119 results
Search Results
2. A Semantic Web Approach to "Request for Quote" in E-Commerce.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Wen-ying Guo, De-ren Chen, and Xiao-lin Zheng
- Abstract
It is challenge for an interoperable multi-agent system (MAS) to understand the communications among software agents. With the standardization of ontology, the semantic Web services can make the communication more flexible and automated. This paper presents an ontology-based, runtime semantic solution for solving the interacting problem between two agents. The paper demonstrates how to employ the OWL description and service ontology to a Request for Quote (RFQ) scenario, and how to develop a methodology for runtime semantics. Keywords: Semantic, matchmaking, ontology, RFQ. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
3. Consistency of User Interface Based on Petri-Net.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Haibo Li, and Dechen Zhan
- Abstract
There exists a difference between traditional control mode and Web interface based one. Operation consistency of Web interfaces is not guaranteed by the traditional control mode. This paper presents a Petri-net based approach to analyze the design of Web interface. The proposed method can be used to identify interface inconsistency and convert interface operation model featured by Petri-net for increase the coverage ability of graph; hence improving the graph. Finally, the paper describes the consistency rules for various operations using XML protocol with the aim at achieving standardize operations of user interface. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
4. ParaView-Based Collaborative Visualization for the Grid.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Guanghua Song, Yao Zheng, and Hao Shen
- Abstract
This paper describes our efforts to develop visualization service on the Grid. The focus of this paper is our work on grid-enabling the ParaView, a widely used parallel visualization software package. Upon the analysis of the ParaView source code, the architecture as well as the implementation of ParaView-based client side cooperation of object visualization has been presented. Furthermore, the deployment of the collaborative ParaView as a visualization service in the Grid has been addressed. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
5. A Dynamic Web Service Composite Platform Based on QoS of Services.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Lei Yang, Yu Dai, Bin Zhang, and Yan Gao
- Abstract
In this paper, a web service composite platform is introduced which aims to compose the services dynamically. And more importantly, in order to get a most qualified composite service, a selection task needs to be done. And after carefully study on the special features of composite service, a relatively new QoS model is proposed in this paper based on which we also give the way of how to use this model to select the most appropriate composite service among several potential composite services. Keywords: Web services, Web service composition, QoS. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
6. Comments on Order-Based Deadlock Prevention Protocol with Parallel Requests in "A Deadlock and Livelock Free Protocol for Decentralized Internet Resource Co-allocation".
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Chuanfu Zhang, Yunsheng Liu, Tong Zhang, Yabing Zha, and Wei Zhang
- Abstract
This paper discusses the order-based deadlock prevention protocol with parallel requests (ODP3) [1]. From the analysis of theorems about ODP3, we found that the conclusions of paper [1] are not correct. The ODP3 method is not free from deadlock and live-lock. An example is given to illustrate our deduction. Keywords: Co-allocation, Deadlock, Livelock, ODP3. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
7. The Design Method of a Video Delivery Grid.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Zhuoying Luo, and Huadong Ma
- Abstract
How to improve the reliability and quality of video delivery has great influence on the extensible and high-quality video services. Grid computing, for dynamic share and collaboration among all kinds of resources, can provide a solution for optimizing video delivery. This paper proposes a conceptual system of video delivery grid. First, the paper provides the model of video delivery grid, and discusses how to select distributed services and create a service flow dynamically. Then, the paper describes the design of video delivery grid based on Globus. Moreover, the prototype of video delivery grid is implemented. The efficiency of this solution was shown by the experiments in the video conference system. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
8. Predictive Grid Process Scheduling Model in Computational Grid.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Sung Ho Jang, and Jong Sik Lee
- Abstract
