首页 > 最新文献

Proceedings of the 2006 ACM symposium on Applied computing最新文献

英文 中文
Comparing images with distance functions based on attribute interaction 基于属性交互的距离函数图像比较
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141600
J. C. Felipe, P. M. A. Marques, André G. R. Balan, C. Traina, A. Traina
This paper presents two new families of distance functions for image comparison through their feature vectors. These families concern with the effects of the interaction of attributes when two images are compared. Experiments were executed in order to corroborate the effectiveness of the new functions, leading to very promising results.
本文提出了两种新的距离函数族,通过它们的特征向量进行图像比较。这些家族关注的是当两个图像被比较时,属性相互作用的影响。为了证实新功能的有效性,进行了实验,得出了非常有希望的结果。
{"title":"Comparing images with distance functions based on attribute interaction","authors":"J. C. Felipe, P. M. A. Marques, André G. R. Balan, C. Traina, A. Traina","doi":"10.1145/1141277.1141600","DOIUrl":"https://doi.org/10.1145/1141277.1141600","url":null,"abstract":"This paper presents two new families of distance functions for image comparison through their feature vectors. These families concern with the effects of the interaction of attributes when two images are compared. Experiments were executed in order to corroborate the effectiveness of the new functions, leading to very promising results.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130977076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Editorial message: special track on handheld computing 编辑信息:关于手持计算的特别曲目
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141512
Q. Mahmoud, Z. Maamar
Handheld computing is an emerging mobile computing paradigm that promotes using handheld wireless devices (or mobile devices) such as cellular phones and Personal Digital Assistants (PDAs) to accomplish various computing tasks. As handheld devices continue to appear in many forms with diverse functionalities, handheld computing will become the dominant computing paradigm in many fields including education, enterprises, and healthcare.
手持计算是一种新兴的移动计算范例,它促进使用手持无线设备(或移动设备),如蜂窝电话和个人数字助理(pda)来完成各种计算任务。随着手持设备继续以多种形式出现,具有多种功能,手持计算将成为包括教育、企业和医疗保健在内的许多领域的主要计算范式。
{"title":"Editorial message: special track on handheld computing","authors":"Q. Mahmoud, Z. Maamar","doi":"10.1145/1141277.1141512","DOIUrl":"https://doi.org/10.1145/1141277.1141512","url":null,"abstract":"Handheld computing is an emerging mobile computing paradigm that promotes using handheld wireless devices (or mobile devices) such as cellular phones and Personal Digital Assistants (PDAs) to accomplish various computing tasks. As handheld devices continue to appear in many forms with diverse functionalities, handheld computing will become the dominant computing paradigm in many fields including education, enterprises, and healthcare.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Dijkstra's algorithm to incrementally find the k-Nearest Neighbors in spatial network databases 利用Dijkstra算法在空间网络数据库中逐步找到k个最近邻
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141291
Victor Teixeira de Almeida, R. H. Güting
One of the most important kinds of queries in Spatial Network Databases (SNDB) to support Location-Based Services (LBS) is the k-Nearest Neighbors (k-NN) query. Given a point in a network, e.g. a location of a car on a road network, and a set of points of interests, e.g. hotels, gas stations, etc., the k-NN query returns the k points of interest closest to the query point. The network distance is used in such a query instead of the Euclidean distance. Dijkstra's algorithm is a well known solution to this problem. In this paper, we propose a storage schema with a set of index structures to support an efficient execution of a slightly modified version of the Dijkstra's algorithm. We show in an experimental evaluation with generated data sets that our proposal is more efficient than the state-of-the-art solution to this problem.
