Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine...
Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-mach...
Written with students in mind, this text provides a survey of the latest research into the Hough transform for line detection and its contemporary developments. It also presents an overview and detailed elaboration of recent research related to PClines - a line parameterization based on parallel coordinates.
Written with students in mind, this text provides a survey of the latest research into the Hough transform for line detection and its contemporary dev...
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. These are encountered in many critical areas of everyday life such as transportation networks, electric power distribution grids, and social networks of mobile users. STN modeling and computations raise significant challenges. The model must meet the conflicting requirements of simplicity and adequate support for efficient algorithms. Another challenge is to address the change in the semantics of common graph operations, such as, shortest path computation assuming different semantics, or...
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. These are encountered in many critical areas ...
Declarative query interfaces to Sensor Networks (SN) have become a commodity. These interfaces allow access to SN deployed for collecting data using relational queries. However, SN are not confined to data collection, but may track object movement, e.g., wildlife observation or traffic monitoring. While rational approaches are well suited for data collection, research on Moving Object Databases (MOD) has shown that relational operators are unsuitable to express information needs on object movement, i.e., spatio-temporal queries. Querying Moving Objects Detected by Sensor Networks...
Declarative query interfaces to Sensor Networks (SN) have become a commodity. These interfaces allow access to SN deployed for collecting data using r...
Description Logics (DLs) is a family of formalisms used to represent knowledge of a domain. They are equipped with a formal logic-based semantic. This book introduces Sequent Calculi and Natural Deduction for some DLs (ALC, ALCQ). It argues that such systems improve the extraction of computational content from DLs proofs for explanation purposes.
Description Logics (DLs) is a family of formalisms used to represent knowledge of a domain. They are equipped with a formal logic-based semantic. This...
In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, and the effects of tuning both CPU and network bandwidth. Modifications were made to deterministically halt cores when idle. Additionally, capabilities were added to alter operating P-state. At the application level, an understanding of the power requirements of a range of important DOE/NNSA production scientific computing applications running at large scale is gained by simultaneously collecting current and voltage measurements on the hosting...
In this work, the unique power measurement capabilities of the Cray XT architecture were exploited to gain an understanding of power and energy use, a...
Present trends in cloud providers (CPs) capabilities have given rise to the interest in federating or collaborating clouds, thus allowing providers to revel on an increased scale and reach more than that is achievable individually. Current research efforts in this context mainly focus on building supply chain collaboration (SCC) models, in which CPs leverage cloud services from other CPs for seamless provisioning. Nevertheless, in the near future, we can expect that hundreds of CPs will compete to offer services and thousands of users will also compete to receive the services to run their...
Present trends in cloud providers (CPs) capabilities have given rise to the interest in federating or collaborating clouds, thus allowing providers...
Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that...
Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-hel...
RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current application model treats tags simply as ID carriers and deals with each tag individually for the purpose of identifying the object that the tag is attached to. The uniqueness of RFID as an Infrastructure is to change the traditional individual view to a collective view that treats universally-deployed tags as a new infrastructure, a new wireless platform on which novel applications can be developed.
The book begins with an...
RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current ap...
For a large, complex system, the amount of test cases in a regression test suite can range from a few hundred to several thousands, which can take hours or even days to execute. Regression testing also requires considerable resources that are often not readily available. This precludes their use in an interactive setting, further contributing to an inefficient testing process.
Cloud computing offers the use of virtualized hardware, effectively unlimited storage, and software services that can help reduce the execution time of large test suites in a cost-effective manner. The research...
For a large, complex system, the amount of test cases in a regression test suite can range from a few hundred to several thousands, which can take ...