首页 > 最新文献

6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)最新文献

英文 中文
A recommender system based on the collaborative behavior of bird flocks 基于鸟群协同行为的推荐系统
Esin Saka, O. Nasraoui
This paper proposes a swarm intelligence based recommender system (FlockRecom) based on the collaborative behavior of bird flocks for generating Top-N recommendations. The flock-based recommender algorithm (FlockRecom) iteratively adjusts the position and speed of dynamic flocks of agents on a visualization panel. By using the neighboring agents on the visualization panel, top-n recommendations are generated. The performance of FlockRecom is evaluated using the Jester Dataset-2 and is compared with a traditional collaborative filtering based recommender system. Experiments on real data illustrate the workings of the recommender system and its advantages over its CF baseline.
本文提出了一种基于群智能的推荐系统(FlockRecom),该系统基于鸟群的协同行为生成Top-N推荐。基于群体的推荐算法(FlockRecom)迭代地调整可视化面板上动态群体的位置和速度。通过使用可视化面板上的相邻代理,生成top-n的建议。使用Jester Dataset-2对FlockRecom的性能进行了评估,并与传统的基于协同过滤的推荐系统进行了比较。在实际数据上的实验说明了推荐系统的工作原理及其相对于CF基线的优势。
{"title":"A recommender system based on the collaborative behavior of bird flocks","authors":"Esin Saka, O. Nasraoui","doi":"10.4108/ICST.COLLABORATECOM.2010.11","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.11","url":null,"abstract":"This paper proposes a swarm intelligence based recommender system (FlockRecom) based on the collaborative behavior of bird flocks for generating Top-N recommendations. The flock-based recommender algorithm (FlockRecom) iteratively adjusts the position and speed of dynamic flocks of agents on a visualization panel. By using the neighboring agents on the visualization panel, top-n recommendations are generated. The performance of FlockRecom is evaluated using the Jester Dataset-2 and is compared with a traditional collaborative filtering based recommender system. Experiments on real data illustrate the workings of the recommender system and its advantages over its CF baseline.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121196237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Patient-Centric Privacy: Envisioning collaboration between payers, providers & patients with the patient at the core 以患者为中心的隐私:设想以患者为核心的付款人、提供者和患者之间的合作
Tyrone Grandison
Protection of personal healthcare information (PHI) has been as a significant hindrance to the acceptance, adoption and continued use of healthcare information technology (HIT). As nations and corporations encourage innovation in the healthcare sector for better outcomes for all its stakeholders, they are proceeding under a latent assumption - the equation of data stewardship with data ownership. This notion relegates the patient to the role of information provider and empowers infrastructure owners with data ownership rights. In this paper, we introduce Patient-Centric Privacy, which refers to 1) the recognition that patients are a fundamental and integral part of the disclosure, access and use processes, and 2) to the ability of the patient to control the release of their healthcare information.
个人医疗保健信息(PHI)的保护一直是接受、采用和继续使用医疗保健信息技术(HIT)的一个重大障碍。随着国家和企业鼓励医疗保健行业的创新,以使所有利益相关者获得更好的结果,他们正在一个潜在的假设下进行——数据管理与数据所有权的等式。这个概念将患者降级为信息提供者的角色,并赋予基础设施所有者数据所有权。在本文中,我们介绍了以患者为中心的隐私,它指的是1)认识到患者是披露、访问和使用过程的基本和不可分割的一部分,以及2)患者控制其医疗保健信息发布的能力。
{"title":"Patient-Centric Privacy: Envisioning collaboration between payers, providers & patients with the patient at the core","authors":"Tyrone Grandison","doi":"10.4108/ICST.COLLABORATECOM.2010.24","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.24","url":null,"abstract":"Protection of personal healthcare information (PHI) has been as a significant hindrance to the acceptance, adoption and continued use of healthcare information technology (HIT). As nations and corporations encourage innovation in the healthcare sector for better outcomes for all its stakeholders, they are proceeding under a latent assumption - the equation of data stewardship with data ownership. This notion relegates the patient to the role of information provider and empowers infrastructure owners with data ownership rights. In this paper, we introduce Patient-Centric Privacy, which refers to 1) the recognition that patients are a fundamental and integral part of the disclosure, access and use processes, and 2) to the ability of the patient to control the release of their healthcare information.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131734243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facilitating understanding of team-based adaptation policies 促进对基于团队的适应策略的理解
S. Hussain, Dirk Veiel, J. Haake, S. Lukosch
Knowledge work in modern organizations is increasingly performed collaboratively by distributed teams. Such collaboration involves dynamically changing situations. Making the collaboration environment fit the needs of these situations is supported by system-initiated adaptation based on the user and team context. Adaptation in the collaboration environment may confuse the users, because they cannot remember all adaptation policies. In this paper we propose an approach to present context enriched explanations to help them understand the adaptation behavior. Also, we describe a social network analysis strategy to identify socially related and current situation relevant communication partners. Integrated on demand communication is facilitated among these partners for discussion and understanding the adaptation policies.