空间网络数据库(SNDB)中支持基于位置的服务(LBS)的最重要的查询类型之一是k-最近邻(k-NN)查询。给定网络中的一个点,例如汽车在道路网络上的位置,以及一组兴趣点,例如酒店,加油站等,k- nn查询返回最接近查询点的k个兴趣点。在这样的查询中使用网络距离而不是欧几里得距离。Dijkstra算法是解决这个问题的一个众所周知的方法。在本文中,我们提出了一种具有一组索引结构的存储模式,以支持Dijkstra算法的稍微修改版本的有效执行。我们在使用生成的数据集进行的实验评估中表明,我们的建议比最先进的解决方案更有效。
{"title":"Using Dijkstra's algorithm to incrementally find the k-Nearest Neighbors in spatial network databases","authors":"Victor Teixeira de Almeida, R. H. Güting","doi":"10.1145/1141277.1141291","DOIUrl":"https://doi.org/10.1145/1141277.1141291","url":null,"abstract":"One of the most important kinds of queries in Spatial Network Databases (SNDB) to support Location-Based Services (LBS) is the k-Nearest Neighbors (k-NN) query. Given a point in a network, e.g. a location of a car on a road network, and a set of points of interests, e.g. hotels, gas stations, etc., the k-NN query returns the k points of interest closest to the query point. The network distance is used in such a query instead of the Euclidean distance. Dijkstra's algorithm is a well known solution to this problem. In this paper, we propose a storage schema with a set of index structures to support an efficient execution of a slightly modified version of the Dijkstra's algorithm. We show in an experimental evaluation with generated data sets that our proposal is more efficient than the state-of-the-art solution to this problem.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128845357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Inner approximation of distance constraints with existential quantification of parameters 参数存在量化的距离约束内逼近
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141668
Carlos Grandón, A. Goldsztejn
This paper presents and compares two methods for checking if a box is included inside the solution set of an equality constraint with existential quantification of its parameters. We focus on distance constraints, where each existentially quantified parameter has only one occurrence, because of their usefulness and their simplicity. The first method relies on a specific quantifier elimination based on geometric considerations whereas the second method relies on computations with generalized intervals (interval whose bounds are not constrained to be ordered). We show that on two dimensions problems, the two methods yield equivalent results. However, when dealing with higher dimensions, generalized intervals are more efficient.
本文给出并比较了用参数存在量化的等式约束解集中是否包含框的两种检验方法。我们专注于距离约束,其中每个存在量化参数只出现一次,因为它们的有用性和简单性。第一种方法依赖于基于几何考虑的特定量词消除,而第二种方法依赖于广义区间(其边界不受约束为有序的区间)的计算。我们证明了在二维问题上,这两种方法的结果是等价的。然而,当处理高维时,广义区间更有效。
{"title":"Inner approximation of distance constraints with existential quantification of parameters","authors":"Carlos Grandón, A. Goldsztejn","doi":"10.1145/1141277.1141668","DOIUrl":"https://doi.org/10.1145/1141277.1141668","url":null,"abstract":"This paper presents and compares two methods for checking if a box is included inside the solution set of an equality constraint with existential quantification of its parameters. We focus on distance constraints, where each existentially quantified parameter has only one occurrence, because of their usefulness and their simplicity. The first method relies on a specific quantifier elimination based on geometric considerations whereas the second method relies on computations with generalized intervals (interval whose bounds are not constrained to be ordered). We show that on two dimensions problems, the two methods yield equivalent results. However, when dealing with higher dimensions, generalized intervals are more efficient.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards low-perturbation anonymity preserving pattern discovery 低摄动匿名保持模式发现
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141412
M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support threshold in association rule mining. We have recently shown [3], that the above belief is ill-founded: by shifting the concept of k-anonymity [8] from data to patterns, we have formally characterized the notion of a threat to anonymity in the context of frequent itemsets mining, and provided a methodology to efficiently and effectively identify such threats that might arise from the disclosure of a set of frequent itemsets. In our previous paper [2] we have introduced a first, naïve strategy (named suppressive) to sanitize such threats. In this paper we develop a novel sanitization strategy, named additive, which outperforms the previous one in terms of the introduced distortion and has the interesting feature of maintaining the original set of frequent itemsets unchanged, while modifying only the corresponding support values.