Importance and need of grid process scheduling have been increased in accordance with development of grid computing. In order to distribute and utilize grid processors efficiently, grid computing system needs scheduling policies that manage and schedule grid process. This paper reviews current scheduling policies and proposes an efficient scheduling model which is called the predictive process scheduling model. For efficient scheduling, this paper presents the processing time prediction algorithm to resolve problems of grid scheduling. The predictive process scheduling model predicts processing times of processors, allocates a job to a processor with minimum processing time, and minimizes overall system execution times. For performance evaluation, this paper measures turn-around time, job loss, throughput, and utilization. Empirical results show that the predictive process scheduling model operates with the less 69.5% of turn-around time and the less 76.4% of job loss and improves the more 119.6 % of throughput and the more 117.8% of utilization than those of existing scheduling models such as random scheduling and round-robin scheduling. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
9. Distributed Group Membership Algorithm in Intrusion-Tolerant System.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Li-hua Yin, Bin-xing Fang, and Xiang-zhan Yu
- Abstract
Intrusion tolerance is capability of Internet systems withstanding attacks and intrusions under unsafe environment. This paper presents the architecture of an intrusion tolerant system using group communication. A distributed group membership algorithm is described which introduces a strategy detecting failure in local servers and announcing them to remote servers to avoid the side effects of remote failure detection. The paper also points out that stability of failure detector is a necessary condition but not sufficient condition of algorithm cease. On analyzing the essential of block, block detection and avoidance mechanism is designed. Finally, we have developed a group membership prototype system on WAN condition. Experiment results show the algorithm has well performance in complicated Internet condition. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
10. An Enterprize Workflow Grid/P2P Architecture for Massively Parallel and Very Large Scale Workflow Systems.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, and Kwanghoon Kim
- Abstract
This paper proposes a layered workflow architecture that is used for not only distributing workflows' information onto Grid or P2P resources but also scheduling the enactment of workflows. The layered architecture proposed in this paper, which we call Enterprize Workflow Grid Architecture, is targeting on maximizing the usability of computing facilities in the enterprize as well as the scalability of its underlined workflow management system in coping with massively parallel and very large scale workflow applications. Keywords: Enterprize Workflow Grid/P2P Architecture, Workflow Models, Massively Parallel and Very large-Scale Workflow. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
11. A Residual Energy-Based MAC Protocol for Wireless Sensor Networks.
- Author
-
Heng Tao Shen, Minglu Li, Jun Ni, Wei Wang, Long Tan, Jinbao Li, and Jianzhong Li
- Abstract
The Residual Energy-Based MAC Protocol (REB MAC) presented in this paper is aimed to solve the problems of how to reduce the collisions from interfering nodes in event-driven wireless sensor networks, how to promote the communication efficiency of the system and how to ensure a balance energy consumption of WSN, etc. We combine node's residual energy with node's orientation in a shared wireless channel, and provide different back-off intervals for nodes having different residual-energy and in different orientation so as to reduce the collisions among neighbor nodes and promote the communication efficiency of the system. In many sensor applications, not all the nodes that sense an event need to report it. Only some of them need to report. So this paper provides a design of using parts of nodes for data transmission so that we can save the energy and balance the energy consumption between neighbor nodes. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
12. Power-Efficient Node Localization Algorithm in Wireless Sensor Networks.
- Author
-
Heng Tao Shen, Minglu Li, Jun Ni, Wei Wang, Jinbao Li, Jianzhong Li, Longjiang Guo, and Peng Wang
- Abstract
Sensor networks is an Ad-Hoc network consist of large amount of sensors. These sensors are distributed in a huge area. Each of the small, cheap, intelligent sensors has processor, memory and wireless transmission ability. These sensors collect or monitor the surroundings in real-time and process these data to obtain the detailed and accurate information from their covered area. Information from sensors must be combined with its location to make sense, so the location of sensors is very important in sensor network applications. Localization of sensors becomes one of the key techniques in sensor networks. A power-efficient localization algorithm is proposed in this paper. It uses few anchors(the sensors whose location is known) to implement the localization of other nodes without special devices such as GPS. This algorithm not only has the lower time cost and communication cost, but also needs only a few anchor nodes whose distribution is independent. Experimental results and analysis show that the localization algorithm proposed in this paper has higher accuracy, lower power cost and better expansibility. It is very suitable for large scale sensor networks. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
13. Object Finding System Based on RFID Technology.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Lun-Chi Chen, Ruey-Kai Sheu, Hui-Chieh Lu, Win-Tsung Lo, and Yen-Ping Chu
- Abstract