现代组织中的知识工作越来越多地由分布式团队协作执行。这种协作涉及动态变化的情况。基于用户和团队上下文的系统启动的适应支持协作环境适合这些情况的需要。协作环境中的适应可能会让用户感到困惑,因为他们无法记住所有的适应策略。在本文中,我们提出了一种方法来提供上下文丰富的解释,以帮助他们理解适应行为。此外,我们描述了一个社会网络分析策略,以确定社会相关和当前形势相关的沟通伙伴。促进了这些合作伙伴之间的按需综合沟通,以便讨论和理解适应政策。
{"title":"Facilitating understanding of team-based adaptation policies","authors":"S. Hussain, Dirk Veiel, J. Haake, S. Lukosch","doi":"10.4108/ICST.COLLABORATECOM.2010.60","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.60","url":null,"abstract":"Knowledge work in modern organizations is increasingly performed collaboratively by distributed teams. Such collaboration involves dynamically changing situations. Making the collaboration environment fit the needs of these situations is supported by system-initiated adaptation based on the user and team context. Adaptation in the collaboration environment may confuse the users, because they cannot remember all adaptation policies. In this paper we propose an approach to present context enriched explanations to help them understand the adaptation behavior. Also, we describe a social network analysis strategy to identify socially related and current situation relevant communication partners. Integrated on demand communication is facilitated among these partners for discussion and understanding the adaptation policies.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134623591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tool support for collaborative software development based on dependency analysis 基于依赖分析的协作软件开发的工具支持
J. Costa, Rafael Martins Feitosa, C. D. Souza
This paper presents RaisAware, a collaborative software development tool aimed at supporting the relationship between software architecture and coordination of software development activities. Our design is based on both dependency analysis of software development artifacts and software developers' activities. We describe the motivations behind this work, detail the design and implementation of RaisAware, and present an evaluation of the tool using open-source project data.
本文介绍了RaisAware,一个协作式软件开发工具,旨在支持软件架构和软件开发活动的协调之间的关系。我们的设计是基于对软件开发工件和软件开发人员活动的依赖性分析。我们描述了这项工作背后的动机,详细介绍了RaisAware的设计和实现,并使用开源项目数据对该工具进行了评估。
{"title":"Tool support for collaborative software development based on dependency analysis","authors":"J. Costa, Rafael Martins Feitosa, C. D. Souza","doi":"10.4108/ICST.COLLABORATECOM.2010.26","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.26","url":null,"abstract":"This paper presents RaisAware, a collaborative software development tool aimed at supporting the relationship between software architecture and coordination of software development activities. Our design is based on both dependency analysis of software development artifacts and software developers' activities. We describe the motivations behind this work, detail the design and implementation of RaisAware, and present an evaluation of the tool using open-source project data.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preserving structural properties in anonymization of social networks 在社交网络匿名化中保持结构属性
A. Masoumzadeh, J. Joshi
A social network is a collection of social entities and the relations among them. Collection and sharing of such network data for analysis raise significant privacy concerns for the involved individuals, especially when human users are involved. To address such privacy concerns, several techniques, such as k-anonymity based approaches, have been proposed in the literature. However, such approaches introduce a large amount of distortion to the original social network graphs, thus raising serious questions about their utility for useful social network analysis. Consequently, these techniques may never be applied in practice. In this paper, we emphasize the use of network structural semantics in the social network analysis theory to address this problem. We propose an approach for enhancing anonymization techniques that preserves the structural semantics of the original social network by using the notion of roles and positions. We present experimental results that demonstrate that our approach can significantly help in preserving graph and social network theoretic properties of the original social networks, and hence improve utility of the anonymized data.
