首页 > 最新文献

Proceedings. International Conference on Information Technology: Coding and Computing最新文献

英文 中文
E-business models for reverse logistics: contributions and challenges 逆向物流的电子商务模式:贡献与挑战
A. Kokkinaki, R. Dekker, R. Koster, W. Verbeke, C. Pappis
Reverse logistics, i.e. all operations related to the extension of a useful lifecycle for used products, commercial returns, excess inventory and packaging materials, is gaining increasing attention globally for its promising financial potential, its sustainable growth alternatives and the environmentally positive impact that it could have. In this paper, we include a brief discussion of the major reverse logistics issues and we present the new e-business models in this field. We identify key factors for their competitive advantages, and we discuss conceptual and current opportunities for these e-business models to thrive and advance. Finally, we outline some possible future developments of e-commerce tools for reverse logistics.
逆向物流,即与延长使用过的产品的有用生命周期、商业回报、过剩库存和包装材料有关的所有业务,因其有希望的财务潜力、可持续增长的替代方案以及可能产生的环境积极影响,在全球范围内日益受到关注。在本文中,我们简要讨论了主要的逆向物流问题,并提出了该领域的新电子商务模式。我们确定了它们竞争优势的关键因素,并讨论了这些电子商务模式蓬勃发展的概念和当前的机会。最后,我们概述了逆向物流电子商务工具的一些可能的未来发展。
{"title":"E-business models for reverse logistics: contributions and challenges","authors":"A. Kokkinaki, R. Dekker, R. Koster, W. Verbeke, C. Pappis","doi":"10.1109/ITCC.2002.1000434","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000434","url":null,"abstract":"Reverse logistics, i.e. all operations related to the extension of a useful lifecycle for used products, commercial returns, excess inventory and packaging materials, is gaining increasing attention globally for its promising financial potential, its sustainable growth alternatives and the environmentally positive impact that it could have. In this paper, we include a brief discussion of the major reverse logistics issues and we present the new e-business models in this field. We identify key factors for their competitive advantages, and we discuss conceptual and current opportunities for these e-business models to thrive and advance. Finally, we outline some possible future developments of e-commerce tools for reverse logistics.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114680419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Joint forward error correction and error concealment for compressed video 压缩视频联合前向纠错和错误隐藏
Yan Mei, W. Lynch, T. Le-Ngoc
In this paper we propose a joint source/channel decoding scheme. This work combines information from classical Forward Error Correction (FEC) with information about the syntax and semantics of the received video along with the resulting video's continuity to give improved performance over classical FEC. One feature of this work is the need to find a slice evaluation measure which balances the likelihood of a slice from the point of view of the channel decoder with the quality of the decompressed slice.
本文提出了一种源/信道联合解码方案。这项工作将经典前向纠错(FEC)的信息与接收视频的语法和语义信息以及结果视频的连续性相结合,从而提高了经典FEC的性能。这项工作的一个特点是需要找到一种切片评估方法,从信道解码器的角度来平衡切片的可能性和解压后的切片的质量。
{"title":"Joint forward error correction and error concealment for compressed video","authors":"Yan Mei, W. Lynch, T. Le-Ngoc","doi":"10.1109/ITCC.2002.1000424","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000424","url":null,"abstract":"In this paper we propose a joint source/channel decoding scheme. This work combines information from classical Forward Error Correction (FEC) with information about the syntax and semantics of the received video along with the resulting video's continuity to give improved performance over classical FEC. One feature of this work is the need to find a slice evaluation measure which balances the likelihood of a slice from the point of view of the channel decoder with the quality of the decompressed slice.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116642350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Characterizing Web user accesses: a transactional approach to Web log clustering 描述Web用户访问:Web日志集群的事务性方法
F. Giannotti, C. Gozzi, G. Manco
We present a partitioning method able to manage Web log sessions. Sessions are assimilable to transactions, i.e., tuples of variable size of categorical data. We adapt the standard definition of mathematical distance used in the K-Means algorithm to represent transactions dissimilarity, and redefine the notion of cluster centroid. The cluster centroid is used as the representative of the common properties of cluster elements. We show that using our concept of cluster centroid together with Jaccard distance we obtain results that are comparable with standard approaches, but substantially improve their efficiency.
