2009 International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Risk-Aware SLA Brokering Using WS-Agreement 使用WS-Agreement的风险感知SLA代理
J. Padgett, K. Djemame, I. Gourlay, Django Armstrong
{"title":"Risk-Aware SLA Brokering Using WS-Agreement","authors":"J. Padgett, K. Djemame, I. Gourlay, Django Armstrong","doi":"10.1109/WAINA.2009.72","DOIUrl":"https://doi.org/10.1109/WAINA.2009.72","url":null,"abstract":"Service Level Agreements (SLAs) are facilitators for widening the commercial uptake of Grid technology. They provide explicit statements of expectation and obligation between service consumers and providers. However, without the ability to assess the probability that an SLA might fail, commercial uptake will be restricted, since neither party will be willing to agree. Therefore, risk assessment mechanisms are critical to increase confidence in Grid technology usage within the commercial sector. This paper presents an SLA brokering mechanism including risk assessment techniques which evaluate the probability of SLA failure. WS-Agreement and risk metrics are used to facilitate SLA creation between service consumers and providers within a typical Grid resource usage scenario.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Quality Aware Context Information Aggregation System for Pervasive Environments 面向普适环境的质量感知上下文信息聚合系统
A. Manzoor, Hong Linh Truong, S. Dustdar
{"title":"Quality Aware Context Information Aggregation System for Pervasive Environments","authors":"A. Manzoor, Hong Linh Truong, S. Dustdar","doi":"10.1109/WAINA.2009.144","DOIUrl":"https://doi.org/10.1109/WAINA.2009.144","url":null,"abstract":"Sensing context information and making it available to the people, involved in coordinating a collaborative task, is a preliminary phase in making a system adaptable to the prevailing situation in pervasive environments. However, the diversity of the sources of context information, the characteristics of pervasive environments, and the nature of collaborative tasks pose a stern challenge to the efficient management of context information by sensing a lot of redundant and conflicting information. Quality of Context parameters can be used to resolve the conflicts in context information. In this paper, we present a context aggregation system that detects and removes the duplicates and conflicts from context information by using the policies based on Quality of Context parameters. This system effectively aggregates the continuously evolving context information and efficiently uses the scare resources in pervasive environments.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125666580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Real-time Minute Change Detection on GPU for Cellular and Remote Sensor Imaging 基于GPU的蜂窝和遥感成像实时微小变化检测
S. Kockara, Tansel Halic, Coskun Bayrak
{"title":"Real-time Minute Change Detection on GPU for Cellular and Remote Sensor Imaging","authors":"S. Kockara, Tansel Halic, Coskun Bayrak","doi":"10.1109/WAINA.2009.202","DOIUrl":"https://doi.org/10.1109/WAINA.2009.202","url":null,"abstract":"Discovering subtle alterations of pairs of images taken from the same scene at different time intervals is called minute change detection problem. To achieve this goal, we have developed a framework that captures and highlights minute changes in digital images that are otherwise hidden to the human eye. Moreover, unnoticeable differences from image pairs that are taken at different time intervals with similar viewing conditions are detected. Although our framework's application areas cover a wide variety of different disciplines, from medicine to security, weather forecasting, urban planning, and monitoring natural disasters, in this study our focus was real-time minute change detection and tracking on biomedical and satellite images. Real-time performance in cases such as medicine is crucial; we enhance this approach by using the extensive computational power of the graphical processing unit (GPU). Our experimental results in detection of subtle changes in light microscopic images of mouse MC3T3-E1 osteoblastic cells grown in culture with the resolution of 2600x2060 and remote sensor images performed by the GPU computations illustrate that our algorithm detects infinitesimal differences on images in real-time.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130398304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Seamless Handover Scheme with Pre-registration in NEMO NEMO中具有预注册的无缝切换方案
Ying-Hong Wang, Kuo-Feng Huang, H. Ho
{"title":"A Seamless Handover Scheme with Pre-registration in NEMO","authors":"Ying-Hong Wang, Kuo-Feng Huang, H. Ho","doi":"10.1109/WAINA.2009.13","DOIUrl":"https://doi.org/10.1109/WAINA.2009.13","url":null,"abstract":"IETF(Internet Engineering Task Force) proposed the Management Mechanism of NEMO (NEtwork MObility) to support network mobility. The mobility management of NEMO is an extension of Mobile IPv6 (MIPv6), and it inherits also all the drawbacks of MIPv6 such as inefficient routing, high handover latency, packet loss rate, and so on.The purpose of method which is based on the public transportations (e.g. Train, MRT, Bus etc.) with fixed path as NEMO application solved the handover latency problem and packet lost problem. We propose a seamless handover Scheme with Pre-registration to solve these problems. The proposed handover scheme can decrease handover latency and packet lost in session for NEMO. The aim is to procure seamless communication when the whole network is movement.KeyWords : NeMo, Pre-registration","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving the Scalability of Communication-Aware Task Mapping Techniques 改进感知通信的任务映射技术的可扩展性
Raul Soriano, J. Orduña
