2010 5th International Conference on Future Information Technology最新文献

筛选
英文 中文
After Effects of Ontology Evolution 本体演化的后效
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482765
A. Khattak, Zeeshan Pervez, Sungyoung Lee, Young-Koo Lee
{"title":"After Effects of Ontology Evolution","authors":"A. Khattak, Zeeshan Pervez, Sungyoung Lee, Young-Koo Lee","doi":"10.1109/FUTURETECH.2010.5482765","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482765","url":null,"abstract":"Use of ontology in Information Systems and Knowledge Sharing Systems are increasing that gives more importance to proper maintenance of these ontologies in use. Ontology change management is a collaborative process that incorporate areas like; ontology engineering, evolution versioning, merging, integration, and maintenance. As experts develop better understanding of the domain, incorporate changes accordingly to the body of knowledge, as a result the body of knowledge evolves from one state to another. Preserving consistency while accommodating changes is a crucial task that needs special attention. In this paper we provide a brief review of state of the art in the field of ontology evolution that set the stage for the unfolded challenges in ontology evolution to complete the process automatically. Then we also discuss very important issues that need special attention to minimize the after effects of ontology evolution.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130523382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Graph Model for OVSF Code Placement OVSF代码放置的图模型
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482700
Chang-Wu Yu, Wen Ouyang, C. Wang, Meng-Ti Liu, Yu-Wei Chang
{"title":"Graph Model for OVSF Code Placement","authors":"Chang-Wu Yu, Wen Ouyang, C. Wang, Meng-Ti Liu, Yu-Wei Chang","doi":"10.1109/FUTURETECH.2010.5482700","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482700","url":null,"abstract":"The orthogonal variable-spreading-factor (OVSF)-CDMA systems can support multimedia applications with different bandwidth requirements. Code management schemes, including code placement and replacement, significantly impact the code utilization of the system. Many researches have studied these two closely related problems and are solving them independently. For replacement, the optimality concerns the minimization of the reassignment number. There is no definition about the placement optimality yet. We formally define the placement optimality for code placement schemes and presented a novel graph model, constrained independent dominating set problem (CIDP), which is proved to be NP-complete for general graphs. A unified algorithm is provided to firstly address both OVSF code placement and replacement issues at the same time which achieves placement optimality in linear time complexity. This demonstrated that OVSF code placement optimality problem is in P. Another simple and practical unified solution is presented and is shown to be reasonably effective.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Peer to Peer Media Streaming System: A/V Conferencing System Using Custom Protocol 点对点媒体流系统:采用自定义协议的A/V会议系统
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482693
Saleh Ali K. Al-Omari, P. Sumari, Sadik A. M. Al-Taweel
{"title":"Peer to Peer Media Streaming System: A/V Conferencing System Using Custom Protocol","authors":"Saleh Ali K. Al-Omari, P. Sumari, Sadik A. M. Al-Taweel","doi":"10.1109/FUTURETECH.2010.5482693","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482693","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design a Novel Scheme for Dual-Stack Cloud File Service Discovery Based on Distributed Hash Table 设计一种基于分布式哈希表的双栈云文件服务发现方案
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482666
Hui-Hung Chien, Jian-Ming Chang, Hsiang-Te Liu, H. Chao
{"title":"Design a Novel Scheme for Dual-Stack Cloud File Service Discovery Based on Distributed Hash Table","authors":"Hui-Hung Chien, Jian-Ming Chang, Hsiang-Te Liu, H. Chao","doi":"10.1109/FUTURETECH.2010.5482666","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482666","url":null,"abstract":"Cloud services attract some attention in recent years, the information connection devices of organizations or enterprises with one another distributed around the world using networking systems. Cloud services also provide variety services for users, including virtual hosting services, storage services and web application services, etc. Because of the rise of cloud computing, users can directly enjoy the benefits of distributed computing. The high throughput of computing power and large storage space can be ubiquitous when users connect to the Internet. Two important elements behind clouds computing include distributed computing and peer-to-peer network. However, the huge numbers of information devices today bring forth some new problems. The lack of IPv4 protocol addresses is one of the serious problems. Therefore, the IPv6 protocol was proposed, and during the transitional period form pure IPv4 to pure IPv6, IPv4 and IPv6 will coexist in the Internet. To link independent dual-stack p2p networks around the world, we hereby propose a mechanism to improve the service discovery in dual-stack cloud file service in hope of decreasing the count of protocol translation so as to improve the efficiency of the bandwidth and load balance.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121507092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of NMOS for Higher Speed and Low Power Applications 高速低功耗NMOS的性能分析
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482680
K. K. Jha, Ankita Jain, M. Pattanaik, A. Srivastava
