Access Control Mechanisms for Inter-organizational Workflow

Size: px
Start display at page:

Download "Access Control Mechanisms for Inter-organizational Workflow"

Transcription

1 Access Contol Mechanisms fo Inte-oganizational Wokflo Myong H. Kang, Joon S. Pak and Judith N. Fosche Naval Reseach Laboatoy Infomation Technology Division 4555 Ovelook Ave. Washington, DC {mkang, jpak, ABSTRACT As moe businesses engage in globalization, inte-oganizational collaboative computing gos in impotance. Since e cannot epect homogeneous computing envionments in paticipating oganizations, heteogeneity and Intenet-based technology ae pevalent in inte-oganizational collaboative computing envionments. One technology that povides solutions fo data shaing and ok coodination at the global level is inteoganizational okflo. In this pape, e investigate the access contol equiements fo inte-oganizational okflo. We then pesent access contol solutions fo inte-oganizational okflo based on ou implementation. Many of the equiements and solutions in this pape addess the scalability of eisting secuity solutions, the sepaation of inte-oganizational okflo secuity fom concete oganization level secuity enfocement, and the enfocement of fine-gained access contol fo inte-oganizational okflo. the entepise needs Fleible IT esouces and infastuctue that allo apid configuation, Secue distibuted applications that can be easily constucted acoss entepise boundaies, and Entepise-level anomaly detection and ecovey. One technology that ties to povide solutions to the above poblems is inte-oganizational okflo. A okflo is a distibuted application that inteacts ith uses and othe applications to achieve common goals. Even though the above thee equiements ae equally impotant, e focus on the second item, especially access contol issues. In this pape, e use entepise application and inte-oganizational okflo intechangeably because an inte-oganizational okflo is an instance of entepise applications. Figue 1 shos to inteoganizational okflos. Keyods Access contol, Secuity, Oganizational secuity, Entepise, Wokflo Oganization1 Oganization2 1. INTRODUCTION The Intenet and business globalization have eplaced the sepaation that as typical of the taditional business paadigm. Unconventional coalitions among businesses and nations ae fomed to advance common goals. These coalitions then quickly dissolve as individual objectives change. Theats no lie in these essential connections among paticipating entepises, hich also enable pofitable coopeation. To facilitate these alliances, businesses and the militay ely on distibuted infomation technology (IT) fo most opeations. A secue computing infastuctue (e.g., secue netok, fieall) is needed to suppot thei missions. In addition to a secue computing infastuctue, Oganization3 : host : oganization bounday : inte-oganizational okflo Figue 1. To inte-oganizational okflos In figue 1, one okflo spans to (physical) oganizations hile the othe okflo spans thee (physical) oganizations. We can vie an inte-oganizational okflo as a vitual entepise that suppots a specific mission. Once a okflo is designed, each task [3, Appendi] should be assigned to a specific oganization and host (compute). In this eample, e assume that hosts ae connected via some netoking mechanisms (e.g., Intenet). Also note that multiple okflo tasks may be assigned to the same host. In this pape, e study the access contol equiements fo inteoganizational okflos. We then pesent access contol solutions fo inte-oganizational okflo based on ou 1