一般认为,数据挖掘结果不会违反源数据库中记录的个人的匿名性。实际上,数据挖掘模型和模式为了保证所需的统计显著性,代表了大量的个体,从而隐藏了个体的身份:关联规则挖掘中的最小支持度阈值就是这种情况。我们最近表明[3],上述信念是没有根据的:通过将k-匿名的概念[8]从数据转移到模式,我们已经正式表征了频繁项目集挖掘背景下匿名威胁的概念,并提供了一种方法来有效地识别这些威胁,这些威胁可能来自一组频繁项目集的披露。在我们之前的论文[2]中,我们介绍了第一种naïve策略(称为suppressive)来清除此类威胁。在本文中,我们开发了一种新的消毒策略,称为添加剂,它在引入畸变方面优于先前的策略,并且具有保持原始频繁项集不变而仅修改相应支持值的有趣特征。
{"title":"Towards low-perturbation anonymity preserving pattern discovery","authors":"M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi","doi":"10.1145/1141277.1141412","DOIUrl":"https://doi.org/10.1145/1141277.1141412","url":null,"abstract":"It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in order to ensure a required statistical significance, represent a large number of individuals and thus conceal individual identities: this is the case of the minimum support threshold in association rule mining. We have recently shown [3], that the above belief is ill-founded: by shifting the concept of k-anonymity [8] from data to patterns, we have formally characterized the notion of a threat to anonymity in the context of frequent itemsets mining, and provided a methodology to efficiently and effectively identify such threats that might arise from the disclosure of a set of frequent itemsets. In our previous paper [2] we have introduced a first, naïve strategy (named suppressive) to sanitize such threats. In this paper we develop a novel sanitization strategy, named additive, which outperforms the previous one in terms of the introduced distortion and has the interesting feature of maintaining the original set of frequent itemsets unchanged, while modifying only the corresponding support values.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114450084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator 基于混合反比超突变算子的无约束全局优化实数编码克隆选择算法
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141501
V. Cutello, Giuseppe Nicosia, M. Pavone
Numerical optimization of given objective functions is a crucial task in many real-life problems. This paper introduces a new immunological algorithm for continuous global optimization problems, called opt-IMMALG; it is an improved version of a previously proposed clonal selection algorithm, using a real-code representation and a new Inversely Proportional Hypermutation operator.We evaluate and assess the performance of opt-IMMALG and several others algorithms, namely opt-IA, PSO, arPSO, DE, and SEA with respect to their general applicability as numerical optimization algorithms. The experiments have been performed on 23 widely used benchmark problems.The experimental results show that opt-IMMALG is a suitable numerical optimization technique that, in terms of accuracy, outperforms the analyzed algorithms in this comparative study. In addition it is shown that opt-IMMALG is also suitable for solving large-scale problems.
给定目标函数的数值优化是许多现实问题中的关键任务。本文介绍了一种求解连续全局优化问题的免疫算法——opt-IMMALG;它是先前提出的克隆选择算法的改进版本,使用实码表示和新的反比例超突变算子。我们评估和评估了opt-IMMALG和其他几种算法的性能,即opt-IA, PSO, arPSO, DE和SEA,它们作为数值优化算法的一般适用性。在23个广泛使用的基准问题上进行了实验。实验结果表明,opt-IMMALG是一种合适的数值优化技术,在精度方面优于本对比研究中分析的算法。此外,还证明了opt-IMMALG也适用于解决大规模问题。
{"title":"Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator","authors":"V. Cutello, Giuseppe Nicosia, M. Pavone","doi":"10.1145/1141277.1141501","DOIUrl":"https://doi.org/10.1145/1141277.1141501","url":null,"abstract":"Numerical optimization of given objective functions is a crucial task in many real-life problems. This paper introduces a new immunological algorithm for continuous global optimization problems, called opt-IMMALG; it is an improved version of a previously proposed clonal selection algorithm, using a real-code representation and a new Inversely Proportional Hypermutation operator.We evaluate and assess the performance of opt-IMMALG and several others algorithms, namely opt-IA, PSO, arPSO, DE, and SEA with respect to their general applicability as numerical optimization algorithms. The experiments have been performed on 23 widely used benchmark problems.The experimental results show that opt-IMMALG is a suitable numerical optimization technique that, in terms of accuracy, outperforms the analyzed algorithms in this comparative study. In addition it is shown that opt-IMMALG is also suitable for solving large-scale problems.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114478374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components 方法重载和重写导致封装缺陷:一个异构组件组装实验
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141608
A. Beugnard
Based on an experiment using three languages under .NET, this paper argues that the semantic differences between these languages regarding method overloading and overriding give rise to significant complexity and break encapsulation. We first recalls the various interpretations of overriding and overloading in object oriented languages through what we call language signatures. Then, we realize an experimentation with .NET components coded in different programming languages in order to observe the global behavior. From this, we show that overriding and overloading are not compatible with a key property of components: encapsulation. We conclude that, in the current state of the art, in order to build predictable assembly, components must expose their internal structure! We propose a solution to this problem.
