108 resultados para Distributed


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Addressing core issues in mobile surveillance, we present an architecture for querying and retrieving distributed, semi-permanent multi-modal data through challenged networks with limited connectivity. The system provides a rich set of queries for spatio-temporal querying in a surveillance context, and uses the network availability to provide best quality of service. It incrementally and adaptively refines the query, using data already retrieved that exists on static platforms and on-demand data that it requests from mobile platforms. We demonstrate the system using a real surveillance system on a mobile 20 bus transport network coupled with static bus depot infrastructure. In addition, we show the robustness of the system in handling different conditions in the underlying infrastructure by running simulations on a real, but historic dataset collected in an offline manner.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes object-centered symbolic representation and distributed matching strategies of 3D objects in a schematic form which occur in engineering drawings and maps. The object-centered representation has a hierarchical structure and is constructed from symbolic representations of schematics. With this representation, two independent schematics representing the same object can be matched. We also consider matching strategies using distributed algorithms. The object recognition is carried out with two matching methods: (1) matching between an object model and observed data at the lowest level of the hierarchy, and (2) constraints propagation. The first is carried out with symbolic Hopfield-type neural networks and the second is achieved via hierarchical winner-takes-all algorithms

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous studies in speculative prefetching focus on building and evaluating access models for the purpose of access prediction. This paper on the other hand investigates the performance of speculative prefetching. When prefetching is performed speculatively, there is bound to be an increase in the network load. Furthermore, the prefetched items must compete for space with existing cache occupants. These two factors-increased load and eviction of potentially useful cache entries-are considered in the analysis. We obtain the following conclusion: to maximise the improvement in access time, prefetch exclusively all items with access probabilities exceeding a certain threshold.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigated the problem of strategic manipulation of feedback attacks and proposed an approach that makes trust management systems sufficiently robust against feedback manipulation attacks. The new trust management system enables potential service consumers to determine the risk level of a service before committing to proceed with the transaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ubiquity of the Internet and Web has led to the emergency of several Web search engines with varying capabilities. A weakness of existing search engines is the very extensive amount of hits that they can produce. Moreover, only a small number of web users actually know how to utilize the true power of Web search engines. Therefore, there is a need for searching infrastructure to help ease and guide the searching efforts of web users toward their desired objectives. In this paper, we propose a context-based meta-search engine and discuss its implementation on top of the actual Google.com search engine. The proposed meta-search engine benefits the user the most when the user does not know what exact document he or she is looking for. Comparison of the context-based meta-search engine with both Google and Guided Google shows that the results returned by context-based meta-search engine is much more intuitive and accurate than the results returned by both Google and Guided Google.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book is a vital compendium of chapters on the latest research within the field of distributed computing, capturing trends in the design and development of Internet and distributed computing systems that leverage autonomic principles and techniques. The chapters provided within this collection offer a holistic approach for the development of systems that can adapt themselves to meet requirements of performance, fault tolerance, reliability, security, and Quality of Service (QoS) without manual intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book focuses on network management and traffic engineering for Internet and distributed computing technologies, as well as present emerging technology trends and advanced platform

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distributed denial-of-service (DDoS) attacks typically exhaust bandwidth, processing capacity, or memory of a targeted machine, service or network. Despite enormous efforts in combating DDoS attacks in the past decade, DDoS attacks are still a serious threat to the security of cyberspace. In this talk I shall outline the recent efforts of my research group in detection of and defence against DDoS attacks. In particular, this talk will concentrate on the following three critical issues related to DDoS attacks: (1) Traceback of DDoS attacks; (2) Detection of low-rate DDoS attacks; and (3) Discriminating DDoS attacks from flash crowds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Portfolios, especially where they involve some use of or link to online technologies, are currently a popular focus for learning innovation in universities, drawing on a tradition of using portfolios in some areas of higher education and attempting to extend and broaden this practice. In some cases this focus has led to ambitious plans for whole-of-institution approaches, often involving significant technological development. However, the term portfolio can also cover a wider variety of possible learning and assessment activities and there are ways of using portfolios which, while quite traditional in their own form and approach, enable teachers to approach other aspects of their curriculum and pedagogy in far more innovative ways. This paper explores the conceptual basis on which the Department of Internet Studies at Curtin University of Technology is utilising a pragmatic approach to portfolio assessment within individual units of study, so as to enable a more thorough implementation of distributed learning. In this form of learning, where students regularly contribute to their own and others' learning through short tasks and conversations, the evidence of achievement is widely distributed and not easily accessible for either formative or summative assessment. As explained in the paper, students are required to collate, select, and then contextualise a sample of these numerous productive moments of their ongoing study. The paper concludes that while other goals for portfolio assessment (such as encouraging reflection) can also be used with this approach, its primary value is in unleashing the potential of social media creativity in a manner that motivates students via the requirement of assessment, enables feedback to be provided to guide learning, and which promotes shared responsibility between teachers and students in determining the kind and extent of their learning activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a behavior-based detection that can discriminate Distributed Denial of Service (DDoS) attack traffic from legitimated traffic regardless to various types of the attack packets and methods. Current DDoS attacks are carried out by attack tools, worms and botnets using different packet-transmission rates and packet forms to beat defense systems. These various attack strategies lead to defense systems requiring various detection methods in order to identify the attacks. Moreover, DDoS attacks can craft the traffics like flash crowd events and fly under the radar through the victim. We notice that DDoS attacks have features of repeatable patterns which are different from legitimate flash crowd traffics. In this paper, we propose a comparable detection methods based on the Pearson’s correlation coefficient. Our methods can extract the repeatable features from the packet arrivals in the DDoS traffics but not in flash crowd traffics. The extensive simulations were tested for the optimization of the detection methods. We then performed experiments with several datasets and our results affirm that the proposed methods can differentiate DDoS attacks from legitimate traffics.