The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose an x-coordinate point compression method for elliptic curves over Fp, where p >; 3 is prime, as an alternative to the classical y-coordinate point compression method. A point P̃ = (x̃, y) will be compressed as P = (x, y) where x has only two bits and, thus, our method allows more compact representations when [log2 x] >; [log2 y]+1. Both...
Service Oriented Architecture (SOA) provides a new generation of software architectures that attracts attention as promising way for smooth integration of loose coupled software applications. In addition to all benefits, it adds new dimensions to the complexity of designing, building, testing, deploying and maintaining Service-based applications (SBA). Research in verification and validation applied...
A new psychological model for efficient data transmission in mobile networks under communication constrains is proposed. It accounts for user personality characteristics to determine the feasible path for packet transmission from source to target and to predict the availability of the communication resources based on dynamically determined level of node generosity. Two case studies are presented with...
The present paper focuses on means of creating a framework for e-learning services by integrating learning and dedicated information systems facilities within a web portal. The information system facilities are provided into the web portal by retrieving the dedicated software services from the specific systems and synchronizing databases based on various technologies (php / postgresql, asp / MS sql)...
Service-oriented systems are fast becoming complex nodes in a vast digital, dynamic ecosystem, these systems of systems require the identification and establishment of flexible and spontaneous/opportunistic collaborative activities among various parties. Such sophisticated systems need new engineering approaches able to integrate new functionalities and behaviours into running systems composed by...
Video surveillance systems have become very popular these days. In households, enterprises and even cities the monitoring systems have been deployed to improve the sense of safety. The large number of video cameras require a new, smart approach to browsing and analyzing video streams. There is a lot of research on motion detection, face recognition or integration with external sensors. We notice the...
Fault-tolerance of services has received great attention for years, yet it is not clear how this can be done efficiently for different types of services. Current research focuses on finding strategies to provide fault-tolerance using commodity hardware and as independent of the service and transparent to clients as possible. We propose a replication system to provide fault-tolerance for any type of...
The security of service-oriented applications is crucial in several contexts such as e-commerce or e-governance. The design, implementation, and deployment of this kind of services are often so complex that serious vulnerabilities remain even after extensive application of traditional validation techniques, such as testing. Given the importance of security-sensitive service applications, the development...
Interoperability represents an important issue in developing successful e-Services applications. Many times data is obtained from services belonging to one organization and must be used within a service under the domain of another one. Automatic data migration and transfer utilities are not sufficiently addressed. There are various ways of moving data between files and databases, all with the common...
Reversibility is one of the most important characteristics of microscopic mechanisms in physics. It is our aim in this paper to describe some classes of linear cellular automata(LCAs) that can be studied in terms of an associated reversible LCA. We prove that any given LCA having as local transition map a row contraction can be dilated to a LCA having a local rule with isometric components. We finally...
The goal of this paper is to develop a fault tolerant Grid Intrusion Detection System. The architecture is based on a network of high level detection systems which receive intrusion information form local detectors. These high level detectors constantly exchange information using gossip algorithms and correlate the data received received from the local level to detect complex attacks targeted at different...
Vehicular Ad-Hoc Networks (VANETs) have the potential to optimize traffic in modern urban areas, reduce congestions and pollution, and increase passenger safety and comfort. Applications designed for such networks pose new security constraints. The mobile devices have limited resources to spare, and the network connectivity is reduced because of the mobility of cars. We present a security protocol...
In this article, we illustrate practical issues arising in the development of efficient implementation of distributed algorithms that solve a general (concave) constrained maximization problem. Such optimizations arise in many situations. One typical example is those of resource allocation in computer networks, where the system aims at maximizing some global function of the users individual throughput...
We are witnessing the birth of the digital enterprise, in which many of the enterprise operations will be performed by independent software programs or by programs acting on behalf of humans. These heterogeneous agents are often managing different activities (such as stock trading or inventory management) in an autonomous manner and interact with each other in order to perform their job, creating...
Resource scheduling based on SLA (Service Level Agreement) in cloud computing is NP-hard problem. There is no efficient method to solve it. This paper proposes a new method to solve the problem by applying stochastic integer programming for optimal resource scheduling in cloud computing. Applying Gröbner bases theory for solving the stochastic integer programming problem and the experimental...
Non-interference is a semantic program property that assigns confidentiality levels to data objects and prevents illicit information flows to occur from high to low security levels. Erasure is a way of strengthening confidentiality by upgrading data confidentiality levels, up to the extreme of demanding the removal of secret data from the system. In this paper, we propose a certification technique...
The paper details the modeling and processing of a semantic behavior repository for Web users/customers in the context of an application model that involves the capturing of eye tracking during the user-interface interaction, AJAX-style communication between the client and the server, and the conversion of user attention maps to convenient data structures. Due to the problem complexity, the client-side...
This paper presents ArhiNet, an integrated system for generating, processing and querying semantically enhanced archival eContent related to the middle age history of Transylvania, targeting cultural heritage preservation. The main workflows of the system aim to perform semantically enhanced eContent generation and knowledge acquisition, as well as knowledge processing and retrieval. Through knowledge...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.