社会网络是社会实体及其相互关系的集合。收集和共享用于分析的此类网络数据会引起有关个人的重大隐私问题,特别是当涉及人类用户时。为了解决此类隐私问题,文献中提出了几种技术,例如基于k-匿名的方法。然而,这种方法对原始的社会网络图引入了大量的扭曲,从而对它们在有用的社会网络分析中的效用提出了严重的问题。因此,这些技术可能永远不会在实践中应用。在本文中,我们强调在社会网络分析理论中使用网络结构语义来解决这个问题。我们提出了一种增强匿名化技术的方法,该方法通过使用角色和位置的概念来保留原始社交网络的结构语义。我们提出的实验结果表明,我们的方法可以显着帮助保留原始社交网络的图和社会网络理论属性,从而提高匿名数据的效用。
{"title":"Preserving structural properties in anonymization of social networks","authors":"A. Masoumzadeh, J. Joshi","doi":"10.4108/ICST.COLLABORATECOM.2010.7","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.7","url":null,"abstract":"A social network is a collection of social entities and the relations among them. Collection and sharing of such network data for analysis raise significant privacy concerns for the involved individuals, especially when human users are involved. To address such privacy concerns, several techniques, such as k-anonymity based approaches, have been proposed in the literature. However, such approaches introduce a large amount of distortion to the original social network graphs, thus raising serious questions about their utility for useful social network analysis. Consequently, these techniques may never be applied in practice. In this paper, we emphasize the use of network structural semantics in the social network analysis theory to address this problem. We propose an approach for enhancing anonymization techniques that preserves the structural semantics of the original social network by using the notion of roles and positions. We present experimental results that demonstrate that our approach can significantly help in preserving graph and social network theoretic properties of the original social networks, and hence improve utility of the anonymized data.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128100145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distributed context-aware Affinity Propagation clustering in Wireless Sensor Networks 无线传感器网络中的分布式上下文感知亲和传播聚类
M. ElGammal, M. Eltoweissy
We foresee the need for dynamically clustering nodes in Wireless Sensor Networks (WSNs) according to a multitude of disparate co-existing contexts. To this end, we propose a distributed, low-overhead context-aware clustering protocol for WSNs. We employ Affinity Propagation (AP) for clustering nodes based on multiple criteria including location, residual energy, and contextual data sensed from the environment. We propose a novel approach for context representation based on potential fields. We discuss the integration of our context representation model with AP and demonstrate using simulation the effectiveness and proficiency of the proposed protocol in satisfying its intended objectives.
我们预见到无线传感器网络(WSNs)中需要根据多种不同的共存环境动态聚类节点。为此,我们提出了一种用于wsn的分布式、低开销的上下文感知聚类协议。我们基于多个标准对节点进行聚类,包括位置、剩余能量和从环境中感知的上下文数据。我们提出了一种基于势场的上下文表示方法。我们讨论了上下文表示模型与AP的集成,并使用仿真演示了所提议的协议在满足其预期目标方面的有效性和熟练程度。
{"title":"Distributed context-aware Affinity Propagation clustering in Wireless Sensor Networks","authors":"M. ElGammal, M. Eltoweissy","doi":"10.4108/ICST.COLLABORATECOM.2010.54","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.54","url":null,"abstract":"We foresee the need for dynamically clustering nodes in Wireless Sensor Networks (WSNs) according to a multitude of disparate co-existing contexts. To this end, we propose a distributed, low-overhead context-aware clustering protocol for WSNs. We employ Affinity Propagation (AP) for clustering nodes based on multiple criteria including location, residual energy, and contextual data sensed from the environment. We propose a novel approach for context representation based on potential fields. We discuss the integration of our context representation model with AP and demonstrate using simulation the effectiveness and proficiency of the proposed protocol in satisfying its intended objectives.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129615196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using LOTOS for rigorous specifications of workflow patterns 使用LOTOS严格规范工作流模式
P. L. Takecian, J. E. Ferreira, Simon Malkowski, C. Pu
Collaborative applications require understanding of the theoretical foundations. In case of workflow systems, one possibility to achieve this is an accurate description of workflow functionalities. Despite its growing popularity and success, it has not yet been evaluated whether Language of Temporal Ordering Specification (LOTOS) is actually suitable for representing comprehensive workflow functionality in real-world workflow systems describing the behavioral perspective of control-flow. Our primary contribution is the complete mapping of a collection of workflow patterns to LOTOS notation. We further discuss suitability and expressiveness of LOTOS in the context of workflow patterns. This study can be used for pattern-based workflow execution, reasoning, and simulation as well as for future research on theoretical aspects of workflows for collaborative applications.