Locations of moving or missing objects are getting important information for context-aware applications which try to get the locality of an object, and then provide services pertaining to the object. To position an object, most systems use a predefined coordinate to compute object location while sensing the appearance of the target object. Usually, it is troublesome and costs much to define the base coordinate in advance for most object positioning systems, especially when the target object is locating in an unknown environment. To reduce the cost and complexity of object locating system and improve the accuracy of location, this paper proposed an Object Finding System based on RFID technology to identify the localities of target objects in buildings. In this paper, we introduce the design concepts of the proposed system as well as the algorithms used to calculate the object locations. In addition, the experimental results show that it is a feasibility study. Keywords: RFID, wireless networks, user location and tracking, location estimation, indoor localization. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
14. IPv6 Stateless Address Auto-configuration in Mobile Ad-Hoc Network.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Dongkeun Lee, Jaepil Yoo, Keecheon Kim, and Kyunglim Kang
- Abstract
This paper describes global IPv6 address auto-configuration mechanism for MANET(Mobile Ad-hoc Network) nodes connected to the Internet via one or more gateways. IPv6 Duplicate Address Detection(DAD) process cannot be applicable for MANET without modification either because of the multi-hop problem or DAD time bound. In this paper, we propose a stateless auto-configuration that overcomes multi-hop problem. We solve the multi-hop problem by having some ad-hoc routable nodes doing DAD for the new node that is willing to accept DAD. These auto-configuration steps specifically include generation of link-local address and verification of its uniqueness. It further defines the processes of creating globally routable address and a new duplicate address detection mechanism. Once a host configures its interfaces, it becomes possible to communicate in multi-hop environment. We call this new scheme as Tunneled DAD (T-DAD). [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
15. A Novel Localization Scheme Based on RSS Data for Wireless Sensor Networks.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Hongyang Chen, Deng Ping, Yongjun Xu, and Xiaowei Li
- Abstract
Sensor localization has become an essential requirement for realistic applications over Wireless Sensor Networks (WSN).In this paper, we propose a novel location algorithm based on mean received signal strength (RSS) measurements. It incorporates Chan's hyperbolic position location algorithm and the extended Kalman filtering to achieve an accurate estimation. We have verified the scheme mentioned in the paper performed better than conventional received signal strength indicator (RSSI) location algorithm for the static location estimator in indoor sensor networks. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
16. Finding Event Occurrence Regions in Wireless Sensor Networks.
- Author
-
Heng Tao Shen, Minglu Li, Jun Ni, Wei Wang, Longjiang Guo, Jianzhong Li, and Jinbao Li
- Abstract
Wireless sensor networks have emerged as a promising solution for a large number of monitoring applications. Sensor nodes are capable of measuring real world phenomena, storing, processing and transferring these measurements. However, users are interested in event monitored by sensors, but not the sensor itself or the massive irrelevant readings from sensors. Users often issue event queries such as "Where did happen hailstone in sensor network from 3:00 to 5:00?" Since battery supply of sensors is limited, energy-efficient query processing in sensor networks has become an important research problem. This paper presents an improved data-centric storage strategy, called CM-DCS, and also proposes two event query processing algorithms based on CM-DCS and local storage. The energy consumption of sensors for three storage strategies namely external storage, local storage and data-centric storage are analyzed and compared. The paper also studies the influence of the number of sensor nodes and node density on energy consumption. Analytical and experimental results show that in most cases the event query processing algorithm based on CM-DCS can save more energy than those algorithms based on external storage and local storage strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
17. XML Clustering Based on Common Neighbor.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Tian-yang Lv, Xi-zhe Zhang, Wan-li Zuo, and Zheng-xuan Wang
- Abstract
Clustering on XML documents is an important task. However, it is difficult to select the appropriate parameters' value for the clustering algorithms. By integrating outlier detection with clustering, the paper takes a new approach for analyzing the XML documents by structure distance. After stating the XML tree distance, the paper proposes a new clustering algorithm, which stops clustering automatically by utilizing the outlier information and needs only one parameter, whose appropriate value range can be decided in the outlier mining process. The paper adopts the XML dataset with different structure and other real-life datasets to compare it with other clustering algorithms. Keywords: XML Structure; Clustering; Common Neighbor. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
18. Logic-Based Association Rule Mining in XML Documents.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Hong-Cheu Liu, Zeleznikow, John, and Jamil, Hasan M.
