2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing最新文献

筛选
英文 中文
CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration CloudVO:为多云协作构建安全的虚拟组织
Jianxin Li, B. Li, Zongxia Du, Linlin Meng
{"title":"CloudVO: Building a Secure Virtual Organization for Multiple Clouds Collaboration","authors":"Jianxin Li, B. Li, Zongxia Du, Linlin Meng","doi":"10.1109/SNPD.2010.35","DOIUrl":"https://doi.org/10.1109/SNPD.2010.35","url":null,"abstract":"Cloud computing has become a popular computing paradigm in which virtualized and scalable resources are consolidated to provide services over Internet. However, the resource capability of a single cloud is generally limited, and some applications often require various cloud centers over Internet to deliver services together. Therefore, a Virtual Organization (VO) will be a promising approach to integrate services and users across multiple autonomous clouds. However, how to build a secure virtual organization to achieve the collaboration goals is a critical problem, and some issues such as membership agreement, policy conflict and trust management should be adequately addressed. In this paper, we present a framework CloudVO which based on security policies and trust management techniques to provide some flexible and dynamic VO management protocols for clouds. Therefore, CloudVO can achieve inter-cloud collaboration without destroying a cloud’s local policies. Based on previous VO security management experiences, we have conducted some preliminary simulations to verify the effectiveness our approaches for cloud computing environments.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Web Object Prefetching: Approaches and a New Algorithm Web对象预取:方法和新算法
Toufiq Hossain Kazi, Wenying Feng, Gongzhu Hu
{"title":"Web Object Prefetching: Approaches and a New Algorithm","authors":"Toufiq Hossain Kazi, Wenying Feng, Gongzhu Hu","doi":"10.1109/SNPD.2010.28","DOIUrl":"https://doi.org/10.1109/SNPD.2010.28","url":null,"abstract":"In Internet applications, Web object prefetching is a commonly used and quite effective algorithmic approach to reduce user perceived delays. While a separate concept, prefetching is closely related to caching and they are often blended together in Web algorithms. In this paper, we give a review of Web prefetching models and algorithms, categorize them into groups based on their design principles, and compare their functionalities and performance. We then proposed a new prefetching algorithm that is based on the Adaptive Resonance Theory (ART) of neural networks. The new model uses the bottom-up and top-down weights of the cluster-URL connections obtained from a modified ART1 algorithm to make prefecthing decisions.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134124422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Towards the Usage of Harmony of Audio and Video Clips in Cross-Media Retrieval System Based on Impression 音视频剪辑和谐在基于印象的跨媒体检索系统中的应用
T. Hochin, Hiroki Nomiya
{"title":"Towards the Usage of Harmony of Audio and Video Clips in Cross-Media Retrieval System Based on Impression","authors":"T. Hochin, Hiroki Nomiya","doi":"10.1109/SNPD.2010.45","DOIUrl":"https://doi.org/10.1109/SNPD.2010.45","url":null,"abstract":"The effect of the harmony of the audio clip and the video clip in an audiovisual material on the estimation of its scores is experimentally clarified for the cross-media retrieval. In the experiment, four patterns of audiovisual materials are used. These are the statically matched or mismatched, and the dynamically matched or mismatched audiovisual clips. This experiment clarifies the degree of the contribution of the harmony of audiovisual clips to their scores. It also clarifies that the degree of total harmony of the audiovisual material could be estimated by using the degree of the static harmony and that of the dynamic harmony.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134293223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Gemination Effect on Consonant and Vowel Duration in Standard Arabic Speech 标准阿拉伯语语音中对辅音和元音持续时间的双发效应
A. Trigui, M. Maraoui, M. Zrigui
{"title":"The Gemination Effect on Consonant and Vowel Duration in Standard Arabic Speech","authors":"A. Trigui, M. Maraoui, M. Zrigui","doi":"10.1109/SNPD.2010.26","DOIUrl":"https://doi.org/10.1109/SNPD.2010.26","url":null,"abstract":"In this paper, we expose the results of an experimental study of acoustic properties of geminated consonants in Arabic language. We aim to determinate the temporal relationship between doubled consonant and the length of the vowel preceding them in a VCCV sequence. We compare these values with those measured for a VCV sequence. The results proved that the duration of simple consonant was sensibly different from the geminated one and same for the duration of the vowel preceding it. This work was undertaken to determinate the consonant duration characteristics to distinguish between a simple consonant and the geminated one in standard Arabic speech recognition.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131603082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
