Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies最新文献

筛选
英文 中文
Agent communication based SAR image parallel processing 基于Agent通信的SAR图像并行处理
T. Chi, Xin Zhang, Hongqiao Wu, Jinyun Fang
{"title":"Agent communication based SAR image parallel processing","authors":"T. Chi, Xin Zhang, Hongqiao Wu, Jinyun Fang","doi":"10.1109/PDCAT.2003.1236359","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236359","url":null,"abstract":"Airborne SAR remote sensing image has the characteristic of large data volume and computation burden, so the processing needs very large computer memory and stronger computation ability. Based on the introduction of the SAR image processing procedure, we study the SAR image processing using computer parallel computation technology. The parallel processing mechanism is based on the parallel computer cluster operation and the large virtual shared memory technology. In the client/server architecture based SAR image parallel system, agent based network communication plays an important role in the computer performance monitor and burden distribution. In the end, the application of the SAR image parallel processing system in the disaster monitor and assessment system is introduced. The application result illustrates the high efficiency of the system and the feasibility of our research.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131047283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bounds on aperiodic auto- and cross-correlations of binary sequences with low or zero correlation zone 具有低相关带或零相关带的二值序列的非周期自相关和互相关的界
D. Peng, P. Fan
{"title":"Bounds on aperiodic auto- and cross-correlations of binary sequences with low or zero correlation zone","authors":"D. Peng, P. Fan","doi":"10.1109/PDCAT.2003.1236438","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236438","url":null,"abstract":"By reducing the problem of finding aperiodic sequence bounds to that of minimizing a quadratic form, several lower bounds on the aperiodic correlations of binary sequences with low or zero correlation zone are established. It is shown that the new bounds are tighter than the existing bounds.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research on object-oriented role-based access control model 面向对象的基于角色的访问控制模型研究
J. Luo, Dake He
{"title":"Research on object-oriented role-based access control model","authors":"J. Luo, Dake He","doi":"10.1109/PDCAT.2003.1236273","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236273","url":null,"abstract":"We provide an object-oriented model for role-based access control (RBAC). In RBAC, permissions are associated with roles. Users are assigned members of roles, thereby obtaining the associated permissions. Administrators dominate the authorization of access permissions to make target resource available for users. We introduce the concept of object to provide an efficient access control mechanism for multidomains distributed system with centralized control and decentralized management of the policy controller. This model discusses static and dynamic role authorization, and further analysis of dynamic features of the model.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance assessment of retrieving information of moving objects with spatio-temporal index 基于时空索引的运动目标信息检索性能评价
Zhang Fengli, Yu Jiebang, Qin Zhiguang, Zhou Mingtian
{"title":"Performance assessment of retrieving information of moving objects with spatio-temporal index","authors":"Zhang Fengli, Yu Jiebang, Qin Zhiguang, Zhou Mingtian","doi":"10.1109/PDCAT.2003.1236434","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236434","url":null,"abstract":"We will present a 4 dimensional trajectory model for capturing dynamic locations of moving objects is proposed. Based upon this model, we will present a usage of query operators and implement these queries on ORDBMS and study the effect of indices on the performance of these moving object queries. Finally, the effectiveness of our approach is justified by some experiments.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131814801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An overlay spreading scheme for microcellular QS-CDMA system 一种用于微蜂窝QS-CDMA系统的覆盖扩展方案
L. Hao, P. Fan
{"title":"An overlay spreading scheme for microcellular QS-CDMA system","authors":"L. Hao, P. Fan","doi":"10.1109/PDCAT.2003.1236324","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236324","url":null,"abstract":"A quasisynchronous code-division multiple-access (QS-CDMA) system for microcellular network is considered. The proposed QS-CDMA system employs an overlay spreading code allocation scheme in order to suppress the multiple access interference (MAI). It is shown, by analytical and simulation results, that, compared with the conventional concatenated scheme, the overlay spreading scheme exhibits better system performance.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134452038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards virtual private grid through policy-based management 通过策略管理实现虚拟私有电网
Kun Yang, Xin Guo, Da-you Liu, Bo Yang
{"title":"Towards virtual private grid through policy-based management","authors":"Kun Yang, Xin Guo, Da-you Liu, Bo Yang","doi":"10.1109/PDCAT.2003.1236374","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236374","url":null,"abstract":"We contribute to the current literature of grid computing research by introducing virtual private grid (VPG) concept and corresponding supporting environment, which not only deal with the grid resource management as carried out by most researches but also take into account the network security issues for grid application. We tend to promote VPG from the management point of view by exploring policy-based management method. More concern is assigned to the private part of the VPG by employing virtual private networks (VPN) technology while leaving the grid resource management to the grid tool globus. An early experiment exemplifies the current implementation status and its feasibility. We present a first step towards VPG and plenty of work is ongoing.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134056461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Clustone: a service-based cluster middleware clusterstone:基于服务的集群中间件
