{"title":"Agent communication based SAR image parallel processing","authors":"T. Chi, Xin Zhang, Hongqiao Wu, Jinyun Fang","doi":"10.1109/PDCAT.2003.1236359","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236359","url":null,"abstract":"Airborne SAR remote sensing image has the characteristic of large data volume and computation burden, so the processing needs very large computer memory and stronger computation ability. Based on the introduction of the SAR image processing procedure, we study the SAR image processing using computer parallel computation technology. The parallel processing mechanism is based on the parallel computer cluster operation and the large virtual shared memory technology. In the client/server architecture based SAR image parallel system, agent based network communication plays an important role in the computer performance monitor and burden distribution. In the end, the application of the SAR image parallel processing system in the disaster monitor and assessment system is introduced. The application result illustrates the high efficiency of the system and the feasibility of our research.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bounds on aperiodic auto- and cross-correlations of binary sequences with low or zero correlation zone","authors":"D. Peng, P. Fan","doi":"10.1109/PDCAT.2003.1236438","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236438","url":null,"abstract":"By reducing the problem of finding aperiodic sequence bounds to that of minimizing a quadratic form, several lower bounds on the aperiodic correlations of binary sequences with low or zero correlation zone are established. It is shown that the new bounds are tighter than the existing bounds.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on object-oriented role-based access control model","authors":"J. Luo, Dake He","doi":"10.1109/PDCAT.2003.1236273","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236273","url":null,"abstract":"We provide an object-oriented model for role-based access control (RBAC). In RBAC, permissions are associated with roles. Users are assigned members of roles, thereby obtaining the associated permissions. Administrators dominate the authorization of access permissions to make target resource available for users. We introduce the concept of object to provide an efficient access control mechanism for multidomains distributed system with centralized control and decentralized management of the policy controller. This model discusses static and dynamic role authorization, and further analysis of dynamic features of the model.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance assessment of retrieving information of moving objects with spatio-temporal index","authors":"Zhang Fengli, Yu Jiebang, Qin Zhiguang, Zhou Mingtian","doi":"10.1109/PDCAT.2003.1236434","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236434","url":null,"abstract":"We will present a 4 dimensional trajectory model for capturing dynamic locations of moving objects is proposed. Based upon this model, we will present a usage of query operators and implement these queries on ORDBMS and study the effect of indices on the performance of these moving object queries. Finally, the effectiveness of our approach is justified by some experiments.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131814801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overlay spreading scheme for microcellular QS-CDMA system","authors":"L. Hao, P. Fan","doi":"10.1109/PDCAT.2003.1236324","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236324","url":null,"abstract":"A quasisynchronous code-division multiple-access (QS-CDMA) system for microcellular network is considered. The proposed QS-CDMA system employs an overlay spreading code allocation scheme in order to suppress the multiple access interference (MAI). It is shown, by analytical and simulation results, that, compared with the conventional concatenated scheme, the overlay spreading scheme exhibits better system performance.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134452038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards virtual private grid through policy-based management","authors":"Kun Yang, Xin Guo, Da-you Liu, Bo Yang","doi":"10.1109/PDCAT.2003.1236374","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236374","url":null,"abstract":"We contribute to the current literature of grid computing research by introducing virtual private grid (VPG) concept and corresponding supporting environment, which not only deal with the grid resource management as carried out by most researches but also take into account the network security issues for grid application. We tend to promote VPG from the management point of view by exploring policy-based management method. More concern is assigned to the private part of the VPG by employing virtual private networks (VPN) technology while leaving the grid resource management to the grid tool globus. An early experiment exemplifies the current implementation status and its feasibility. We present a first step towards VPG and plenty of work is ongoing.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustone: a service-based cluster middleware","authors":"Taoying Liu, Zhiwei Xu","doi":"10.1109/PDCAT.2003.1236262","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236262","url":null,"abstract":"Middleware development is stepping into a new phase to meet requirements coming from Internet, grid and clusters. We first discuss new challenges to middleware for clusters. Next we present a service-based cluster middleware Clustone, and interpret components of Clustone in great detail. We analyze the performance of communication component of Clustone. Finally, we make our conclusion and give future focus of our research.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Honeypots in blackhat mode and its implications [computer security]","authors":"Chunming Rong, Geng Yang","doi":"10.1109/PDCAT.2003.1236284","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236284","url":null,"abstract":"Honeypot is a recent developed computer security concept which uses active offense to against attacks from blackhats (people with evil or illegal intents like hackers and virus-producers). It lures hackers to attack a seemly vulnerable but well observed computer system in order to learn about the tactics and tools used by the attackers so that we may improve the system security accordingly. However, a system developed with noble intentions may sometimes be used in evil applications. We discuss the consequences and implications of honeypots being used with evil intents. A honeypot system may be set up by blackhats to lure common Internet users to use a fake system in order to gain valuable information, like credit card numbers, from these users. Implications of such possible usages may damage the credibility of services provided in the Internet, especially those involving payment transactions and sensitive information exchanges. Unless we find ways to avoid such misusages, the consumer trust of e-commerce, e-health and e-government depending on the use of Internet services may be severely hampered.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A controllable predictive cross-diamond fast search algorithm for block matching motion estimation","authors":"Tianwu Yang, Changqian Zhu, Qiang Peng","doi":"10.1109/PDCAT.2003.1236423","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236423","url":null,"abstract":"Motion search is a key technique to motion compensated video coding standards (Jo Yew Tham et al., 1998). A novel controllable predictive cross-diamond fast search algorithm is proposed based on intense study of motion vector characteristics. The proposed algorithm takes advantage of \"stop when good enough\" spirit in PMVFAST (A. M. Tourapis et al., 2000) and multiple initial predictor candidates (MIPC) concept in APDZS, and new controllable search criteria are set down. Simulation results demonstrate that the proposed algorithm is better than other recently proposed algorithms in term of PSNR performance and required number of search points, and moreover, the proposed algorithm can control the search speed according to practical demands.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On three-dimension Ethernet MAN (3D-EMAN) architecture","authors":"Huaxin Zeng, Jun Dou, Dengyuan Xu","doi":"10.1109/PDCAT.2003.1236360","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236360","url":null,"abstract":"Based on analysis to the Internet in provision of QoS, we present a framework of three-dimension Ethernet-based MAN (3D-EMAN) architecture for DWDM communication environment. 3D-EMAN adopts the out-band signaling approach to separate functions for control, management, and user data in 3 working planes, and in all conscience, follows the popularity of the Ethernet MAC in MANs. 3D-EMAN has two operation modes: 3D-EMAN mode and default mode. In default mode, 3D-EMAN specific functions are disabled and it behaves as ordinary Internet implementation. While in 3D-EMAN mode, Internet protocol stack in conjunction with 3D-EMAN specific protocols performs control and management functions and stream oriented user traffic is directly segmented into Ethernet-like physical frames (EPF) and forwarded in the physical layer of the user plane. To enable physical layer switching in DWDM environment, a novel concept called the physical frame time-slot switching (PETS) is introduced, which utilizes the time of transferring a fixed length EPF as a time-slot and operates asynchronously so as to provide a virtual-circuit service with a guaranteed QoS.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}