通过在。net下使用三种语言进行实验,本文认为这些语言之间在方法重载和重写方面的语义差异导致了显著的复杂性和破坏封装。我们首先回顾一下在面向对象语言中对覆盖和重载的各种解释,我们称之为语言签名。然后,为了观察全局行为,我们实现了用不同编程语言编写的。net组件的实验。由此我们可以看出,重写和重载与组件的一个关键属性:封装是不兼容的。我们的结论是,在目前的技术水平下,为了构建可预测的组装,组件必须暴露其内部结构!我们提出了一个解决这个问题的办法。
{"title":"Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components","authors":"A. Beugnard","doi":"10.1145/1141277.1141608","DOIUrl":"https://doi.org/10.1145/1141277.1141608","url":null,"abstract":"Based on an experiment using three languages under .NET, this paper argues that the semantic differences between these languages regarding method overloading and overriding give rise to significant complexity and break encapsulation. We first recalls the various interpretations of overriding and overloading in object oriented languages through what we call language signatures. Then, we realize an experimentation with .NET components coded in different programming languages in order to observe the global behavior. From this, we show that overriding and overloading are not compatible with a key property of components: encapsulation. We conclude that, in the current state of the art, in order to build predictable assembly, components must expose their internal structure! We propose a solution to this problem.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117136726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the transitive closure representation and adjustable compression 关于传递闭包表示和可调压缩
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141385
Yangjun Chen, D. Cooke
A composite object represented as a directed graph (digraph for short) is an important data structure that requires efficient support in CAD/CAM, CASE, office systems, software management, web databases, and document databases. It is cumbersome to handle such objects in relational database systems when they involve ancestor-descendant relationships (or say, recursive relationships). In this paper, we present a new encoding method to label a digraph, which reduces the footprints of all previous strategies. This method is based on a tree labeling method and the concept of branchings that are used in graph theory for finding the shortest connection networks. A branching is a subgraph of a given digraph that is in fact a forest, but covers all the nodes of the graph. On the one hand, the proposed encoding scheme achieves the smallest space requirements among all previously published strategies for recognizing recursive relationships. On the other hand, it leads to a new algorithm for computing transitive closures for DAGs (directed acyclic graph) in O(e·b) time and O(n·b) space, where n represents the number of the nodes of a DAG, e the numbers of the edges, and b the DAG's breadth. The method can also be extended to graphs containing cycles. Especially, based on this encoding method, a multi-level compression is developed, by means of which the space for the representation of a transitive closure can be reduced to O((b/dk)·n), where k is the number of compression levels and d is the average outdegree of the nodes.
表示为有向图(简称有向图)的复合对象是一种重要的数据结构,在CAD/CAM、CASE、办公系统、软件管理、web数据库和文档数据库中需要有效的支持。在关系数据库系统中,当涉及到祖先-后代关系(或者说递归关系)时,处理这样的对象是很麻烦的。在本文中,我们提出了一种新的编码方法来标记有向图,它减少了所有以前的策略的足迹。该方法基于图论中用于寻找最短连接网络的树标记方法和分支的概念。分支是给定有向图的子图,它实际上是一个森林,但覆盖了图的所有节点。一方面,所提出的编码方案在所有先前发布的递归关系识别策略中实现了最小的空间需求。另一方面,提出了在O(e·b)时间和O(n·b)空间上计算DAG(有向无环图)传递闭包的新算法,其中n表示DAG的节点数,e表示DAG的边数,b表示DAG的宽度。该方法也可以推广到包含循环的图。特别地,基于这种编码方法,开发了一种多级压缩方法,通过该方法可以将传递闭包的表示空间缩减到O((b/dk)·n),其中k为压缩级别数,d为节点的平均出度。
{"title":"On the transitive closure representation and adjustable compression","authors":"Yangjun Chen, D. Cooke","doi":"10.1145/1141277.1141385","DOIUrl":"https://doi.org/10.1145/1141277.1141385","url":null,"abstract":"A composite object represented as a directed graph (digraph for short) is an important data structure that requires efficient support in CAD/CAM, CASE, office systems, software management, web databases, and document databases. It is cumbersome to handle such objects in relational database systems when they involve ancestor-descendant relationships (or say, recursive relationships). In this paper, we present a new encoding method to label a digraph, which reduces the footprints of all previous strategies. This method is based on a tree labeling method and the concept of branchings that are used in graph theory for finding the shortest connection networks. A branching is a subgraph of a given digraph that is in fact a forest, but covers all the nodes of the graph. On the one hand, the proposed encoding scheme achieves the smallest space requirements among all previously published strategies for recognizing recursive relationships. On the other hand, it leads to a new algorithm for computing transitive closures for DAGs (directed acyclic graph) in O(e·b) time and O(n·b) space, where n represents the number of the nodes of a DAG, e the numbers of the edges, and b the DAG's breadth. The method can also be extended to graphs containing cycles. Especially, based on this encoding method, a multi-level compression is developed, by means of which the space for the representation of a transitive closure can be reduced to O((b/dk)·n), where k is the number of compression levels and d is the average outdegree of the nodes.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Impact of peer incentives on the dissemination of polluted content 同伴激励对污染内容传播的影响
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141720
Fabrício Benevenuto, C. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, J. Almeida, M. Mowbray
Recent studies have reported a new form of malicious behavior in file-sharing Peer-to-Peer systems: content pollution. The dissemination of polluted content in a P2P system has the detrimental effect of reducing content availability, and ultimately, decreasing the confidence of users in such systems. Two potential strategies for polluting P2P content are decoy insertion, which consists of injecting corrupted copies of a file into the system, and hash corruption, which consists of injecting a corrupted file with the same hash code as a non-corrupted one. Polluted content disseminates through P2P networks because users typically do not delete the corrupted files that they download.This paper investigates the effectiveness of peer incentives to delete corrupted files in reducing the dissemination of polluted content, considering the two aforementioned pollution mechanisms. Our simulation results show that the effectiveness of incentives is highly dependent on the pollution mechanism. We show that for a pollution dissemintation techinique called hash corruption, only effective incentive mechanisms are able to avoid spreading of polluted content.
