首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
Passive source localization using power spectral analysis and decision fusion in wireless distributed sensor networks 基于功率谱分析和决策融合的无线分布式传感器网络无源定位
M. Z. Rahman, G. Karmakar, L. Dooley, G. Karmakar
Source localization is a challenging issue for multisensor multitarget detection, tracking and estimation problems in wireless distributed sensor networks. In this paper, a novel source localization method, called passive source localization using power spectral analysis and decision fusion in wireless distributed sensor networks is presented. This includes an energy decay model for acoustic signals. The new method is computationally efficient and requires less bandwidth compared with current methods by making localization decisions at individual nodes and performing decision fusion at the manager node. This eliminates the requirement of sophisticated synchronization. A simulation of the proposed method is performed using different numbers of sources and sensor nodes. Simulation results confirmed the improved performance of this method under ideal and noisy conditions.
在无线分布式传感器网络中,源定位是多传感器多目标检测、跟踪和估计的难点。提出了一种基于功率谱分析和决策融合的无线分布式传感器网络无源源定位方法。这包括声信号的能量衰减模型。该方法在单个节点进行定位决策,在管理节点进行决策融合,与现有方法相比,计算效率高,所需带宽少。这消除了对复杂同步的需求。采用不同数量的源和传感器节点对所提出的方法进行了仿真。仿真结果验证了该方法在理想和噪声条件下的性能改进。
{"title":"Passive source localization using power spectral analysis and decision fusion in wireless distributed sensor networks","authors":"M. Z. Rahman, G. Karmakar, L. Dooley, G. Karmakar","doi":"10.1109/ITCC.2005.225","DOIUrl":"https://doi.org/10.1109/ITCC.2005.225","url":null,"abstract":"Source localization is a challenging issue for multisensor multitarget detection, tracking and estimation problems in wireless distributed sensor networks. In this paper, a novel source localization method, called passive source localization using power spectral analysis and decision fusion in wireless distributed sensor networks is presented. This includes an energy decay model for acoustic signals. The new method is computationally efficient and requires less bandwidth compared with current methods by making localization decisions at individual nodes and performing decision fusion at the manager node. This eliminates the requirement of sophisticated synchronization. A simulation of the proposed method is performed using different numbers of sources and sensor nodes. Simulation results confirmed the improved performance of this method under ideal and noisy conditions.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133751648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Real stock trading using soft computing models 真实股票交易使用软计算模型
Brent Doeksen, A. Abraham, Johnson P. Thomas, M. Paprzycki
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict the direction of both Microsoft and Intel stock prices over a period of thirteen years. We explore the performance of artificial neural networks trained using backpropagation and conjugate gradient algorithm and a Mamdani and Takagi Sugeno fuzzy inference system learned using neural learning and genetic algorithm. Once all the different models were built the last part of the experiment was to determine how much profit can be made using these methods versus a simple buy and hold technique.
本研究的主要重点是比较软计算范式在预测个股方向方面的不同表现。研究人员使用了三种不同的人工智能技术来预测微软和英特尔在13年期间的股价走势。我们研究了使用反向传播和共轭梯度算法训练的人工神经网络的性能,以及使用神经学习和遗传算法学习的Mamdani和Takagi Sugeno模糊推理系统的性能。一旦建立了所有不同的模型,实验的最后一部分是确定使用这些方法与简单的买入并持有技术相比可以赚取多少利润。
{"title":"Real stock trading using soft computing models","authors":"Brent Doeksen, A. Abraham, Johnson P. Thomas, M. Paprzycki","doi":"10.1109/ITCC.2005.238","DOIUrl":"https://doi.org/10.1109/ITCC.2005.238","url":null,"abstract":"The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intelligence techniques were used to predict the direction of both Microsoft and Intel stock prices over a period of thirteen years. We explore the performance of artificial neural networks trained using backpropagation and conjugate gradient algorithm and a Mamdani and Takagi Sugeno fuzzy inference system learned using neural learning and genetic algorithm. Once all the different models were built the last part of the experiment was to determine how much profit can be made using these methods versus a simple buy and hold technique.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114331088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Verifiable threshold sharing of a large secret safe-prime 大秘密安全素数的可验证阈值共享
M.H. Ibrahi
Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are sharing a unique secret and this secret is the secret originally distributed by the dealer if the dealer was honest. However, such schemes do not ensure that the shared secret has any special characteristics (such as being a prime, safe prime or being with a specific bit-length). In this paper, we introduce a secret sharing scheme to allow a set of players to have confidence that they are sharing a large secret prime. Next, we introduce another scheme that allows the players to have confidence that they are sharing a large secret safe prime. Finally we give a subroutine that allows the players to ensure that the shared primes are of the appropriate bit-length. What we have in mind is to add fault-tolerance property to the recent all honest RSA function sharing protocol as presented in M. H. Ibrahim et al. (2004).
