Academy Publisher

Displaying 1-40 of 2425 results

  • White Papers // Jul 2014

    Evaluation of DGEMM Implementation on Intel Xeon Phi Coprocessor

    In this paper the authors will present a detailed study of implementing Double-precision GEneral Matrix Multiply (DGEMM) utilizing the Intel Xeon Phi Coprocessor. They discuss a DGEMM algorithm implementation running \"Natively\" on the coprocessor, minimizing communication with the host CPU. They will run DGEMM across a range of matrix sizes...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset

    In this paper the authors concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, the authors propose a new version of the multi-class Weighted Support Vector Machines (WSVM) method to perform automatic recognition...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Image Segmentation with Fuzzy Clustering Based on Generalized Entropy

    Aimed at fuzzy clustering based on the generalized entropy, an image segmentation algorithm by joining space information of image is presented in this paper. For solving the optimization problem with generalized entropy's fuzzy clustering, both hopfield neural network and multi-synapse neural network are used in order to obtain cluster centers...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Novel Resource Pricing Mechanism Based on Multi-Player Gaming Model in Cloud Environments

    Recently, cloud computing has become a promising network platform for non-trivial applications. The key feature of cloud computing is on-demand resource provision by utility paradigm. Therefore, resource pricing mechanism plays an important role for realizing on-demand resource provision. Unfortunately, existing resource pricing mechanism will result in many negative effects on...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Research on Cloud-Based Mass Log Data Management Mechanism

    In this paper, the authors study the file management mechanism of large-scale cloud-based log data. With the rise of big data, there are more and more the hadoop-based applications. Log analysis is an important part of network security management, but the existing network log analysis system can't deal with huge...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Dynamic Load-balancing Scheme for XPath Queries Parallelization in Shared Memory Multi-core Systems

    Due to the rapid popularity of multi-core processors systems, the parallelization of XPath queries in shared memory multi-core systems has been studied gradually. Existing paper developed some parallelization methods based on cost estimation and static mapping, which could be seen as a logical optimization of parallel query plan. However, static...

    Provided By Academy Publisher

  • White Papers // May 2014

    Implementation of Multi-channel FIFO in One BlockRAM with Parallel Access to One Port

    Because of flexibility of application and high cost performance, the low-and-middle-end FPGA has obtained an extensive market. As a fundamental memory structure, the FIFO memory is widely used in FPGA based paper in various manners. But limited by the resources in chip and imperfection of development tools, the problem that...

    Provided By Academy Publisher

  • White Papers // May 2014

    Mining Frequent Closed Patterns using Sample-growth in Resource Effectiveness Data

    As the occurrence of failure of electronic resources is sudden, real-time record analysis on the effectiveness of all resources in the system can discover abnormal resources earlier and start using backup resources or restructure resources in time, thus managing abnormal situations and finally realizing health management of the system. This...

    Provided By Academy Publisher

  • White Papers // May 2014

    An Architecture Independent Packing Method for LUT-based Commercial FPGA

    In this paper the authors propose an efficient architecture independent packing method for commercial FPGA. All specific logics of commercial FPGA such as carry chain arithmetic, x-LUT, are pre-designed into reference circuits according to its architecture. Due to complex architecture of contemporary FPGA, to enumerate all reference circuits in a...

    Provided By Academy Publisher

  • White Papers // May 2014

    GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Intruder Detection

    The network anomaly detection technology based on Support Vector Machine (SVM) can efficiently detect unknown attacks or variants of known attacks; however, it cannot be used for detection of large-scale intrusion scenarios due to the demand of computational time. The Graphics Processing Unit (GPU) has the characteristics of multi-threads and...

    Provided By Academy Publisher

  • White Papers // May 2014

    Optimizing Data Distribution for Loops on Embedded Multicore with Scratch-Pad Memory

    Software-controlled Scratch-Pad Memory (SPM) is a desirable candidate for on-chip memory units in embedded multi-core systems due to its advantages of small die area and low power consumption. In particular, data placement on SPMs can be explicitly controlled by software. Therefore, the technique of data distribution on SPMs for multi-core...