2 implementation. The est of the pape is oganized as follos. We biefly descibe a pototype inte-oganizational okflo management system (WFMS), SALSA, in section 2. Section 3 pesents access contol equiements fo inte-oganizational okflos. We evie elated access contol eseach in section 4. In section 5, e pesent access contol mechanisms that have been implemented in SALSA. Section 6 summaizes this pape. 2. AN INTER-ORGANIZATIONAL WORKFLOW MANAGEMENT SYSTEM An entepise application that suppots global, vitual entepises may span multiple oganizations and legal boundaies. Conventional WFMS cannot suppot such entepise applications due to its mostly centalized achitectue and functions. In most cases, the autonomy of uses and oganizations ae geatly esticted due to centalized achitectual and design consideations. Theefoe, e need ne inte-oganizational WFMSs. A WFMS, typically, consists of to pats; design-time and untime tools. We constucted an inte-oganizational WFMS, called SALSA [4], by implementing ne design-time tools and etending an eisting distibuted CORBA-compliant okflo untime engine, ObWok[6] fom Univesity of Geogia. Thee is no centalized okflo engine in Obok. Instead each task contains a potion of the okflo specification that petains to that task s inteaction ith othe tasks in the okflo. Data esouces that the task uses ae also knon as ok-items. Ou etension is based on one impotant equiement of inteoganizational okflos: the autonomy of paticipating oganizations should be honoed not only duing the design phase but also duing the untime (eecution) phase. In othe ods, diffeent okflo designes may ok on diffeent potions of an inte-oganizational okflo duing the design phase. Also, multiple okflo untime engines, hich ae managed by diffeent oganizations, may have to ok togethe to accomplish a mission. To suppot such autonomy among paticipating oganizations, e etended ObWok ith coopeative pocesses [3] that allo multiple independent autonomous okflos to coopeate based on the contact among them. To make the contact among paticipating oganizations igoous, e intoduce a okflo domain in ou design tool. A okflo domain is a geneic concept that can be used to epesent each oganization o even secuity domain [3]. A okflo in a okflo domain coesponds to an independent okflo duing untime. In othe ods, hen an inte-oganizational okflo is designed, it is a single okflo acoss multiple oganizations. Hoeve, this single inte-oganizational okflo design is split into multiple autonomous okflos, and they ae deployed to paticipating oganizations fo eecution. The numbe of independent okflos that ill be poduced is the same as the numbe of paticipating oganizations o okflo domains [3]. In this ay, e addess the autonomy of oganizations and thei concen fo mutual potection. In othe ods, each oganization maintains and eecutes its potion of okflo, and any data to and fom othe oganizations fo eceiving and sending should be echanged accoding to the oganization s secuity policies [3]. Any communication among okflo domains should follo the contact govening coopeation among independent okflos o oganizations. The contact may specify hat kinds of equests o data can be passed fom one entity to anothe, hen a esponse is epected. Since seveal potions of okflo design may be assembled to accomplish an entepise level mission, it is impotant to validate that the oveall design is consistent and sound. We povide tanslatos fo conveting an inteoganizational okflo design into inputs to an eisting Peti-net based analysis tool Woflan [11], and a model checking tool Spin [2], so that the consistency of the inte-oganizational okflo design can be validated. The oveall stuctue of SALSA is as follos: SALSA Design Tool XML Compile Runtime Specification & Code Figue 2. Intenal stuctue of SALSA Runtime Engine The SALSA design tool allos application designes to specify mission/application logic, and the contact govening inteactions among paticipating oganizations. In othe ods, the designe can specify the follos: okflo domains that may epesent oganizations task specifications (e.g., inputs, outputs, invocation method fo the undelying component) in each okflo domain, and contol logic and data flo among tasks. The SALSA design tool also allos application designes to hide compleity by poviding a ay to goup elated tasks into a moe abstact highe-level task (i.e., the level of abstaction) [3, see Appendi]. The SALSA design tool saves the design specification in XML. When the okflo design is completed, the compile eads the XML epesentation of the design, and geneates Woflan o Spin inputs fo design analysis and validation. Finally it geneates untime specification and code. Cuently, e ae using modified vesion of ObWok as ou untime engine. ObWok does not have a cental schedule; athe the schedule is distibuted ith each task containing the code petaining to it. Each schedule only knos its pedecessos and successos. Each ObWok schedule eads a task specification that as geneated by the compile and eecutes its ole in the oveall mission. Biefly, ObWok consists of the folloing CORBA seves: task seves, oklist seve, data seves, and a monito seve. Each task seve, hich is a pocess fom the opeating systems point of vie, may contain moe than one task [Appendi], hee each is a sepaate thead in a task seve. The oklist seve maintains the lists of pending ok fo human tasks. Data seves act as a epositoy fo data that is needed by tasks. A monito seve maintains the histoy of eecution and anses queies fom othe seves and monito clients. Since they ae CORBA seves, they communicate ith each othe though CORBA s IIOP. The task seve and oklist seve ae not only CORBA seves, but also HTTP seves. When a human opeato has to inteact ith oklist seve (e.g., human task), he can do so though the 2

3 HTTP potocol. Also hen a human okflo manage needs to intevene fo some easons, he can do so though the HTTP potocol. Figue 3 shos a simplified vie of ObWok. Human Opeato Woklist Seves Data Seves W D Tasks Human Manage Task Seves M Monito Seves : CORBA s IIOP : HTTP Figue 3. A simplified vie of ObWok 3. ACCESS CONTROL REQUIREMENTS FOR INTER-ORGANIZATIONAL WORKFLOW Thee ae many secuity equiements fo inte-oganizational okflos such as establishing secue communication among seves, and poviding diffeent vies of the okflo based on uses needs-to-kno and thei affiliated oganization. Hoeve, in this pape, e focus on access contol equiements fo inteoganizational okflos Sepaation of Application-level (Wokflo) Secuity Infastuctue fom Oganization-level Secuity Infastuctue Because thee ae seveal oganizations that suppot an inteoganizational okflo, the paticipants may change duing the life cycle of an inte-oganizational okflo. Fo eample, a ne oganization may eplace an old oganization o thee may be a mege o sepaation among oganizations. Since each oganization may suppot seveal inte-oganizational okflos, it is not ealistic fo each oganization to estuctue its secuity infastuctue fo inte-oganizational okflos. Theefoe, inteoganizational okflos need to be insulated fom oganization level changes so that okflos can continuously opeate ithout changing okflo specifications including secuity specifications Fine-gained and Contet-based Access Contol Taditionally, an access contol decision is made based on subjects and objects. The subjects may be uses o pocesses acting on behalf of uses. The objects ae data o esouces in the system; fo eample, objects may be files in the file system. Conventionally, a pocess, hich may be an application eecuting on behalf of a use, is the finest gained subject fo hich an access contol decision can be made by the opeating system. Inte-oganizational okflos tend to be lage scale and consist of many okflo tasks [Appendi], hich can be theads ithin a pocess. Hence, conventional access contol may be too coase fo okflos, in geneal. What e need is a fine-gained access contol that is based on a use s oking contet. Wokflo tasks povide uses oking contet. Even the same use may have diffeent data access needs and equiements based on the tasks the use is oking on Suppoting Dynamic Constaints Dynamic constaints ae equied in many inte-oganizational okflos. Dynamic constaints may be based on the uses of a specific task. Fo eample, if a use pefoms a task,, then that peson may not be alloed to pefom anothe task, (i.e., sepaation of duty [8]) in the same okflo instance. If thee is one centalized WFMS, then it is not too difficult to enfoce such constaints. Hoeve, inte-oganizational okflo may consist of seveal autonomous okflos that ok togethe to achieve an entepise-level mission. Theefoe, inte-oganizational okflos need some fameok fo shaing elevant eecution histoy among paticipating okflos. The above access contol equiements ae not only equiements fo inte-oganizational okflos but also those of entepise applications that have to be eecuted acoss multiple oganizations. In the folloing, e pesent access contol elated eseach. 4. RELATED RESERCH Taditionally, an access contol decision is made based on subjects and objects (see figue 4). The subjects may be uses o pocesses acting on behalf of uses. Conventionally, a pocess is vieed as a subject; hoeve, fo okflos, a pocess may include seveal okflo tasks, hich can act on behalf of diffeent uses. The objects ae data o esouces in the system. Fo eample, objects may be files in the file system. Pemission is a set of authoized inteactions that a subject can have ith one o moe objects in the system. Pemission may have a vaiety of intepetations in vaious access contol models. The basic idea is to contol ho can access hich esouces. Pocesses on behalf of uses Uses Subjects Access Contol Decision Pemissions Access contol module Resouces files Figue 4. A taditional access contol model Data Objects Objects 4.1. Role-based Access Contol (RBAC) Role-based access contol (RBAC, [7]) has apidly emeged in the 1990s as a technology fo managing and enfocing secuity in lage-scale systems. The basic notion of RBAC is that pemissions 3