可验证的秘密共享方案(VSS)是一种旨在确保玩家共享唯一秘密的方案,如果经销商是诚实的,则该秘密是最初由经销商分发的秘密。然而,这样的方案不能确保共享的秘密具有任何特殊的特征(比如是素数、安全素数或具有特定的位长度)。在本文中,我们引入了一种秘密共享方案,允许一组参与者确信他们正在共享一个大的秘密素数。接下来,我们引入另一个方案,让玩家有信心他们正在分享一个大的秘密安全素数。最后,我们给出了一个子程序,它允许参与者确保共享素数具有适当的位长度。我们的想法是在M. H. Ibrahim et al.(2004)中提出的最近的全诚实RSA函数共享协议中添加容错属性。
{"title":"Verifiable threshold sharing of a large secret safe-prime","authors":"M.H. Ibrahi","doi":"10.1109/ITCC.2005.290","DOIUrl":"https://doi.org/10.1109/ITCC.2005.290","url":null,"abstract":"Verifiable secret sharing schemes (VSS) are schemes for the purpose of ensuring that the players are sharing a unique secret and this secret is the secret originally distributed by the dealer if the dealer was honest. However, such schemes do not ensure that the shared secret has any special characteristics (such as being a prime, safe prime or being with a specific bit-length). In this paper, we introduce a secret sharing scheme to allow a set of players to have confidence that they are sharing a large secret prime. Next, we introduce another scheme that allows the players to have confidence that they are sharing a large secret safe prime. Finally we give a subroutine that allows the players to ensure that the shared primes are of the appropriate bit-length. What we have in mind is to add fault-tolerance property to the recent all honest RSA function sharing protocol as presented in M. H. Ibrahim et al. (2004).","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114854990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobile Web services discovery and invocation through auto-generation of abstract multimodal interface 通过自动生成抽象多模态接口发现和调用移动Web服务
R. Steele, K. Khankan, T. Dillon
With the advancement in wireless technologies in general and mobile devices capabilities in particular, ubiquitous access of mobile Web services continues to be in the focal point of research. This paper presents a novel architecture for discovery and invocation of mobile Web services through automatically generated abstract multimodal user interface for these services. A prototype has been developed to auto-generate user interface based on XForms and VoiceXml from a WDSL file. In this proposed architecture, the discovered Web services are invoked dynamically with a transparent mechanism. Moreover, the proposed architecture is a component-based architecture that provides its core functionality as Web services.
随着一般无线技术和移动设备功能的进步,移动Web服务的无处不在的访问仍然是研究的焦点。本文提出了一种通过为移动Web服务自动生成抽象多模态用户界面来发现和调用移动Web服务的新体系结构。已经开发了一个原型,可以基于XForms和VoiceXml从WDSL文件自动生成用户界面。在这个建议的体系结构中,使用透明机制动态调用发现的Web服务。此外,所建议的体系结构是基于组件的体系结构,将其核心功能作为Web服务提供。
{"title":"Mobile Web services discovery and invocation through auto-generation of abstract multimodal interface","authors":"R. Steele, K. Khankan, T. Dillon","doi":"10.1109/ITCC.2005.202","DOIUrl":"https://doi.org/10.1109/ITCC.2005.202","url":null,"abstract":"With the advancement in wireless technologies in general and mobile devices capabilities in particular, ubiquitous access of mobile Web services continues to be in the focal point of research. This paper presents a novel architecture for discovery and invocation of mobile Web services through automatically generated abstract multimodal user interface for these services. A prototype has been developed to auto-generate user interface based on XForms and VoiceXml from a WDSL file. In this proposed architecture, the discovered Web services are invoked dynamically with a transparent mechanism. Moreover, the proposed architecture is a component-based architecture that provides its core functionality as Web services.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Using formal concept analysis to establish model dependencies 使用形式化的概念分析来建立模型依赖关系
Igor Ivkovic, K. Kontogiannis
Software models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their elements are usually mutually dependent. To preserve consistency and enable synchronization when models are altered due to evolution, the underlying model dependencies need to be established and maintained. As there is a potentially large number of such relations, this process should be automated for suitable scenarios. This paper introduces a tractable approach to automating identification and encoding of model dependencies that can be used for model synchronization. The approach first uses association rules to map types between models and different levels of abstraction. It then makes use of formal concept analysis (FCA) on attributes of extracted models to identify clusters of model elements.
