首页 > 最新文献

2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)最新文献

英文 中文
Toward a Semantic Cache Supporting Version-Based Consistency 支持基于版本一致性的语义缓存
Zhe Yang, Kun Ma, Jialin Zhong
In an era of mobile internet and big data, how to make the data access more efficient is worth researching because the mobile computing environments have some limitations such as the narrow bandwidth, the frequent disconnections of network and so on. To improve the response time of query, a good cache system is of vital importance. Besides, a good cache consistency method is essential to ensure the correctness. In this paper, a semantic cache supporting version-based consistency is proposed. This cache mainly have two advantages. On one hand, it can obviously improve the response time of query and the hit ratio of the cache. On the other hand, the version-based consistency enhances the stability of the system especially in high-concurrency situations. Several experiments has been carried out and the results are presented to show the performance of the cache.
在移动互联网和大数据时代,如何提高数据访问的效率是值得研究的问题,因为移动计算环境存在带宽狭窄、网络频繁断开等限制。为了提高查询的响应时间,一个好的缓存系统至关重要。此外,良好的缓存一致性方法是保证缓存正确性的关键。本文提出了一种支持基于版本一致性的语义缓存。这种缓存主要有两个优点。一方面,它可以明显提高查询的响应时间和缓存的命中率。另一方面,基于版本的一致性增强了系统的稳定性,特别是在高并发情况下。实验结果表明了该高速缓存的性能。
{"title":"Toward a Semantic Cache Supporting Version-Based Consistency","authors":"Zhe Yang, Kun Ma, Jialin Zhong","doi":"10.1109/CISIS.2016.130","DOIUrl":"https://doi.org/10.1109/CISIS.2016.130","url":null,"abstract":"In an era of mobile internet and big data, how to make the data access more efficient is worth researching because the mobile computing environments have some limitations such as the narrow bandwidth, the frequent disconnections of network and so on. To improve the response time of query, a good cache system is of vital importance. Besides, a good cache consistency method is essential to ensure the correctness. In this paper, a semantic cache supporting version-based consistency is proposed. This cache mainly have two advantages. On one hand, it can obviously improve the response time of query and the hit ratio of the cache. On the other hand, the version-based consistency enhances the stability of the system especially in high-concurrency situations. Several experiments has been carried out and the results are presented to show the performance of the cache.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134422858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems 点对点发布/订阅系统中的信息流控制模型
Shigenari Nakamura, T. Enokido, M. Takizawa
A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair "t, op" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.
发布/订阅(PS)模型是分布式系统的事件驱动模型。在本文中,我们考虑了一个点对点(P2P)类型的PS模型,其中每个点(进程)可以发布和订阅事件。在这里,对等体发布事件消息,然后将事件消息通知给对该事件感兴趣的目标对等体。根据主题的PS系统中讨论的主题来指定发布和订阅。本文讨论了一种基于主题的访问控制(TBAC)模型,以防止PS系统中节点间的非法信息流。在这里,访问权限是主题t的一对“t, op”和发布或订阅的操作op。只有在将主题授予对等体时,才允许对等体发布带有主题的事件消息并订阅主题。如果e的发布和pi的订阅包含一些公共主题,则将事件消息e通知给对等体pi。如果对等体pi收到事件消息e1后发布事件消息e2,则该事件消息e2可能会带来对等体pi不允许发布的e1事件。在这里,点pi中的信息非法地流向另一个点。定义了对等体之间的法律流动关系。在此基础上,提出了一种基于订阅的同步(SBS)协议来防止非法信息流。在这里,如果通知可能导致非法信息流,则通知被禁止。我们根据禁止的通知数量来评估SBS协议。
{"title":"Information Flow Control Models in Peer-to-Peer Publish/Subscribe Systems","authors":"Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/CISIS.2016.122","DOIUrl":"https://doi.org/10.1109/CISIS.2016.122","url":null,"abstract":"A publish/subscribe (PS) model is an event-driven model of a distributed system. In this paper, we consider a peer-to-peer (P2P) type of PS model where each peer (process) can publish and subscribe events. