عنوان مقاله |
نویسنده (ها) |
مربوط به کنفرانس |
چکیده |
|
A Fault-Tolerance Pattern Recommender for Transactional Service Compositions |
Omid Bushehrian
Mohammad Mohsen Mavaddat
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Combining services to build compositions is a key concept in Service Oriented Architecture. In a service composition with transactional property, each service failure may impose a rollback cost on the ... مشاهده کامل
Combining services to build compositions is a key concept in Service Oriented Architecture. In a service composition with transactional property, each service failure may impose a rollback cost on the composition due to the rollback of its dependent successfully ended services. Reducing the mean rollback cost of a composition is possible by applying Fault Tolerance (FT) patterns to each task in order to decrease the failure probability of the composition. Different FT patterns with different imposed cost and execution time overheads can be applied to each task within the composition workflow. In this paper we have formulated the problem of choosing FT patterns for a given transactional composition as an optimization problem and a NSGA-II genetic algorithm has been proposed to find a mapping of patterns totasks which satisfies conflicting objectives. The effectiveness of the proposed approach has been evaluated by applying the optimization process to different compositions عدم مشاهده کامل
Combining services to build compositions is a key concept in Service Oriented Architecture. In a service composition with transactional property, each service failure may impose a rollback cost on the ... مشاهده کامل
|
خرید مقاله
|
SiftCU: An AcceleratedCuda Based Implementation of SIFT |
Mahdi S. Mohammadi
Mehdi Rezaeian
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Scale Invariant Feature Transform (SIFT) is a popular image feature extraction algorithm. SIFT’s features are invariant to many image related variables including scale and change in viewpoint. Despite its broad ... مشاهده کامل
Scale Invariant Feature Transform (SIFT) is a popular image feature extraction algorithm. SIFT’s features are invariant to many image related variables including scale and change in viewpoint. Despite its broad capabilities, it is computationally expensive. This characteristic makes it hard for researchers to use SIFT in their works especially in real time application. This is a common problem with many image-processing related algorithm. Utilizing graphical processing unit (GPU) through parallel programming is an affordable solution for this issue. In this paper we present a GPU-based implementation of SIFT using Compute Unified Device Architecture (CUDA) programming framework. We compare our CUDA-based implementation, namely siftCU, with CPU-based serial implementations of SIFT both in feature matching accuracy and time consumption. Results show our implementation can gain 4x speed up over serial CPU implementation even though we have used a low end graphic card while using a powerful CPU for test platform عدم مشاهده کامل
Scale Invariant Feature Transform (SIFT) is a popular image feature extraction algorithm. SIFT’s features are invariant to many image related variables including scale and change in viewpoint. Despite its broad ... مشاهده کامل
|
خرید مقاله
|
A Computational Model of Trust Based on a Multi-Criteria Decision Making Approach |
Mehrdad Ashtiani
Mohammad Abdollahi Azgomi
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
In this paper, we formulate trust as a multi-criteria decision making process. Making trust decisions needs a structural way in computational environments. Based on this need, we use a combination ... مشاهده کامل
In this paper, we formulate trust as a multi-criteria decision making process. Making trust decisions needs a structural way in computational environments. Based on this need, we use a combination of fuzzy AHP and fuzzy VIKOR approaches from the domain of multi-criteria decision making to formulate trust. The VIKOR method was originally developed to solve decision problems with conflicting and non-commensurable criteria.By using the VIKOR approach, we can rank the trustee alternatives and determine the compromise solution that is closest to the ideal. Combining fuzzy logic with this approach lets us model the vague, uncertain and subjective nature of trust عدم مشاهده کامل
In this paper, we formulate trust as a multi-criteria decision making process. Making trust decisions needs a structural way in computational environments. Based on this need, we use a combination ... مشاهده کامل
|
خرید مقاله
|
A semi-automatic approach for WSC |
Parinaz Mobedi
Asadollah Shahbahrami
Reza Ebrahimi Atani