4 ae associated ith oles, and uses ae assigned to appopiate oles. RBAC ensues that only authoized uses ae given access to cetain data o esouces. This simplifies secuity management and e can see that RBAC focuses on the management of subjects in figue 4 using uses oles instead of identities. In RBAC, a ole is a semantic constuct foming the basis fo access contol policy. System administatos can ceate oles, gant pemissions to those oles, and then assign uses to the oles on the basis of thei specific job esponsibilities and policy. Theefoe, ole-pemission elationships can be pedefined, making it simple to assign uses to the pedefined oles. RBAC helps (especially, in a lage entepise system) to detemine efficiently hich pemissions have been authoized fo hat uses. Constaints (e.g., sepaation of duties, [8]) can apply to elations and functions in an RBAC model. This is an effective mechanism fo establishing highe-level oganizational policy. Constaints ae pedicates, hich ae applied to the RBAC elations and functions and etun a value of acceptable o not acceptable Task-based Authoization Contols (TBAC) Task-based Authoization Contols (TBAC, [10]) is a taskoiented model fo access contol and authoization. It is an active secuity model that is ell suited fo distibuted computing and dynamic infomation pocessing activities, such as okflo management and agent-based distibuted computing. TBAC focuses on secuity modeling and enfocement fom the application and entepise pespective athe than fom a systemcentic subject-object vie. In the subject-object paadigm, the access decision function checks hethe a subject has the equied pemissions fo the opeation, but it does not cae about the contetual infomation about ongoing activities o tasks. In contast, in the TBAC paadigm, pemissions ae checked-in and checked-out in a just-in-time fashion based on activities o tasks Fine-gained Object Appoaches Conventionally, a file o a data object is a unit of objects fo hich an access contol decision can be made by the opeating system. To povide fine-gained access contol, pemissions can be based on DTD 1 [5] o IDL 2 [9] fo data objects. In othe ods, pemissions can be based on specific fields o methods of data objects. Fo instance, NAI (Netok Associates, Inc.) Lab s OO- DTE (Object Oiented Domain and Type Enfocement, [9]) povides elatively fine-gained access contol than typical object oiented appoaches. It can povide access contol based on individual fields o methods of an object in CORBA-based systems. These appoaches mainly focus on poviding finegained access contol to objects (figue 4). We efe to such appoaches as fine-gained object appoaches in this pape. 1 Document Type Definition that is used in Etensible Makup Language (XML). 2 Inteface Definition Language. 5. ACCESS CONTROL MECHANISMS FOR INTER-ORGANIZATIONAL WORKFLOWS Inte-oganizational okflos have to be eecuted on eisting computing esouces in paticipating oganizations. They may be Windos-based, UNIX-based, LINUX-based, etc. Eisting systems have thei on secuity mechanisms. It is not ealistic to epect paticipating oganizations to change thei computing esouces o secuity mechanisms to suppot inte-oganizational okflos. What is needed ae access contol mechanisms fo okflo that can ok ith eisting systems and secuity mechanisms. Thee ae many ays to povide access contol mechanisms fo inte-oganizational okflos. The access contol mechanisms that e evieed in section 4 ae all applicable to inte-oganizational okflos. The challenge is to satisfy access contol equiements that e specified in section 3 ithout changing the eisting secuity mechanisms and infastuctue of paticipating oganizations. Fom an oganizational-level access contol point of vie, a okflo is an odinay application pogam acting on behalf of uses. Fo eample, figue 5 shos an inte-oganizational okflo that consists of to autonomous okflos. In this eample, each autonomous okflo is just anothe application pogams. Hence, each autonomous okflo should follo its oganization s secuity policy. This implies that if e caefully hide additional access contol mechanisms ithin the WFMS, it does not affect the eisting access contol mechanisms that ee deployed by paticipating oganizations. In this section, e highlight access contol mechanisms that ae incopoated in ou WFMS, SALSA. Since these secuity mechanisms ae managed by SALSA, eisting oganizations secuity mechanisms ae not affected. Oganization1 okflo Oganization level access contol Uses Oganization2 Uses T4 T5 T7 T6 T8 T9 okflo Inte-oganizational okflo Pemissions Oganization level access contol Pemissions Resouces Files Resouces Files Data objects Data objects Figue 5. Inte-oganizational okflo fom conventional access contol point of vie Decoupling Wokflo and Oganization Secuity Infastuctues In SALSA, thee ae to types of tasks: human and automatic tasks. Human opeatos accomplish human tasks and automatic tasks ae accomplished by undelying components (e.g., database, 4