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event. Publications and subscriptions are specified in terms of topics as discussed in topic-based PS systems. In this paper, we newly discuss a topic-based access control (TBAC) model to prevent illegal information flow among peers in PS systems. Here, an access right is a pair \"t, op\" of a topic t and an operation op which is publish or subscribe. A peer is allowed to publish an event message with topics and subscribe topics only if the topics are granted to the peer. An event message e is notified to a peer pi if the publication of e and subscription of pi include some common topic. If a peer pi publishes an event message e2 after receiving an event message e1, the event message e2 may bring the event of e1, which the peer pi is not allowed to publish. Here, information in the peer pi illegally flow to another peer. We define the legal flow relation among the peers. Then, we newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, a notification is banned if the notification may cause illegal information flow. We evaluate the SBS protocol in terms of number of notifications banned.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effects of Sustained Communication Time on Reliability of JXTA-Overlay P2P Platform: A Comparison Study for Two Fuzzy-Based Systems 持续通信时间对jxta覆盖P2P平台可靠性的影响——基于两种模糊系统的比较研究
Yi Liu, Shinji Sakamoto, L. Barolli, Evjola Spaho, Makoto Ikeda, F. Xhafa
In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based systems (called FPRS1 and FPRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between the fuzzy-based reliability systems. Comparing the complexity of FPRS1 and FPRS2, the FPRS2 is more complex than FPRS1. However, it considers also the sustained communication time which makes the platform more reliable.
在P2P系统中,每一个对等体都需要获取其他对等体的信息,并通过相邻的对等体将这些信息传播给其他对等体。因此,每个对等体有一定数量的邻居对等体是很重要的。此外,更重要的是讨论每个对等体是否有可靠的邻居。实际上,每个对等体都可能出现故障,或者向其他对等体发送过时甚至错误的信息。我们已经实现了一个名为jxta - overlay的P2P平台,它定义了一组协议,用于标准化不同设备之间的通信和协作方式。JXTA-Overlay提供了一组基本功能和原语,旨在尽可能完整地满足大多数基于jxta的应用程序的需求。为了提高JXTA-Overlay P2P平台的可靠性,本文提出了两个基于模糊的系统(FPRS1和FPRS2)。对基于模糊的可靠性系统进行了比较研究。比较FPRS1和FPRS2的复杂性,FPRS2比FPRS1更复杂。然而,它也考虑了持续通信时间,使平台更加可靠。
{"title":"Effects of Sustained Communication Time on Reliability of JXTA-Overlay P2P Platform: A Comparison Study for Two Fuzzy-Based Systems","authors":"Yi Liu, Shinji Sakamoto, L. Barolli, Evjola Spaho, Makoto Ikeda, F. Xhafa","doi":"10.1109/CISIS.2016.56","DOIUrl":"https://doi.org/10.1109/CISIS.2016.56","url":null,"abstract":"In P2P systems, each peer has to obtain information of other peers and propagate the information to other peers through neighboring peers. Thus, it is important for each peer to have some number of neighbor peers. Moreover, it is more significant to discuss if each peer has reliable neighbor peers. In reality, each peer might be faulty or might send obsolete, even incorrect information to the other peers. We have implemented a P2P platform called JXTA-Orverlay, which defines a set of protocols that standardize how different devices may communicate and collaborate among them. JXTA-Overlay provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present two fuzzy-based systems (called FPRS1 and FPRS2) to improve the reliability of JXTA-Overlay P2P platform. We make a comparison study between the fuzzy-based reliability systems. Comparing the complexity of FPRS1 and FPRS2, the FPRS2 is more complex than FPRS1. However, it considers also the sustained communication time which makes the platform more reliable.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Distributed Backup System among Individuals by Introducing Deduplication 引入重复数据删除技术开发分布式个人备份系统
H. Ishida, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita
Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems exist for individuals to solve problems of processing time and immediacy. However, problems of storage capacity exist in such systems. This research presents a deduplication technique of block data to solve problems of storage capacity. By incorporating this into the system, we aim at storage capacity reduction of backup data.