    Provided By Academy Publisher

  • White Papers // May 2014

    Proposed Design and Implementation for RESTful Web Server

    In this paper, the authors propose a framework to design and implement novel RESTful web server architecture. The proposed RESTful web server architecture is a lightweight server that will be less taxing on system resources and will therefore handle a greater volume of requests. Furthermore, in contrast to the usual...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Greedy-Based Job Scheduling Algorithm in Cloud Computing

    Now-a-days/cloud computing has become a popular platform for scientific applications. Cloud computing intends to share a large number of resources such as equipments for storage and computation, and information and knowledge for scientific researches. Job scheduling algorithm is one of the most challenging theoretical issues in the cloud computing area....

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform

    Virtualization is a key enabling technology in cloud computing. Multiple tenants can share computing resource of cloud provider on demand. While sharing can reduce the expenses of computing, it brings security vulnerability as well since the isolation between different VMs could be violated through side-channel attacks. Recent researches point out...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Provable Dynamic Data Possession by Datalog Rules

    In recent years, the concept of data outsourcing has become quite popular. With the appearance of cloud computing, there is a new paradigm: cloud storage. Cloud storage means that the data owner moves its data to a cloud storage server that is supposed to faithfully store the data and make...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce

    With the advent of the era of \"Big data\", the application of the large-scale data is becoming popular. Efficiently using and analyzing the data has become an interesting research topic. Traditional knowledge reduction algorithms read small data samples once into a computer main memory for reduction, but it is not...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    QoS Constraint Based Workflow Scheduling for Cloud Computing Services

    QoS constraint based workflow scheduling described by Directed Acyclic Graph (DAG) has been proved to be a NP-hard problem in cloud computing services, especially for cost minimization under deadline constraint. Due to Deadline Bottom Level (DBL) hasn't considered the concurrence during the real executing process that cause much more shatter...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Resource Scheduling Optimization Algorithm of Energy Consumption for Cloud Computing Based on Task Tolerance

    In order to solve that the energy was seriously wasted in cloud computing, an algorithm of Energy Consumption optimization for Cloud computing based on the task Tolerance (ECCT) was proposed. The concept of the task tolerance was put forward in the algorithm. The resource utilization of cloud computing node was...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Workflow Task Scheduling Algorithm Based on the GA Model in the Cloud Computing Environment

    Taking advantage of the resource sharing, the cloud computing service mode save the investment cost efficiently. In a cloud computing environment, the workflow task scheduling algorithm is based on the task processing time and the execution cost factors and start point of the user demand for quality of service, in...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Effective Clustering Algorithm for Transaction Databases Based on K-Mean

    Clustering is an important technique in machine learning, which has been successfully applied in many applications such as text and webpage classifications, but less in transaction database classification. A large organization usually has many branches and accumulates a huge amount of data in their branch databases called multi-databases. At present,...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Model-based Bayesian Reinforcement Learning in Factored Markov Decision Process

    Learning the enormous number of parameters is a challenging problem in model-based Bayesian reinforcement learning. In order to solve the problem, the authors propose a model-based Factored Bayesian Reinforcement Learning (F-BRL) approach. F-BRL exploits a factored representation to describe states to reduce the number of parameters. Representing the conditional independence...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    A Formal Transformation Approach for Embedded Software Modeling

    Formal specification can enhance the reliability of the embedded system and verify the system properties at the design stage. This paper presents a formal transformation approach for MARTE (Modeling and Analysis of Real Time and Embedded systems) model based on MDA (Model Driven Architecture), and defines the transformation rules of...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling

    As for massive multidimensional data are being generated in a wide range of emerging applications, this paper introduces two new methods of dimension reduction to conduct small-sample size and high-dimensional data processing and modeling. Through combining the Support Vector Machine (SVM) and Recursive Feature Elimination (RFE), SVM-RFE algorithm is proposed...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Towards Realization of Domain-Specific Scientific Data Cloud for Material Data Sharing