5 eecutables). Hence, no human opeatos ae needed fo automatic tasks. RBAC is a convenient ay fo a system administato to ceate oles, gant pemissions to the oles, and assign uses to the oles on the basis of thei job esponsibilities and the system policy. Theefoe, in the SALSA implementation, e use RBAC fo human tasks. Thee ae many oganizations that can suppot an inteoganizational okflo. Hence, an inte-oganizational okflo may have to inteact ith the secuity infastuctues of seveal paticipating oganizations. If thee is a change in paticipation, a pat of the inte-oganizational okflo has to be moved to othe oganizations, and the inte-oganizational okflo specification (especially secuity specification) may have to be changed. We ant to avoid changing inte-oganizational okflo specifications, including secuity specifications (e.g., ho can access a task). To avoid such disuptions, e need to decouple the okflo-specific secuity infastuctue fom an oganization s secuity infastuctues. Geneally speaking, an oganization s ole seve contains oganization-specific ole stuctues that specify available oles, ole hieachy, and use-ole assignments in the oganization. If a okflo accesses the oganization s ole seve diectly, e cannot achieve this decoupling beteen the okflo secuity infastuctue and oganization secuity infastuctue. To achieve this decoupling, e intoduce a ole domain, hich is a ole stuctue inteface fo okflo. Just like egula RBAC, each ole domain contains specific oles and the elationships among them. Any oganization that needs to paticipate in the coopeation should map its ole stuctue to the ole domain fo the okflo. Because of this indiect inteaction beteen a okflo and oganizations ole stuctue, the changes in the paticipating oganizations do not affect the okflo secuity infastuctue. Instead, these changes ae confined to modification of the mapping fom an oganization s ole stuctue to the ole domain. In this sense, the elationship beteen a ole domain and the ole stuctues of oganizations is simila to the elationship beteen an inteface and a seve implementation in client-seve inteactions. Role domains ae intefaces fo okflos, and each oganization povides a mapping beteen the ole domain and the oganization s specific ole stuctue. SALSA povides a ole edito [4] fo a okflo designe to define a ole domain, oles in the domain, and the elationship among the oles. When a okflo is designed, a okflo designe uses okflo domains, hich ee intoduced in section 2, instead of oganizations. The designe also specifies access contol equiements in tems of ole domains instead of oganizationspecific ole stuctues. Fo eample, an application designe may specify equied oles fo each task in the folloing ay, <Task n, Role>: [{oledomain, (oles)}, {RD_1, (A, B, C, )}, {RD_2, (X,Y, )} ] <Task n, Role> declaes that this is a equied ole assignment fo task n. In this eample, RD_1 is a specific ole domain and A,B,C,D ae specific oles in RD_1. If a use belongs to one of the ole domains in the equied ole set (epessed in [ ]) and has one of the oles in that ole domain o moe pivilege than one of the oles in the equied ole set, he is alloed to pefom the task. The ole assignment to each task duing design time is tuned into a secuity policy fo each task that has to be enfoced duing untime. When a use accesses a task duing untime, he pesents a cetificate 3 that eveals his identity and ole in his oganization. The ObWok s Woklist seve looks up the mapping beteen the ole stuctue of the use s oganization and that of the ole domain. If the use has the pope ole, he can eecute the task and thus access the necessay esouces Fine-gained and Contet-based Access Contol Conside a okflo that consists of 4 tasks:,,, and T4. Futhe, assume that all fou tasks ae in one pocess, and task needs pemission P1, task needs pemission P2, task needs pemission P3, and task T4 needs pemission P4. Using taditional access contol, even if a use needs only pemission P1 to eecute task, he ill get P1, P2, P3, and P4 because conventional access contol mechanisms cannot distinguish diffeent tasks ithin a pocess. Pocess Pemission P1 P3 P2 P4 Figue 6. Taditional access contol model To suppot fine-gained access contol in a okflo, e intoduce task-specific access contol modules (TACM). The pupose of the TACM is to povide fine-gained access contol fo both subject and object (see figue 2) in the folloing ays: 1. Divide a pocess (subject in figue 4) into many tasks, 2. Divide the data set (object in figue 4) that a okflo needs to access into many subsets. This is possible because the esouces that each task needs to access may be a subset of the esouces that the hole okflo needs to access, and 3. Povide access contol beteen divided, thus smalle, subject and divided object. Pocess Pemission P1 P3 P2 P4 Figue 7. Fine-gained access contol model Thus, e make use of fine-gained object appoaches that ee discussed in section 4.3 at the task level athe than the pocess level. We povide a mechanism fo a okflo designe to povide the task-data access specification that descibes hich fields of a data object can be accessed by a specific task. We povide a tool fo a okflo designe to specify a data access 3 In ou implementation, X.509 cetificate is used to povide use ID and ole/oganization infomation. We use Phaos JCA to geneate cetificates and Phaos SSLava fo SSL connection beteen Web bose and ObWok s Woklist seves. 5