{"title":"Improving the Scalability of Communication-Aware Task Mapping Techniques","authors":"Raul Soriano, J. Orduña","doi":"10.1109/WAINA.2009.91","DOIUrl":"https://doi.org/10.1109/WAINA.2009.91","url":null,"abstract":"The advent of cluster computing introduced some years ago the need for taking into account the communications that take place on distributed computer architectures when executing applications. In that environment, different communication-aware mapping techniques were proposed for improving the system performance, both for off-chip and for on-chip networks. Some of these proposals are based on heuristic search for finding pseudo-optimal assignments of a given population of tasks and processing elements. However, the technology has allowed a significant increase in the problem size, arising the scalability problem. In this paper, we propose the use of an evolutionary computation framework to implement a genetic algorithm that can significantly improve the scalability of communication-aware task mapping techniques. We have studied different genetic operators and selection mechanisms, choosing those providing the best performance for this particular problem. The performance evaluation results shows that for medium and large domain spaces, the genetic algorithm provides better solutions while requiring lower or similar execution times. These results indicate that the heuristic search based on genetic algorithms can improve the scalability of communication-aware task mapping techniques for both cluster computing and Networks-on-Chip.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets) 面向移动自组网(immanet)的上下文感知身份管理
A. Arabo, Q. Shi, M. Merabti
{"title":"Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets)","authors":"A. Arabo, Q. Shi, M. Merabti","doi":"10.1109/WAINA.2009.32","DOIUrl":"https://doi.org/10.1109/WAINA.2009.32","url":null,"abstract":"The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. In this paper we present the current research issues within the field of MANets and highlight some challenges for future studies. The main focus is on the area of identity management (IM), context-awareness and user-centricity for MANets together with its security issues and implications. We conclude with the need of a research into the area of IMMANets.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"278 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120860934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Service Oriented Model for Semantics-Based Data Management in Wireless Sensor Networks 面向服务的无线传感器网络语义数据管理模型
M. Iqbal, H. Lim, Wenqiang Wang, Yuxia Yao
{"title":"A Service Oriented Model for Semantics-Based Data Management in Wireless Sensor Networks","authors":"M. Iqbal, H. Lim, Wenqiang Wang, Yuxia Yao","doi":"10.1109/WAINA.2009.130","DOIUrl":"https://doi.org/10.1109/WAINA.2009.130","url":null,"abstract":"The emerging heterogeneity of data management, programming models and operating platforms in sensor nodes are making the seamless interoperation of devices a challenge. We consider this problem and leverage on the concepts of semantic web and service-oriented design to propose a model that adds a semantics and service-oriented layer to existing network models. This added layer hides the hardware as well as software implementation details from the application layer and thus allows seamless data management between nodes whose capabilities may even be unknown. The proposed model builds on top of well established standards OWL and OWL-S to encapsulate sensor data and services as hierarchical ontology and provides interfaces for service advertisement and discovery. A case study has been discussed whereby the proposed model is used for service-oriented data management (acquisition, archival, processing).","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121267631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Machine Learning Applied to BRCA1 Hereditary Breast Cancer Data 机器学习应用于BRCA1遗传性乳腺癌数据
A. Doncescu, Baptiste Tauzain, N. Kabbaj
{"title":"Machine Learning Applied to BRCA1 Hereditary Breast Cancer Data","authors":"A. Doncescu, Baptiste Tauzain, N. Kabbaj","doi":"10.1109/WAINA.2009.165","DOIUrl":"https://doi.org/10.1109/WAINA.2009.165","url":null,"abstract":"This research aims to provide a tool to doctors in order to help for diagnosis of BRCA1 hereditary breast cancer. Our goal is to determine, if possible, profiles that are responsible for early cancer onset. In order to extract knowledge from the biological information above we will create a relational database that will allow prognosticating cancer apparition. We want to determine different types responsible for different profiles of cancer onset thanks to machine learning programs. The prognostic will rely on polymorphisms of a gene, BRCA1, but on family history as well. The machine learning software(s) will be used as a tool by doctors as a help for diagnosis. This tool will be used in order to determine if these patients are member of a high risk cluster, an early occurring cancer.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy in Content-Based Opportunistic Networks 基于内容的机会网络中的隐私
Abdullatif Shikfa, Melek Önen, R. Molva
{"title":"Privacy in Content-Based Opportunistic Networks","authors":"Abdullatif Shikfa, Melek Önen, R. Molva","doi":"10.1109/WAINA.2009.73","DOIUrl":"https://doi.org/10.1109/WAINA.2009.73","url":null,"abstract":"In this paper, we present security primitives required to achieve privacy in content-based opportunistic networks. We define three privacy models adapted to content-based networking and detail what are the requirements that the security primitives have to achieve in order to fit in each of these models. We also propose an original approach based on multiple layer commutative encryption that features full privacy content-based networking.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131061500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Opportunistic Social Network Experiments 机会主义社会网络实验
N. Montavont, Safaà Hachana, Lucien Loiseau
{"title":"Opportunistic Social Network Experiments","authors":"N. Montavont, Safaà Hachana, Lucien Loiseau","doi":"10.1109/WAINA.2009.134","DOIUrl":"https://doi.org/10.1109/WAINA.2009.134","url":null,"abstract":"This paper presents the premisses of a new modular framework and a large scale experiment that we will launch for social opportunistic networks. The new framework aims at activating specific protocols depending on the application requirements. The experiment involves several students who will be equipped with PDA. Our goal is to study how the social interaction between users impact the behavior of opportunistic routing algorithms. By presenting this experiment, we are looking for the feedback from the community and to extend our experiment to other universities / campus.","PeriodicalId":159465,"journal":{"name":"2009 International Conference on Advanced Information Networking and Applications Workshops","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116981236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信