2008 1st International Conference on Information Technology最新文献

筛选
英文 中文
A framework for measuring the vulnerability of hosts 一个衡量主机脆弱性的框架
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621610
K. Scarfone, T. Grance
{"title":"A framework for measuring the vulnerability of hosts","authors":"K. Scarfone, T. Grance","doi":"10.1109/INFTECH.2008.4621610","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621610","url":null,"abstract":"This paper proposes a framework for measuring the vulnerability of individual hosts based on current and historical operational data for vulnerabilities and attacks. Previous approaches have not been scalable because they relied on complex manually constructed models, and most approaches have examined software flaws only, not other vulnerabilities such as software misconfiguration and software feature misuse. The framework uses a highly automatable metrics-based approach, producing rapid and consistent measurements for quantitative risk assessment and for attack and vulnerability modeling. In this paper, we propose the framework and its components and describe the work needed to implement them.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115501476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CartoMetric: Semantic ontology evaluation with cartographic methods CartoMetric:用制图方法进行语义本体评价
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621703
Krzysztof Goczy, Wojciech Waloszek
{"title":"CartoMetric: Semantic ontology evaluation with cartographic methods","authors":"Krzysztof Goczy, Wojciech Waloszek","doi":"10.1109/INFTECH.2008.4621703","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621703","url":null,"abstract":"In the last years, with development of the Semantic Web, large number of still evolving ontologies has been designed, which led to rising of the environment called sometimes ldquowild wide Webrdquo. In this rapidly changing environment, both human users and computer agents need a method of evaluation of ontologies that takes into consideration their semantic properties, i.e. the spaces of possible models. This paper presents latest improvements of the cartographic method, which has been developed in the course of PIPS - 6th European Framework Project - and focuses on use of the method for measuring semantic properties of ontologies. A prototypical system performing this task and the results of the preliminary experiments are also presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"57 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113937233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-core/tile Polymorphous Computing systems 多核/多块多态计算系统
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621675
H. Spaanenburg
{"title":"Multi-core/tile Polymorphous Computing systems","authors":"H. Spaanenburg","doi":"10.1109/INFTECH.2008.4621675","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621675","url":null,"abstract":"Polymorphous computing systems have been introduced in multi-core/tile architectures as a result of the DARPA Polymorphous Computing Architectures (PCA) program. We will review the state-of-the-art in multi-core systems, first by reviewing the PCA developed systems, and secondly by reviewing recently announced multi-core chips. The PCA-developed USC-ISI/Raytheon/Mercury MONARCH chip in addition to the general-purpose (post)-processing cores contains reprogrammable hardware for high-performance sensor-based (pre)-processing. This paper describes the application of polymorphous computing in embedded processing application domains. We will be particularly interested in the performance benefits gained from additional reconfigurable hardware in multi-core chips.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124192640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A solution to remote biometric identification 一种远程生物识别解决方案
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621615
P. Bodnar
{"title":"A solution to remote biometric identification","authors":"P. Bodnar","doi":"10.1109/INFTECH.2008.4621615","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621615","url":null,"abstract":"Identification is an essential part of security in most systems. There are many technologies and protocols supporting this functionality. Biometrics is considered promising because of ease of use from the user's viewpoint. They are also helpful if physical user presence has to be guaranteed. This paper studies security of biometrics if used in distributed and unprotected contexts. It demonstrates that an unprotected architecture is vulnerable to trivial attacks and that the use of biometric technologies in the user identification process may significantly undermine the security chain of the whole system. A solution which removes most of the difficulties is presented and discussed in the context of a distributed e-health application.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123772831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A scalable range radio-communication interfacing for embedded systems 用于嵌入式系统的可扩展范围无线电通信接口
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621605
T. Kochanski, R. Niski, A. Rucinski, J. Zurek
{"title":"A scalable range radio-communication interfacing for embedded systems","authors":"T. Kochanski, R. Niski, A. Rucinski, J. Zurek","doi":"10.1109/INFTECH.2008.4621605","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621605","url":null,"abstract":"This paper describes the radio-communications ldquostate-of-the-artrdquo and ldquostate-of-the-practicerdquo for interfacing nodes in an ambient intelligence network. We also discuss the role of software defined hardware for software defined radios that form the radio-communication interface for ambient intelligence networks. Nodes must be capable of communication over at least one medium from Wibree-like (Bluetooth) to broadband satellite, preferably with flexible range and bandwidth. Wireless sensor networks and wireless ad-hoc networks based on these nodes provide a well-defined architectural basis for mission-critical and security-critical solutions.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117137824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Branch and bound algorithm for nonenzymatic RNA degradation 非酶RNA降解的分支结合算法
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621679
