2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

筛选
英文 中文
Controllable authorization delegation model supported by constraints 约束支持的可控授权委托模型
Dongxian Shi, Changle Wang
{"title":"Controllable authorization delegation model supported by constraints","authors":"Dongxian Shi, Changle Wang","doi":"10.1109/CYBERC.2009.5342170","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342170","url":null,"abstract":"Trust management is a common approach on access control in the distributed environment. RT is one of the frameworks for role-based trust management. However, RT has some faults, and one of the main faults is the delegation control. To address this problem, this paper proposes a controllable authorization delegation model supported by constraint. First, the framework of RT and a reasonable classification of the RT attributes are introduced. Second, to better control the spread of permission, the constraint on the authorization source is implemented and the formalization of constraints is described. Finally, a usage of the model is illustrated through a typical example.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124544152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of blast furnace cross thermometric based on spatial data mining 基于空间数据挖掘的高炉交叉测温分析
Yanchi Liu, Hongwei Guo, Xuedong Gao
{"title":"Analysis of blast furnace cross thermometric based on spatial data mining","authors":"Yanchi Liu, Hongwei Guo, Xuedong Gao","doi":"10.1109/CYBERC.2009.5342141","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342141","url":null,"abstract":"Current clustering algorithms are limited in insufficient use of spatial information of cross thermometric temperature data. To address this problem, this paper presents a new similarity and distance measurement approach with which the spatial distance can be effectively computed. On the basis of new measurement, the clustering result of Jinan Iron and Steel 1# blast furnace cross thermometric temperature data show that the method can fully extract useful information of the temperature data and in practical applications with higher accuracy and reliability.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129538779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A dynamic nonlinear fault tolerant control algorithm and its application for motor reliability 一种动态非线性容错控制算法及其在电机可靠性中的应用
Qian Liu, Daqi Zhu
{"title":"A dynamic nonlinear fault tolerant control algorithm and its application for motor reliability","authors":"Qian Liu, Daqi Zhu","doi":"10.1109/CYBERC.2009.5342153","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342153","url":null,"abstract":"A dynamic fault-tolerant control system based on the improved CMAC (Cerebellar Model Articulation Controllers) neural network is presented in this paper. In the conventional CMAC learning scheme, the correcting amounts of errors are equally distributed into all addressed hypercube, regardless the credibility of those hypercube. The proposed improved learning approach is to use the learned times of addressed hypercube as the credibility, the correcting amounts of errors are proportional to the inversion of the learned times of addressed hypercube, with this idea, the learning speed can indeed be improved. Based on the improved CMAC fault learning approach for motor, the effective control law reconfiguration strategy is presented. The system stability and performance are analyzed under failure scenarios. The numerical simulation demonstrates the effectiveness of the Improved CMAC algorithm and the proposed fault-tolerant controller.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132397386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A priority-based message scheduling scheme for multi-agent system dynamically, adapting to the environment change 一种基于优先级的多智能体系统动态消息调度方案,可适应环境的变化
Hyun Ki Hong, Sun Sik Park, Sung-Keun Song, H. Youn
{"title":"A priority-based message scheduling scheme for multi-agent system dynamically, adapting to the environment change","authors":"Hyun Ki Hong, Sun Sik Park, Sung-Keun Song, H. Youn","doi":"10.1109/CYBERC.2009.5342178","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342178","url":null,"abstract":"Multi-agent system consists of a number of cooperative agents which have agreed to work together for a common goal. When scheduling the messages in an agent system, if the same priority is assigned to all the agents without considering the importance of their role, the performance may not be maximized. In this paper we propose a new priority-based message scheduling scheme. It enables the agent system to quickly adapt to the environment change by properly modeling the priority of the messages based on the importance of the agents and message throughput. The performance of an agent system is shown to be greatly improved by the proposed scheme using a case study of crime prevention system which was implemented with the agent platform developed by the authors.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"57 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Palmprint recognition by fusion of multi-color components 多色成分融合掌纹识别