我们提出了一种能够管理Web日志会话的分区方法。会话可与事务同化,即分类数据的可变大小的元组。我们采用K-Means算法中数学距离的标准定义来表示交易的不相似性,并重新定义了聚类质心的概念。簇质心被用作簇元素共同属性的代表。我们表明,使用我们的聚类质心和Jaccard距离的概念,我们得到的结果与标准方法相当,但大大提高了它们的效率。
{"title":"Characterizing Web user accesses: a transactional approach to Web log clustering","authors":"F. Giannotti, C. Gozzi, G. Manco","doi":"10.1109/ITCC.2002.1000408","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000408","url":null,"abstract":"We present a partitioning method able to manage Web log sessions. Sessions are assimilable to transactions, i.e., tuples of variable size of categorical data. We adapt the standard definition of mathematical distance used in the K-Means algorithm to represent transactions dissimilarity, and redefine the notion of cluster centroid. The cluster centroid is used as the representative of the common properties of cluster elements. We show that using our concept of cluster centroid together with Jaccard distance we obtain results that are comparable with standard approaches, but substantially improve their efficiency.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance of multimedia applications with IPSec tunneling 采用IPSec隧道的多媒体应用性能
S. Al-Khayatt, S. Shaikh, Babak Akhgar, J. Siddiqi
The concept of virtual private networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of authentication and encryption techniques and protocols affect issues such as data throughput and performance throughout the network. This paper looks into the effects of video and audio streaming on performance, while deploying secure communications. Two operating system platforms are implemented in this investigation: Novell Netware and Windows 2000. Performance of the two arrangements is, subsequently, analyzed and evaluated.
虚拟专用网络的概念为企业网络和Internet环境中的专用安全网络提供了一种简单而廉价的替代方案。然而,身份验证和加密技术及协议的选择会影响整个网络的数据吞吐量和性能等问题。本文研究了视频流和音频流在部署安全通信时对性能的影响。本研究采用了两种操作系统平台:Novell Netware和Windows 2000。随后,对这两项安排的执行情况进行分析和评价。
{"title":"Performance of multimedia applications with IPSec tunneling","authors":"S. Al-Khayatt, S. Shaikh, Babak Akhgar, J. Siddiqi","doi":"10.1109/ITCC.2002.1000374","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000374","url":null,"abstract":"The concept of virtual private networks offers a simple and cheap alternative to dedicated secure networks in corporate networks and Internet environments. The choice, however, of authentication and encryption techniques and protocols affect issues such as data throughput and performance throughout the network. This paper looks into the effects of video and audio streaming on performance, while deploying secure communications. Two operating system platforms are implemented in this investigation: Novell Netware and Windows 2000. Performance of the two arrangements is, subsequently, analyzed and evaluated.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance of KDB-trees with query-based splitting 基于查询拆分的kdb树的性能
Yves Lépouchard, J. Pfaltz, R. Orlandic
While the persistent data of many advanced database applications, such as OLAP and scientific studies, are characterized by very high dimensionality, typical queries posed on these data appeal to a small number of relevant dimensions. Unfortunately, the multidimensional access methods designed for high-dimensional data perform rather poorly for these partially specified queries. A potentially very appealing idea, frequently suggested in the literature, is to adopt a node-splitting policy that takes into account the "importance" of individual dimensions, which could be determined either a priori or through a statistical sampling of actual queries. This paper presents the results of some carefully controlled experiments conducted to observe the effects of query-based splitting on the performance of KDB-trees. The strategy is compared to a splitting policy that selects the split dimensions in a "cyclic" fashion, which has been shown to be very effective, especially in high-dimensional situations. Based on the results, the query-based splitting does not appear to be a very appealing splitting strategy for KDB-trees.