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Web Services Composition (WSC) is a seamless approach to develop the software development projects on the basis of reusability potentials. Most web services composition approaches tend to benefit from either ... مشاهده کامل
Web Services Composition (WSC) is a seamless approach to develop the software development projects on the basis of reusability potentials. Most web services composition approaches tend to benefit from either of practical or formal models; this paper proposes an approach for semi-automatic web services composition to close the gap between formal models and database practice. In this approach, the web services are stored in a database after being modeled in G-net. The G-net services employed in the composition process can be subsequently obtained using a proposed WSC search algorithm with SQL queries. Finally, based on the relational algebra operators the WSC is performed and a Java-based tool is developed for WSC. The proposed approach is demonstrated using a digital class assistant as a case study عدم مشاهده کامل
Web Services Composition (WSC) is a seamless approach to develop the software development projects on the basis of reusability potentials. Most web services composition approaches tend to benefit from either ... مشاهده کامل
|
خرید مقاله
|
Acceleration of IPTABLES Linux Packet Filtering using GPGPU |
Keyvan Karimi
Arash Ahmadi
Mahmood Ahmadi
Bahram Bahrambeigy
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Firewalls are a piece of software or hardware that control access to organization networks. Packet filtering is placed in the heart of firewalls. It is performed by comparing each data ... مشاهده کامل
Firewalls are a piece of software or hardware that control access to organization networks. Packet filtering is placed in the heart of firewalls. It is performed by comparing each data packet against a rule set. In the high bandwidth networks, filtering becomes a time consuming task. In this situation, the packet filtering firewall can reduce the overall throughput and become a bottleneck. To solve this problem a wide range ofresearcheshave been done to improve overall throughput of the packet filtering firewalls. In this paper, the first matching rule mechanism of Iptablesis implemented in user-space by employing parallel processing capability of Graphics Processing Unit (GPU). The results show that CPU-GPU accelerated code brings significantly higher throughput over the CPU version ofIptablescode. The overall throughput of packet filtering on GPU for 10,000 rules is about 400,000 Packets PerSecond (PPS) which is 43 times faster than inefficient first matching rule algorithm of Iptableson CPU عدم مشاهده کامل
Firewalls are a piece of software or hardware that control access to organization networks. Packet filtering is placed in the heart of firewalls. It is performed by comparing each data ... مشاهده کامل
|
خرید مقاله
|
An Improved Architectural Pattern for Organic Resource-Flow Systems |
Ali Tarihi
Hassan Haghighi
Fereidoon Shams
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Organic Computing or OC for short is rather a new bio-inspired paradigm that applies the OC principles extracted from the nature to technical application. To control the emergence caused by ... مشاهده کامل
Organic Computing or OC for short is rather a new bio-inspired paradigm that applies the OC principles extracted from the nature to technical application. To control the emergence caused by the self-organizing property of OC systems, an architectural pattern called observer/controller has been proposed. In this paper, the observer/controller architecture is improved for a subset of OC systems known as Resource-Flow Organic systems by using some known architectural/design patterns in order to achieve a new architectural pattern. The proposed architectural pattern splits the observer/controller into a set of cooperative capabilities among the agents that both covers the whole-system architecture and enables straightforward distribution of observer and controller. The result of the study is presented as a case study to show the applicationof the proposed pattern and its advantages عدم مشاهده کامل
Organic Computing or OC for short is rather a new bio-inspired paradigm that applies the OC principles extracted from the nature to technical application. To control the emergence caused by ... مشاهده کامل
|
خرید مقاله
|
Modified Bitwise Hill Crypto System |
Jaber Karimpour
Masoud Aghdasifam
Ali Asghar Noroozi
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Hill Cipher (HC) is a polygraph symmetric data encryption method which is based on matrices. In 2011, Desoky et al.proposed the Bitwise Hill Crypto System (BHC) which is based on ... مشاهده کامل