Jiajia Zhou, Dongmei Sun, Z. Qiu, Ke Xiong, Di Liu, Yanqiang Zhang
{"title":"Palmprint recognition by fusion of multi-color components","authors":"Jiajia Zhou, Dongmei Sun, Z. Qiu, Ke Xiong, Di Liu, Yanqiang Zhang","doi":"10.1109/CYBERC.2009.5342159","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342159","url":null,"abstract":"Palmprint Recognition Systems (PRS) with multi-feature can increase the recognition performance of PRS. For such a purpose, effectively distinguished information with low dimension is important in fusion for palmprint recognition. Usually, color information is a beneficial feature in image retrieval. But it is always ignored in recognition. This paper proposes a novel palmprint recognition algorithm based on multi-color components fusion. Firstly, an improved DCT-based approach is used to extract color component features from RGB space, YIQ space and HSI space, respectively. Secondly, the extracted useful component features are fused to serial-fused feature vectors. Then, classification is performed by the nearest neighbor classifier. Experimental results show that the proposed fusion algorithm obtains higher recognition rates compared to single component feature.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126528570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed Monte Carlo simulation for option pricing: The first completed benchmark and applications of distributed Monte Carlo simulation model on high-performance computing architecture 分布式蒙特卡罗期权定价仿真:首次完成了分布式蒙特卡罗仿真模型在高性能计算架构上的基准测试及应用
F. Wang
{"title":"Distributed Monte Carlo simulation for option pricing: The first completed benchmark and applications of distributed Monte Carlo simulation model on high-performance computing architecture","authors":"F. Wang","doi":"10.1109/CYBERC.2009.5342201","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342201","url":null,"abstract":"As financial institution computing requirements grow exponentially, we have explored the potential for the ClearSpeed Accelerator, the Cell processor and the FPGA (A field-programmable gate array) to run risk analytics applications. We also invented the Smoothed Alias Method based generator for FPGA in order to achieve the fast result. We have taken Monte Carlo algorithm from my C++ Quantitative Library and rewrite it for this benchmark purpose and test the algorithm with some clever numerical adaptation with the Bulk Synchronous Parallel (BSP) computing model in order to leverage the distributed computing architecture. Following the initial benchmark, we have chosen to use the ClearSpeed Accelerator. With some smart quant re-engineering, we have further optimized the Distributed MC algorithm for pricing Bermudan Swaption to exploit the potential of distributed-based architecture. We will show the comparative benchmark results of the MC algorithm on ClearSpeed Accelerator, Cell and FPGA platform for the first time within our industry based on my working notes from my time in Barclays Capital London.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125485479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A measurement study of online internet video views through a large-scale, search engine 通过大规模搜索引擎对在线互联网视频观看量的测量研究
Yishuai Chen, Changjia Chen, Guo Dan
{"title":"A measurement study of online internet video views through a large-scale, search engine","authors":"Yishuai Chen, Changjia Chen, Guo Dan","doi":"10.1109/CYBERC.2009.5342142","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342142","url":null,"abstract":"As the spread of broadband internet access, the online Internet video becomes popular in our daily life. The search engine is an important tool for users to access online video, resulting in considerable traffic on the video websites. In this work, we statistically analyze the video access log provided by a large scale video search engine, and validate that the aggregated views of online video from the search engine is diurnally regular. Furthermore, we find the probability of abrupt surge or disappearance of views is significantly high, having a percentage of 20% all videos. The results also show that 30% of them are spike that indicates that an accessing surge of views is followed by an immediate and abrupt falling. Such a result renders the big challenge how the website providers can satisfy the quality of service in providing their videos to users during the surging period. The online video access also indicates the social behaviors of the corresponding social group. These results are revealed by studying the querying string at the search engine. These results can be useful for the website developer to optimize the video system by allocating appropriate system resources according to the accessing habits of the users.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of data compression for energy-aware communication in mobile networks 移动网络中能量感知通信的数据压缩评价
