The 2nd International Conference on Distributed Frameworks for Multimedia Applications最新文献

筛选
英文 中文
A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis 业务计算的通用分布式体系结构。在财务风险分析中的应用
A. DeFrance, S. Vialle, M. Wauquier, P. Akim, D. Dewnarain, R. Loutou, A. Methari
{"title":"A Generic Distributed Architecture for Business Computations. Application to Financial Risk Analysis","authors":"A. DeFrance, S. Vialle, M. Wauquier, P. Akim, D. Dewnarain, R. Loutou, A. Methari","doi":"10.1109/DFMA.2006.296915","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296915","url":null,"abstract":"This paper introduces a generic n-tier distributed architecture for business applications, and its basic component: a computing server distributed on a PC cluster. Design of this distributed server is relevant of both cluster programming and business standards: it mixes TCP client-server mechanisms, MPI programming and database accesses from cluster nodes. The main topics investigated in this paper are the design of a generic distributed TCP server based on the MPI paradigm, and the experimentation and optimization of concurrent accesses to databases from cluster nodes. Finally, this new distributed architecture has been integrated in the industrial Summit environment, and a Hedge application (a famous risk analysis computation) has been implemented and performances have been measured on laboratory and industrial testbeds. They have validated the architecture, exhibiting interesting speed up","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126724901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Light P2P platform of computing for DAG 用于DAG计算的轻型P2P平台
F. Hantz
{"title":"Light P2P platform of computing for DAG","authors":"F. Hantz","doi":"10.1109/DFMA.2006.296894","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296894","url":null,"abstract":"HiPoP is a P2P platform of computing specialized in the execution of applications as DAG (directed acyclic graph). This platform works in an heterogeneous environment and relies on the portability of the JAVA language. HiPoP performances are compared to Condor and show an ease of use and good performances. The security of our system is based on the concept of sandboxing","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Dynamic Programming Based Sequence Alignment Algorithm 基于快速动态规划的序列比对算法
N. Rashid, R. Abdullah, A. Talib, Z. Ali
{"title":"Fast Dynamic Programming Based Sequence Alignment Algorithm","authors":"N. Rashid, R. Abdullah, A. Talib, Z. Ali","doi":"10.1109/DFMA.2006.296909","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296909","url":null,"abstract":"Protein sequence alignment is basic operation mostly used in protein sequence analysis. The most optimal algorithm used in sequence alignment is based on the dynamic programming method. Smith-Waterman algorithm is the most commonly used dynamic programming based sequence alignment algorithm. However the algorithm uses quadratic time and space. Heuristic algorithm such as FASTA and BLAST were introduced to speed up the sequence alignment algorithm. FASTA is based on word search whereas BLAST is based on maximum segment pairs. In word search algorithm, lists of words from the query and database sequence are being compared to determine if two sequences have a region of sufficient similarity to merit further alignment using the Smith-Waterman Algorithm. All the different algorithms use the substitutions matrix based on the twenty alphabet amino acids. However research shows that reducing the number of amino acids to 10 does not affect the similarity measure. Our proposed algorithm uses the reduced amino acids alphabet to transform the protein sequences into a sequence of integer and uses n-gram to reduce the length of the sequence. Then the Smith-Waterman algorithm is used to get the similarity measure between two sequences. Result shows that the new proposed algorithm is as sensitive as the Smith-Waterman algorithm yet uses less space and performs better","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"224 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133112146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Java: From "Hard Coding" to Using an Integrated Development Environment Java:从“硬编码”到使用集成开发环境
Ali Kattan, R. Abdullah, R. A. Salam
{"title":"Java: From \"Hard Coding\" to Using an Integrated Development Environment","authors":"Ali Kattan, R. Abdullah, R. A. Salam","doi":"10.1109/DFMA.2006.296905","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296905","url":null,"abstract":"Being a Java developer the decision of starting to use an integrated development environment (IDE) instead of a set of discrete programming tools, is to be taken sooner or later. This paper identifies the favorite features to opt for, in selecting a suitable IDE, what should be used and by whom with plethora of such IDEs. Though IDEs are meant to facilitate program development and increase productivity, migrating developers might fall into a set of common pitfalls that could hinder productivity. Such pitfalls are indicated and discussed in the view of available IDE features","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fragile Watermarking for medical Image Authentication 用于医学图像认证的脆弱水印
I.F. Kallel, M. Kallel, E. Garcia, M. Bouhlel
{"title":"Fragile Watermarking for medical Image Authentication","authors":"I.F. Kallel, M. Kallel, E. Garcia, M. Bouhlel","doi":"10.1109/DFMA.2006.296919","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296919","url":null,"abstract":"The ease and extensive use of digital imaging systems raise serious questions about integrity and authenticity of digital images particularly in medical applications. A medical image requires great integrity of content since any change in the image might affect the diagnosis even if it is of small amount. Fragile watermark could be the best technique to provide efficient image authentication tool for medical images, in this paper we present different methods developed in image watermarking used in order to verify integrity and authenticity of images. We will present after that our proposed method and validated the embedding and extracting procedures","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Screening of Diabetic Retinopathy - Automatic Segmentation of Optic Disc in Colour Fundus Images 糖尿病视网膜病变的筛选——彩色眼底图像视盘的自动分割
S. S. Lee, M. Rajeswari, D. Ramachandram, B. Shaharuddin
