2010 International Conference on Computational Science and Its Applications最新文献

筛选
英文 中文
DPLWN: A Novel Model for Designing and Implementing Dynamic Business Processes and Process Changes DPLWN:设计和实现动态业务流程和流程变更的新模型
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.46
Yin Li, Chuang Lin, Shanchen Pang, Mengchu Zhou
{"title":"DPLWN: A Novel Model for Designing and Implementing Dynamic Business Processes and Process Changes","authors":"Yin Li, Chuang Lin, Shanchen Pang, Mengchu Zhou","doi":"10.1109/ICCSA.2010.46","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.46","url":null,"abstract":"In order to adapt to the inconstancy of business environments and service requirements, a model of dynamic workflow is defined. It can be used to analyze and implement dynamic processes and process changes automatically. The dynamics of processes depends on many factors including the current state, input data, and customer-defined functions and so on. The effectiveness of process changes can be evaluated through checking both functional and non-functional factors, including soundness, I/O equivalence, compatibility, QoS, and cost of change deployment. The effectiveness of process changes is a paramount indicator to decide the rationality of process changes. Process dynamics may depend on both structural changes and functional changes which constitutes the two methods of process change deployment. Before changes are made, the effectiveness is considered to make a final decision. This paper adopts a DPLWN (Dynamic Programmable Logic Workflow) model based on Petri nets to design and implement dynamic business processes and analyze process changes by presenting an algorithm to evaluate the effectiveness. A prototype is given to deploy online and offline process changes.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Paradigm Shift in Smart Card Ownership Model 智能卡所有权模式的范式转变
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.52
Raja Naeem Akram, K. Markantonakis, K. Mayes
{"title":"A Paradigm Shift in Smart Card Ownership Model","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.1109/ICCSA.2010.52","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.52","url":null,"abstract":"Smart cards have been proliferated into many aspects of modern life. Historically, the ownership of smart cards has remained with the smart card issuers. Although this ownership model is favored by a wide range of industries and service providers, it does not provide optimum convenience and flexibility to cardholders. One potential solution could be to shift the control of smart cards from the smart card issuers to the smart card users. In this paper, we will analyze the feasibility of an ownership model that delegates the ownership of a smart card to its user. The operational and security requirements of the proposed ownership model will be provided. In addition, principal research questions are identified that would merit further in-depth analysis to test the viability of this ownership model.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Automatic 2D Building Extraction Using High Resolution Image in Bangpli District, Samut Prakan Province, Thailand 泰国Samut Prakan省Bangpli区高分辨率图像自动二维建筑提取
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.64
Kannika Komwong, Ramphing Simking, Panu Nuangjumnong
{"title":"Automatic 2D Building Extraction Using High Resolution Image in Bangpli District, Samut Prakan Province, Thailand","authors":"Kannika Komwong, Ramphing Simking, Panu Nuangjumnong","doi":"10.1109/ICCSA.2010.64","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.64","url":null,"abstract":"Most of the recent work in Thailand, on building extraction, is based on 3D building extraction by manual digitization from aerial photo which are both time and labor consuming. High-resolution satellite imagery is expected to be widely used on urban planning mapping, cartography, land use application and others.Automatic and/or semi automatic building extraction is one of the alternative to develop method for building features extraction, with different rooftops, from high resolution satellite image in 1 sq.km. of urban prawn, with mixed area, which is approximately 40% of the study area is residential, commercial area while other 30% is plantation area, in a part of Bangpli District, Samut Prakan Province, Central of Thailand. The image was implemented on the supervised classification function of PCI Geometica and feature analyst extension of ArcGIS software. The building extraction results were compared with percentage of the result. In this study, the result of supervised classification methodology can extract approximately 32% of buildings image properly and the other can extract approximately 42%. Exactly, the both method used less time, so they showed the time reduction, hardware, software, and labor in feature extraction process, although they were not perfect result at the first output. For future work, if the methods were improved algorithm, the result should get better.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A MDA Tool for Data Warehouse 数据仓库的MDA工具