软件模型在不同的抽象层次上发展,从需求规范到源代码的开发。这个过程背后的模型是相关的,它们的元素通常是相互依赖的。为了在模型因演进而改变时保持一致性并启用同步,需要建立和维护底层的模型依赖关系。由于可能存在大量这样的关系,因此应该针对合适的场景自动化此过程。本文介绍了一种易于处理的方法来自动识别和编码可用于模型同步的模型依赖关系。该方法首先使用关联规则在模型和不同抽象级别之间映射类型。然后利用形式概念分析(FCA)对提取的模型属性进行识别模型元素的聚类。
{"title":"Using formal concept analysis to establish model dependencies","authors":"Igor Ivkovic, K. Kontogiannis","doi":"10.1109/ITCC.2005.286","DOIUrl":"https://doi.org/10.1109/ITCC.2005.286","url":null,"abstract":"Software models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their elements are usually mutually dependent. To preserve consistency and enable synchronization when models are altered due to evolution, the underlying model dependencies need to be established and maintained. As there is a potentially large number of such relations, this process should be automated for suitable scenarios. This paper introduces a tractable approach to automating identification and encoding of model dependencies that can be used for model synchronization. The approach first uses association rules to map types between models and different levels of abstraction. It then makes use of formal concept analysis (FCA) on attributes of extracted models to identify clusters of model elements.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123330394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards an indoor location system using RF signal strength in IEEE 802.11 networks 在ieee802.11网络中使用射频信号强度的室内定位系统
A. Harder, Lanlan Song, Yu Wang
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information; they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless network. The location is determined from radio signal strength information collected from multiple base stations at different physical locations. Our experiments show a high accuracy rate of this approach.
位置是普适计算环境中最重要的上下文之一。GPS系统被广泛用于检测位置信息;他们主要在户外环境下工作。应用需要精确,易于构建和易于使用的室内定位系统。本文介绍了我们利用现有的IEEE 802.11无线网络实现基于microsoft - windows平台的室内位置确定系统的工作。该位置是根据从不同物理位置的多个基站收集的无线电信号强度信息确定的。实验结果表明,该方法具有较高的准确率。
{"title":"Towards an indoor location system using RF signal strength in IEEE 802.11 networks","authors":"A. Harder, Lanlan Song, Yu Wang","doi":"10.1109/ITCC.2005.278","DOIUrl":"https://doi.org/10.1109/ITCC.2005.278","url":null,"abstract":"Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information; they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless network. The location is determined from radio signal strength information collected from multiple base stations at different physical locations. Our experiments show a high accuracy rate of this approach.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"172 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A parallel scheme for implementing multialphabet arithmetic coding in high-speed programmable hardware 一种在高速可编程硬件上实现多字母算术编码的并行方案
S. Mahapatra, Kuldeep Singh
In this paper, a scheme is proposed for parallel-pipelined implementation of the multialphabet arithmetic-coding algorithm used in lossless data compression. Using this scheme, it is possible to parallelize both the encoding and decoding operations used respectively in data compression and decompression. The compression performance of the proposed implementation for both order 0 and order 1 models have been evaluated and compared with existing sequential implementations in terms of compression ratios as well as the execution time using the Canterbury corpus benchmark set of files. The proposed scheme also facilitates hardware realisation of the respective modules and hence is suitable for integration into embedded microprocessor systems, an important area where lossless data compression is applied.