6 policy fo each task. In othe ods, each task has its associated data access policy that has a seies of the folloing tiples, <Task n, Data>: [{Data object, field name, pemission}, { }, ] <Task n, Data> declaes that this is a data access contol assignment fo task n. The pemission in this statement can eithe be ead-only, full-contol, no-access, etc. The task data access specification is also tanslated into a untime specification fo ObWok to enfoce. Any violation of the specification causes ObWok to tho a data access eception. In this appoach, if a use has the coect equied ole, the use is alloed to access the task. Hoeve, data access by the use is futhe esticted by the task s contet. Conside a okflo that consists of to tasks, Task1 and Task2. Assume that the folloing access contol policy has been set: <Task1, Role>: [{GM, (Accountant)}, {Fod, (Accountant)}] <Task1, Data>: <Task2, Role>: <Task2, Data>: [{DataObj1, field1, ead-only}, {DataObj2, field3, full-contol}] [{GM, (Manage)}, {Fod, (Poject_leade)}] [{DataObj2, field3, ead-only}, {DataObj3, field2, ead-only}, {DataObj3, field3, fullcontol}] This means that only a use ho has the Accountant ole in GM o Fod ole domains can eecute Task1. When the use eecutes Task1, he has ead-only pemission on field1 in DataObj1 and full-contol pemission on field3 in DataObj2. Ecept field1 in DataObj1 and field3 in DataObj2, the use cannot ead no modify any othe fields o data object. In this sense, SALSA uses capability-based secuity. Figue 8 sho that each task maintains data access capabilities. Fo eample, task can ead fields and of data object D2, and ite to field of D2. In case of human tasks, a human opeato must have a equied ole to access a task. Once the access to the task is ganted, the opeato can access only the potion of data that is in the task s capability list. D1 D2 D3 capability Figue 8. Fine-gained secuity fo all tasks It is inteesting to compae the fine-gained and contet-based access contol that e intoduced in this section to TBAC [10]. As e evieed in section 4.2, TBAC activates and deactivates pemissions in a just-in-time fashion based on the contet associated ith pogessing tasks. If the TBAC is implemented in a centalized fashion (i.e., pemissions ae managed by a cental access contol module), it could intoduce unnecessay constaints (e.g., ace conditions) acoss okflos. In ou SALSA implementation, pemissions ae managed in a distibuted fashion; hence, it does not intoduce unnecessay constaints acoss okflos (i.e., SALSA can enfoce TBAC-like policies in a distibuted fashion). Fo eample, if a use ants to eecute a human task, the use must have the equied ole fo the task. This is enfoced by Access Contol List (ACL) based secuity (see section 5.1 and step1 of figue 9). Note that subjects S1, S2, ae {oledomain, ole} pais and,, ae tasks in step1 of figue 9. Step1: Step2: S1 S2 S3 S4 D1 Figue 9. To-step pocess fo SALSA secuity in tems of access contol matices Once a use is ganted to access a task, the use s access to data objects is futhe esticted by the capability of the task that the use is accessing (step2 of figue 9). Hence, the task povides a contet fo the use s data access. Since the data access is esticted by the capability of each task, thee is no need fo TBAC style activation and deactivation of pemissions in a justin-time fashion based on the contet associated ith pogessing tasks Suppoting Dynamic Constaints Wokflos sometimes equie dynamic constaints such as dynamic sepaation of duty [8] (e.g., 2-man ule). Conside the folloing eample: a simplified employee epense eimbusement scenaio (see figue 10). This eample consists of five tasks; fou human tasks and one automatic task. We assume that a equied ole is associated ith each human task. Fo simplicity, e also assume that all oles ae fom the same ole domain. Any human opeato ho has a ole that is in the equied ole set o has moe pivilege than any of the oles in the equied ole set can eecute the task. Note that the Issue_check and Sign_check tasks equie the same ole in this eample. D2 T4 Access to human tasks ae enfoced by access contol list (ACL) based secuity D3 All tasks have capabilities (Capability-based secuity) 6

