2010 International Conference on Complex, Intelligent and Software Intensive Systems最新文献

筛选
英文 中文
Adaptive Semantics of Complex Information/Services Networks: A Case Study from Cultural Heritage 复杂信息/服务网络的自适应语义:以文化遗产为例
G. Mascari, U. Maniscalco, L. Moltedo, P. Moscati, G. Pilato, L. Pitolli, P. Salonia, Giovanni Toffoli
{"title":"Adaptive Semantics of Complex Information/Services Networks: A Case Study from Cultural Heritage","authors":"G. Mascari, U. Maniscalco, L. Moltedo, P. Moscati, G. Pilato, L. Pitolli, P. Salonia, Giovanni Toffoli","doi":"10.1109/CISIS.2010.125","DOIUrl":"https://doi.org/10.1109/CISIS.2010.125","url":null,"abstract":"A unified view to Semantic Web/Grid Information and Services Discovery and Management is being investigated at CNR both at the theoretical level and at the experimental level. The mathematical foundations are being developed with algebraic methods. An experimental prototype is being realized in the area of Cultural Heritage. The paper presents achievements and future directions.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124426131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Control of Distributed Systems Based on State Prediction Methods 基于状态预测方法的分布式系统自动控制
A. Visan, Mihai Istin, Florin Pop, V. Cristea
{"title":"Automatic Control of Distributed Systems Based on State Prediction Methods","authors":"A. Visan, Mihai Istin, Florin Pop, V. Cristea","doi":"10.1109/CISIS.2010.79","DOIUrl":"https://doi.org/10.1109/CISIS.2010.79","url":null,"abstract":"Distributed systems have been developing rapidly in the past few years and their automatic control is a real challenge being a very active research field. In order to assure the load balancing and to optimize the resource utilization, a distributed system is using different software components, such as management tools, schedulers or monitoring tools. Considering the prediction of future behavior of distributed systems resources can offer better results in optimization and control. This paper proposes a state prediction algorithm based on neural networks using a genetic algorithm for initialization. The algorithm combines the advantages of the neural networks with the advantages of a dynamically constructed architecture and the very good results offered by a genetic algorithm. The prediction system includes the MonALISA monitoring system that collects information about the current status of the available resources in a distributed system. The algorithm is used in order to predict the next value or the next interval of values for parameters such as load, free memory or network bandwidth. The comparison between proposed algorithm and the classical prediction methods highlights the obtained improvements referring to the decreasing of the prediction errors.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"285 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Uniform Concept Representation in a P2P-Based Semantic Service Discovery Framework 基于p2p的语义服务发现框架中的统一概念表示
Mario Bisignano, G. Modica, O. Tomarchio, L. Vita
{"title":"Uniform Concept Representation in a P2P-Based Semantic Service Discovery Framework","authors":"Mario Bisignano, G. Modica, O. Tomarchio, L. Vita","doi":"10.1109/CISIS.2010.138","DOIUrl":"https://doi.org/10.1109/CISIS.2010.138","url":null,"abstract":"Semantic web services have recently appeared as an enabling technology for the challenging task of automated service discovery and composition. In addition, the growing number of web services demands for distributed discovery mechanisms which do not suffer of the scalability problems of the centralized ones. A framework based on the P2P paradigm to enhance the service discovery process has been designed: it is mainly based on the grouping of peers which are semantically \"close\" to each other. In this paper, we focus on the semantic characterization of a peer, which is built by taking into account the set of services it provides. In order to reach an high level of service integration, our framework builds an abstract \"expertise\" of the peer, which is independent of the specific semantic language used to annotate the service.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123712198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Q-Contract Net: A Negotiation Protocol to Enable Quality-Based Negotiation in Digital Business Ecosystems Q-Contract Net:数字商业生态系统中基于质量的谈判协议
M. Raza, F. Hussain, O. Hussain, E. Chang
{"title":"Q-Contract Net: A Negotiation Protocol to Enable Quality-Based Negotiation in Digital Business Ecosystems","authors":"M. Raza, F. Hussain, O. Hussain, E. Chang","doi":"10.1109/CISIS.2010.188","DOIUrl":"https://doi.org/10.1109/CISIS.2010.188","url":null,"abstract":"The Digital Business Ecosystem (DBE) is the result of the co-evolution of the Business Ecosystem and the Digital Ecosystem. There are numerous approaches and enabling technologies which are used in modeling open business marketplaces and, due to the similarities between the Digital Business environments, they can also help to enable the Digital Business Ecosystem but with some limitations. The complete lifecycle of the DBE can be decomposed into the following phases: formation, evolution and dissipation. In this work, our main focus is on the importance of negotiation in the DBE formation phase and especially on the structure of Contract Net Protocol. We will present an extension to the primitive Contract Net Protocol and name it Contract Net with Quality Protocol (CNQP or Q-Contract Net) to facilitate the negotiation process by adding the quality evaluation steps during the negotiation phase of the DBE formation.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114894436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Study of How to Reduce the Content Delivery Time and the System Load in P2P System 如何在P2P系统中减少内容交付时间和系统负载的研究
