Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II (eBook)

eBook Download: PDF
2016 | 1st ed. 2017
XIV, 253 Seiten
Springer International Publishing (Verlag)
978-3-319-46586-9 (ISBN)

Lese- und Medienproben

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II -
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts:

Part I-addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects.

Part II-discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things.

Part III-discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management.

Part IV-dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Preface 6
ISAT 2016 Conference Organization 8
General Chair 8
Program Co-Chairs 8
Local Organizing Committee 8
International Program Committee 9
ISAT 2016 Reviewers 11
Contents 14
Embedded Systems Design and Applications 16
1 Modification of Concurrent Design of Hardware and Software for Embedded Systems—A Synergistic Approach 17
Abstract 17
1 Introduction. Coherent Co-synthesis of Computer Systems—Model and Method 17
1.1 General Model for the Problem of System Synthesis 19
1.2 Process of System Synergic Co-synthesis 20
1.3 Adaptation of Ant Colony Optimization Algorithm to Solve the Problems of Par-Synthesis 22
2 Customization of the Branch and Bound Greedy Algorithm to Synthesis Problems Solving 24
3 Calculative Experiments 24
3.1 Optimization of Scheduling Length and System Cost 25
3.2 Power Consumption and System Cost Optimization 26
4 Conclusion 27
References 27
2 Elastic FOPID+FIR Controller Design Using Hybrid Population-Based Algorithm 28
Abstract 28
1 Introduction 28
2 Description of Proposed FOPID + FIR Controller 30
3 Description of the Proposed Hybrid Algorithm 31
3.1 Encoding of the Controller Parameters 32
3.2 Proposed Algorithm Description 33
4 Simulation Results 35
4.1 Problem Evaluation 35
4.2 Simulation Parameters 36
4.3 Obtained Results 36
4.4 Simulation Results 38
5 Conclusions 39
Acknowledgment 39
References 39
3 Optimization of Read-Only Memory Program Models Mapping into the FPGA Architecture 40
Abstract 40
1 Introduction 40
2 Research and Publications Survey 41
3 Problem Stating 41
4 Algorithm of Optimizing the ROM Program Model Mapping into the FPGA Architecture by the Data Group Compression 42
4.1 Data Compression by the Dictionary Method 42
4.2 Data Compression by the Sequence Length Coding Method 43
4.3 Data Compression by the Combined Method of Sequence Length and Dictionary Coding 44
4.4 Data Grouping Algorithm 45
5 Data Grouping Algorithm Complexity Assessment 47
6 Results of Experimental Studies 48
7 Conclusions 50
References 50
4 Simple Rule-Based Human Activity Detection with Use of Mobile Phone Sensors 51
Abstract 51
1 Introduction 51
2 Related Works 52
3 Detection Method 53
3.1 The General Procedure of Activity Recognition 53
3.2 Rules for Activity Detection 54
4 Evaluation Experiment 59
5 Final Remarks 60
References 61
Systems Security Issues 62
5 Timed Analysis of Security Protocols 63
Abstract 63
1 Introduction 63
2 Formal Model and Computational Structure 65
3 Implementation and Experimental Result 67
4 Summary 72
References 72
6 Some Remarks on Security Protocols Verification Tools 74
Abstract 74
1 Introduction 74
2 Automatic Verification of Correct and Incorrect Protocols 76
3 Results 82
References 83
7 Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall 85
Abstract 85
1 Introduction 85
2 Algorithmic Complexity 86
2.1 Algorithmic Complexity Attacks 86
3 Hash Table Data Structure 87
3.1 Exploiting Hash Table Data Structure Computational Complexity 88
4 Stateful Firewalls 89
4.1 Session Table 89
4.2 Cisco® Context-Based Access Control 90
4.3 CBAC Limitations 90
4.4 Exploring Cisco® CBAC Mechanism and Its Session Table 91
5 Experimental Results 92
5.1 Primary Goals and Assumptions 92
5.2 Analyzing CBAC Hash Function 93
5.3 Environment Design and Configuration 95
5.4 Procedure 98
5.5 Results 99
5.6 Observations and Notes 102
6 Conclusions and Future Work 104
References 104
8 Analysis of the Minutia Groups Base of Currents Algorithms ‘Pasterns’ Database 106
Abstract 106
1 Introduction 106
2 Quality Assessment of Biometric Algorithms 107
3 Current Algorithms 107
3.1 Minutiae Adjacency Graph (MAG) 108
3.2 Elastic Minutiae Matching (EMM) 109
4 Fingerprint Recognition Algorithm Based on Minutia’ Groups 110
5 Conversion of Fingerprints’ Data 113
6 The Experiment 113
7 Conclusion and Future Work 114
References 114
Computing and Service Systems Architectures 116