虽然许多高级数据库应用程序(如OLAP和科学研究)的持久数据具有非常高的维度,但对这些数据提出的典型查询只涉及少量相关维度。不幸的是,对于这些部分指定的查询,为高维数据设计的多维访问方法的性能相当差。在文献中经常提出的一个潜在的非常吸引人的想法是,采用考虑到单个维度的“重要性”的节点分割策略,这可以通过先验或通过实际查询的统计抽样来确定。本文介绍了一些精心控制的实验的结果,这些实验是为了观察基于查询的拆分对kdb树性能的影响。将该策略与以“循环”方式选择分割维度的分割策略进行比较,后者已被证明非常有效,特别是在高维情况下。根据结果,基于查询的分割似乎不是一个非常吸引人的kdb树分割策略。
{"title":"Performance of KDB-trees with query-based splitting","authors":"Yves Lépouchard, J. Pfaltz, R. Orlandic","doi":"10.1109/ITCC.2002.1000390","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000390","url":null,"abstract":"While the persistent data of many advanced database applications, such as OLAP and scientific studies, are characterized by very high dimensionality, typical queries posed on these data appeal to a small number of relevant dimensions. Unfortunately, the multidimensional access methods designed for high-dimensional data perform rather poorly for these partially specified queries. A potentially very appealing idea, frequently suggested in the literature, is to adopt a node-splitting policy that takes into account the \"importance\" of individual dimensions, which could be determined either a priori or through a statistical sampling of actual queries. This paper presents the results of some carefully controlled experiments conducted to observe the effects of query-based splitting on the performance of KDB-trees. The strategy is compared to a splitting policy that selects the split dimensions in a \"cyclic\" fashion, which has been shown to be very effective, especially in high-dimensional situations. Based on the results, the query-based splitting does not appear to be a very appealing splitting strategy for KDB-trees.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The object behavior of Java object-oriented database management systems Java面向对象数据库管理系统的对象行为
D. Lo, J. M. Chang, O. Frieder, D. Grossman
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the pure object oriented features, compared to the non-pure object-oriented C++ language, have caused Java to be a good candidate as a tool in designing object oriented systems, especially in database servers. However the performance of the Java Virtual Machine (JVM) is the reason that several database designers, such as Oracle, IBM, Sybase and Informix, have not fully transferred their database management system (DBMS) into Java. One of the performance indices is the responsiveness for online transaction processing (OLTP) which may be dominated by the garbage collection system inside the JVM. In this paper eight Java programs, jess, javac, mtrt, compress, db, db4o, smallDB and ozone, are used to study the dynamic memory behavior. The latter four programs are Java object-oriented database management systems and their object behaviors are compared to those of the four regular Java programs. Simulation results such as object size distribution, average object size, object live distribution and total garbage collection cycle are reported.
由于其可移植性和对Internet应用程序的普及,Java已成为主要的编程语言之一。与非纯面向对象的c++语言相比,从C语言继承的类似语法和纯面向对象的特性使Java成为设计面向对象系统(特别是数据库服务器)的良好候选工具。然而,Java虚拟机(JVM)的性能是一些数据库设计者(如Oracle、IBM、Sybase和Informix)没有将其数据库管理系统(DBMS)完全转换为Java的原因。其中一个性能指标是在线事务处理(OLTP)的响应性,这可能由JVM中的垃圾收集系统主导。本文采用jess、javac、mtrt、compress、db、db40、smallDB和ozone八个Java程序研究动态内存行为。后四种程序是Java面向对象的数据库管理系统,并将其对象行为与四种常规Java程序进行了比较。给出了对象大小分布、平均对象大小、对象活分布和总垃圾回收周期等仿真结果。
{"title":"The object behavior of Java object-oriented database management systems","authors":"D. Lo, J. M. Chang, O. Frieder, D. Grossman","doi":"10.1109/ITCC.2002.1000395","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000395","url":null,"abstract":"Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the pure object oriented features, compared to the non-pure object-oriented C++ language, have caused Java to be a good candidate as a tool in designing object oriented systems, especially in database servers. However the performance of the Java Virtual Machine (JVM) is the reason that several database designers, such as Oracle, IBM, Sybase and Informix, have not fully transferred their database management system (DBMS) into Java. One of the performance indices is the responsiveness for online transaction processing (OLTP) which may be dominated by the garbage collection system inside the JVM. In this paper eight Java programs, jess, javac, mtrt, compress, db, db4o, smallDB and ozone, are used to study the dynamic memory behavior. The latter four programs are Java object-oriented database management systems and their object behaviors are compared to those of the four regular Java programs. Simulation results such as object size distribution, average object size, object live distribution and total garbage collection cycle are reported.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
IT infrastructure management and standards IT基础设施管理和标准
S. Sirkemaa
Information system development is often connected to functional requirements and business processes in an organization. The development of the basic information technology infrastructure (IT infrastructure) is therefore easily forgotten. However, a reliable infrastructure is the key to successful operations. As business requirements, the flexibility of the IT infrastructure becomes important. We argue that standards play a key role in development of an IT infrastructure that is flexible and adapts to future business needs.