Aya Takekawa, N. Imaeda, Hiroyuki Tanaka, Tsuyoshi Kitagawa
{"title":"The Study of How to Reduce the Content Delivery Time and the System Load in P2P System","authors":"Aya Takekawa, N. Imaeda, Hiroyuki Tanaka, Tsuyoshi Kitagawa","doi":"10.1109/CISIS.2010.158","DOIUrl":"https://doi.org/10.1109/CISIS.2010.158","url":null,"abstract":"In recent years, large-volume contents have delivery has been growing, so network traffic and content delivery time has increased. To solve the problem, Peer to Peer technology has been on the rise in content delivery systems. In addition, P4P system, which can tell a peer its adequate upload peers so as to reduce network traffic and to accelerate the content delivery speed, has been coming to the forefront. However, existing P4P systems have a problem that they cannot notify delivery routes minutely and accurately e.g. in units of routers or of peers. Therefore the hop counts between a download peer and an upload peer is not sufficiently reduced, then the network traffic is not satisfactorily decreased. For details, some existing P4P systems cannot satisfactorily reduce the hop counts, and the other existing P4P method which can reduce the hop counts has a restriction that IP addresses must be hierarchically assigned. To solve the problem, we propose a new P4P method reducing hop counts, which is free from the restriction. For this purpose, we use network structure information to search the hop counts, and utilize the hint server to manage the information. We evaluated the effect of our system by experiments in the lab. As a result, our method gives the best performance on the network traffic and the content delivery time among the existing methods. Additionally, we found that decreasing the hop count reduces the network traffic and the content delivery time. We researched the causes that the content delivery time is reduced by reduction of the hop counts. The most probable cause is the load balance of upload peers by decreasing the hop counts.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115592318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Grid Economics and Businesses: Meeting the Challenges 网格经济与商业:迎接挑战
G. Thanos, E. Agiatzidou, Juan-Carlos Cuesta, A. Readhead, D. Parrilli, Karita Luokkanen-Rabetino
{"title":"Grid Economics and Businesses: Meeting the Challenges","authors":"G. Thanos, E. Agiatzidou, Juan-Carlos Cuesta, A. Readhead, D. Parrilli, Karita Luokkanen-Rabetino","doi":"10.1109/CISIS.2010.148","DOIUrl":"https://doi.org/10.1109/CISIS.2010.148","url":null,"abstract":"Even though the new and advanced technologies can provide benefits for business their wide adoption in industrial settings requires always clear evidences how, and under which conditions these technological advantages can be turn into business benefits. The economic, business and legal factors should not be underestimated but rather examined in detail together with the technological context. Based on this statement, this paper presents a number of valuable conclusions and hands-on advice for new players that wish to enter the market by adopting Grid technology. The authors discuss the main challenges to be dealt with, provide a set of business advice and suggestions and place this discussion in the context of new architectural paradigms such as Cloud computing. The paper has been built on the experience of a business and legal consultancy team with the responsibility of assisting the adoption of Grid technologies in the EU.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Stress-induced Regulatory Cascades Involving Transcription Factor Dimers 涉及转录因子二聚体的应激诱导调节级联的建模
M. Manioudaki, Panayiota Poirazi
{"title":"Modeling of Stress-induced Regulatory Cascades Involving Transcription Factor Dimers","authors":"M. Manioudaki, Panayiota Poirazi","doi":"10.1109/CISIS.2010.171","DOIUrl":"https://doi.org/10.1109/CISIS.2010.171","url":null,"abstract":"Regulatory cascades consisting of stress-induced gene modules and their transcriptional regulators were recently identified and quantitatively modeled using Artificial Neural Networks (ANNs). Here, we extent our approach to account for regulators that consist of transcription factor dimers. The latter are frequently missed by module-finding tools since the expression profile of one of the dimers is typically un-altered while the profile of the second dimer changes significantly during the stress response. We identify two modules of stress-associated genes that are regulated by transcription factor dimers and show that ANN modeling can be used to accurately predict the expression of all genes in these modules. We also find that prediction accuracy is dependent on the specific stress category, in agreement with experimental studies where constitutively expressed transcription factors exert different regulatory actions upon different exposures to stressful stimuli. Overall, we show that TF dimerization is an important attribute of the transcriptional network regulation, which is frequently ignored by module finding tools, and can lead to the identification of important biological cascades whose regulatory action can be quantitatively simulated with ANNs.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extensible Framework for Efficient Secure SMS 高效安全短信的可扩展框架
