The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the current Web3D document format, users are forced to choose certain document formats to use, either during development with a particular tool or when it will be displayed in a browser. Only one format that can be processed by any browser at one given time. This raises the main problem of not allowing users to display a variety of objects with different formats in their browser. For this problem,...
Similar product identifications with different brands focus on different aspects, and there are different coding methods of product identification, which brings inconvenience to the data storage and representation during integrating the data from various data sources and increases the difficulty of data query. This paper proposes a data dictionary based XML to define a storage format, which can be...
Web services which allow the interoperability and communication of heterogeneous systems in the Web through Internet protocols, are also subject to attacks a well as destructive as sophisticated. Contrariwise, very few solutions exist to ensure the availability of Web services in the presence of these attacks. In order to tackle these issues, we propose a comprehensive and complete attack-tolerance...
Cooperative Intelligent Transportation Systems (C-ITS) are gaining ground and are almost part of our everyday life. Within these environments, huge amounts of messages are exchanged. Besides, these messages should be secure in order to ensure users' privacy. Public Key Infrastructures (PKI) represent the most common security solution. Due to the vehicles speed, the communication with the PKI should...
Nowadays, the performance and security are always hot research topics in different data fusion systems. In this paper, a more efficient and secure heterogeneous data fusion system has been proposed and implemented. Firstly, based on the global data pattern, which is referred to the concept of view in database, the heterogeneous data is transformed into Extensible Markup Language(XML) documents which...
XML data can be represented by a tree or graph and the query processing for XML data requires the structural information among nodes. Designing an efficient labeling scheme for the nodes of Order-Sensitive XML trees is one of the important methods to obtain the excellent management of XML data. Previous labeling schemes such as region and prefix often sacrifice updating performance and suffer increasing...
Multi-vendor interoperability can be achieved at node and network levels by relying on standard data modeling. YANG represents an attractive data modeling solution for network component definition. This article reports on the work done on YANG models for optical networks with particular reference to flexible-grid networks. In addition to a YANG model description for link, node, and media channels,...
Currently, web and mobile-based systems exchange information with other services, mostly through APIs that extend the functionality and enable multipart interoperable information exchange. Most of this is accomplished through the usage of RESTful APIs and data exchange that is conducted using JSON over the HTTP or HTTPS protocol. In the case of the exchange requires some specific security requirements,...
In recent years, there has been considerable interest in Intercloud. Inspired by the Internet, Intercloud allows clouds to be interconnected, forming a cloud/network of clouds. With Intercloud, many new and powerful cloud computing services can be provided. One of the basic problems with supporting Intercloud is the need to address the issue of how to ensure that clouds can communicate with each other...
The paper deals with generation of new hybrid algorithms based on the bioinspired search methods. Subsystem architecture involves a data management module and a module of automation of new search procedures generation. This module is found on genetic search and genetic programming mechanisms. The authors suggest a new approach for description of the data structure based on the XML. As a result it...
Text encoding is considered as the most functional outset to store and retrieve data, with trees of information and lists of concordances as its first immediate results, but there is a wide range of possible results opening up when a complete encoding process is accomplished. The three case studies described in this paper are meant to give an overall view on the preliminary steps of a wider project...
According to the characteristics of Weibo event, this paper analyzes the advantages and disadvantages of the traditional K-means algorithm, and proposes the K-means clustering algorithm of events based on variable time granularity. The experiments show that the improved algorithm is more suitable for clustering analysis of Weibo event, improves the efficiency of clustering algorithm, and solves the...
The massive amounts of data processed in modern computational systems is becoming a problem of increasing importance. This data is commonly stored directly or indirectly through the use of data exchange languages, such as JavaScript Object Notation (JSON), for human-readable platform agnostic access. This paper focuses on describing and analyzing SJSON, a library that explores succinct representations...
Accurate classification and recognition of pulmonary nodules is an important and key process of Computer-Aided Diagnosis (CAD) system in lung cancer diagnose. Although it has become an increasingly popular research topic, it remains a lot of scientific and technical challenges. Not only do we lack the accurate and effective algorithm of recognition and classification, but also we have difficulties...
The implementation of software based OPCUA servers on computing platforms in actuators and sensors of the field layer remains a challenge due to the protocols high memory and bandwidth prerequisites. This paper discusses encoding aspects of OPC UA binary data representations for devices with limited random access memory and low fieldbus throughput, especially focusing on single-chip microcomputing...
Providing efficient encoding approaches for mining XML query patterns is crucial, as many applications use XML to share data in their disciplines over the Internet. These encoded XML query patterns can be used to design an index mechanism or cached and thus enhance XML query performance. Several XML query pattern mining algorithms have been proposed to record user queries in the system and thus discover...
This paper proposes an approach to k-bounded Petri nets behavioral equivalence checking using the model checking method and mainstream verifier nuSMV. For the comparison of behavior of two nets, an add-in net is introduced which performs a supervisory control of these two nets. The approach uses an implicit word-to-word comparison of labeled Petri net languages with invisible transitions when computing...
This paper presents a novel approach based on structure recurrence in XML documents for Android mobile devices. The model identifies recurrent structures and gives a feasible solution to be easily adapted for resource constrained mobile devices. XML files with sequentially repetitive blocks of structures can be processed differently to reduce the processing time. It relieves the parser from the computationally...
Service-Oriented Architecture is a cornerstone for the realization of the user's needs through the automatic composition of services from service descriptions and user tasks. Yet, automatic service composition processes commonly assume that Linguistic Web Service descriptions and user requests share the same abstraction level, and that services have been pre-designed to integrate. In this paper, we...
We show that there exists a graph G with O(n) nodes, where any forest of n nodes is a node-induced sub graph of G. Furthermore, for constant arboricity k, the result implies the existence of a graph with O(nk) nodes that contains all n-node graphs as node-induced sub graphs, matching a Ω(nk) lower bound. The lower bound and previously best upper bounds were presented in Alstrup and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.