本文提出了一种用于无损数据压缩的多字母算术编码算法的并行流水线实现方案。使用这种方案,可以并行化分别用于数据压缩和解压缩的编码和解码操作。已经使用Canterbury语料库基准文件集,就压缩比和执行时间方面,评估了所提出的0阶和1阶模型实现的压缩性能,并与现有的顺序实现进行了比较。所提出的方案还促进了相应模块的硬件实现,因此适合集成到嵌入式微处理器系统中,这是应用无损数据压缩的重要领域。
{"title":"A parallel scheme for implementing multialphabet arithmetic coding in high-speed programmable hardware","authors":"S. Mahapatra, Kuldeep Singh","doi":"10.1109/ITCC.2005.24","DOIUrl":"https://doi.org/10.1109/ITCC.2005.24","url":null,"abstract":"In this paper, a scheme is proposed for parallel-pipelined implementation of the multialphabet arithmetic-coding algorithm used in lossless data compression. Using this scheme, it is possible to parallelize both the encoding and decoding operations used respectively in data compression and decompression. The compression performance of the proposed implementation for both order 0 and order 1 models have been evaluated and compared with existing sequential implementations in terms of compression ratios as well as the execution time using the Canterbury corpus benchmark set of files. The proposed scheme also facilitates hardware realisation of the respective modules and hence is suitable for integration into embedded microprocessor systems, an important area where lossless data compression is applied.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122946150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic learning of automata from the call stack log for anomaly detection 从调用堆栈日志中动态学习自动机进行异常检测
Z. Liu, S. Bridges
Anomaly detection based on monitoring of sequences of system calls has proved to be an effective approach for detection of previously unknown attacks on programs. This paper describes a new model for profiling normal program behavior that can be used to detect intrusions that change application execution flow. The model (hybrid push down automaton, HPDA) incorporates call stack information and can be learned by dynamic analysis of training data captured from the call stack log. The learning algorithm uses call stack information maintained by the program to build a finite state automaton. When compared to other approaches including VtPath which also uses call stack information, the HPDA model produces a more compact and general representation of control flow, handles recursion naturally, can be learned with less training data, and has a lower false positive rate when used for anomaly detection. In addition, dynamic learning can also be used to supplement a model acquired from static analysis.
基于监视系统调用序列的异常检测已被证明是检测先前未知的程序攻击的有效方法。本文描述了一个分析正常程序行为的新模型,该模型可用于检测改变应用程序执行流的入侵。该模型(混合下推自动机,HPDA)包含调用堆栈信息,可以通过动态分析从调用堆栈日志中捕获的训练数据来学习。学习算法利用程序维护的调用栈信息构建有限状态自动机。与其他方法(包括同样使用调用堆栈信息的VtPath)相比,HPDA模型产生了更紧凑和通用的控制流表示,自然地处理递归,可以用更少的训练数据学习,并且在用于异常检测时具有更低的误报率。此外,动态学习也可以用来补充静态分析获得的模型。
{"title":"Dynamic learning of automata from the call stack log for anomaly detection","authors":"Z. Liu, S. Bridges","doi":"10.1109/ITCC.2005.136","DOIUrl":"https://doi.org/10.1109/ITCC.2005.136","url":null,"abstract":"Anomaly detection based on monitoring of sequences of system calls has proved to be an effective approach for detection of previously unknown attacks on programs. This paper describes a new model for profiling normal program behavior that can be used to detect intrusions that change application execution flow. The model (hybrid push down automaton, HPDA) incorporates call stack information and can be learned by dynamic analysis of training data captured from the call stack log. The learning algorithm uses call stack information maintained by the program to build a finite state automaton. When compared to other approaches including VtPath which also uses call stack information, the HPDA model produces a more compact and general representation of control flow, handles recursion naturally, can be learned with less training data, and has a lower false positive rate when used for anomaly detection. In addition, dynamic learning can also be used to supplement a model acquired from static analysis.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design theoretic approach to replicated declustering 复制聚类的设计理论方法
A. Tosun
Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Most of the research on declustering is targeted at spatial range queries and investigates schemes with low additive error. Recently, declustering using replication is proposed to reduce the additive overhead. Replication significantly reduces retrieval cost of arbitrary queries. In this paper, we propose a disk allocation and retrieval mechanism for arbitrary queries based on design theory. Using proposed c-copy replicated declustering scheme, (c - 1)k/sup 2/ + ck buckets can be retrieved using at most k disk accesses. Retrieval algorithm is very efficient and is asymptotically optimal with /spl Theta/(|Q|) complexity for a query Q. In addition to the deterministic worst-case bound and efficient retrieval, proposed algorithm handles nonuniform data, high dimensions, supports incremental declustering and has good fault-tolerance property.