A. D. Santis, Aniello Castiglione, G. Cattaneo, Maurizio Cembalo, Fabio Petagna, U. F. Petrillo
{"title":"An Extensible Framework for Efficient Secure SMS","authors":"A. D. Santis, Aniello Castiglione, G. Cattaneo, Maurizio Cembalo, Fabio Petagna, U. F. Petrillo","doi":"10.1109/CISIS.2010.81","DOIUrl":"https://doi.org/10.1109/CISIS.2010.81","url":null,"abstract":"Nowadays, Short Message Service (SMS) still represents the most used mobile messaging service. SMS messages are used in many different application fields, even in cases where security features, such as authentication and confidentiality between the communicators, must be ensured. Unfortunately, the SMS technology does not provide a built-in support for any security feature. This work presents SEESMS (Secure Extensible and Efficient SMS), a software framework written in Java which allows two peers to exchange encrypted and digitally signed SMS messages. The communication between peers is secured by using public-key cryptography. The key-exchange process is implemented by using a novel and simple security protocol which minimizes the number of SMS messages to use. SEESMS supports the encryption of a communication channel through the ECIES and the RSA algorithms. The identity validation of the contacts involved in the communication is implemented through the RSA, DSA and ECDSA signature schemes. SEESMS is able to certify the phone number of the peers using the framework. Additional cryptosystems can be coded and added to SEESMS as plug-ins. Special attention has been devoted to the implementation of an efficient framework in terms of energy consumption and execution time. This efficiency is obtained in two steps. First, all the cryptosystems available in the framework are implemented using mature and fully optimized cryptographic libraries. Second, an experimental analysis was conducted to determine which combination of cryptosystems and security parameters were able to provide a better trade-off in terms of speed/security and energy consumption. This experimental analysis has also been useful to expose some serious performance issues affecting the cryptographic libraries which are commonly used to implement security features on mobile devices.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122994405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Semantic Web Fostering Enterprise 2.0 语义网促进企业2.0
N. Capuano, M. Gaeta, F. Orciuoli, Pierluigi Ritrovato
{"title":"Semantic Web Fostering Enterprise 2.0","authors":"N. Capuano, M. Gaeta, F. Orciuoli, Pierluigi Ritrovato","doi":"10.1109/CISIS.2010.54","DOIUrl":"https://doi.org/10.1109/CISIS.2010.54","url":null,"abstract":"The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inter-persons collaboration, information exchange and knowledge sharing, also outside the organization, to establish relationships based on conversational modalities rather than on traditional business communication. The vision of Enterprise 2.0 places a high value on the importance of social networks inside and outside the organization stimulating flexibility, adaptability and innovation between workers, managers, customers, suppliers and consultants. The integration between the Web 2.0 tools with traditional enterprise software, the aggregation of organization inner data with external data and the choice of adequate knowledge representations are critical aspects to be faced in order to further the growth of smart applications in the Enterprise 2.0 context. In this work we propose an approach, based on Semantic Web techniques, to relax the aforementioned critical issues.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Enabling the User to Setup Ubiquitous Computing Applications Based on Intelligent Context 使用户能够设置基于智能上下文的泛在计算应用程序
E. Christopoulou, J. Garofalakis
{"title":"Enabling the User to Setup Ubiquitous Computing Applications Based on Intelligent Context","authors":"E. Christopoulou, J. Garofalakis","doi":"10.1109/CISIS.2010.177","DOIUrl":"https://doi.org/10.1109/CISIS.2010.177","url":null,"abstract":"Context-aware ubiquitous computing applications thrive in extremely dynamic and heterogeneous environments. When they are delivered to the user preconfigured and without the capability to be adapted, they may fail to satisfy the user’s changing needs and may give the user the feeling that control is taken away from him. In this paper we present how context can be exploited in ubiquitous computing environments in order to enable the user to setup his own application. We will focus on how context can be modelled using ontologies, on the management of accumulated context data and on the reasoning process based on intelligent context and rules defined by the user.","PeriodicalId":265285,"journal":{"name":"2010 International Conference on Complex, Intelligent and Software Intensive Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124101027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书