协作应用需要理解理论基础。在工作流系统的情况下,实现这一点的一种可能性是对工作流功能的准确描述。尽管LOTOS越来越受欢迎和成功,但它是否真的适合在真实的工作流系统中描述控制流的行为视角来表示全面的工作流功能,还没有得到评估。我们的主要贡献是工作流模式集合到LOTOS表示法的完整映射。我们进一步讨论了LOTOS在工作流模式上下文中的适用性和表达性。本研究可用于基于模式的工作流执行、推理和模拟,也可用于协作应用中工作流理论方面的未来研究。
{"title":"Using LOTOS for rigorous specifications of workflow patterns","authors":"P. L. Takecian, J. E. Ferreira, Simon Malkowski, C. Pu","doi":"10.4108/ICST.COLLABORATECOM.2010.57","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.57","url":null,"abstract":"Collaborative applications require understanding of the theoretical foundations. In case of workflow systems, one possibility to achieve this is an accurate description of workflow functionalities. Despite its growing popularity and success, it has not yet been evaluated whether Language of Temporal Ordering Specification (LOTOS) is actually suitable for representing comprehensive workflow functionality in real-world workflow systems describing the behavioral perspective of control-flow. Our primary contribution is the complete mapping of a collection of workflow patterns to LOTOS notation. We further discuss suitability and expressiveness of LOTOS in the context of workflow patterns. This study can be used for pattern-based workflow execution, reasoning, and simulation as well as for future research on theoretical aspects of workflows for collaborative applications.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mimir: Term-distributed indexing and search for secret documents 密密尔:术语分布式索引和秘密文件搜索
Guoqiang Gao, Ruixuan Li, X. Gu, Kunmei Wen, Zhengding Lu, Kun Yan
In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, (1) without leaking information about the remaining documents, (2) without imposing large load on the receptionist, and (3) with a balanced load on the index servers. To address this problem, we propose Mimir, a distributed cipher retrieval system for sensitive documents. Mimir constructs the distributed indexes based on load balanced term distribution for better search efficiency and load balanced query. Mimir utilizes encryption with random key, partial key update, and access control based on role and user to protect sensitive data and improve query efficiency. Mimir uses dynamic pipelined search strategy to balance the load of the management server and reduce the search delay. Our experiments show that Mimir can effectively protect secret data and answer queries nearly as fast as an ordinary inverted index.
为了访问在政府、军队和企业内部网上共享的敏感文件,用户依赖于一个索引设施,在那里他们可以快速找到他们被允许访问的相关文件,(1)不会泄露有关其余文件的信息,(2)不会给接待员带来很大的负担,(3)索引服务器上的负载均衡。为了解决这个问题,我们提出了一个分布式敏感文件密码检索系统Mimir。Mimir基于负载均衡项分布构造分布式索引,以提高搜索效率和负载均衡查询。Mimir利用随机密钥加密、部分密钥更新和基于角色和用户的访问控制来保护敏感数据,提高查询效率。Mimir采用动态流水线搜索策略来平衡管理服务器的负载,减少搜索延迟。我们的实验表明,Mimir可以有效地保护秘密数据,并且几乎与普通倒排索引一样快地响应查询。
{"title":"Mimir: Term-distributed indexing and search for secret documents","authors":"Guoqiang Gao, Ruixuan Li, X. Gu, Kunmei Wen, Zhengding Lu, Kun Yan","doi":"10.4108/ICST.COLLABORATECOM.2010.25","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.25","url":null,"abstract":"In order to access sensitive documents shared over government, army and enterprise intranets, users rely on an indexing facility where they can quickly locate relevant documents they are allowed to access, (1) without leaking information about the remaining documents, (2) without imposing large load on the receptionist, and (3) with a balanced load on the index servers. To address this problem, we propose Mimir, a distributed cipher retrieval system for sensitive documents. Mimir constructs the distributed indexes based on load balanced term distribution for better search efficiency and load balanced query. Mimir utilizes encryption with random key, partial key update, and access control based on role and user to protect sensitive data and improve query efficiency. Mimir uses dynamic pipelined search strategy to balance the load of the management server and reduce the search delay. Our experiments show that Mimir can effectively protect secret data and answer queries nearly as fast as an ordinary inverted index.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An overlay multicast scheme for Distributed Interactive Applications 分布式交互应用的覆盖组播方案
Mikyung Kang, Yun-Seung Nam, Ji-Seung Nam
Recently broadcasts on the Internet, Internet movie theaters and the growing stream of service-oriented Internet services have increased. The bottleneck created to enhance network performance to meet the needs of service users has also increased, while accommodating the needs of the system for the performance of multimedia server capacity cannot meet the server specifications. To provide Distributed Interactive Applications (DIAs) such as IPTV, Teleconferencing and NetGames service in a real environment it is required to have a large amount of system resource and network bandwidth. Our analysis results show that proposed scheme can reduce the network overhead for the multicast routing tree construction and uses minimal bandwidth for data delivery.