- Abstract
In this paper, we propose a new framework, called XLogic- Miner, to mine association rules from XML data. We consider the generate-and-test and the frequent-pattern growth approaches. In XLogic-Miner, we propose an novel method to represent a frequent-pattern tree in an object-relational table and exploit a new join operator developed in the paper. The principal focus of this research is to demonstrate that association rule mining can be expressed in an extended datalog program and be able to mine XML data in a declarative way. We also consider some optimization and performance issues. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
19. Discovery of Web Services Applied to Scientific Computations Based on QOS.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Han Cao, Daxin Liu, and Rui Fu
- Abstract
Computational science is an important and urgent field with multi-disciplinary research. Many science and engineering explorations rely on mature, efficient computational algorithms and implementations, practical and reliable numerical methods, and large-scale computation systems. Since scientific computation consumes many computer resources. And some function quality parameter such as error or max loop times, impact much on function executing. Applying Web services to scientific computation differs from other usage situation of Web services. This paper described the service template as the data structure to discover services, and discuss the algorithm of the similarity degree between ST and SO based on QOS of Web service. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
20. Web Service-Based Study on BPM Integrated Application for Aero-Manufacturing.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Zhi-qiang Jiang, Xi-lan Feng, Jin-fa Shi, and Xue-wen Zong
- Abstract
The paper expatiated the practical demands of information resource and technology with modern manufacturing enterprise, and analyzed the causation forming islands of information in allusion to information system construction of enterprise. And adopting the enterprise application an integrated application framework of enterprise Business Process Management (e-BPM) based on Web service with distributed network is introduced. It will promote the enterprise integration effectively of all kinds of legacy systems and new application systems, and more accelerated the information project implement of Aero manufacturing. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
21. Grid-Based Parallel Elastic Graph Matching Face Recognition Method.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Haiyang Zhang, and Huadong Ma
- Abstract
This paper presents a grid-based parallel elastic graph matching face recognition method. We firstly divide the face into several sub-regions by geometric features decomposing algorithm, and match the sub-regions of probe face image with the corresponding sub-regions of the sample faces by sub-region elastic graph matching algorithm, and these matching processes can be assigned onto a lot of nodes in the multimedia service grid and scheduled by the optimal costs algorithm. Eventually, we obtain the match degrees between the probe face and the sample faces by integrating the weighted matched results of sub-regions. We carried out extensive experiments on the special face database and HMMC standard face recognition database. Compared with the previous algorithms, our algorithm offers better recognition accuracy and more rapid recognition speed. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
22. Grid-Based Multi-scale PCA Method for Face Recognition in the Large Face Database.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Haiyang Zhang, Huadong Ma, and Anlong Ming
- Abstract
In this paper, we propose an efficient grid-based multi-scale PCA method in the large face database. This method divides the large face database into some small sub-face databases by maximizing the variance in the face sub-database and minimizing the variance between the face sub-databases, then it segments the recognition process into the local coarse profile recognition process and accurate detailed geometric sub-component analysis process, and assigns the local coarse profile recognition process to the nodes of the multimedia service grid to reduce the recognition time. Our experimental results show that with the increase of the face database, this method not only reduces the recognition time, but also remarkably increases the recognition precision, compared with other PCA methods. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
23. Research on Web Application of Struts Framework Based on MVC Pattern.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Jing-Mei Li, Guang-Sheng Ma, Gang Feng, and Yu-Qing Ma
- Abstract
The paper introduces MVC design pattern briefly, then discusses the Struts framework based on J2EE MVC pattern and finally gives the development procedure of how to design Web application with Struts framework. From this we can see that software framework and component reuse can enhance the efficiency of software development, offer clear responsibilities between Web page designers and software developers and improve system maintainability and extensibility. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
24. A New Automatic Intrusion Response Taxonomy and Its Application.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, and Daxin Liu
- Abstract
The response taxonomy is a key to realizing automatic an intrusion response system as it provides theoretical framework for responding coherently to attacks. This paper presents a new taxonomy called 5W2H on the basis of analyzing the taxonomies, and the application prototype running over IBM Aglet is given. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
25. Evaluation of Network Dependability Using Event Injection.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Huiqiang Wang, Yonggang Pang, Ye Du, Dong Xu, and Daxin Liu
- Abstract