    Scientific data sharing has been an important area of research for several years. However, due to the sharp increase in scientific data, the existing scientific data sharing systems are becoming complicated and cannot meet the demands of current scientific domain communication. In this paper, the realization of material scientific data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Parameterizable NoC Router for FPGAs

    The Network-on-Chip (NoC) approach for designing (System-on-Chip) SoCs is currently used for overcoming the scalability and efficiency problems of traditional on-chip interconnection schemes, such as shared buses and point-to-point links. NoC design draws on concepts from computer networks to interconnect Intellectual Property (IP) cores in a structured and scalable way,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets

    Software faults could cause serious system errors and failures, leading to huge economic losses. But currently none of inspection and verification technique is able to find and eliminate all software faults. Software testing is an important way to inspect these faults and raise software reliability, but obviously it is a...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration

    At present, the mediator/wrapper integration methods are widely used in ontology based data integration because they solve the data update problems of data warehouse method. The key of this method is building of mapping from the global ontology in mediator to the local ontology in wrapper. This paper analyzes the...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    QoS-aware SaaS Services Selection with Interval Numbers for Group User

    The integration of SaaS service for group user in cloud is challenging, notably because the service's QoS and member's personalization QoS preference in group are uncertain. This is a timely and importance problem with the advent of the SaaS model of service delivery. Therefore, before the SaaS service been utilized,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research and Application of Data Integration in Aircraft Designing Based on SDO

    One of the fundamental problems in complicated system environment is the mechanism of data interaction and sharing between heterogeneous data sources. The known solutions, using middlewares to unify data formats, are not reliable due to the tightly coupled architecture, poor portability and reusability, large update latency, etc. To solve this...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A New Model of Data Protection on Cloud Storage

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method

    Poor information means incomplete and insufficient information, such as unknown probability distributions and trends. In this case, many statistical methods may become ineffective. So a fusion method based on the information poor theory is proposed. The fusion method contains five methods, three concepts, and one rule. The five methods include...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    ChordMR: A P2P-based Job Management Scheme in Cloud

    MapReduce is a programming model and an associated implementation for processing parallel data, which is widely used in cloud computing environments. However, the traditional MapReduce system is based on a centralized master-slave structure. While, along with the increase of the number of MapReduce jobs submitted and system scale, the master...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Improved k-Exclusion Algorithm

    K-exclusion is a generalization of mutual exclusion that allows up to k processes to be in the critical section concurrently. Starvation freedom and First-In-First-Enabled (FIFE) are two desirable progress and fairness properties of k-exclusion algorithms. The authors present the first known bounded-space k-exclusion algorithm that uses only atomic reads and...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone

    In recent years, data analysis and knowledge discovery in uncertain data become more and more important in many applications, such as, sensor network, biomedical measurement, financial market analysis and weather predictions, etc. Clustering for uncertain data is an interesting research topic in data mining. Researchers prefer to define uncertain data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing

    With the development of high performance computing, there are many computing paradigms including Peer-To-Peer (P2P) computing, cluster computing, services computing, grid computing and cloud computing. This paper presents virtual machines resources scheduling algorithm taking into computing capacity of processing elements and consideration their computational complexity. The authors apply the improved...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research of the FP-Growth Algorithm Based on Cloud Environments

    The emergence of cloud computing solves the problems that traditional data mining algorithms encounter when dealing with large data. This paper studies the FP-growth algorithm and proposes a parallel linked list-based FPG algorithm based on MapReduce programming model, named as the PLFPG algorithm. And then it describes the main idea...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    On Data and Virtualization Security Risks and Solutions of Cloud Computing

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A SOM Based Incremental Clustering Algorithm

    Due to fast development of network technique, internet users have to face to massive textual data every day. Because of unsupervised merit of clustering, clustering is a good solution for users to analyze and organize texts into categories. However, most of recent clustering algorithms conduct in static situation. That indicates,...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Research and Application of Data Mining Feature Selection Based on Relief Algorithm