7 Pepae Compae Appove Issue check Sign check Requied Role: Employee Pepae an itemized epense eimbusement equest Automatic Task Access database to etieve alloable epenses fo each item and make peliminay appoval Requied Role: Manage Appove the equest Requied Role: Accountant Issue a check Requied Role: Accountant Sign the check that allos untime tasks to quey eecution histoy fom the monito seve. The second aspect is untime suppot. Inte-oganizational okflos consist of seveal autonomous okflos. Hence, thee may be many monito seves. In SALSA, thee is a monito seve pe untime engine. Theefoe, e need some communication mechanisms that echange elevant infomation among monito seves. Each monito seve has its on database so that it can ecod events fom ObWok and anse any quey fom ObWok o monito clients. Monito clients can egiste thei topics of inteests to monito seves. Fo eample, one monito client may be inteested in all events in a specific okflo hile anothe monito client may be inteested in only events that have to do ith a specific task. The monito seve ecods clients inteests and dispatches only those events that each client is inteested in. The monito seve is not only a seve but also a client, so that it can egiste its topics of inteests to othe monito seves and eceive inteesting events fom othe monito seves (figue 11). Figue 10. An eample of a simplified employee epense eimbusement pocess Conside a scenaio hee an employee pepaes an epense eimbusement equest. An oganization may ant to enfoce a secuity policy that specifies that the employee ho pepaed an epense eimbusement equest should not appove the equest. This is a geneal application of the taditional 2-man ule (i.e., sepaation of duty) that can be applied to to diffeent tasks, Pepae and Appove, ith to diffeent equied oles. In othe ods, if the employee, ho initiates the eimbusement pocess, happens to be a manage, then the manage should not appove the epense eimbusement equest that he initiated even though he has both Employee and Manage oles. We can apply the 2- manuletothetoothetasks,issue_check and Sign_check that have the same equied ole, Accountant. In this case, the 2- man ule says that a peson ho issues a check should not sign the check. The Accountant ole can be split into to oles, Accountant1 and Accountant2, and assign Accountant1 to Issue_check task and Accountant2 to Sign_check task ith static sepaation of duty (i.e., uses cannot be assigned to both Accountant1 and Accountant2). Hoeve, that is a solution that educes the numbe of people ho can pefom the task. To ovecome these difficulties, e popose to use histoy-based access contol. We have intoduced the okflo monito seve in section 2. Since the monito seve keeps a log of eecution histoy (e.g., ho pefoms task A in okflo instance 5), a task that equies eecution histoy to make access contol decision can quey the monito seve. To implement this mechanism, e had to etend SALSA. The fist aspect is design-time suppot. We intoduce constaints fo each task. Suppose the folloing constaint must be enfoced: task1 and task3 should not be eecuted by the same peson fo the same okflo instance. A okflo designe can specify dynamic constaints on task1 as!pefome(task3), hich means that a use ho pefomed task3 cannot pefom this task, and!pefome(task1) fo task3. If thee is a dependency beteen task1 and task3, then only the task that is eecuted late may be constained. This ill geneate a untime specification ObWok othe Monito seves Monito Seve DB Monito clients Figue 11. The stuctue of SALSA monito seve Since each monito seve can act as a client e can aange monito seves in a hieachical fashion. Conside a scenaio hee oganization A is collaboating ith oganizations B, C, and D, and oganization A is acting as a coodinato. Assume that each oganization maintains its on okflo and monito seves due to secuity and autonomy issues. Even though they manage thei on okflos, oganization A may need to kno the status of the ok in pogess in oganizations B, C, and D. In this case e can configue monito seves so that oganization A can eceive specific events fom oganizations B, C, and D. 6. SUMMARY In this pape, e descibed okflo-specific access contol equiements such as dynamic constaints, fine-gained and contet-based access contol, and the need to insulate inteoganizational okflos fom oganization level changes. We pesented a ay to satisfy the above equiements. We have intoduced the ole domain as an inteface beteen okflos and oganization-specific secuity infastuctue. We also have intoduced histoy-based access contol fo dynamic constaints, and fine-gained and contet-based access contol. Even though e intoduced the access contol mechanisms in the contet of inte-oganization okflo, they can be applied in othe contets, such as applications ithin a system o an oganization. In ou implementation of these mechanisms fo SALSA, e caefully engineeed the mechanisms so that eisting secuity 7

8 infastuctues of paticipating oganizations ae not affected and the autonomy of each oganization is honoed. We can summaize the SALSA secuity achitectue and its inteaction ith oganizations secuity mechanisms as follos (see figue 12). Thee ae to kinds of access contol modules in the oveall secuity achitectue: An oganization-specific access contol module (OACM) that is contolled by each oganization and enfoces a secuity policy that as set by each oganization. The access contol module in Figue 4 is an eample of an oganizationspecific access contol module. The task-specific access contol module (TACM) that is contolled by each okflo and enfoces task-specific secuity policies. Only a peson ith intimate knoledge of the okflo can set the secuity policy of each task because, in geneal, a task-specific secuity policy depends on the semantics of the okflo. This module enfoces access contol mechanisms that ee intoduced in section 5.2. Since TACMs ae distibuted and autonomous, they cannot enfoce constaints that depend on the activities of othe tasks. To accommodate the needs fo coodinating access contol decision among tasks, e epand the capabilities of the okflo monito. The monito ecods okflo-specific events duing untime and esponds to queies fom the task-specific access contol modules of the okflo. TACMs need to suppot changes in paticipants because oganizations that suppot a specific mission may be changed even befoe the mission is ove. We can achieve this goal by educing the dependency of task-specific access contol modules on paticipating oganizations secuity infastuctue. The okflo secuity seve (WSS) is a tool fo achieving this goal. The okflo secuity seve povides okflo-specific secuity infastuctue infomation (e.g., okflo-specific ole domain) and the mapping infomation beteen the okflo-specific secuity infastuctue and the secuity infastuctues of paticipating oganizations. When the paticipants change, e need to update the mapping beteen the okflo-specific secuity infastuctue and that of paticipating oganizations. Role/ID WSS TACM Monito Events TACM T4 TACM TACM Wokflo Access Contol by Oganization Pemissions OACM Resouces Files TACM: Task-specific Access Contol Module OACM: Oganization-specific Access Contol Module WSS: Wokflo Secuity Seve Figue 12. The SALSA secuity achitectue Data objects Cuently, e have completed implementation of 90% of all the mechanisms that e descibed in this pape. The emaining ok is to modify ObWok to enfoce a histoy-based access contol fo dynamic constaints. We plan to elease the SALSA design tools to the public at the fist quate of CY REFERENCES [1] Etensible Makup Language (XML) 1.0, Wold-ide- Web Consotium, html. [2] G.J. Holzmann, The model checke Spin, IEEE T/SE, Vol. 23, No. 5, May 97, pp See also [3] M. H. Kang, J. N. Fosche, A. P. Sheth, K. J. Kochut, and J. A. Mille, A Multilevel Secue Wokflo Management System, Poceedings of the 11 th Confeence on Advanced Infomation Systems Engineeing, Heidelbeg, Gemany (1999). [4] M. H. Kang, B. J. Eppinge, and J. N. Fosche, Tools to Suppot Secue Entepise Computing, In Poceedings of 15 th Annual Compute Secuity Applications Confeence, Phoeni, Aizona, Decembe [5] D. L. Long, J. Bake, and F. Fung, A Pototype Secue Wokflo Seve, In Poceedings of 15 th Annual Compute Secuity Applications Confeence, Phoeni, Aizona, Decembe [6] K. Kochut, A. Sheth, and J. Mille, ORBWok: A CORBA- Based Fully Distibuted, Scalable and Dynamic Wokflo Enactment Sevice fo METEOR, UGA-CS-TR , Technical Repot, Depatment of Compute Science, Univesity of Geogia, [7] R. S. Sandhu, E. J, Coyne, H. Feinstein, and C. Youman, Role-Based Access Contol Models, IEEE Compute, 29(2): 38-47, Febuay [8] R. Simon and M. E. Zuko, Sepaation of Duty in Role- Based Access Contol Envionments, In Poceedings of Ne Secuity Paadigms Wokshop, Septembe [9] D.F.Stene,G.W.Tally,C.D.McDonell,D.L.Sheman, D. L. Sames, and P. X. Pastuel, Scalable Access Contol fo Distibuted Object Systems, In Poceedings of 8 th USENIX Secuity Symposium, Washington, DC, August [10] R. K. Thomas and R. S. Sandhu, Task-based Authoization Contols (TBAC): A Family of Models fo Active and Entepise-oiented Authoization Management, In Poceedings of the IFIP WG11.3 Wokshop on Database Secuity, August [11] H.M.W. Vebeek, T. Basten, and W.M.P. van de Aalst. Diagnosing Wokflo Pocesses using Woflan. Computing Science Repot 99/02, Eindhoven Univesity of Technology, Eindhoven, Appendi: An Inte-oganization Wokflo Model In ou inte-oganization okflo model, a task epesents an abstaction of an activity. A task can be egaded as a unit of 8