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.62
Leopoldo Zepeda-Sánchez, Elizabeth Ceceña, R. Quintero, Ramón Zataraín-Cabada, L. Vega, Z. Mora, C. García
{"title":"A MDA Tool for Data Warehouse","authors":"Leopoldo Zepeda-Sánchez, Elizabeth Ceceña, R. Quintero, Ramón Zataraín-Cabada, L. Vega, Z. Mora, C. García","doi":"10.1109/ICCSA.2010.62","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.62","url":null,"abstract":"In this paper, we present a method based on Model Driven Architecture (MDA) for the design of Data Warehouses (DWs). The method is made up of a set of transformation rules as a mechanism to extract multidimensional schemas from the logical description of the operational database and a Computation Independent Model (CIM) for the definition of user requirements. As a result we have implemented an Eclipse based prototype that generates from the logical description of the operational database and user requirements the multidimensional schema that best reflects user’s requirements.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129071697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Bootstrap Analysis of Genetic Networks inferred by the Method Using LPMs 基于lpm方法的遗传网络自举分析
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.69
Shuhei Kimura, Koki Matsumura, Mariko Okada
{"title":"Bootstrap Analysis of Genetic Networks inferred by the Method Using LPMs","authors":"Shuhei Kimura, Koki Matsumura, Mariko Okada","doi":"10.1109/ICCSA.2010.69","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.69","url":null,"abstract":"Recently, we proposed a genetic network inference method using linear programming machines (LPMs). As this method infers genetic networks by solving linear programming problems, its computational time is very short. However, generic networks inferred by the method using the LPMs often contain a large number of false-positive regulations. When we try to apply the inference method to actual problems, we must experimentally validate the inferred regulations. Therefore, it is important to reduce the number of false-positive regulations. To decrease the number of regulations we must validate, this study assigns confidence values to all of the possible regulations. For this purpose, we combine a bootstrap method and the method using the LPMs. Through numerical experiments on artificial genetic network inference problems, we check the effectiveness of assessing the confidence values of the regulations.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Friction Measurement to Haptic Rendering with One Point-Based Haptic Device 从摩擦测量到单点触觉设备的触觉渲染
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.80
Wataru Wakita, Hirokazu Murai, Hiromi T. Tanaka
{"title":"From Friction Measurement to Haptic Rendering with One Point-Based Haptic Device","authors":"Wataru Wakita, Hirokazu Murai, Hiromi T. Tanaka","doi":"10.1109/ICCSA.2010.80","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.80","url":null,"abstract":"We present a system from friction measurement to haptic rendering with ONE point-based haptic device. To present a high definition virtual object by haptic rendering, it is necessary to present a haptic impression such as the asperity, friction and stiffness while controlling the haptic device at more than 300-1000 Hz update rate. We have proposed several texture-based haptic rendering techniques at small amount of calculation and with high definition. However, in our previous techniques, the haptic texture such as the height map, normal map, friction map and stiffness map are not based on the measurement data in the real world. To present more realistic haptic impression, it is necessary to calculate the reaction force based on the measurement data in the real world. Therefore, we firstly developed a prototype system of a friction measurement and friction map generation. Secondly, we attempted a haptic rendering based on the measurement data. It is notable that our system enables these functions with ONE point-based haptic device. This paper describes a system from friction measurement to haptic rendering with one point-based haptic device.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Load Balancing of Mobile Access Gateways in Proxy Mobile IPv6 Domains 代理移动IPv6域下移动接入网关的高效负载均衡
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.67
Hyunjin Kong, Yoonchang Jang, Hyunseung Choo