    To choose the best features in data mining issues, the relief feature selection algorithm is proposed to implement the feature selection in this paper. Firstly, the data of Ionosphere from the UCI (University of California - Irvine) database is used to do a simulation experiment; secondly, the proposed method is...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    An ACO-LB Algorithm for Task Scheduling in the Cloud Environment

    In the face of a large number of task requests which are submitted by users, the cloud data centers need not only to finish these massive tasks but also to satisfy the user's service demand. How to allocate virtual machine reasonably and schedule the tasks efficiently becomes a key problem...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Middleware-Based Approach for Mobile Service Delivery

    Service applications in mobile environment with large potential users become more and more popular. However, there are some limitations and obstacles for service delivery in mobile environment because of the particularity of mobile network and limiting ability of mobile terminals. In order to improve the efficiency and performance of service...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    CARISMA - A Service-Oriented, Real-Time Organic Middleware Architecture

    To cope with the ever increasing complexity of today's computing systems, the Concepts of Autonomic and Organic Computing (AC/OC) have been devised. Organic or autonomic systems are characterized by so-called self-X properties such as self-configuration and self-optimization. This approach is particularly interesting in the domain of distributed, embedded, real-time systems....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Improving Pairing Mechanism in Bluetooth Security

    Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One such weakness has been identified in its pairing mechanism,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Learning to Match XML Schemas - A Decision Tree based Approach

    Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Exploiting XML Dom for Restricted Access of Information

    Time Bound Access (TBA) has been a major challenge for online information distribution services. A secure and constrained information transmission over the public network is the key aspect of such services wherein a genuine user who is privileged should not be denied of service under any circumstances. As it is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Source Routing in Mobile Ad Hoc NETworks (MANETs)

    Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad...

    Provided By Academy Publisher

  • White Papers // Feb 2009

    Multi-Model Music Content Description and Retrieval Using IEEE 1599 XML Standard

    The new format IEEE 1599 for music and audio content description defines a standard for the representation of retrieval models within music and music/audio formats that makes use of XML documents as content descriptors. This paper described how music/audio semantics can be actually represented within the Structural Layer of IEEE...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on Fast Implementation of RSA With Java

    This paper introduces the principles of RSA, then based on these principles the implementation of RSA is discussed. After that several classes are analyzed and designed with Object-Oriented methods, and these classes are implemented with Java language. In the third fourth part, the authors give the fast implementation of RSA...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Research on On-Card Bytecode Verifier for Java Cards

    The bytecode verification is a key point of the security chain of the Java Platform. This feature is optional in many embedded devices since the memory requirements of the verification process and the process capability of hardware are too high. This paper proposes a verifier that utilizes the logical flow...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Global Optimization of Multi Radio Mesh Access Point Location in Underground Area

    This paper shows that with a proper placement of Mesh multi radio devices in a confined area, it is possible to reduce the congestion in the WMN (Wireless Mesh Network) by 50 to 60 percent according to the loaded traffic. The best portal deployment is obtained by minimizing the maximum...

    Provided By Academy Publisher

  • White Papers // May 2009

    Peer to Peer Network for Mobile Communication

    This paper focuses on possibilities of implementation of peer to peer architecture of communication over mobile platform. There are many studies going on nowadays about Peer to Peer (P-to-P) and file-sharing. Some studies predict staggering 45% of total internet traffic is P-to-P. Mobile operators need to embrace Peer to Peer...