信息系统开发通常与组织中的功能需求和业务流程相关联。因此,基本信息技术基础设施(IT infrastructure)的发展很容易被遗忘。然而,可靠的基础设施是成功运营的关键。作为业务需求,IT基础设施的灵活性变得非常重要。我们认为,标准在灵活的、适应未来业务需求的IT基础设施的开发中起着关键作用。
{"title":"IT infrastructure management and standards","authors":"S. Sirkemaa","doi":"10.1109/ITCC.2002.1000387","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000387","url":null,"abstract":"Information system development is often connected to functional requirements and business processes in an organization. The development of the basic information technology infrastructure (IT infrastructure) is therefore easily forgotten. However, a reliable infrastructure is the key to successful operations. As business requirements, the flexibility of the IT infrastructure becomes important. We argue that standards play a key role in development of an IT infrastructure that is flexible and adapts to future business needs.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124074827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
FCBHS: a fast center-biased hybrid search algorithm for fast block motion estimation FCBHS:用于快速块运动估计的快速中心偏置混合搜索算法
Su-Bong Hong, Hyo-Jik Lee, Geun-Young Chun, Hyunki Baik, Myong-Soon Park
Describes a fast block-matching algorithm (BMA) for motion estimation exploiting the center-biased motion vector distribution characteristic more efficiently than the center-biased hybrid search (CBHS) algorithm does. This proposed algorithm, which is called the "fast center-biased hybrid search" (FCBHS), employs a hybrid method of a compact plus-shaped search, an X-shaped search and a diamond search to reduce the search point for motion vectors which are distributed within a 2-pixel radius of the center of the search window. Experimental results show that the FCBHS algorithm is about 44 times faster than a full search and 7-10% faster than the CBHS algorithm. Such a fast sub-optimal motion estimation algorithm is essential for situations which have limited processing power and constraints on the amount of power consumption, like real-time mobile video coding applications. This paper compares the popular sub-optimal block-matching technique with FCBHS, for which both the processing speed and the accuracy of motion compensation are tested over widely-used H.263 test video sequences.
描述了一种比中心偏置混合搜索(CBHS)算法更有效地利用中心偏置运动矢量分布特性的快速块匹配算法(BMA)。该算法被称为“快速中心偏置混合搜索”(FCBHS),采用紧凑的+形搜索、x形搜索和菱形搜索的混合方法来减少分布在搜索窗口中心2像素半径内的运动向量的搜索点。实验结果表明,FCBHS算法比全搜索快44倍左右,比CBHS算法快7-10%。这种快速的次优运动估计算法对于处理能力有限和功耗限制的情况是必不可少的,比如实时移动视频编码应用。本文将流行的次优块匹配技术与FCBHS技术进行了比较,并在广泛使用的H.263测试视频序列上测试了其处理速度和运动补偿精度。
{"title":"FCBHS: a fast center-biased hybrid search algorithm for fast block motion estimation","authors":"Su-Bong Hong, Hyo-Jik Lee, Geun-Young Chun, Hyunki Baik, Myong-Soon Park","doi":"10.1109/ITCC.2002.1000396","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000396","url":null,"abstract":"Describes a fast block-matching algorithm (BMA) for motion estimation exploiting the center-biased motion vector distribution characteristic more efficiently than the center-biased hybrid search (CBHS) algorithm does. This proposed algorithm, which is called the \"fast center-biased hybrid search\" (FCBHS), employs a hybrid method of a compact plus-shaped search, an X-shaped search and a diamond search to reduce the search point for motion vectors which are distributed within a 2-pixel radius of the center of the search window. Experimental results show that the FCBHS algorithm is about 44 times faster than a full search and 7-10% faster than the CBHS algorithm. Such a fast sub-optimal motion estimation algorithm is essential for situations which have limited processing power and constraints on the amount of power consumption, like real-time mobile video coding applications. This paper compares the popular sub-optimal block-matching technique with FCBHS, for which both the processing speed and the accuracy of motion compensation are tested over widely-used H.263 test video sequences.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115850384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Providing an infrastructure for a cross database management tool 为跨数据库管理工具提供基础设施