近年来,作为一种鲁棒性备份,地理上分散和分布式的数据存储备份系统一直受到人们的关注。然而,现有的低成本分布式备份系统在处理时间、即时性和存储容量等方面存在诸多困难。因此,基于多agent的分布式备份系统作为解决这一问题的现有方法,为个人解决处理时间和即时性问题而存在。但是,这种系统存在存储容量问题。本研究提出一种基于块数据的重复数据删除技术,以解决存储容量问题。通过将其整合到系统中,我们的目标是减少备份数据的存储容量。
{"title":"Development of Distributed Backup System among Individuals by Introducing Deduplication","authors":"H. Ishida, Takahiro Uchiya, I. Takumi, Tetsuo Kinoshita","doi":"10.1109/CISIS.2016.78","DOIUrl":"https://doi.org/10.1109/CISIS.2016.78","url":null,"abstract":"Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems exist for individuals to solve problems of processing time and immediacy. However, problems of storage capacity exist in such systems. This research presents a deduplication technique of block data to solve problems of storage capacity. By incorporating this into the system, we aim at storage capacity reduction of backup data.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114753457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Optical Pulse Propagation in Nonlinear and Dispersive Medium by Constrained Interpolated Profile Method 用光脉冲在非线性色散介质中传输的约束插值剖面法模拟
H. Maeda, M. Čada, Jianming Jin, Kazuya Tomiura
Optical pulse wave propagation in nonlinear and dispersive medium is simulated by constrained interpolated profile (CIP) method. In one dimensional space with dispersion and nonlinearity, Gaussian envelope pulse modulated by optical carrier wave propagates successfully with physically reliable manner for typical small and large amplitudes. The spreading and compressing behavior for small and large input amplitudes are caused by trade-off between linear dispersion and nonlinear refractive index modulation of the medium.
用约束插值剖面法模拟了光脉冲波在非线性色散介质中的传播。在具有色散和非线性的一维空间中,由光载波调制的高斯包络脉冲以物理可靠的方式成功地传播了典型的大小振幅。大小输入幅值的扩频和压缩行为是由介质的线性色散和非线性折射率调制之间的权衡引起的。
{"title":"Simulation of Optical Pulse Propagation in Nonlinear and Dispersive Medium by Constrained Interpolated Profile Method","authors":"H. Maeda, M. Čada, Jianming Jin, Kazuya Tomiura","doi":"10.1109/CISIS.2016.88","DOIUrl":"https://doi.org/10.1109/CISIS.2016.88","url":null,"abstract":"Optical pulse wave propagation in nonlinear and dispersive medium is simulated by constrained interpolated profile (CIP) method. In one dimensional space with dispersion and nonlinearity, Gaussian envelope pulse modulated by optical carrier wave propagates successfully with physically reliable manner for typical small and large amplitudes. The spreading and compressing behavior for small and large input amplitudes are caused by trade-off between linear dispersion and nonlinear refractive index modulation of the medium.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116140481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on Evaluating Wearing Mobility of Wearable Robot Mechanisms 可穿戴机器人机构穿戴机动性评估研究
T. Morizono, Shuhei Oda, Takashi Motomura, Kazuya Sakamoto, Shutaro Takeshita, Hiroyuki Matsubara
Wearable robots recently become a hopeful technology for support and assist of human activity in many fields. A major issue discussed in this research field to this date is limb mobility of a person wearing a wearable robot. It is considered that the mobility receives influence from factors such as alignment of a wearable robot mechanism on human limbs, control of the robot, mechanical design of the mechanism etc. This paper considers two mechanical designs of the mechanism for motion support of a human elbow joint, and compare those mobility based on relative motion between a human arm and the mechanism, under an assumption that the mechanism does not receive special care for its alignment on a human arm. The comparison of the mobility obtained from measured data of persons wearing the mechanism does not statistically exhibit significant difference between the mechanical designs, however, it also brings up some issues for future study.