    Provided By Academy Publisher

  • White Papers // May 2009

    Network Survivability for a Regular WDM Optical Network From Double-Link Failures Using Greedy Algorithm

    Network survivability is an important requirement in high-speed optical networks. The survivability of these networks from the failure of a single component such as a link or a node needs some typical approaches. In this paper, one have considered double-link failures in a hypercube optical network and present three loopback...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Threats and Vulnerabilities in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. Security of such...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Security Research of VPN Technology Based on MPLS

    The VPN technology based on MPLS is the current mainstream VPN technology that uses isolations of routing and address or other information technologies to resist attacking and marking spoofing, in which the security of data transmission are guaranteed to a certain extent. In this paper, Securities of MPLS VPN are...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study

    Mobile Ad hoc Networks (MANETs) as well as Wireless Sensor Networks (WSNs) suffer from various challenges like low bandwidth, overhead and velocity of nodes. This research contribution is the characterization study between MANETs and WSNs environment with respect to various routing protocols. This study investigates the routing protocols corresponding to...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research of Network Mass Storage Mode Based on SAN

    In the face of new needs of the current network storage, the traditional DAS, NAS and advanced SAN network storage technology are analyzed, and the technical differences between the three technologies are compared. The redundant technology and main performance indicator system are analyzed by using system reliability theory, and thus...

    Provided By Academy Publisher

  • White Papers // May 2009

    Operating Systems for Tiny Networked Sensors: A Survey

    Wireless Sensor Networks (WSNs) is an emerging area of research. WSNs face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are some basic problems that need to be...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Survey on Hybrid Mobile Sensor Networks

    Sensor networks consist of small wireless sensor nodes deployed randomly over an area to monitor the environment or detect intrusion. The coverage provided by sensor networks is very crucial to their effectiveness. Many of the important applications of sensor networks demand autonomous mobility for the sensor nodes. Early failure of...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Cryptanalysis of Some RFID Authentication Protocols

    Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.'s LCSS RFID authentication protocol, Song and Mitchell's protocol are identified. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Efficient Method for Identifying Location and Removal of Data Redundancy for RFID Data

    Radio Frequency IDentification (RFID) Technology has gained a significant momentum, in the past few years. This technology plays an essential role in object tracking in supply chain management applications and library management applications. RFID Technology holds the promise to simplify baggage handling, clinical laboratory procedures and other tasks by providing...

    Provided By Academy Publisher

  • White Papers // Apr 2009

    Realization of SCM and CRM by Using RFID-Captured Consumer Behavior Information

    Physical store retailers are facing a tougher situation than ever. In order to tackle this tough situation, they need not only to reduce cost by effectively executing SCM but also to introduce measures to increase profit like CRM. They are effective by themselves, but if they are combined the retailers...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Value Chain Model in Knowledge Management

    Knowledge is a complex and fluid concept to people, so knowledge management focuses on knowledge arrival; also it is considered as strategic activity help organizations to achieve sustainable competitive advantage. Value chain analysis is one of the analysis tools which satisfy continuous competitive advantage on organizations. This paper summarizes the...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Research of Campus Heterogeneous Database Middleware Based on SOA

    Along with the rapid development of campus information technology, many universities precipitate a great deal of information resources, how well make use of existing resources to build a centralized information resource management system is a serious problem. This paper designs a deep integration architecture of campus information based on SOA,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Requirements for Building an e-Commerce Infrastructure

    This paper will present all requirements to build a reliable e-commerce infrastructure in Jordan. Ecommerce is one of the main desired outcomes from a state internet readiness. Despite the fact that the requirements for e-commerce are very similar to those for an e-government or an internet readiness in general, however,...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Study on the Application Layer Security in e-Commerce Websites

    Most of studies about E-Commerce Security focus on the data confidentiality issue. Although security mechanisms, such as SSL (secure socket layer) or SET (secure electronic transaction), have been adopted in websites, catastrophic events that confidential data in ECommerce are revealed happened more than once. The essential reason for this is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Distributed Cryptographic Key Management for Mobile Agent Security

    The problem of securing data section in a mobile agent from discovery and exploitation by a malicious host is a difficult task. A full scale adaptation of mobile agents becomes true once the security obstacles are overcome. A number of solutions are proposed based on cryptographic principles have their own...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Semantic Focused Crawling for Retrieving ECommerce Information

    Focused crawling is proposed to selectively seek out pages that are relevant to a predefined set of topics without downloading all pages of the Web. With the rapid growth of the E-commerce, how to discovery the specific information such as about buyer, seller and products etc. adapting for the online...