Event injection is a new technique for evaluating dependability of target system, and it's developed on the basis of fault injection techniques. This paper proposed an event injection system for assessing dependability of computer network system, analyzed the event injection in details, and described the course of event injection and the key techniques. Finally, the testing results of the response time and average flow speed of network server by DoS attack experiments are given. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
26. Component Composition Based on Web Service and Software Architecture.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Xin Wang, Changsong Sun, Xiaojian Liu, and Bo Xu
- Abstract
Software composition is one of major technologies in component-based software engineering. The combination of Internet computing and software engineering prompts great potentials for future software industrials, and extend the scope of software applications. For example, Web service-based software development becomes the next generation software to be used in distributed systems. In this paper, presents a newly-developed software architecture using Web service based composition technique. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
27. Web-Based Three-Dimension E-Mail Traffic Visualization.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Xiang-hui Wang, and Guo-yin Zhang
- Abstract
E-mail pervades many aspects of our lives and is becoming indispensable communication method in areas such as commerce, government, production and general information dissemination. To maintain the security and usability of the e-mail system, every effort must be made to efficient monitoring e-mail traffic and protecting against various types of spam maker. In this paper, we design and implement a web-based 3D visualization system, monitoring the e-mail traffic and providing based on statistic suspicious activities analysis. Our system also provides convenient interactive user interface for selecting interest watching object and different type of analysis method. Our results indicate that analysts can efficient examine the e-mail traffic and rapidly discover abnormal user activities. Keywords: Web-based visualization, E-mail traffic, Security, Spam, Java3D. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
28. Grid Service Based Parallel Debugging Environment.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, and Binxing Fang
- Abstract
Debugging can help programmers to locate the reasons for incorrect program behaviors. The dynamic and heterogeneous characteristics of computational grid make it much harder to utilize the traditional parallel debuggers to debug grid applications for their defects in architecture. In this paper, we propose a new parallel debugging environment based on grid services, which support the information sharing and resource interoperation. Some new debugging functionalities oriented to Grid applications are appended. The architecture of the proposed debugging environment has high portability and scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
29. Mobile Agents for Network Intrusion Resistance.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Wang, H. Q., Wang, Z. Q., Zhao, Q., Wang, G. F., Zheng, R. J., and Liu, D. X.
- Abstract
In this paper a distributed IDS systematic model based on mobile agents is proposed and the functions of key modules are described in detail. Then the key modules are implemented in mobile agent platform-IBM Aglets and the results of experiments are discussed and analyzed quantitatively. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
30. A Feature-Based Semantics Model of Reusable Component.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Jin Li, Dechen Zhan, and Zhongjie Wang
- Abstract
Component technology plays a key role in the field of software reuse. Components can be reused under various business environments through its changeability .This paper proposes a feature-based semantics model of reusable component, which describes semantics of components by using domain feature space and expresses changeability of components through five kinds of changeable mechanisms of domain features. In addition, this study proposes a self-contained classification of features according to enterprise business model, divides semantics structure and hierarchical relation of three kinds of components, and sets up mapping relations between semantics model of component and business model. The model is verified through the case study of a Web-based information platform for logistics enterprise. Keywords: Component; Feature; Semantics. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
31. System Architecture of a Body Area Network and Its Web Service Based Data Publishing.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Hongliang Ren, Meng, Max Q.-H., Xijun Chen, Haibin Sun, Bin Fan, and Yawen Chan
- Abstract
Wireless Sensor Networks (WSN) is a research hotspot in recent years and has yielded many fruitful results. However, the biomedical applications of WSN haven't received significant development due to its many unique challenges for the engineers and physicians. In this paper, a system architecture solution of body area network (BAN), our so called project "MediMesh", is presented. A biomedical dedicated BAN node hardware platform is devised to fit the medical monitoring application. The sensor node is built up especially for healthcare monitoring while the biocompatibility and portability are considered. A light weight network protocol is designed considering the radiation effect and communication overhead. After data acquisition from sink stations, a data publishing system based on web service technology is implemented for typical hospital environment. The publishing of biomedical data is realized through 3 phases: first storing the data automatically in a database, then creating information sharing service by using Web Service technology, and finally allowing data access by the physicians and end users. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
