Kooperativer Bibliotheksverbund

Berlin Brandenburg

and
and

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.367-377
    Description: The implementation of web service security standards provides end-to-end security attaching signature and encryption headers to SOAP messages, but it outcomes with message overhead, as well as requires complex cryptographic operations for each message or some parts of it. This leads to extra CPU time and memory for processing information related to WS-Security, as well as elapsed time for parsing the increased XML message. This paper describes a series of experiments focused on understanding the performance impact of different security-level mechanisms based on WS-Security. We create a baseline of performance data that can be used to explore if the parameter “message size” or “number of concurrent messages” impacts more to the server performance for different message types with or without different WS-security mechanisms implemented on web service hosted on web server on Linux platform. Also, we analyze the correlation between these two parameters.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Studies in Computational Intelligence, Chaos-Based Cryptography: Theory,Algorithms and Applications, pp.27-65
    Description: In this chapter we give an overview and the state of the art in the field of Chaos-based cryptography. The public key cryptosystems based on Chebyshev polynomials enjoy some nice chaotic properties, which makes them suitable for use in both encryption and digital signature. The cryptosystem can work either on real or integer numbers. The cryptosystem that works on real numbers is not secure and permits to recover the corresponding plaintext from a given ciphertext. In addition, it also allows forgeries if the cryptosystem is used for signing messages. On the other hand, ElGamal-like and RSA-like algorithms when using Chebyshev polynomials on integer numbers are secure as the aforementioned encryption algorithms. The chaos-based cryptography is discussed from a point of view which we believe is closer to the spirit of both cryptography and chaos theory than the way the subject has been treated recently by many researchers.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Data Encryption ; Data Structures, Cryptology and Information Theory ; Engineering ; Computer Science
    ISBN: 9783642205415
    ISBN: 3642205410
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.269-277
    Description: The overall objective of the present work is to develop and implement a novel multi-step general computational methodology for modeling of complex condensed-phase systems on high-performance computing environments. First, molecular dynamics (MD) or Monte Carlo (MC) simulations of the free interacting clusters, as well as of clusters microsolvated by several molecules from the medium (solvent) are performed.MD orMC simulations are carried out applying either classical empirical interaction potentials, or implementing quantum mechanical MD or MC methodologies. Quantum mechanical MD simulations are carried out with the Born-Oppenheimer approach (BOMD), the Car-Parrinello (CPMD) approach, or using the atom-centered density matrix propagation scheme (ADMP). Sequential to this step, a series of suitably chosen configurations from the statistical physics simulations corresponding to the equilibrated system, which are mutually statistically independent, are subjected to further more rigorous quantum mechanical analysis. In this way, a realistic simulation of complex physico-chemical systems is enabled, in real computational time, without loosing, in statistical sense, any relevant information about the system. Due to the complexity of the algorithms which are used for this hybrid approach, it is of crucial importance to be able to implement the computational strategy on high-performance computing environment. Often, the overall CPU time which is required is very high. Therefore, achieving good parallel efficiency for calculations of such type is far from a trivial task without the use of high-performance low-latency MPI interconnect.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.107-118
    Description: Space and time play a crucial role in wireless sensor networks, since sensor nodes are used to collaboratively monitor physical phenomena and their space-time properties. Wireless sensor networks (WSN) are envisioned to be used to fulfill complex monitoring tasks. A number of techniques and distributed algorithms for location estimation and time synchronization have been developed specifically for sensor networks. A similarity of time and space affects the location estimation and time synchronization, ranging from applications and requirements to basic approaches and concrete algorithmic techniques. An original approach for space and time localization in WSNs is given in this paper, also an energy-efficient approach is given, by clustering the WSNs. In both algorithms, we use only one mobile beacon for both localization and synchronization, a sensor node which moves around the sensor’s field, aware of its time and position, equipped with a GPS receiver. The synchronization component uses the packets required by the positioning component to improve its performance. The positioning component gets use from the communication, required by the synchronization component to decrease errors. A set of simulations are presented to evaluate the performance of our algorithms in order to reduce communication and processing resources and save energy and network resources.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.119-127
    Description: Amplify-and-forward method with fixed gain relays is one of the most attractive cooperative scheme due to its low complexity. In this paper, we propose a new relaying scheme, called the on-off relaying, where the relay is utilized only if the quality of the direct link between the source and the destination is lower then the relayed link. For this scheme, we present asymptotic performance analysis for the outage probability and average error probability for high SNRs. Monte Carlo simulations are used to verify these results.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.129-146
    Description: This paper identified electronic security as a key component to the delivery of e-finance benefits in performing electronic transactions through GPRS type of communication. The fraud is known issue from the beginning of electronic payment and it is growing in line with the development of the technology. The paper describes the approach what GPRS POS should have in order to provide higher level of the security in GPRS network and to enhance the prevention in GPRS transactions in order to be more accepted by the customers.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.147-157
    Description: Games have been an important activity among people for many years, but it has never been as interesting to explore as it is today. The main aim of our work is to investigate the influence of mobile phone games on collaboration and social interaction of physically co-located players, instead of focusing on the consequences of playing digital games that are antisocial in nature. Considering the performances of the contemporary converged mobile phones, we have developed and augmented reality (AR) TeamTwixT game for mobile phones. We have evaluated the system performances, user interface performances by adopting the Fitts’ law and the usability of mobile phones for collaborative AR. The results have shown that, despite the small screen and limited input capabilities mobile phones and 3D AR technology can be used to naturally enhance collaboration of co-located players and increase their confidence in respect to other gaming conditions.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.15-25
    Description: MEMS research has until recently focused mainly on the engineering process, resulting in interesting products and a growing market. To fully realize the promise of MEMS, the next step is to add embedded intelligence. With embedded intelligence, the scalability of manufacturing will enable distributed MEMS systems consisting of thousands or millions of units which can work together to achieve a common goal. However, before such systems can become a reallity, we must come to grips with the challenge of scalability which will require paradigm-shifts both in hardware and software. Furthermore, the need for coordinated actuation, programming, communication and mobility management raises new challenges in both control and programming. The objective of this article is to report the progresses made by taking the example of two research projects and by giving the remaining challenges and the perspectives of distributed intelligent MEMS.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.159-169
    Description: This paper describes a framework for prototyping and evaluation of techniques by which, machine learning can be brought into the realm of mobile augmented reality and location aware applications in general. Two realistic scenarios will be presented and considerations for the inclusion of particular recommendation techniques will be discussed. The results of our exploratory evaluation have pointed out that the framework could be used in evaluating similar adaptable augmented reality systems and location aware mobile applications using it as a building block for future exploration.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book chapter
    Book chapter
    Berlin, Heidelberg: Springer Berlin Heidelberg
    Language: English
    In: Advances in Intelligent and Soft Computing, ICT Innovations 2011, pp.27-37
    Description: This paper presents a survey of novel technologies for uncovering implicit knowledge through the analysis of user-contributed content in Web2.0 applications. The special features of emergent semantics are herein described, along with the various dimensions that the techniques should be able to handle. Consequently a series of application domains is given where the extracted information can be consumed. The relevant techniques are reviewed and categorised according to their capability for scaling, multi-modal analysis, social networks analysis, semantic representation, real-time and spatio-temporal processing. A showcase of such an emergent semantics extraction application, namely ClustTour, is also presented, and open issues and future challenges in this new field are discussed.
    Keywords: Engineering ; Computational Intelligence ; Artificial Intelligence (Incl. Robotics) ; Engineering ; Computer Science
    ISBN: 9783642286636
    ISBN: 3642286631
    Source: SpringerLink Books
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages