Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008

Author: Emilio Corchado

Publisher: Springer Science & Business Media

Published: 2008-10-24

Total Pages: 331

ISBN-13: 3540881816

DOWNLOAD EBOOK

The research scenario in advanced systems for protecting critical infrastructures and for deeply networked information tools highlights a growing link between security issues and the need for intelligent processing abilities in the area of information s- tems. To face the ever-evolving nature of cyber-threats, monitoring systems must have adaptive capabilities for continuous adjustment and timely, effective response to modifications in the environment. Moreover, the risks of improper access pose the need for advanced identification methods, including protocols to enforce comput- security policies and biometry-related technologies for physical authentication. C- putational Intelligence methods offer a wide variety of approaches that can be fruitful in those areas, and can play a crucial role in the adaptive process by their ability to learn empirically and adapt a system’s behaviour accordingly. The International Workshop on Computational Intelligence for Security in Inf- mation Systems (CISIS) proposes a meeting ground to the various communities - volved in building intelligent systems for security, namely: information security, data mining, adaptive learning methods and soft computing among others. The main goal is to allow experts and researchers to assess the benefits of learning methods in the data-mining area for information-security applications. The Workshop offers the opportunity to interact with the leading industries actively involved in the critical area of security, and have a picture of the current solutions adopted in practical domains. This volume of Advances in Soft Computing contains accepted papers presented at CISIS’08, which was held in Genova, Italy, on October 23rd–24th, 2008.


Intermittently Connected Mobile Ad Hoc Networks

Intermittently Connected Mobile Ad Hoc Networks

Author: Abbas Jamalipour

Publisher: Springer Science & Business Media

Published: 2011-10-29

Total Pages: 125

ISBN-13: 1461415721

DOWNLOAD EBOOK

In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users’ behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths between every pair of nodes. For the conventional MANETs, mobility of nodes is considered as a challenge and needs to be handled properly to enable seamless communication between nodes. However, to overcome intermittent connectivity in the ICMANs context, mobility is recognized as a critical component for data communications between the nodes that may never be part of the same connected portion of the network. This comes at the cost of addition considerable delay in data forwarding, since data are often stored and carried by the intermediate nodes waiting for the mobility to generate the next forwarding opportunity that can probably bring it close to the destination. Such incurred large delays primarily limit ICMANs to the applications, which must tolerate delays beyond traditional forwarding delays. ICMANs belong to the family of delay tolerant networks (DTNs). However, the unique characteristics (e.g., self-organizing, random mobility and ad hoc based connection) derived from MANETs distinguish ICMANs from other typical DTNs such as interplanetary network (IPN) with infrastructure-based architecture. By allowing mobile nodes to connect and disconnect based on their behaviors and wills, ICMANs enable a number of novel applications to become possible in the field of MANETs. For example, there is a growing demand for efficient architectures for deploying opportunistic content distribution systems over ICMANs. This is because a large number of smart handheld devices with powerful functions enable mobile users to utilize low cost wireless connectivities such as Bluetooth and IEEE 802.11 for sharing and exchanging the multimedia contents anytime anywhere. Note that such phenomenal growth of content-rich services has promoted a new kind of networking where the content is delivered from its source (referred to as publisher) towards interested users (referred to as subscribers) rather than towards the pre-specified destinations. Compared to the extensive research activities relating to the routing and forwarding issues in ICMANs and even DTNs, opportunistic content distribution is just in its early stage and has not been widely addressed. With all these in mind, this book provides an in-depth discussion on the latest research efforts for opportunistic content distribution over ICMANs.


High Performance Computing - HiPC 2004

High Performance Computing - HiPC 2004

Author: Luc Bougé

Publisher: Springer Science & Business Media

Published: 2004-12-08

Total Pages: 553

ISBN-13: 3540241299

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 11th International Conference on High-Performance Computing, HiPC 2004, held in Bangalore, India in December 2004. The 48 revised full papers presented were carefully reviewed and selected from 253 submissions. The papers are organized in topical sections on wireless network management, compilers and runtime systems, high performance scientific applications, peer-to-peer and storage systems, high performance processors and routers, grids and storage systems, energy-aware and high-performance networking, and distributed algorithms.