32. ESD: The Enterprise Semantic Desktop.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Jingtao Zhou, and Mingwei Wang
- Abstract
The continuous blending of boundaries between personal and corporate data leads to overall enterprise information and knowledge pervading not only common but personal data sources. To fully sharing potentially useful information within entire enterprise, there are growing needs of a generic, interoperable, and flexible infrastructure to integrate and coordinate information across corporate and individual desktops on semantic or knowledge level. In this context, we introduce ESD, a desktop information sharing infrastructure based on Semantic Grid vision to achieve adaptive and intelligence information sharing across enterprise corporate and personal desktops. A primary framework for ESD is introduced based on the analysis of key criteria in realizing the vision of an infrastructure for information sharing, management, searching, and navigating on desktop grid. Focuses of this position paper are placed on the background, vision and the outline of ESD approach. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
33. A Category on the Cache Invalidation for Wireless Mobile Environments.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Jianpei Zhang, Yan Chu, and Jing Yang
- Abstract
Wireless computing becomes most popular with the development of mobile computers. Cache technique in wireless computing is crucial because it facilitates the data access at clients for reducing servers' loading, hence improve the performance. However, conventional cache technique requires coherence between servers and clients because of frequent disconnection. The cache invalidation strategy becomes an ideal method. In this paper, a category on the cache invalidation is proposed. To evaluate system performance, a mathematical model is proposed. It will develop high performance cache technique for practical wireless mobile computing. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
34. Common Program Analysis of Two-Party Security Protocols Using SMV.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Yuqing Zhang, and Suping Jia
- Abstract
A common framework, which can be used to analyze the two-party security protocols, is proposed in this paper. With the common framework, a common program is developed in order that any two-party security protocol can be automatically analyzed through SMV with slight modification of the common program. Finally, we illustrate the feasibility and efficiency of the common program analysis with the SSL 3.0 protocol as a case study. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
35. Multi-agent Negotiation Model for Resource Allocation in Grid Environment.
- Author
-
Heng Tao Shen, Jinbao Li, Jun Ni, Wei Wang, Xiaoqin Huang, LinPeng Huang, and MingLu Li
- Abstract
Due to the resources in the Grid are heterogeneous and geographically distributed, the management of resources and application scheduling in large-scale distributed Grid environment is a complex undertaking. Intelligent agents can play an important role in solving these problems. In this paper we formulated this problem as a multi-agent game with the players being agents purchasing service from a common server. We strive to highlight major challenges in managing resources in a Grid computing environment and present some of our recent works on multi-agent negotiation strategies for resource management and scheduling in grid environment. The proposed approach is to realize multiple negotiation models/protocols/strategies that can be selected by the system automatically to adapt to computation needs as well as changing computing resource environment. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
36. A Web Service Composition Modeling and Evaluation Method Used Petri Net.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Xiao-Ning Feng, Qun Liu, and Zhuo Wang
- Abstract
The emergence of Web services opens a new way of Web application design and development. It has led to more interest into Web service composition, which is an active area of research. The formidable problem of efficient and effective composition of existing Web services is the subject of much current attention. The study of modeling is one of the most important parts and a key layer of Web service composition. Therefore, there is a need for modeling techniques and tools for reliable Web services composition. In this paper, we propose a method used an Advanced Object-Oriented Petri Net (AOOPN) to model and evaluation the process of Web services composition. This method is expressive enough to capture the semantics of complex Web services combinations. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
37. A New Method for the Design of Stateless Transitive Signature Schemes.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Chunguang Ma, Peng Wu, and Guochang Gu
- Abstract
Transitive signature is a new and useful cryptology tool for information security, Internet security, and e-commercial security. Most of the current transitive signature schemes are stateful, which increases the store cost and impacts the computing efficiency of signing algorithm. In this paper, a new practical method is introduced to transform the state transitive signature schemes to the stateless ones without loss their security. According to the proposed method, three concrete stateless transitive signature schemes based on Factoring and RSA are presented respectively. Under the moderate assumption, two schemes are secure against the adaptive chosen-message attacks in random oracle model. Keywords: Cryptography, digital signature, stateless signature, transitive signature. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
38. An Effective XML Filtering Method for High-Performance Publish/Subscribe System.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Tong Wang, Da-Xin Liu, Wei Sun, and Wan-song Zhang
- Abstract