{"title":"Screening of Diabetic Retinopathy - Automatic Segmentation of Optic Disc in Colour Fundus Images","authors":"S. S. Lee, M. Rajeswari, D. Ramachandram, B. Shaharuddin","doi":"10.1109/DFMA.2006.296892","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296892","url":null,"abstract":"In this paper, a novel approach to automatically segment the optic disc contour using the center point of an optic disc candidate is proposed. The optic disc segmentation algorithm consists of 2 stages. The first stage involves the removal of blood vessels that obscure the optic disc. The blood vessel structures are detected using morphological operations. These detected structures are then removed by anisotropic diffusion smoothing. The second stage involves the detection of edge points belonging to the optic disc-contour. A number of one dimensional intensity profiles which pass through the center point of optic disc region are then obtained at multiple angles with fixed angular intervals. The modulus maxima of each intensity profile are identified as a contour point for the optic disc. Among these contour points, some of the outliers are removed by re-positioning to a new position which complies with optic disc's shape using spline interpolation. Using these contour points, a coarse contour of the optic disc is constructed. Testing the approach on 23 colour fundus images demonstrates that the proposed algorithm is able to detect the optic disc contour to an accuracy of 92% to that drawn by a human expert","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Minimizing Security Threats in Multimedia Systems 最小化多媒体系统中的安全威胁
H. Singh, A.K. Singh, S. Balasubramanian, A. Mohan
{"title":"Minimizing Security Threats in Multimedia Systems","authors":"H. Singh, A.K. Singh, S. Balasubramanian, A. Mohan","doi":"10.1109/DFMA.2006.296907","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296907","url":null,"abstract":"This paper describes security enhancement of multimedia data using steganography. The proposed method is based on a new method of embedding ASCII text characters into moderatory bits of IEEE standard multimedia images, which are used as cover media. Simulation results for peak signal to noise ratio (PSNR) and mean square error (MSE) for text data embedding into different moderatory bit positions are presented. It is shown that the proposed method of data embedding offers superior robustness against external attacks as compared to LSB insertion technique without compromising the perceptual quality of the host multimedia image. Therefore our proposed method can find potential use in security enhancement of multimedia image","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Assessment of Burst Assembly Algorithms using Real IPv4 Data Traces 使用真实IPv4数据轨迹的突发装配算法评估
N. M. Garcia, P. Monteiro, M. Freire
{"title":"Assessment of Burst Assembly Algorithms using Real IPv4 Data Traces","authors":"N. M. Garcia, P. Monteiro, M. Freire","doi":"10.1109/DFMA.2006.296912","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296912","url":null,"abstract":"This paper describes the generation of data bursts using real IPv4 data as input, compares the performance of the three aggregation algorithms and suggests a novel mechanism to adjust the burst assembly algorithm thresholds. The generated bursts are studied, in particular average packet delay per burst, burst inter-arrival time, and average burst size and average number of packets per burst. Performance optimization of burst assembly algorithms is defined as a function of the network offered load","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
TEMIC: a New Cooperative Platform for Industrial Tele-Maintenance TEMIC:一个新的工业远程维护合作平台
M. Brahma, Martine Chaudier, Éric Garcia, Jean-Patrick Gelas, H. Guyennet, F. Hantz, L. Lefèvre, Pascal Lorenz, H. Tobiet
{"title":"TEMIC: a New Cooperative Platform for Industrial Tele-Maintenance","authors":"M. Brahma, Martine Chaudier, Éric Garcia, Jean-Patrick Gelas, H. Guyennet, F. Hantz, L. Lefèvre, Pascal Lorenz, H. Tobiet","doi":"10.1109/DFMA.2006.296902","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296902","url":null,"abstract":"Since the year 2000, the performances that are obtained from the point of view of the networks processors make it possible to use real distribution applications. Particularly, in remote maintenance domain, the network quality makes it possible to have several expertises readily available. As a result, the quality of maintenance increases as it becomes faster, more reliable and highly efficient. The TEMIC tele-maintenance application connects mobile users (via their PDA terminal) to information systems in order to perform activities in areas such as corrective, preventive and conditional maintenance. The TEMIC tele-maintenance platform is based on a three-level architecture: collection and surveillance, intervention and reporting, diagnosis and collaboration. The use of wireless networks is one of the TEMIC distinctive characteristics, which allows connection between mobile tele-maintenance qualified actors. Another distinction is the design of active and autonomous industrial network devices that are easily and efficiently deployable in an industrial setup","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using Consistency Management Protocols Over a Communication Management Protocol 在通信管理协议上使用一致性管理协议
J. Henriet
{"title":"Using Consistency Management Protocols Over a Communication Management Protocol","authors":"J. Henriet","doi":"10.1109/DFMA.2006.296897","DOIUrl":"https://doi.org/10.1109/DFMA.2006.296897","url":null,"abstract":"In collaborative environments, sharing notion is everywhere. Concurrency management protocols become very important. We have defined the Chameleon protocol which allows us to obtain a dynamic management of the collaborative architecture on the one hand, and on the other hand, we have improved our consistency management protocol and rendered it optimistic: the Pilgrim and the Optimistic Pilgrim. The originality of the Chameleon is to allow the virtual topology to be reconfigured dynamically Pilgrim protocol and its optimistic version Optimistic Pilgrim protocol manage shared data consistency over our CSCW platform. They are based on a token over a logical ring of sites and ownership mechanisms: each shared parameter has one site which is its owner. Nevertheless, problems may appear when one site becomes inactive according to the Chameleon. Indeed, if this site is the owner of a shared parameter according to one of the versions of the Pilgrim protocol, there may be ownerless shared parameters. Consequently, we have studied and analyzed the cases in which that kind of problem may occurs through a coloured Petri net model. Thus, all the protocols have been modified in order to work well together","PeriodicalId":333315,"journal":{"name":"The 2nd International Conference on Distributed Frameworks for Multimedia Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信