近年来,互联网上的广播、互联网影院和互联网服务型服务日益增多。为提高网络性能以满足业务用户的需求而造成的瓶颈也有所增加,而容纳系统对多媒体性能需求的服务器容量却不能满足服务器规格。要在真实环境中提供IPTV、Teleconferencing、NetGames等分布式交互应用(DIAs)业务,需要大量的系统资源和网络带宽。分析结果表明,该方案可以减少组播路由树构建的网络开销,并使用最小的带宽进行数据传输。
{"title":"An overlay multicast scheme for Distributed Interactive Applications","authors":"Mikyung Kang, Yun-Seung Nam, Ji-Seung Nam","doi":"10.4108/ICST.COLLABORATECOM.2010.36","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.36","url":null,"abstract":"Recently broadcasts on the Internet, Internet movie theaters and the growing stream of service-oriented Internet services have increased. The bottleneck created to enhance network performance to meet the needs of service users has also increased, while accommodating the needs of the system for the performance of multimedia server capacity cannot meet the server specifications. To provide Distributed Interactive Applications (DIAs) such as IPTV, Teleconferencing and NetGames service in a real environment it is required to have a large amount of system resource and network bandwidth. Our analysis results show that proposed scheme can reduce the network overhead for the multicast routing tree construction and uses minimal bandwidth for data delivery.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130100970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-driven simulation for cross-domain policy enforcement 用于跨域策略实施的模型驱动仿真
Zhengping Wu, Lifeng Wang
This paper proposes an enforcement architecture and develop a simulation framework for cross-domain policy enforcement. The entire simulation environment is used to solve the problem of enforcing policies across domain boundaries when permanent or temporary collaborations have to span over multiple domains. In reality, different systems from different organizations or domains have very different high-level policy representations and various low-level enforcement mechanisms, such as high-level security policies, privacy configurations, and low-level system calls (services). To make sure the compatibility and enforceability of one policy set in another domain, a simulation environment is needed before actual policy deployment and code development. The framework developed in this simulation environment can also be used to generate policy enforcement code directly for permanent integrations or temporary interactions. This framework provides various functions to enforce policies automatically or semi-automatically across domains as by-products. A case study in healthcare information systems confirms the advantages of these new functions and facilities in this simulation environment.
提出了一种跨域策略实施的实施体系结构,并开发了一个跨域策略实施的仿真框架。当永久或临时协作必须跨越多个域时,整个模拟环境用于解决跨域边界执行策略的问题。实际上,来自不同组织或领域的不同系统具有非常不同的高级策略表示和各种低级执行机制,例如高级安全策略、隐私配置和低级系统调用(服务)。为了确保一个策略集在另一个域中的兼容性和可执行性,在实际的策略部署和代码开发之前需要一个模拟环境。在此模拟环境中开发的框架还可以用于直接为永久集成或临时交互生成策略实施代码。这个框架提供了各种功能,可以作为副产品自动或半自动地跨域执行策略。医疗保健信息系统中的一个案例研究证实了这些新功能和设施在模拟环境中的优势。
{"title":"Model-driven simulation for cross-domain policy enforcement","authors":"Zhengping Wu, Lifeng Wang","doi":"10.4108/ICST.TRUSTCOL.2010.5","DOIUrl":"https://doi.org/10.4108/ICST.TRUSTCOL.2010.5","url":null,"abstract":"This paper proposes an enforcement architecture and develop a simulation framework for cross-domain policy enforcement. The entire simulation environment is used to solve the problem of enforcing policies across domain boundaries when permanent or temporary collaborations have to span over multiple domains. In reality, different systems from different organizations or domains have very different high-level policy representations and various low-level enforcement mechanisms, such as high-level security policies, privacy configurations, and low-level system calls (services). To make sure the compatibility and enforceability of one policy set in another domain, a simulation environment is needed before actual policy deployment and code development. The framework developed in this simulation environment can also be used to generate policy enforcement code directly for permanent integrations or temporary interactions. This framework provides various functions to enforce policies automatically or semi-automatically across domains as by-products. A case study in healthcare information systems confirms the advantages of these new functions and facilities in this simulation environment.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1