{"title":"Performance Analysis of NMOS for Higher Speed and Low Power Applications","authors":"K. K. Jha, Ankita Jain, M. Pattanaik, A. Srivastava","doi":"10.1109/FUTURETECH.2010.5482680","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482680","url":null,"abstract":"Integrated circuits based on low supply voltage and subthreshold operations of NMOS devices are very attractive for low power applications. An effective way to reduce supply voltage and resulting in power consumption without losing the circuit performance of NMOS is to increase the drive current of NMOS. This paper reports the scaling analysis of NMOS from deep-submicron to nanometer technologies, in which channel length has been scaled down from 600nm to 90nm. For simulation, ATLAS device simulator is used, by using the models LAMBARDI (CVT) mobility model and fixed Shockley-read-hall model recombination model. Simulation result depicts that threshold voltage is 0.26V at 600nm, 0.04V at 180nm and 0.01V at 90nm so nanometer range NMOS devices can be very attractive for low power and subthreshold operations.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125043929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effects of Financial Crises on American Financial Institutions Information Security 金融危机对美国金融机构信息安全的影响
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482633
Cliff Knopik, J. Zhan
{"title":"The Effects of Financial Crises on American Financial Institutions Information Security","authors":"Cliff Knopik, J. Zhan","doi":"10.1109/FUTURETECH.2010.5482633","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482633","url":null,"abstract":"Information Security Professionals must be flexible and adapt to an ever changing environment. The financial industry in particular offers many unique challenges for information security as technology is often quickly adopted and governments regulations fluctuate and change. These challenges can be especially complicated during financial crises. In order for both information security professionals and financial industry professionals to more efficiently navigate through trying times I have compiled and surveyed a historical list of financial crises in America. This survey gives a good overall picture of the trends happening due to financial crises and their effects on the financial industry. The crisis which began in December 2007 is then looked at. Comparing past financial crises with the crisis starting in December 2007 I forecast more stringent legal and regulatory changes will be forthcoming which will affect information security. I then offer ideas on how a pro-active organization can pre-empt these potentially burdensome changes by self-regulating their information security and combining various industry accepted IT standards before legal regulatory changes are enacted.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Leveraging Traditional Software Engineering Tools to Ontology Engineering under a New Methodology 利用传统软件工程工具进行新方法论下的本体工程
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482657
Santhosh John
{"title":"Leveraging Traditional Software Engineering Tools to Ontology Engineering under a New Methodology","authors":"Santhosh John","doi":"10.1109/FUTURETECH.2010.5482657","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482657","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Proactive Approach to Detecting and Reducing Information Security Threats in Billing Systems 主动检测和减少计费系统中信息安全威胁的方法
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482636
Dustin Erhardt, J. Zhan
{"title":"A Proactive Approach to Detecting and Reducing Information Security Threats in Billing Systems","authors":"Dustin Erhardt, J. Zhan","doi":"10.1109/FUTURETECH.2010.5482636","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482636","url":null,"abstract":"A billing system consists of many components that allow an end user to be able to add, view, print, or perform normal billing operations. These components can be in the form of servers, desktops, laptops, routers, firewalls, printers, and other appliances. All of these components connect together in some form to make up the complete billing system. The security of the whole billing system is reliant on the security of each individual component and process. Using a well managed and thorough vulnerability management system, the security of each of these components can drastically be increased. By mitigating the vulnerabilities that exist on each individual component, the vulnerabilities and security holes in the system can be greatly reduced.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124520795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Key Management Scheme in Sensor Network 传感器网络中一种高效的密钥管理方案
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482661
Hye-young Kim, Y. Jeong
{"title":"An Efficient Key Management Scheme in Sensor Network","authors":"Hye-young Kim, Y. Jeong","doi":"10.1109/FUTURETECH.2010.5482661","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482661","url":null,"abstract":"NA","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130200110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hixosfs for Ubiquitous Commerce through Bluetooth Hixosfs通过蓝牙实现无处不在的商务
2010 5th International Conference on Future Information Technology Pub Date : 2010-05-21 DOI: 10.1109/FUTURETECH.2010.5482746
N. Corriero, Eustrat Zhupa
{"title":"Hixosfs for Ubiquitous Commerce through Bluetooth","authors":"N. Corriero, Eustrat Zhupa","doi":"10.1109/FUTURETECH.2010.5482746","DOIUrl":"https://doi.org/10.1109/FUTURETECH.2010.5482746","url":null,"abstract":"Hixosfs is a Linux filesystem designed to easily cataloging and retriving files according final user selected metadata. The idea is the use of bluetooth technology to create an ad-hoc indoor network managed by hixosfs. The system has been implemented using embedded systems linked to each other using bluetooth connection or an ad-hoc wireless network. In each of these, a hixosfs filesystem based database has been used to improve the performance.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131388075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信