9 ok, hich is pefomed by a vaiety of pocessing entities, depending on the natue of the task. Thee ae to kinds of tasks: a netok task and a simple task. A simple task can be pefomed by (ealized by) a human, o by pefoming a computeized activity though eecuting a compute pogam, a database tansaction, etc. A netok task is pefomed by a netok of inteconnected tasks. Hence, a netok task povides one level of abstaction (vie) and its ealization povides a loe level of abstaction (vie). Since the ealization of a task may contain many tasks at diffeent levels of abstaction, a task is a ecusive efeence in the inte-oganization okflo model. In this model, each task belongs to a okflo domain hich may epesents an oganization o some othe domain (e.g., secuity domain). Figue A shos an inte-oganization okflo (i.e., Task1 that is a top-level netok task) that consists of thee levels of abstactions (vies). In Figue A, Task1 and Task 5 ae netok tasks that ee ealized by a netok of tasks. Othe tasks ae simple tasks that can be ealized by othe means (e.g., human, database, eecutable). Tansition T j epesents a tansition fom Task2 to Task3 (i.e., Task2 has been completed and Task3 can make use of esults that ee poduced by Task2). Tansition T j Task2 Task1 Task4 Task3 Task6 Realized by Task5 Task7 Task8 Realized by Task9 Figue A. An entepise application model A task may play the ole of a souce task o a destination task (e.g., Task2 is the souce task and Task3 is the destination task of the tansition t j in Figue A) fo a numbe of tansitions. All of the tansitions fo hich a task is the destination task ae called the input tansitions fo that task (e.g., tansition t j is an input tansition fo Task3). Likeise, all of the tansitions fo hich a task is the souce task ae called its output tansitions (e.g., tansition t j is an output tansition of Task2). A tansition may have an associated Boolean condition, called its guad. A tansition may be activated only if its guad is tue. The classes (i.e., types of objects) that ae associated ith an input tansition to a task ae called the task s input classes, and those appeaing on an output tansition ae called output classes of that task. A task's output class, hich is not its input class, is ceated by the task. A task's input class, hich is not its output class, is dopped (consumed). Note, that some input classes may be unused by the task. They ae simply tansfeed to the task s successo(s). A goup of input tansitions is called an AND-join if all of the paticipating tansitions must be activated fo the task to be enabled fo eecution. An AND-join is called enabled if all of its tansitions have been activated. All the input tansitions of a task may be patitioned into a numbe of AND-joins. A goup of input tansitions is called an OR-join if the activation of one of the paticipating tansitions enables the task. A goup of tansitions is said to have a common souce if they have the same souce task and all lead eithe fom: its success state, o its fail state A goup of common souce tansitions may fom eithe: 1. AND-split: Each of the tansitions in the goup has the condition set to tue. It means that all of the tansitions in the goup ae activated, once the task completes. 2. OR-split (selection): An odeed list of tansitions hee all but the last tansition may have abitay conditions (i.e., the last tansition on the list has the condition set to tue). The fist tansition hose condition is satisfied ill be activated. 3. Loop: A special case of an OR-split, hee the list is composed of eactly to tansitions: loopback and continue. Loopback implies banch taken and continue implies banch not taken (i.e., fall though). 9

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

TCBAC: An Access Control Model for Remote Calibration System

TCBAC: An Access Control Model for Remote Calibration System JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 339 TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology,