Taoying Liu, Zhiwei Xu
{"title":"Clustone: a service-based cluster middleware","authors":"Taoying Liu, Zhiwei Xu","doi":"10.1109/PDCAT.2003.1236262","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236262","url":null,"abstract":"Middleware development is stepping into a new phase to meet requirements coming from Internet, grid and clusters. We first discuss new challenges to middleware for clusters. Next we present a service-based cluster middleware Clustone, and interpret components of Clustone in great detail. We analyze the performance of communication component of Clustone. Finally, we make our conclusion and give future focus of our research.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Honeypots in blackhat mode and its implications [computer security] 黑帽模式下的蜜罐及其影响[计算机安全]
Chunming Rong, Geng Yang
{"title":"Honeypots in blackhat mode and its implications [computer security]","authors":"Chunming Rong, Geng Yang","doi":"10.1109/PDCAT.2003.1236284","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236284","url":null,"abstract":"Honeypot is a recent developed computer security concept which uses active offense to against attacks from blackhats (people with evil or illegal intents like hackers and virus-producers). It lures hackers to attack a seemly vulnerable but well observed computer system in order to learn about the tactics and tools used by the attackers so that we may improve the system security accordingly. However, a system developed with noble intentions may sometimes be used in evil applications. We discuss the consequences and implications of honeypots being used with evil intents. A honeypot system may be set up by blackhats to lure common Internet users to use a fake system in order to gain valuable information, like credit card numbers, from these users. Implications of such possible usages may damage the credibility of services provided in the Internet, especially those involving payment transactions and sensitive information exchanges. Unless we find ways to avoid such misusages, the consumer trust of e-commerce, e-health and e-government depending on the use of Internet services may be severely hampered.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121738271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A controllable predictive cross-diamond fast search algorithm for block matching motion estimation 一种块匹配运动估计的可控预测交叉菱形快速搜索算法
Tianwu Yang, Changqian Zhu, Qiang Peng
{"title":"A controllable predictive cross-diamond fast search algorithm for block matching motion estimation","authors":"Tianwu Yang, Changqian Zhu, Qiang Peng","doi":"10.1109/PDCAT.2003.1236423","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236423","url":null,"abstract":"Motion search is a key technique to motion compensated video coding standards (Jo Yew Tham et al., 1998). A novel controllable predictive cross-diamond fast search algorithm is proposed based on intense study of motion vector characteristics. The proposed algorithm takes advantage of \"stop when good enough\" spirit in PMVFAST (A. M. Tourapis et al., 2000) and multiple initial predictor candidates (MIPC) concept in APDZS, and new controllable search criteria are set down. Simulation results demonstrate that the proposed algorithm is better than other recently proposed algorithms in term of PSNR performance and required number of search points, and moreover, the proposed algorithm can control the search speed according to practical demands.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On three-dimension Ethernet MAN (3D-EMAN) architecture 三维以太网城域网(3D-EMAN)体系结构
Huaxin Zeng, Jun Dou, Dengyuan Xu
{"title":"On three-dimension Ethernet MAN (3D-EMAN) architecture","authors":"Huaxin Zeng, Jun Dou, Dengyuan Xu","doi":"10.1109/PDCAT.2003.1236360","DOIUrl":"https://doi.org/10.1109/PDCAT.2003.1236360","url":null,"abstract":"Based on analysis to the Internet in provision of QoS, we present a framework of three-dimension Ethernet-based MAN (3D-EMAN) architecture for DWDM communication environment. 3D-EMAN adopts the out-band signaling approach to separate functions for control, management, and user data in 3 working planes, and in all conscience, follows the popularity of the Ethernet MAC in MANs. 3D-EMAN has two operation modes: 3D-EMAN mode and default mode. In default mode, 3D-EMAN specific functions are disabled and it behaves as ordinary Internet implementation. While in 3D-EMAN mode, Internet protocol stack in conjunction with 3D-EMAN specific protocols performs control and management functions and stream oriented user traffic is directly segmented into Ethernet-like physical frames (EPF) and forwarded in the physical layer of the user plane. To enable physical layer switching in DWDM environment, a novel concept called the physical frame time-slot switching (PETS) is introduced, which utilizes the time of transferring a fixed length EPF as a time-slot and operates asynchronously so as to provide a virtual-circuit service with a guaranteed QoS.","PeriodicalId":145111,"journal":{"name":"Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信