During the process large-scale XPath queries against fast XML streams on Internet, a bottleneck occurs due to the lack of memory for filtering. This paper presents an effective automaton method to reduce the memory need by diminishing the tedious operators (such as "//" and "*") in XPath expressions. The method contains a product automata to convert XPath to the actual path; thus to reduce the complexity in search space. The proposed method was implemented in MFSA (Multi- Finite States Automata) system for filtering queries of subscribers. The empirical evidence shows its efficiency and stability when the scale of queries is large. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
39. Distortion Analysis of Component Composition and Web Service Composition.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Min Song, Changsong Sun, and Liping Qu
- Abstract
This paper discusses the consistency of component composition and Web service composition, therefore all kinds of distortions during component composition are defined and analyzed, and then some distortion cases are discussed, and from the view of the semantic of function behavior qualitative analysis is conducted of the possible distortion cases that several composition modes may lead to, in order to evaluate the system distortion and provide a evaluate model for distortion testing. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
40. An Information Audit System Based on Bayes Algorithm.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Fei Yu, Yue Shen, Huang Huang, Cheng Xu, and Xia-peng Dai
- Abstract
It is difficult to collect information over Gigabit networks for infor-mation audit. In the paper, the information audit system adopts the network processor to collect and analyze the date in the low level of network. Through taking an advanced research on current algorithm, some improvements of the Bayes categorization algorithm have been made as well as the proposal of a text categorization model of the minimal risk Bayes decision. In addition, it considers the risk probability of mistaking the related text for unrelated text during the text categorization. The experiments results show that it promotes the precision of text categorization. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
41. Using Abstract State Machine in Architecture Design of Distributed Software Component Repository.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Yunjiao Xue, Leqiu Qian, Xin Peng, Yijian Wu, and Ruzhi Xu
- Abstract
Recently many enterprises have established their own software component repositories. Because of the physical isolation to each other and independent decision on the classifying and specification mechanisms, the repositories form a distributed and heterogeneous system, hindering the reusability of component resource. Due to the infeasibility of integrating all the repositories physically, it is necessary to use a collaborative way to integrate such repositories and form a logically uniform architecture with consistent user interface and retrieval mechanism, to improve the reuse of software components. In this paper we propose an architecture of integrated system based on intelligent agent, and make use of ASM in its architecture design, which can be validated formally. This architecture implements the required fundamental functionality. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
42. Research of Multilevel Transaction Schedule Algorithm Based on Transaction Segments.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Hongbin Wang, Daxin Liu, and Binge Cui
- Abstract
A new multilevel transaction schedule algorithm based on transaction segments is proposed as a high-ready-wait algorithm. A multilevel transaction is divided into several transaction segments. High security level transaction segments are executed if there aren't any conflicted low security level transaction segments. Transaction segments are committed in an increasing order of security levels in multilevel transactions. This algorithm eliminates the read-firstly semantic dependency and write-firstly semantic dependency in multilevel transactions without using multi-version, so it can be implemented using un-trusted codes. The algorithm is described and proved that it is A-CIS-correct in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
43. An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Wu Yang, Xiao-Chun Yun, and Jian-Hua Li
- Abstract
In recent years, with the rapid development of network technique and network bandwidth, the network attacking events for web servers such as DOS/PROBE are becoming more and more frequent. In order to detect these types of intrusions in the new network environment more efficiently, this paper applies new machine learning methods to intrusion detection and proposes an efficient algorithm based on vector quantization and support vector machine for intrusion detection (VQ-SVM). The algorithm firstly reduces the network auditing dataset by using VQ techniques, produces a codebook as the training example set, and then adopts fast training algorithm for SVM to build intrusion detection model on the codebook. The experiment results indicate that the combined algorithm of VQ-SVM can greatly improve the learning and detecting efficiency of the traditional SVM-based intrusion detection model. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
44. Optimal Search Strategy for Web-Based 3D Model Retrieval.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Qingxin Zhu, and Bo Peng
- Abstract
In this paper we propose an optimal search strategy for web-based 3D model retrieval. Special considerations are given to the determination of the target's initial probability distributions. Two optimal search strategies are derived by using Lagrange multiplier method. Experimental results shows that this approach is more efficient than random search. Keywords: Search theory, 3D model retrieval, mobile agent, Lagrange multiplier. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