XML Path Matching for Different Hierarchy Order of Elements in XML Documents XML文档中不同层次元素顺序的XML路径匹配
Sutheetutt Vacharaskunee, Sarun Intakosum
{"title":"XML Path Matching for Different Hierarchy Order of Elements in XML Documents","authors":"Sutheetutt Vacharaskunee, Sarun Intakosum","doi":"10.1109/SNPD.2010.22","DOIUrl":"https://doi.org/10.1109/SNPD.2010.22","url":null,"abstract":"XML documents allow document owners to create their documents in their own formats (element names and structure). The same information might be described in several ways. To find the similarity between XML documents which use different formats, one method is path similarity detection. The recently approach is PathSim. The previous approach can detect the similarity rate between two XML paths in case those two XML paths are in the same hierarchy order of elements that are semantic with each other. If XML documents use different elements hierarchy order, that approach has a low similarity rate. To improve the previous approach, PathMatch is introduced. PathMatch uses the edit distance algorithm to find the semantic similarity rate between element names and a cost matrix model to find the similarity rate between two XML paths. On the result, PathMatch has a higher similarity rate than the previous approach in case those two XML paths contain a different hierarchy order of elements that are semantic with each other. Moreover, in case two XML paths contain the same hierarchy order, PathMatch has the same similarity rate as the previous one.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"72 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113988164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Web 2.0 Based Service-Oriented E-Learning Systems: Recurrent Design and Architectural Patterns 基于Web 2.0的面向服务的电子学习系统:循环设计和体系结构模式
Dina Hussein, G. Alaa, A. Hamad
{"title":"Web 2.0 Based Service-Oriented E-Learning Systems: Recurrent Design and Architectural Patterns","authors":"Dina Hussein, G. Alaa, A. Hamad","doi":"10.1109/SNPD.2010.42","DOIUrl":"https://doi.org/10.1109/SNPD.2010.42","url":null,"abstract":"Adopting Web 2.0 technologies and techniques in modern e-learning systems guarantees a more interactive e-learning experience. It leverages collaboration among learners and enhances accessibility to various learning resources. Providing such functionalities as web services within an integrated e-learning system achieves interoperability and reduces redundancy. Our aim in this paper is to identify recurrent Web 2.0 and Service-oriented architecture (SOA) design and architectural patterns that would provide reusable building blocks for any Web 2.0 based service-oriented e-learning system. The paper builds on induction theory techniques to validate taxonomy related to Web 2.0 and SOA behavioural and technological patterns. We identified 3 elementary design patterns, inter-connectivity, file sharing and content re-mixing, a well as 4 secondary design patterns, streaming, content authoring, content aggregation and tagging. The proposed design patterns share three elementary architecture types, client-server, peer-peer and SOA. The paper also builds on UML4SOA techniques in modelling requirements prior application of proposed patterns in the case study.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114581282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers 关键信息系统的一种新的安全方法:使用来自本地网络服务提供商的新服务来防止未经身份验证的客户端区域的洪水
Mohammed A. Alhabeeb, Saad Alsunbul, A. Almuhaideb, P. D. Le, B. Srinivasan
{"title":"A Novel Security Approach for Critical Information Systems: Preventing Flooding in the Non-authenticated Client Area Using a New Service from Local Network Service Providers","authors":"Mohammed A. Alhabeeb, Saad Alsunbul, A. Almuhaideb, P. D. Le, B. Srinivasan","doi":"10.1109/SNPD.2010.17","DOIUrl":"https://doi.org/10.1109/SNPD.2010.17","url":null,"abstract":"Flooding is one type of Denial of Service (DoS) attacks which can cause significant financial losses. This paper presents a new security approach which prevents flooding in the government critical systems and focuses in preventing flooding in non-authenticated client area. A new cooperation with local service providers has been suggested to make the prevention of flooding attacks easier. In addition, dynamic key encryption technique is adapted as a part of the proposed approach to enhance its functionality.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132378050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Achieving Flow-Level Controllability in Network Intrusion Detection System 网络入侵检测系统流级可控性的实现