集群技术通过在多个设备之间分布数据,从而通过并行I/O减少查询响应时间。大多数关于聚类的研究都是针对空间距离查询,并研究具有低加性误差的方案。最近,为了减少附加开销,提出了使用复制进行集群分离。复制显著降低了任意查询的检索成本。本文提出了一种基于设计理论的任意查询磁盘分配和检索机制。使用所提出的c-copy复制集群方案,(c - 1)k/sup 2/ + ck桶可以使用最多k次磁盘访问来检索。检索算法效率高,对于查询Q具有/spl Theta/(|Q|)复杂度的渐近最优,除具有确定性的最坏情况界和高效检索外,该算法还能处理非均匀数据、高维数据、支持增量聚类和良好的容错性能。
{"title":"Design theoretic approach to replicated declustering","authors":"A. Tosun","doi":"10.1109/ITCC.2005.124","DOIUrl":"https://doi.org/10.1109/ITCC.2005.124","url":null,"abstract":"Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Most of the research on declustering is targeted at spatial range queries and investigates schemes with low additive error. Recently, declustering using replication is proposed to reduce the additive overhead. Replication significantly reduces retrieval cost of arbitrary queries. In this paper, we propose a disk allocation and retrieval mechanism for arbitrary queries based on design theory. Using proposed c-copy replicated declustering scheme, (c - 1)k/sup 2/ + ck buckets can be retrieved using at most k disk accesses. Retrieval algorithm is very efficient and is asymptotically optimal with /spl Theta/(|Q|) complexity for a query Q. In addition to the deterministic worst-case bound and efficient retrieval, proposed algorithm handles nonuniform data, high dimensions, supports incremental declustering and has good fault-tolerance property.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Comparison of Web services technologies from a developer's perspective 从开发人员的角度比较Web服务技术
S. Ahuja, R. Clark
Two main technologies that stand out for the implementation of enterprise applications and Web services are Sun Microsystems' Java 2 Enterprise Edition (J2EE) and Microsoft's .NET framework. These two are competing to become the platform of choice for enterprise application and Web services developers. Each platform provides specific development tools and APIs to assist developers. The purpose of this research is to provide an unbiased comparison of the two platforms based on their features and services offered from the viewpoint of developers in the context of building an enterprise or Web application from design right through to deployment.
实现企业应用程序和Web服务的两种主要技术是Sun Microsystems的Java 2 enterprise Edition (J2EE)和Microsoft的。net框架。这两个平台正在竞争成为企业应用程序和Web服务开发人员的首选平台。每个平台都提供特定的开发工具和api来帮助开发人员。本研究的目的是从构建企业或Web应用程序从设计到部署的上下文中,从开发人员的角度出发,根据它们的特性和提供的服务,对这两个平台进行公正的比较。
{"title":"Comparison of Web services technologies from a developer's perspective","authors":"S. Ahuja, R. Clark","doi":"10.1109/ITCC.2005.106","DOIUrl":"https://doi.org/10.1109/ITCC.2005.106","url":null,"abstract":"Two main technologies that stand out for the implementation of enterprise applications and Web services are Sun Microsystems' Java 2 Enterprise Edition (J2EE) and Microsoft's .NET framework. These two are competing to become the platform of choice for enterprise application and Web services developers. Each platform provides specific development tools and APIs to assist developers. The purpose of this research is to provide an unbiased comparison of the two platforms based on their features and services offered from the viewpoint of developers in the context of building an enterprise or Web application from design right through to deployment.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121948295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1