J. Błażewicz, M. Figlerowicz, Agnieszka Rybarczyk
{"title":"Branch and bound algorithm for nonenzymatic RNA degradation","authors":"J. Błażewicz, M. Figlerowicz, Agnieszka Rybarczyk","doi":"10.1109/INFTECH.2008.4621679","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621679","url":null,"abstract":"A stability of individual phosphodiester bonds is an important factor affecting biological properties of large RNA molecules. One or more unstable bonds can control the rate of RNA decay and consequently, regulate its activity in vivo. Earlier in vitro studies on the mechanism of the spontaneous RNA degradation revealed that it is structure dependent process. Here, we present a mathematical formulation of a new problem of nonenzymatic spontaneous RNA degradation and a branch and bound algorithm for finding the solution of the problem. We also show the experimental data that enable to verify the results of the algorithm.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A mission critical embedded system: A new type FPGA-based digital magnetometer system for space research 关键任务嵌入式系统:一种基于fpga的新型空间研究数字磁强计系统
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621599
Hyomin Kim, M.N. Islam, L. Long, A. Rucinski
{"title":"A mission critical embedded system: A new type FPGA-based digital magnetometer system for space research","authors":"Hyomin Kim, M.N. Islam, L. Long, A. Rucinski","doi":"10.1109/INFTECH.2008.4621599","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621599","url":null,"abstract":"The magnetometer, a sensor system which measures magnetic field intensity and how it varies over time, is commonly used in scientific research and industrial applications. Typically, it consists of a magnetic sensor, analog amplifier and filter circuits. It also contains digital circuits for data acquisition. In our study, we address an issue where there is a number of ground-based magnetometer systems installed in both polar regions and in outer space. Due to the limited accessibility to those regions, installation and maintenance of those systems require high cost and lead time. This study proposes a primary test model of a ground-based magnetometer system for space research using digital signal processing techniques based on field programmable gate array (FPGA) and minimal analog circuits. This FPGA-based design is accessible via an Ethernet based network. Network functions provide communications, data acquisition, system test, and remote system control. This approach includes remote control of system characteristics like frequency response, gain, sampling rate, and sampling resolution. This new design concept will result in timely and less expensive maintenance, ease of access/service, and greater reliability. In addition, this system remotely uses an embedded self-test method which can perform system integrity tests for each separate circuit component.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SBFS - steganography based file system 基于隐写术的文件系统
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621617
J. Lach
{"title":"SBFS - steganography based file system","authors":"J. Lach","doi":"10.1109/INFTECH.2008.4621617","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621617","url":null,"abstract":"This paper presents the idea of file system that is built on top of image library using steganography techniques. In this solution user is allowed to select arbitrary set of images that are used as covers for hiding not only single portion of data but a whole file system which can contain several data files. The file system is dedicated for mobile devices such as smart phones which equipped with digital cameras often store large image libraries. Those can be successfully used for hiding sensitive data. As long as steganography technique used for hiding the existence of the file system stays secure the solutionpsilas characteristic feature is plausible deniability since the user can deny its existence.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126509637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On some constructions of monochrome visual cryptographic schemes 单色视觉密码方案的若干结构
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621609
A. Adhikari, B. Roy
{"title":"On some constructions of monochrome visual cryptographic schemes","authors":"A. Adhikari, B. Roy","doi":"10.1109/INFTECH.2008.4621609","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621609","url":null,"abstract":"Most of the secret sharing schemes are based on algebraic calculations in their realizations. But there are some different realizations of the secret sharing schemes. Visual cryptography is one such secret sharing scheme. In a visual cryptographic scheme, for a set P of n participants, a secret image is split into n shadow images called shares, where each participant in P receives one share. Certain qualified subsets of participants can “visually” recover the secret image with some loss of contrast, but other forbidden sets of participants have no information about the secret image. In this paper we review with appropriate examples some of the methods for the construction of monochrome visual cryptographic schemes for general as well as for threshold access structures.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125665305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Blending-prediction-based approach for lossless image compression 基于混合预测的无损图像压缩方法
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621685
G. Ulacha, P. Dziurzański
{"title":"Blending-prediction-based approach for lossless image compression","authors":"G. Ulacha, P. Dziurzański","doi":"10.1109/INFTECH.2008.4621685","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621685","url":null,"abstract":"An approach for blending-prediction-based lossless compression of images together with its system-level model utilizing a NoC-based multicore realization is presented in this paper. We utilize a multi-path routing algorithm and heuristic algorithms for core mapping in order to balance and minimize transfers between cores realizing subsequent stages of the compression algorithm. The experimental results confirming the applicability of the proposed approach are provided.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129421047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信