最近的研究报告了文件共享对等系统中一种新的恶意行为形式:内容污染。在P2P系统中传播受污染的内容会降低内容的可用性,并最终降低用户对此类系统的信心。污染P2P内容的两种潜在策略是诱饵插入(decoy insertion)和散列破坏(hash corruption),前者包括将损坏的文件副本注入系统,后者包括将损坏的文件与未损坏的文件注入具有相同散列码的文件。受污染的内容通过P2P网络传播,因为用户通常不会删除他们下载的损坏文件。本文在考虑上述两种污染机制的情况下,研究了同伴激励删除损坏文件在减少污染内容传播方面的有效性。我们的模拟结果表明,激励的有效性高度依赖于污染机制。我们证明了一种被称为哈希腐败的污染传播技术,只有有效的激励机制才能避免污染内容的传播。
{"title":"Impact of peer incentives on the dissemination of polluted content","authors":"Fabrício Benevenuto, C. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, J. Almeida, M. Mowbray","doi":"10.1145/1141277.1141720","DOIUrl":"https://doi.org/10.1145/1141277.1141720","url":null,"abstract":"Recent studies have reported a new form of malicious behavior in file-sharing Peer-to-Peer systems: content pollution. The dissemination of polluted content in a P2P system has the detrimental effect of reducing content availability, and ultimately, decreasing the confidence of users in such systems. Two potential strategies for polluting P2P content are decoy insertion, which consists of injecting corrupted copies of a file into the system, and hash corruption, which consists of injecting a corrupted file with the same hash code as a non-corrupted one. Polluted content disseminates through P2P networks because users typically do not delete the corrupted files that they download.This paper investigates the effectiveness of peer incentives to delete corrupted files in reducing the dissemination of polluted content, considering the two aforementioned pollution mechanisms. Our simulation results show that the effectiveness of incentives is highly dependent on the pollution mechanism. We show that for a pollution dissemintation techinique called hash corruption, only effective incentive mechanisms are able to avoid spreading of polluted content.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Towards chemical coordination for grids 走向网格的化学配位
Pub Date : 2006-04-23 DOI: 10.1145/1141277.1141381
J. Banâtre, Pascal Fradet, Yann Radenac
In [6], Ian Foster and Karl Kesselman explain that grids need "a rethinking of existing programming models and, most likely, new thinking about novel models". In this work, we investigate a "novel programming model" for grids based on the chemical metaphor.
在[6]中,Ian Foster和Karl Kesselman解释说,网格需要“重新思考现有的编程模型,并最有可能对新模型进行新的思考”。在这项工作中,我们研究了一种基于化学隐喻的网格“新型编程模型”。
{"title":"Towards chemical coordination for grids","authors":"J. Banâtre, Pascal Fradet, Yann Radenac","doi":"10.1145/1141277.1141381","DOIUrl":"https://doi.org/10.1145/1141277.1141381","url":null,"abstract":"In [6], Ian Foster and Karl Kesselman explain that grids need \"a rethinking of existing programming models and, most likely, new thinking about novel models\". In this work, we investigate a \"novel programming model\" for grids based on the chemical metaphor.","PeriodicalId":269830,"journal":{"name":"Proceedings of the 2006 ACM symposium on Applied computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings of the 2006 ACM symposium on Applied computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1