Hill Cipher (HC) is a polygraph symmetric data encryption method which is based on matrices. In 2011, Desoky et al.proposed the Bitwise Hill Crypto System (BHC) which is based on bit arithmetic. In this paper,weanalyze BHC and show that it is insecure. Then, we propose a new modification using chaotic map which provides better security عدم مشاهده کامل
Hill Cipher (HC) is a polygraph symmetric data encryption method which is based on matrices. In 2011, Desoky et al.proposed the Bitwise Hill Crypto System (BHC) which is based on ... مشاهده کامل
|
خرید مقاله
|
Applying Link Prediction Techniques for Item Recommendation in C2C Commercial Networks |
Mohammad Dehghan Bahabadi
Alireza Hashemi Golpayegani
Leila Esmaeili
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
There has been a big revolution in electronic commerce since the advent of recommender systems. Most of the current recommender systems are designed for B2C e-commerce sites. But this paper ... مشاهده کامل
There has been a big revolution in electronic commerce since the advent of recommender systems. Most of the current recommender systems are designed for B2C e-commerce sites. But this paper focuses on building a recommendation algorithm that increases volume and speed of forming trades between users by considering special features of C2C e-commerce sites. In this paper, we consider users and transactions between them as a network in which nodes represent users and edges represent transactions between them. By this mapping, link prediction approaches could be used to build the recommender system. The proposed model, rather than topology of the network, uses nodes’ features like: category of items, ratings of users, and reputation of sellers. The results show that the proposed model can be used to predict future trades between users in a C2C commercial network عدم مشاهده کامل
There has been a big revolution in electronic commerce since the advent of recommender systems. Most of the current recommender systems are designed for B2C e-commerce sites. But this paper ... مشاهده کامل
|
خرید مقاله
|
A Self Organizing Architecture for Adjusting Level of Difficulty in Games |
Adeleh Ebrahimi
Mohammad-R Akbarzadeh-T
|
سمپوزیوم علوم کامپیوتر و مهندسی نرمافزار 2013 |
Games are played by players with different strategies; a game could be frustrating or disappointing, if the level of difficulty does not match the player’s skills. In this paper we ... مشاهده کامل
Games are played by players with different strategies; a game could be frustrating or disappointing, if the level of difficulty does not match the player’s skills. In this paper we use Non-Player Characters (NPCs) to build a Self-Organizing System (SOS) for adjusting the level of difficulty in games. To this end, we apply Artificial Neural Network and Interactive Evolutionary Algorithms, and focus on player’s hidden responses. Our results demonstrate that the proposed SOS can adapt itself with different level of skills عدم مشاهده کامل
Games are played by players with different strategies; a game could be frustrating or disappointing, if the level of difficulty does not match the player’s skills. In this paper we ... مشاهده کامل
|
خرید مقاله
|
Weighted Consensus-Based Cooperative Spectrum Sensing with Learning Automata (LA) in Cognitive Radio Networks |
Milad Soltani
Abdorasoul Ghasemi
|
سمپوزیوم شبکههای کامپیوتری و سیستمهای توزیع شده 2013 |
In traditional cooperative spectrum sensing such as OR-rule
or AND-rule, secondary user (SU) must maintain coordination based on
a fusion center. In this paper, we propose the weighted average consen-
sus, based on ... مشاهده کامل
In traditional cooperative spectrum sensing such as OR-rule
or AND-rule, secondary user (SU) must maintain coordination based on
a fusion center. In this paper, we propose the weighted average consen-
sus, based on Learning Automata(LA), for fully distributed cooperative
spectrum sensing without fusion center. At the first stage of the pro-
posed scheme, each SU makes measurement about presence of primary
user (PU) at the beginning of each time slot, then communicates with
local neighbors to exchange information to make the final decision and
update its weight using a LA based algorithm. Simulation results show
that the proposed scheme has better performance than the non weighted
consensus and existing weighted consensus scheme. Also, the convergence
time of the proposed scheme is less than the existing weighted consensus
and almost equal to non weighted consensus scheme عدم مشاهده کامل
In traditional cooperative spectrum sensing such as OR-rule
or AND-rule, secondary user (SU) must maintain coordination based on
a fusion center. In this paper, we propose the weighted average consen-
sus, based on ... مشاهده کامل
|
خرید مقاله
|