology and ADS technology. ATACS prototype system is testing at Senseki Line in Tohoku district for practical use.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Assurance reconfiguration technology in decentralized database systems by an autonomous restructure mobile agent 自主重构移动代理在分散数据库系统中的保证重构技术
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452036
C. P. Leguízamo, Minoru Takaishi, S. Kimura, K. Mori
{"title":"Assurance reconfiguration technology in decentralized database systems by an autonomous restructure mobile agent","authors":"C. P. Leguízamo, Minoru Takaishi, S. Kimura, K. Mori","doi":"10.1109/ISADS.2005.1452036","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452036","url":null,"abstract":"In the recent years, the society has suffered several changes in its ways and methods of consuming. The companies are providing services through the Internet to large number and uncertain customers. The customers require one-click service and their preferences changes dynamically. Autonomous decentralized database system (ADDS) is proposed as a system architecture in order to realize assurance in distributed database systems that support e-business. A background coordination technology, performed by an autonomous mobile agent, is devised to adapt the system to evolving situations. The system can achieve timeliness by allocating the information in advance among the sites that has different time constraints for updating. Further, the system is provided with an autonomous reconstruction technology to coordinate the heterogeneous requirements when the size of the system increases. Based on a autonomous restructure mobile agent (RMA), which autonomously determines how many sites and which sites should be restructured to improve the response time, this technique can adapt the system to the evolving situation dynamically. Thus, the assurance of the system can be maintained. A simulation shows the effectiveness of the proposed technology.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-based color image retrieval via lifting scheme 基于内容的提升方案彩色图像检索
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452091
Huihui Huang, Wei Huang, Zhigang Liu, Wei-rong Chen, Q. Qian
{"title":"Content-based color image retrieval via lifting scheme","authors":"Huihui Huang, Wei Huang, Zhigang Liu, Wei-rong Chen, Q. Qian","doi":"10.1109/ISADS.2005.1452091","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452091","url":null,"abstract":"Content-based image retrieval (CBIR) aims at querying targets by using visual contents of image itself. Although classical wavelet transform is effective in representing image feature and thus is suitable in CBIR, it still encounters problems especially in implementation, e.g. floating-point operation and decomposition speed, which may nicely be solved by lifting scheme, a novel spatial approach for constructing biorthogonal wavelet filters. Lifting scheme has such intriguing properties as convenient construction, simple structure, integer-to-integer transform, low computational complexity as well as flexible adaptivity, revealing its potentials in CBIR. In this paper, by using general lifting and its adaptive version, we decompose HSI color images into multilevel scale and wavelet coefficients, with which, we can perform image feature extraction and similarity match by means of F-norm theory. Meanwhile, we provide a progressive image filtering strategy to achieve flexible CBIR. Eventually, the retrieval performances of lifting scheme are compared with those of its classical counterpart in retrieval accuracy and speed.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Multi-agent system for security auditing and worm containment in metropolitan area networks 城域网安全审计与蠕虫遏制的多代理系统
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005. Pub Date : 2005-04-04 DOI: 10.1109/ISADS.2005.1452052
Xiantai Gou, Wei-dong Jin
{"title":"Multi-agent system for security auditing and worm containment in metropolitan area networks","authors":"Xiantai Gou, Wei-dong Jin","doi":"10.1109/ISADS.2005.1452052","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452052","url":null,"abstract":"Security auditing and worm containment is used to guarantee the network security in metropolitan area networks. Multi-agent system for security auditing and worm containment in MAN (MSAWCM) is presented to audit user's accesses and provide a first-class automatic reaction mechanism that automatically applies containment strategies to prevent clean host from being infected by blocking the propagation of the worms MSAWCM uses broadband access server as information gathering agent that uses hardware packet filter (HPF) to get packet from MAN. It adaptively studies and audits the accessing in the whole network and dynamically changes the working parameters to detect the unknown worms. MSAWCM integrates worm detection system (WDS) and network management system (NMS). Reaction measures can be taken by using SNMP interface to control BAS as soon as the WDS detect the active worm. MSAWCM is very effective in blocking random scanning worms that are very noisy and tend to waste a lot of network bandwidth and crash routers. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MSAWCM blocking the propagation of the worms.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121524661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信