R. Charlot
Software tools used to administer databases are vendor specific, proprietary, and require extensive prior database knowledge on the part of the database professional. We have developed dbAnalyst, a vendor independent database administration and maintenance tool. dbAnalyst is an Open Architecture database administration and maintenance tool that can be used to graphically show a database schema, manage database objects, import and export database content, and generate database alerts. dbAnalyst can also be used to reverse engineer existing databases to uncover database objects and relationships and diagnose impending database issues. These features, and a uniform interface to any database, are supported for Structure Query Language-type databases.
用于管理数据库的软件工具是特定于供应商的、专有的,并且需要数据库专业人员具有广泛的数据库知识。我们开发了dbAnalyst,一个独立于供应商的数据库管理和维护工具。dbAnalyst是一个Open Architecture数据库管理和维护工具,可用于图形化显示数据库模式、管理数据库对象、导入和导出数据库内容以及生成数据库警报。dbAnalyst还可以用于对现有数据库进行逆向工程,以发现数据库对象和关系,并诊断即将出现的数据库问题。结构查询语言类型的数据库支持这些特性以及到任何数据库的统一接口。
{"title":"Providing an infrastructure for a cross database management tool","authors":"R. Charlot","doi":"10.1109/ITCC.2002.1000386","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000386","url":null,"abstract":"Software tools used to administer databases are vendor specific, proprietary, and require extensive prior database knowledge on the part of the database professional. We have developed dbAnalyst, a vendor independent database administration and maintenance tool. dbAnalyst is an Open Architecture database administration and maintenance tool that can be used to graphically show a database schema, manage database objects, import and export database content, and generate database alerts. dbAnalyst can also be used to reverse engineer existing databases to uncover database objects and relationships and diagnose impending database issues. These features, and a uniform interface to any database, are supported for Structure Query Language-type databases.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134192919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Advanced Encryption Standard and its application in the examination security in Vietnam 高级加密标准及其在越南考试安全中的应用
A. Duong, Kiem Hoang, Minh Tran, Luong Han Co
Every year, millions of pupils take part in the baccalaureate examination and entrance examinations to universities or colleges in Vietnam. It is vital to keep the questions secret in order to maintain fairness and protect the legal rights of participants. We exploit the new and very secure cryptographic algorithms, especially the Advanced Encryption Standard, to devise a practical and effective method for examination security.
每年,数百万学生参加越南的学士学位考试和大学或学院的入学考试。为了维护公平,保护参与者的合法权益,对问题保密至关重要。我们利用新的、非常安全的加密算法,特别是高级加密标准,设计出一种实用有效的考试安全方法。
{"title":"The Advanced Encryption Standard and its application in the examination security in Vietnam","authors":"A. Duong, Kiem Hoang, Minh Tran, Luong Han Co","doi":"10.1109/ITCC.2002.1000382","DOIUrl":"https://doi.org/10.1109/ITCC.2002.1000382","url":null,"abstract":"Every year, millions of pupils take part in the baccalaureate examination and entrance examinations to universities or colleges in Vietnam. It is vital to keep the questions secret in order to maintain fairness and protect the legal rights of participants. We exploit the new and very secure cryptographic algorithms, especially the Advanced Encryption Standard, to devise a practical and effective method for examination security.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129379907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings. International Conference on Information Technology: Coding and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1