Le Wang, J. Manner
{"title":"Evaluation of data compression for energy-aware communication in mobile networks","authors":"Le Wang, J. Manner","doi":"10.1109/CYBERC.2009.5342172","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342172","url":null,"abstract":"The development of ICT following Moore's Law has resulted in a situation where mobile users are able to make use of a wealth of versatile services. Yet, battery and electronics technology has not followed this development as well, which has resulted in a situation where a mobile user's battery can only enable a few hours of active use. Therefore, we need to focus increasingly on energy efficient wireless and mobile communication to reduce energy consumption, but also to cut down greenhouse emissions and improve business competitiveness. Due to significant energy consumption of transmitting data over wireless networks, data compression techniques are one simple way to trade the overhead of compression for less communication energy. This paper investigates the usages of data compression to reduce the energy consumption in a modern hand-held device. By conducting various experiments, we analyze content-aware compression schemes that can reduce energy consumption significantly. Yet, blind or careless use of compression results in a huge energy loss. We also discuss the deployment issues of data compression.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A wave-like amendment-based time-division medium access slot allocation mechanism for underwater acoustic sensor networks 一种基于类波修正的水声传感器网络时分介质接入时隙分配机制
Wenli Lin, Deshi Li, Jian Chen, Tao Sun, Teng Wang
{"title":"A wave-like amendment-based time-division medium access slot allocation mechanism for underwater acoustic sensor networks","authors":"Wenli Lin, Deshi Li, Jian Chen, Tao Sun, Teng Wang","doi":"10.1109/CYBERC.2009.5342165","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342165","url":null,"abstract":"Recently, there has been a growing interest in monitoring aqueous environments using Underwater Acoustic Sensor Networks (UASNs). In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes into the acoustic channel, which is characterized by high propagation delay and low data rate, which is challenging for system synchronization, energy consumption and network output. Most researches in MAC protocol used for UASNs adopt collision avoidance mechanism with handshaking methods at present. But the long acoustic propagation delay results in low throughput and poor energy efficiency. In this paper, we propose a new amendment-based TDMA slot allocation mechanism, which is named WA-TDMA. Slot allocation starts from the node which launched as the center outward to form the wave-like proliferation and the slot allocation and amendment are continuously, which like the performance of wave. This can shorten the initialization time of the network. With the help of amendment, protocol can adjust slot usage to improve slots utilization and deal with slots reuse problem. The main function of the amendment is to avoid the slot collision, and improve the efficiency of slot using. The key characteristic of our mechanism is that it deals with holistic slot allocation problem well, and improve the slots utilization with certain protect distance at the same time.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134353536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design and implementation of a configurable hardware profiler supporting path profiling and sampling 设计和实现一个可配置的硬件分析器,支持路径分析和采样
Huizhen Zhang, J. Ji, Xuehai Zhou, Hongxing Ma, Chao Wang
{"title":"Design and implementation of a configurable hardware profiler supporting path profiling and sampling","authors":"Huizhen Zhang, J. Ji, Xuehai Zhou, Hongxing Ma, Chao Wang","doi":"10.1109/CYBERC.2009.5342169","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342169","url":null,"abstract":"Profiling plays an important role in performance optimization, such as instruction set optimization, dynamic binary translation and so on. Unfortunately, profilers nowadays often lack in efficiency on two key attributes: accuracy and profiling time. In this paper, we introduce a configurable hardware path profiler deriving from previous work, based on the idea of sampling and path profiling. The profiler consists of three modules respectively for identifying branches, detecting paths and storing information. It can work with different processors loosely. It utilizes dynamic path profiling technique on instruction level to accurately obtain sensitive hot information of executing programs while supports multiple sampling policies to reduce profiling overheads. Through configuration, the profiler can perform different profiling policies and profile target programs continuously or discretely. Empirical experiments show that the profiler can reduce hardware timing to 6.4% and keep the accuracy up to 90%.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信