
Proceedings 22nd International Conference on Distributed Computing Systems Workshops
Cơ quản chủ quản: N/A
Lĩnh vực:
Các bài báo tiêu biểu
The eSleeve: a novel wearable computer configuration for the discovery of situated information
- Trang 793-796
Describes work in progress on wearable computing configurations which provide audio and visual output based on the position and orientation of the user. We introduce the 'eSleeve'-a wearable wrist computer with position and heading sensors combined with a user interface employing speech recognition and a small display. Applications described include searching a database of locations, and implement...... hiện toàn bộ
#Wearable computers #Computer displays #Wrist #Computer interfaces #Wearable sensors #User interfaces #Speech recognition #Auditory displays #Application software #Visual databases
Parallel implementation of composite events
- Trang 579-580
Composite events are required for many applications that require obtaining events from various sources, correlating them, and activating appropriate actions. One of the major issues in composite event system is scalability. This paper reports on a research that follows the situation concept of the Amit system, and proposes a parallel execution model for the event composition. The paper describes t...... hiện toàn bộ
#Event detection #Databases #Scalability #Paper technology #Parallel processing #Stock markets #History #Power system management #Discrete event simulation #Bridges
An efficient method to improve the quality of watermarked cover image
- Trang 267-271
In this paper, a general concept called the n+k/n method is introduced. In the n+k/n method, a special mapping function is defined to map an intermediate set with n+k bits into a n bit information set. In the embedding process, the intermediate set is embedded into a cover image rather than embedding the information set. If the distance between features of the cover image and the bits of the inter...... hiện toàn bộ
#Watermarking #Internet #Image quality #Data mining #Military computing #Information security #Computer science #Laboratories #Telecommunication computing #Military communication
Towards dynamic configuration of distributed applications
- Trang 487-492
Configuring distributed applications at deployment time requires the introduction of high-level features such as transaction and synchronization into application code. Component models like CORBA Component Model (CCM) or Enterprise Java Beans (EJB) allow programmers to declare in deployment descriptors which services have to be plugged into components. However, these approaches do not allow a dyna...... hiện toàn bộ
#Programming profession #Reflection #Java #Context-aware services #Visualization #Runtime environment #Data security #Information security #Transaction databases #Open source software
Mobility of context for project teams
- Trang 391-395
In the last decade, bureaucratic organizational hierarchies increasingly have been replaced with flatter organizational forms, bringing together people from different disciplines to form project teams within and between organizations. Distributed project teams often are self-configuring networks of mobile and "fixed" people, devices, and applications. They are the natural next step in the evolutio...... hiện toàn bộ
#Distributed computing #Collaborative software #Collaborative work #Workflow management software #Peer to peer computing #Databases #Time to market #Costs #Globalization #Internet
Taxonomy of distributed event-based programming systems
- Trang 585-586
This paper presents a survey of existing event systems structured as a taxonomy of distributed event-based programming systems. Our taxonomy identifies a set of fundamental properties of event-based programming systems and categorizes them according to the event model and event service criteria. The event service is further classified according to its organization and interaction model, as well as...... hiện toàn bộ
#Taxonomy #Programming profession #Brain modeling #Middleware #Computer science #Educational institutions #Finance #Multimedia systems #Aerospace electronics #Medical services
Rheeve: a plug-n-play peer-to-peer computing platform
- Trang 706-711
As the peer-to-peer (P2P) computing paradigm receives more and more attention, it is now necessary to provide computing platforms to offer an environment to build P2P applications. In this paper, we describe Rheeve, a computing platform that provides support for the development of HTTP-enabled, efficient and fault-tolerant P2P applications. Rheeve has a highly modular system architecture and scala...... hiện toàn bộ
#Peer to peer computing #Distributed computing #Conferences
An adaptive maintenance of hierarchical structure in ad hoc networks and its evaluation
- Trang 7-13
Hierarchical routing is effective for large ad hoc networks. However, it is difficult to maintain the hierarchical structure for routing due to node movement. This paper proposes an adaptive method for maintaining the hierarchical structure. The features of the proposed method are (1) the roles of nodes for the hierarchical structure are changed depending on the status of nodes in the restricted v...... hiện toàn bộ
#Intelligent networks #Ad hoc networks #Routing protocols #Robustness #Joining processes #Base stations #Disaster management #Scattering #Computational modeling #Distributed computing
Enhancing the security of block ciphers with the aid of parallel substitution box construction
- Trang 29-34
When considering block cipher designs, one feature that is seemingly not related to their robustness of a design is algorithmic variability, i.e. the ability to effect changes on a design that essentially leave its structure unchanged while they modify its functional characteristics. This feature, however, is related to robustness as there are situations where a specific algorithm is either suspec...... hiện toàn bộ
#Cryptography #Concurrent computing #Algorithm design and analysis #Parallel algorithms #Distributed computing #Design engineering #Electronic mail #Robustness #Field programmable gate arrays #Computer security
Exploiting an event-based system to develop a distributed e-commerce infrastructure
- Trang 573-574
In the last few years the event-based paradigm has been largely studied and considered as a promising approach to develop the communication infrastructure of distributed systems. It is particularly interesting when easy reconfiguration and decoupling among components is required. In fact, it allows events to be propagated in a way that is completely hidden to the component that has generated them ...... hiện toàn bộ
#Distributed computing #Electronic mail #Plugs #Computer architecture #Software architecture #Business #Indexing #Advertising #Europe #Marketing and sales