45. A Web-Based System for Adaptive Data Transfer in Grid.
- Author
-
Heng Tao Shen, Jinbao Li, Jun Ni, Wei Wang, Jiafan Ou, Linpeng Huang, and Minglu Li
- Abstract
Appearance of GridFTP in Grid won't substitute the old data transfer protocols, however, existing data servers confuse the users and applications. There is no unified data accessing approach. This paper proposes an implementation of web based adaptive Grid data transfer solution over multiple protocols. The system is made up of three tiers: a transfer core named PAFTP, transfer service based on WSRF, and portlet application. The core hides diversity of various protocols and provides a universal interface to higher level data access. This solution not only offers multi-protocol reliable data transfer, simple file operation and monitoring on transfer status, but also emphasizes performance of mass file transfer. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
46. A Model of XML Access Control with Dual-Level Security Views.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Wei Sun, Da-xin Liu, and Tong Wang
- Abstract
XML becomes a standard format for data interchanges on Internet, especially in E-commerce. Although XML technology has been widely used, the research and development on XML security is still at the early stage. The control of XML access is important for protecting XML documents from being illegally modified or accessed. Most of available models utilize a single level check point. In this paper, we proposed an access control model with dual level access control: file-level and element-level (or attribute-level). The model allows adopt the XBLP policy with file-level security, while employs Hide-Node View for element-level security. The architecture framework of the access control model and implementation are briefly described. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
47. The Research of Scientific Computing Environment on Scilab.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Zhili Zhang, Zhenyu Wang, Deyu Qi, Weiwei Lin, Dong Zhang, and Yongjun Li
- Abstract
The paper focuses on the implements of distributed parallel computing on Scilab, a wide-used Grid environment. Netbutterfly Grid Computing System (NGCS) is designed , Some of key issues, such as the architecture of NGCS ,job distributing, system communications, fault tolerance and security problem are analyzed and discussed. And a new science computing method is advanced. Finally, an example on Grid computing environments is presented. The experiment shows that it's the results are satisfying. Keywords: Distributed parallel computing, Grid computing, Scilab, globus toolkit. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
48. An Energy Efficient Network Topology Configuration Scheme for Sensor Networks.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Eunhwa Kim, Jeoungpil Ryu, and Kijun Han
- Abstract
Since sensor nodes have limited battery power, it is desirable to select a minimum set of working sensor nodes which should be involved in sensing and forwarding data to the sink. In this paper, we propose a topology scheme which selects a minimum set of working nodes in the sensor network field to avoid wasting excessive energy by turning off too many redundant nodes. Our scheme offers a solution for configuring network topology with a minimal number of working nodes. Simulations show that our scheme extends the lifetime of the dense sensor networks, and achieves the desired robust coverage as well as satisfactory connectivity to the sink in an energy efficient fashion. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
49. A Distributed Information System for Healthcare Web Services.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Joan Lu, Naeem, Tahir, and Stav, John B.
- Abstract
This paper introduces the reader to the design considerations and implementation in the development of a client server system for GE Healthcare Technologies (GEHT). It assesses the viability of using new technology to implement a secure reliable distributed system. It also discusses the advantages of the new Microsoft.Net platform over established technologies. Finally, it concludes that the new system can provide data capture and retrieval functionality using a mobile computing device to pass data to an information system for GEHT employees across the globe. Throughout the report the design documentation is represented in the form UML documents to enable the reader to comprehend the workflow and lines of communication of the proposed system. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
50. Deployment of Web Services for Enterprise Application Integration (EAI) System.
- Author
-
Heng Tao Shen, Jinbao Li, Minglu Li, Jun Ni, Wei Wang, Jie Liu, Er-peng Zhang, Jin-fen Xiong, and Zhi-yong Lv
- Abstract
The process to explore application integration for enterprise information system is called Enterprise Application Integration (EAI). Generally, EAI that based on the peer-to-peer has many limitations, such as poor extensibility, difficulty of management, and high-cost etc. These disadvantages can be overcome by Web services technology which helps to integrate large-scale, distributed enterprise applications together. This paper presents a framework of EAI which based on Web services, and gives discussions on its major functional modules. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.