近年来,可穿戴机器人在许多领域成为支持和协助人类活动的一种有希望的技术。到目前为止,该研究领域讨论的一个主要问题是佩戴可穿戴机器人的人的肢体活动能力。考虑了可穿戴机器人机构对人的肢体的对准、机器人的控制、机构的机械设计等因素对其运动能力的影响。本文考虑了人体肘关节运动支撑机构的两种机械设计,并在假设机构没有特别注意其在人体手臂上的对准的情况下,比较了基于人体手臂与机构相对运动的两种机械设计。通过对佩戴该机构人员的实测数据进行比较,两种机械设计之间并没有统计学上的显著差异,但这也为今后的研究提出了一些问题。
{"title":"A Study on Evaluating Wearing Mobility of Wearable Robot Mechanisms","authors":"T. Morizono, Shuhei Oda, Takashi Motomura, Kazuya Sakamoto, Shutaro Takeshita, Hiroyuki Matsubara","doi":"10.1109/CISIS.2016.85","DOIUrl":"https://doi.org/10.1109/CISIS.2016.85","url":null,"abstract":"Wearable robots recently become a hopeful technology for support and assist of human activity in many fields. A major issue discussed in this research field to this date is limb mobility of a person wearing a wearable robot. It is considered that the mobility receives influence from factors such as alignment of a wearable robot mechanism on human limbs, control of the robot, mechanical design of the mechanism etc. This paper considers two mechanical designs of the mechanism for motion support of a human elbow joint, and compare those mobility based on relative motion between a human arm and the mechanism, under an assumption that the mechanism does not receive special care for its alignment on a human arm. The comparison of the mobility obtained from measured data of persons wearing the mechanism does not statistically exhibit significant difference between the mechanical designs, however, it also brings up some issues for future study.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116230364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Meal Information Collection System Using IoT Wireless Tags 基于物联网无线标签的膳食信息采集系统的设计与实现
Kohei Kaiya, A. Koyama
In recent years, people with lifestyle-related diseases are increasing, because of lack of exercise, overeating, stress and smoking. With this situation, applications of Personal Computer (PC) or smart phone which support healthy life are widespread. Turning to the system dealing with meal information, there are two type systems. One is that meal records are inputted by hand and managed as meal logs. Another one is that a meal image is shot by a smart phone, and meal contents are recorded by image recognition. However, these systems need a lot of time for inputting of meal contents or shooting of meal images. Therefore, it is difficult to continue use. Moreover, the second system has a problem for accuracy of image recognition. In this paper, to solve these problems, we propose a meal information collection system which uses IoT wireless tags. An IoT wireless tag is corresponded to a meal and the system can automatically get meal information such as meal contents, meal sequence, meal time and so on. We implemented the meal information collection system which aims automatic collection and getting of various information which do not get at other systems. From the evaluation results of collection accuracy and comparison with conventional systems, we verified effectiveness of the proposed system.
近年来,由于缺乏锻炼、暴饮暴食、压力过大和吸烟,患有与生活方式有关疾病的人越来越多。在这种情况下,支持健康生活的个人电脑(PC)或智能手机的应用越来越广泛。谈到处理膳食信息的系统,有两种类型的系统。一是用餐记录是手工输入的,并作为用餐日志进行管理。另一种是通过智能手机拍摄用餐图像,通过图像识别记录用餐内容。然而,这些系统需要大量的时间来输入食物内容或拍摄食物图像。因此,很难继续使用。此外,第二种系统在图像识别的准确性方面存在问题。为了解决这些问题,本文提出了一种利用物联网无线标签的餐饮信息采集系统。物联网无线标签与一顿饭相对应,系统可以自动获取用餐内容、用餐顺序、用餐时间等用餐信息。实现了餐饮信息采集系统,实现了其他系统无法实现的各种信息的自动采集和获取。从采集精度的评价结果和与常规系统的比较,验证了系统的有效性。
{"title":"Design and Implementation of Meal Information Collection System Using IoT Wireless Tags","authors":"Kohei Kaiya, A. Koyama","doi":"10.1109/CISIS.2016.66","DOIUrl":"https://doi.org/10.1109/CISIS.2016.66","url":null,"abstract":"In recent years, people with lifestyle-related diseases are increasing, because of lack of exercise, overeating, stress and smoking. With this situation, applications of Personal Computer (PC) or smart phone which support healthy life are widespread. Turning to the system dealing with meal information, there are two type systems. One is that meal records are inputted by hand and managed as meal logs. Another one is that a meal image is shot by a smart phone, and meal contents are recorded by image recognition. However, these systems need a lot of time for inputting of meal contents or shooting of meal images. Therefore, it is difficult to continue use. Moreover, the second system has a problem for accuracy of image recognition. In this paper, to solve these problems, we propose a meal information collection system which uses IoT wireless tags. An IoT wireless tag is corresponded to a meal and the system can automatically get meal information such as meal contents, meal sequence, meal time and so on. We implemented the meal information collection system which aims automatic collection and getting of various information which do not get at other systems. From the evaluation results of collection accuracy and comparison with conventional systems, we verified effectiveness of the proposed system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129274179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Extensible Command Parsing Method for Network Device 网络设备的可扩展命令解析方法
Ning Li, Lingcui Zhang, Qiaoduo Zhang, Fenghua Li
Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching module. Business-logic module includes user-defined command rule files and a rule file parsing program. The grammar of user-defined command rule is concise and easy. The rule file parsing program parses rule files into command tree which is disposed in the memory. Command-matching module consists of user commands handling program and command tokens matching program. The former program divides user commands into command tokens. The latter program matches command tokens with command tree to locate the command handling function. We present the design of such a parser using ECPM and apply it to new network devices. The result shows that the ECPM improves the variability, extensibility and flexibility of network devices parsing system.
随着网络功能的日益复杂,网络设备的命令添加成为一个日益严峻的挑战。为了提高在开发或已开发网络设备中添加新命令的效率,提出了一种可扩展命令解析方法(ECPM)。利用该方法,设计了由业务逻辑模块和命令匹配模块组成的可扩展命令解析系统。业务逻辑模块包括用户定义的命令规则文件和规则文件解析程序。用户自定义命令规则语法简洁、简单。规则文件解析程序将规则文件解析成命令树,命令树在内存中进行处理。命令匹配模块由用户命令处理程序和命令令牌匹配程序组成。前一个程序将用户命令划分为命令令牌。后一个程序将命令令牌与命令树匹配以定位命令处理函数。本文提出了一种基于ECPM的解析器设计,并将其应用于新的网络设备。结果表明,ECPM提高了网络设备解析系统的可变性、可扩展性和灵活性。
{"title":"Extensible Command Parsing Method for Network Device","authors":"Ning Li, Lingcui Zhang, Qiaoduo Zhang, Fenghua Li","doi":"10.1109/CISIS.2016.62","DOIUrl":"https://doi.org/10.1109/CISIS.2016.62","url":null,"abstract":"Network functionality is growing increasingly complex, making the commands addition of network device a steadily growing challenge. In order to improve the efficiency of adding new commands to developing or developed network devices, we propose an extensible command parsing method (ECPM). With this method, we design the extensible command parsing system consisting of business-logic module and command-matching module. Business-logic module includes user-defined command rule files and a rule file parsing program. The grammar of user-defined command rule is concise and easy. The rule file parsing program parses rule files into command tree which is disposed in the memory. Command-matching module consists of user commands handling program and command tokens matching program. The former program divides user commands into command tokens. The latter program matches command tokens with command tree to locate the command handling function. We present the design of such a parser using ECPM and apply it to new network devices. The result shows that the ECPM improves the variability, extensibility and flexibility of network devices parsing system.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130208340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accessing Cloud Services through Biometrics Authentication 通过生物识别认证访问云服务
P. Ruiu, G. Caragnano, G. Masala, E. Grosso
The adoption of Cloud computing involves many advantages in terms of flexibility, scalability and reliability, but also implies new challenges on security, data privacy and protection of personal data. Since more and more sensitive applications and data are moved to the cloud, the verification of the digital identity of the participants in the electronic communication has become a crucial challenge. Currently, the use of biometric techniques can be considered as an effective solution to ensure a significant increase of security in the authentication protocols managed by modern authentication servers. However the use of biometric data for the logical access to IT services is a more challenging and still unsolved problem. The project Cloud for SME integrates a biometric authentication based on fingerprints with a cloud computing platform, investigating how highly secure authentication methods can increase the adoption of cloud computing technologies among small and medium enterprises.