    Provided By Academy Publisher

  • White Papers // Nov 2010

    Mobile Payment Framework Based on 3G Network

    With the development of mobile network technology and mobile commerce application, mobile payment is becoming more and more important to assist mobile users to participate in the mobile commerce. Service reliability, security authtification, payment mobility is the core improblem, which should be solve with some flexible and secure measures. After...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Integrating e-Services With a Telecommunication e-Commerce Using Service-Oriented Architecture

    In the past, electronic commerce only focused on customer-to-business web interaction and on business-to-business web interaction. With the emergence of business process management and of service-oriented architecture, the focus has shifted to the development of e-services that integrate business processes and that diversify functionalities available to customers. The potential of...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Router-Based Technique to Detect and Defend Against Low-Rate Denial of Service

    With the successful use of router technique, one consider to give routers additional function to defect and defend against LDOS. LDOS is a kind of miniature network attack which can affect TCP flows to zero or very low transmission bandwidth, just because it takes advantage of retransmission timeout of TCP....

    Provided By Academy Publisher

  • White Papers // Feb 2009

    An Innovative Pricing Method for Telecommunication Services Pricing Through American Options

    With the evolution of telecommunication networks and of their services the role of service provider is changed, so nowadays there is a coexistence of Network Operators and Virtual Operators. The difference between these players is not in the way they offer a service but primarily in their economic objectives and...

    Provided By Academy Publisher

  • White Papers // Nov 2008

    Quality-Aware Cooperative Proxy Caching for Video Streaming Services

    By applying a proxy mechanism widely used in WWW systems to video streaming systems, low-delay and high-quality video distribution can be accomplished without imposing extra load on the system. The video streaming system proposed in this paper consists of a video server and multiple proxy servers. In authors mechanism, proxies...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Cross-Layering in an Industrial Wireless Sensor Network: Case Study of OCARI

    Wireless sensor networks are adapted to monitoring applications. Specific solutions have to be developed for industrial environments in order to deal with the harsh radio conditions and the QoS (Quality Of Service) requirements of industrial applications. In this paper, they present the main protocols used in the OCARI project, and...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    A Multi-Attribute Assessment Method for e-Commerce Risks

    Based on multi-attribute decision making theory, a multi-attribute assessment framework for E- commerce risks is presented. The paper applies an improved Evidential Reasoning (ER) approach to support evaluation decision, and uses a credit interval to figure scoring result and allow something absent. E-Commerce risks include environmental risks, management risks, technical...

    Provided By Academy Publisher

  • White Papers // May 2009

    Security Solution of Collaborative Commerce Chain System

    To improve the performance and network security of the collaborative commerce chain system and to deal with shortcomings of existing solution to the electronic commerce, the technology of the mobile agent was introduced into the modeling of the system. Based on the properties of mobile agent, problems of network security...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Mobile Agent Based Distributed System Computing in Network

    Mobile agents are emerging as a promising paradigm for the design and implementation of distributed applications. While mobile agents have generated considerable excitement in the research community, they have not translated into a significant number of real-world applications. One of the main reasons for this is lack of work that...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    Special Issue: Delay Tolerant Networks, Architecture, and Applications

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Research on Security Policy and Framework

    Policies are rules that govern the choices in behaviors of a system. Security policies define what actions are permitted or not permitted, for what or for whom, and under what conditions. In this paper, the present situation of research on policy is overviewed, including policy and security policy definition, policy...

    Provided By Academy Publisher

  • White Papers // May 2009

    High-Speed Signature Matching in Network Interface Device Using Bloom Filters

    Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they fail to perform...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Mobile Agent Based Architecture for Securing WLANs

    Wireless LANs are open and are vulnerable to various attacks. Techniques available to prevent Wireless LANs from these attacks are not comprehensive. In this paper the authors discuss the drawbacks of the existing security mechanisms and the authors provide a security architecture which uses Mobile agents as a security facilitator....

    Provided By Academy Publisher