Bo Song, Weibing Yang, Mingyu Chen, Xiaofang Zhao, Jianping Fan
{"title":"Achieving Flow-Level Controllability in Network Intrusion Detection System","authors":"Bo Song, Weibing Yang, Mingyu Chen, Xiaofang Zhao, Jianping Fan","doi":"10.1109/SNPD.2010.18","DOIUrl":"https://doi.org/10.1109/SNPD.2010.18","url":null,"abstract":"Current network intrusion detection systems are lack of controllability, manifested as significant packet loss due to the long-term resources occupation by a single flow. The reasons can be classified into two kinds. The first kind is known as normal reasons, that is, the processing of mass arriving packets of a large flow can not be limited to a determinable period of time and thus makes other flows starved. The second kind, in which the CPU is trapped in a dead-loop like state due to processing some packets with particular content of a flow, is considered as abnormal reasons. In fact, it is a kind of software crashes. In this paper, we discuss the innate defects of traditional packet-driven NIDS, and implement a flow-driven framework which can achieve fine-grained controllability. An Active Two-threshold scheme based on ideal Exit-Point (ATEP) is proposed in order to diminish data preserving overhead during flow switches and to detect crash in time. A quick crash recovery mechanism is also given which can recover the trapped thread from 90% crashes in 0.2ms. The experimental results show that our flow-driven framework with ATEP scheme can achieve higher throughput and less packet loss ratio than the uncontrollable packet-driven systems with less than 1% of extra CPU overhead. What’s more, in the case of crash occurrence, the ATEP scheme is still able to maintain rather steady throughput without sudden decrease.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114063863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling of Device Collaboration Process Based on Petri Net 基于Petri网的设备协同过程建模
Feng Chen, Pan Deng, Xiaohui Rong, Qiongqiong Zhou
{"title":"Modeling of Device Collaboration Process Based on Petri Net","authors":"Feng Chen, Pan Deng, Xiaohui Rong, Qiongqiong Zhou","doi":"10.1109/SNPD.2010.15","DOIUrl":"https://doi.org/10.1109/SNPD.2010.15","url":null,"abstract":"In the area of device collaboration system, there are a large number of devices which needed to be collaborated with other devices, and the collaboration process is complex. It is significative to reduce the complexity of modeling a device collaboration process. In this paper, a device collaboration process model is proposed, which includes four basic structures. By use of device collaboration net, the modeling rules of the basic structures are proposed. By using a collaborative process modeling example, the modeling rules are described.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116197114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining High Utility Web Access Sequences in Dynamic Web Log Data 动态Web日志数据中高效Web访问序列的挖掘
Chowdhury Farhan Ahmed, S. Tanbeer, Byeong-Soo Jeong
{"title":"Mining High Utility Web Access Sequences in Dynamic Web Log Data","authors":"Chowdhury Farhan Ahmed, S. Tanbeer, Byeong-Soo Jeong","doi":"10.1109/SNPD.2010.21","DOIUrl":"https://doi.org/10.1109/SNPD.2010.21","url":null,"abstract":"Mining web access sequences can discover very useful knowledge from web logs with broad applications. By considering non-binary occurrences of web pages as internal utilities in web access sequences, e.g., time spent by each user in a web page, more realistic information can be extracted. However, the existing utility-based approach has many limitations such as considering only forward references of web access sequences, not applicable for incremental mining, suffers in the level-wise candidate generation-and-test methodology, needs several database scans and does not show how to mine web traversal sequences with external utility, i.e., different impacts/significances for different web pages. In this paper, we propose a new approach to solve these problems. Moreover, we propose two novel tree structures, called UWAS-tree (utility-based web access sequence tree), and IUWAS-tree (incremental UWAS tree), for mining web access sequences in static and dynamic databases respectively. Our approach can handle both forward and backward references, static and dynamic data, avoids the level-wise candidate generation-and-test methodology, does not scan databases several times and considers both internal and external utilities of a web page. Extensive performance analyses show that our approach is very efficient for both static and incremental mining of high utility web access sequences.","PeriodicalId":266363,"journal":{"name":"2010 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114659805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信