采用云计算在灵活性、可扩展性和可靠性方面具有许多优势,但也意味着在安全、数据隐私和个人数据保护方面面临新的挑战。随着越来越多的敏感应用和数据被转移到云端,电子通信参与者的数字身份验证已经成为一个至关重要的挑战。目前,使用生物识别技术可以被认为是一种有效的解决方案,以确保在现代认证服务器管理的认证协议中显著增加安全性。然而,将生物特征数据用于对IT服务的逻辑访问是一个更具挑战性且尚未解决的问题。“中小企业云”项目将基于指纹的生物识别认证与云计算平台集成在一起,研究高度安全的认证方法如何在中小企业中增加云计算技术的采用。
{"title":"Accessing Cloud Services through Biometrics Authentication","authors":"P. Ruiu, G. Caragnano, G. Masala, E. Grosso","doi":"10.1109/CISIS.2016.76","DOIUrl":"https://doi.org/10.1109/CISIS.2016.76","url":null,"abstract":"The adoption of Cloud computing involves many advantages in terms of flexibility, scalability and reliability, but also implies new challenges on security, data privacy and protection of personal data. Since more and more sensitive applications and data are moved to the cloud, the verification of the digital identity of the participants in the electronic communication has become a crucial challenge. Currently, the use of biometric techniques can be considered as an effective solution to ensure a significant increase of security in the authentication protocols managed by modern authentication servers. However the use of biometric data for the logical access to IT services is a more challenging and still unsolved problem. The project Cloud for SME integrates a biometric authentication based on fingerprints with a cloud computing platform, investigating how highly secure authentication methods can increase the adoption of cloud computing technologies among small and medium enterprises.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125683850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Agent-Based Model for Autonomous Planning 基于agent的自主规划模型
F. Amato, Francesco Moscato
Distributed autonomous elements like sensors networks, intelligent devices etc. are nowadays widely used. Here, one of the most difficult task is the automatic re-planning when something goes wrong: new planning algorithms have to be coped with existing ones in order to fulfill performance and soundness requirements. In this work we present a modelling methodology and a planning technique based on multi-agent models. The planning methodology exploits both classical and a new counter-example based approaches in order to build an effective multi-expert system able to face with increasing complexity of these systems, implementing procedures that make possible the reaching of desired goals within temporal constraints.
分布式自治元件如传感器网络、智能设备等在当今得到了广泛的应用。在这里,最困难的任务之一是当出现问题时自动重新规划:为了满足性能和可靠性要求,新的规划算法必须与现有的算法相适应。在这项工作中,我们提出了一种基于多智能体模型的建模方法和规划技术。规划方法利用经典和新的反例方法,以建立一个有效的多专家系统,能够面对这些系统日益增加的复杂性,实施程序,使在时间限制内达到预期目标成为可能。
{"title":"An Agent-Based Model for Autonomous Planning","authors":"F. Amato, Francesco Moscato","doi":"10.1109/CISIS.2016.135","DOIUrl":"https://doi.org/10.1109/CISIS.2016.135","url":null,"abstract":"Distributed autonomous elements like sensors networks, intelligent devices etc. are nowadays widely used. Here, one of the most difficult task is the automatic re-planning when something goes wrong: new planning algorithms have to be coped with existing ones in order to fulfill performance and soundness requirements. In this work we present a modelling methodology and a planning technique based on multi-agent models. The planning methodology exploits both classical and a new counter-example based approaches in order to build an effective multi-expert system able to face with increasing complexity of these systems, implementing procedures that make possible the reaching of desired goals within temporal constraints.","PeriodicalId":249236,"journal":{"name":"2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)","volume":"61 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 10th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1