9 Self-organizing Agents for Dynamic Network- and QoS-Aware Service Composition in Cloud Computing 117
Abstract 117
1 Introduction 118
2 Related Work 119
3 Dynamic Network- and QoS-Aware Cloud Service Composition 120
4 Cooperative Agents Based-Dynamic Cloud Service Composition 121
4.1 Structural Description 121
4.2 Solution Formalization 123
4.3 Functional Description 125
5 Experimental Results 127
6 Conclusion and Future Works 129
References 129
10 Distributed Computing Architecture on Epiphany MIMD Accelerators 131
Abstract 131
1 Introduction 131
2 Parallella 132
3 Architecture 135
4 Implementation 135
4.1 Network 136
4.2 Node Implementation 137
4.3 Epiphany Interface 137
4.4 Task Definition 138
5 Sample Scenarios 139
6 Conclusions and Future Work 139
Acknowledgments 140
References 140
11 A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPI Applications 142
Abstract 142
1 Introduction 143
2 Related Work 144
3 Proposed Solution 144
4 Experiments 147
5 Summary and Future Work 151
References 151
12 Towards Effective Allocation of Resources in Service-Oriented Systems 153
Abstract 153
1 Introduction 153
2 Related Work 154
3 Resource Allocation Task 155
4 Service System Model 156
5 Experiments 159
6 Conclusions 162
References 163
Communication Systems 164
13 Transient Processing Analysis in a Finite-Buffer Queueing Model with Setup Times 165
Abstract 165
1 Introduction 165
2 Description of the Model and Auxiliary Results 167
3 Integral Equations for Conditional Departure Process 169
4 Compact-Form Solution for Transforms 172
5 Numerical Results 175
References 177
14 Analysis of Routing Protocols Metrics for Wireless Mesh Networks 178
Abstract 178
1 Introduction 178
2 Routing Protocols 179
3 Routing Metrics 181
4 Simulation Study 182
5 Simulation Results 182
6 Conclusions 185
15 Energy Efficient Dynamic Load Balancing in Multipath TCP for Mobile Devices 188
Abstract 188
1 Introduction 188
2 Multipath Data Transfer 189
3 Energy Considerations and Optimal Load Distribution 190
4 Dynamic Load Balancing 192
5 How to Measure Sub-channel Capacity 193
6 Channel Capacity Prediction 194
7 Experimental Evaluation 195
8 Summary and Conclusions 197
Acknowledgments 197
References 197
Data Processing Tools 199
16 Mutation Testing in Model Accuracy Assessment 200
Abstract 200
1 Introduction 200
2 Background and Related Work 201
3 An Approach to Model Accuracy Assessment 202
3.1 An Outline of the Approach 203
3.2 Stage 1—Generation of Mutated Test Cases 204
3.3 Stage 2—Execution of Mutated Test Cases 204
3.4 Stage 3—Analysis of Assessment Results 205
4 Case Study: A HVAC System 206
4.1 Generation of Mutants 207
4.2 Execution of Mutants 207
4.3 Analysis of the Assessment Results 208
5 Conclusions and Future Work 209
References 209
17 Generating Source Code Templates on the Basis of Unit Tests 211
Abstract 211
1 Introduction 211
2 Gathering Information from Unit Tests 213
2.1 Syntactic Analysis 213
2.2 Semantic Analysis and Generating Source Code Templates 214
2.3 Existing Solutions 216
3 Tool Implementation 216
4 Case Study 218
4.1 Results Comparison 219
5 Conclusions 220
References 221
18 Decomposition and Reduction of Indexing Structures with Use of the GPU Computations 222
Abstract 222
1 Introduction 222
2 The LSI Method 223
3 The K-Means Method 223
4 Decomposition and Reduction 225
5 Experiment 226
6 Conclusions 234
References 234
19 Social-Media Data Analysis Using Tessera Framework in the Hadoop Cluster Environment 235
Abstract 235
1 Introduction 235
2 Tessera 237
3 Design of the Proposed System 238
3.1 Hadoop Cluster Infrastructure 238
3.2 Architecture of Proposed Solution 239
3.3 Design of the Visualizations 240
4 Implementation of Visualizations and Experiments 240
4.1 Description of Input Data and Preprocessing 240
5 Implementation of Selected Visualizations and Experiments 242
6 Conclusion and Future Work 246
Acknowledgments 247
References 247
Author Index 248

Erscheint lt. Verlag 23.9.2016
Reihe/Serie Advances in Intelligent Systems and Computing
Advances in Intelligent Systems and Computing
Zusatzinfo XIV, 253 p. 115 illus., 28 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Nachrichtentechnik
Schlagworte Computer Networks • information systems • Information Systems Architecture • ISAT 2016 • Risk Management
ISBN-10 3-319-46586-4 / 3319465864
ISBN-13 978-3-319-46586-9 / 9783319465869
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 6,3 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
CHF 24,30
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
CHF 37,95