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

RBAC Tutorial. Brad Spengler Open Source Security, Inc. Locaweb

RBAC Tutorial. Brad Spengler Open Source Security, Inc. Locaweb RBAC Tutoial Bad Spengle Open Souce Secuity, Inc. Locaweb - 2012 Oveview Why Access Contol? Goals Achitectue Implementation Lookup example Subject example Questions/Requests Why Access Contol? Access Contol

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Color Interpolation for Single CCD Color Camera

Color Interpolation for Single CCD Color Camera Colo Intepolation fo Single CCD Colo Camea Yi-Ming Wu, Chiou-Shann Fuh, and Jui-Pin Hsu Depatment of Compute Science and Infomation Engineeing, National Taian Univesit, Taipei, Taian Email: 88036@csie.ntu.edu.t;

More information

A Non-blocking Directory Protocol for Large-Scale Multiprocessors. Technical Report

A Non-blocking Directory Protocol for Large-Scale Multiprocessors. Technical Report A Non-blocking Diectoy Potocol fo Lage-Scale Multipocessos Technical Repot Depatment of Compute Science and Engineeing Univesity of Minnesota 4-192 EECS Building 200 Union Steet SE Minneapolis, MN 55455-0159

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

MIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG

MIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG MIS to Pepess ICS Vesion 1.01 Date: 2006-01-02 File: ICS-MIS-Pepess-1.01.doc,.pdf Oigination & Pepess WG Abstact This ICS defines the Inteface between the MIS and Pepess. It specifies the Pocesses fo a

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Using Data Flow Diagrams for Supporting Task Models

Using Data Flow Diagrams for Supporting Task Models in Companion Poc. of 5 th Euogaphics Wokshop on Design, Specification, Veification of Inteactive Systems DSV-IS 98 (Abingdon, 3-5 June 1998), P. Makopoulos & P. Johnson (Eds.), Spinge-Velag, Belin, 1998.

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Advances in Automobile Engineering

Advances in Automobile Engineering nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

What is a System:- Characteristics of a system:-

What is a System:- Characteristics of a system:- Unit 1 st :- What is a System:- A system is an odely gouping of intedependent components linked togethe accoding to a plan to achieve a specific objective. The study of system concepts has thee basic implications:

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Hierarchical Peer-to-peer Systems

Hierarchical Peer-to-peer Systems Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

An Ameliorated Methodology for the Design of Project Data Flow Diagram

An Ameliorated Methodology for the Design of Project Data Flow Diagram An Amelioated Methodology fo the Design of Poject Data Flow Diagam Shivanand M. Handigund 1, Kavitha H. B 2 Dept of M. Tech. CS&E Pogamme, Bangaloe Institute of Technology, Bangaloe-570004, India 1 smhandigund@gmail.com;

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Journal of Network and Computer Applications

Journal of Network and Computer Applications Jounal of Netwok and Compute Applications 34 (211) 135 142 Contents lists available at ScienceDiect Jounal of Netwok and Compute Applications jounal homepage: www.elsevie.com/locate/jnca Optimization of

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Hierarchical Region Mean-Based Image Segmentation

Hierarchical Region Mean-Based Image Segmentation Hieachical Region Mean-Based Image Segmentation Slawo Wesolkowski and Paul Fieguth Systems Design Engineeing Univesity of Wateloo Wateloo, Ontaio, Canada, N2L-3G1 s.wesolkowski@ieee.og, pfieguth@uwateloo.ca

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

IBM Optim Query Tuning Offerings Optimize Performance and Cut Costs

IBM Optim Query Tuning Offerings Optimize Performance and Cut Costs IBM Optim Quey Tuning Offeings Optimize Pefomance and Cut Costs Saghi Amisoleymani Solution Achitect Integated Data Management amisole@us.ibm.com June 9, 2010 Disclaime Copyight IBM Copoation [cuent yea].

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

CAM I/O Scheduler. Netflix, Inc. AsiaBSDCon 2015

CAM I/O Scheduler. Netflix, Inc. AsiaBSDCon 2015 CAM I/O Schedule ワーナーラーシュ フーメー Netflix, Inc. AsiaBSDCon 2015 東京 2015 年 4 月 15 日 http://people.feebsd.og/~imp/asiabsdcon2015/iosched-slides.pdf http://people.feebsd.og/~imp/asiabsdcon2015/pape.pdf Outline

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba Pesistent Memoy what developes need to know Mak Calson Co-chai SNIA Technical Council Toshiba 2018 Stoage Develope Confeence EMEA. All Rights Reseved. 1 Contents Welcome Pesistent Memoy Oveview Non-Volatile

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

A General Characterization of Representing and Determining Fuzzy Spatial Relations

A General Characterization of Representing and Determining Fuzzy Spatial Relations 7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Methods for history matching under geological constraints Jef Caers Stanford University, Petroleum Engineering, Stanford CA , USA

Methods for history matching under geological constraints Jef Caers Stanford University, Petroleum Engineering, Stanford CA , USA Methods fo histoy matching unde geological constaints Jef Caes Stanfod Univesity, Petoleum Engineeing, Stanfod CA 9435-222, USA Abstact Two geostatistical methods fo histoy matching ae pesented. Both ely

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

PODC: Paradigm-oriented distributed computing

PODC: Paradigm-oriented distributed computing J. Paallel Distib. Comput. ( ).elsevie.com/locate/jpdc PODC: Paadigm-oiented distibuted computing Haiong Kuang,Lubomi F. Bic,Michael B. Dillencout Infomation and Compute Science, Univesity of Califonia,

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information