{"title":"An Efficient Load Balancing of Mobile Access Gateways in Proxy Mobile IPv6 Domains","authors":"Hyunjin Kong, Yoonchang Jang, Hyunseung Choo","doi":"10.1109/ICCSA.2010.67","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.67","url":null,"abstract":"In Proxy Mobile IPv6, network entities such as mobile access gateway and local mobility anchor perform mobility on behalf of the mobile nodes. Thus, PMIPv6 decreases the handover latency and the network enables mobile nodes to receive mobility support although they do not have mobility protocol stack within them. However, when a large number of mobile nodes are attached to the PMIPv6 domain, or they attach to a specific MAG, an MAG easily suffers from heavy load. As the load over an MAG increases, the end-to-end transmission delay and the number of packet loss increase. Then the load leads to mobility failure. Yet, the current specification of PMIPv6 does not provide any solution for this problem. Thus, in this paper, we propose a load balancing scheme for the PMIPv6 network to balance the load over MAGs in the domain. It is shown in the simulation that the proposed scheme distributes loads over MAGs in a PMIPv6 domain and also reduces packet losses.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130921089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
NHVM: Design and Implementation of Linux Server Virtual Machine Using Hybrid Virtualization Technology 基于混合虚拟化技术的Linux服务器虚拟机的设计与实现
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.49
Inhyuk Kim, Taehyoung Kim, Y. Eom
{"title":"NHVM: Design and Implementation of Linux Server Virtual Machine Using Hybrid Virtualization Technology","authors":"Inhyuk Kim, Taehyoung Kim, Y. Eom","doi":"10.1109/ICCSA.2010.49","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.49","url":null,"abstract":"The virtualization technology has been developed rapidly with the growth of the hardware supported virtualization technologies and the appearance of the various services. Many researchers are concentrating on developing the virtualization technologies which are recognized as the most significant core technology of the IT applications such as green IT and cloud computing. The major processor companies have introduced various hardware supported virtualization technologies for overcoming the limitations of the software virtualization technologies. Until now, however, the hardware supported virtualization technologies are used only for supporting the full-virtualization technologies. In this paper, we introduced our efficient server virtual machine, which merged the hardware supported virtualization technologies with conventional para-virtualization technologies. Through our proposed hybrid virtualization technology, we could reduce the complexity and overhead of traditional server virtual machines. And lastly, we evaluated and compared our proposed virtual machine with traditional server virtual machines through the experiments.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131145676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Novel Decorative Islamic Star Pattern Generation Algorithm 一种新的装饰伊斯兰星图生成算法
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.42
A. Bastanfard, Hadi Mansourifar
{"title":"A Novel Decorative Islamic Star Pattern Generation Algorithm","authors":"A. Bastanfard, Hadi Mansourifar","doi":"10.1109/ICCSA.2010.42","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.42","url":null,"abstract":"This paper presents a novel algorithm to generate Islamic star patterns. Applications of proposed algorithm are widespread. They include creation of aesthetic ornament, architecture, interior design, textile design, tilling, entertainment and web design. This paper explores a novel algorithm to generalize the Islamic pattern based on a novel parametric method. The proposed method generates different kinds of patterns as a powerful abstract modeling algorithm for ornament design. In the first step, we draw the primitive part; then the primitive will be rotated. After rotation, the main particle will be generated; then the generated pattern will be tilled. Validation of our approach is given in terms of experimental results. An investigation of the relationships between the generated image and corresponding rules is also discussed.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The AES Implantation Based on OpenCL for Multi/many Core Architecture 多核架构下基于OpenCL的AES植入
2010 International Conference on Computational Science and Its Applications Pub Date : 2010-03-23 DOI: 10.1109/ICCSA.2010.44
O. Gervasi, Diego Russo, Flavio Vella
{"title":"The AES Implantation Based on OpenCL for Multi/many Core Architecture","authors":"O. Gervasi, Diego Russo, Flavio Vella","doi":"10.1109/ICCSA.2010.44","DOIUrl":"https://doi.org/10.1109/ICCSA.2010.44","url":null,"abstract":"In this article we present a study on an implementation, named clAES, of the symmetric key cryptography algorithm Advanced Encryption Standard (AES) using the Open Computing Language (OpenCL) emerging standard. We will show a comparison of the results obtained benchmarking clAES on various multi/many core architectures. We will also introduce the basic concepts of AES and OpenCL in order to describe the details of clAES implementation. This study represents a first step in a broader project which final goal is to develop a full OpenSSL library implementation on heterogeneous computing devices such as multi-core CPUs and GPUs.","PeriodicalId":405597,"journal":{"name":"2010 International Conference on Computational Science and Its Applications","volume":"66 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121006714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信