图书情报专题研究2012-3(6)

2019-04-23 11:41

vulnerabilities. Here, the authors define four indicators of cloud-specific vulnerabilities, introduce a security-specific cloud reference architecture, and provide examples of cloud-specific vulnerabilities for each architectural component.

5. 题名:IEEE Recommended Practice for Software Requirements Specifications 出处:IEEE Std 830-1998 Page(s):i

Digital Object Identifier : 10.1109/IEEESTD.1998.88286 摘要:The content and qualities of a good software requirements specification (SRS) are described, and several sample SRS outlines are presented. This recommended practice is aimed at specifying the requirements of software to be developed, but can also be applied to assist in the selection of in-house and commercial software products. Guidelines for compliance with IEEE/EIA Std 12207.1-1997 are also provided.

6.题名:IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications 出处:IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007) Page(s):1 - 2793

Digital Object Identifier : 10.1109/IEEESTD.2012.6178212

摘要:This revision specifies technical corrections and clarifications to IEEE Std 802.11 for wireless local area networks (WLANS) as well as enhancements to the existing medium access control (MAC) and physical layer (PHY) functions. It also incorporates Amendments 1 to 10 published in 2008 to 2011.

7.题名:Data Security in the World of Cloud Computing 作者:Kaufman, L.M.

出处:Security & Privacy, IEEE

Volume: 7 Issue: 4 Date: July-Aug. 2009 Page(s):61 - 64 Digital Object Identifier : 10.1109/MSP.2009.87 摘要:Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. In this new world of computing, users are universally required to accept the underlying premise of trust. Within the cloud computing world, the virtual environment lets users access computing power that exceeds that contained within their own physical worlds. Typically, users will know neither the exact location of their data nor the other sources of the data collectively stored with theirs. The data you can find in a cloud ranges from public source, which has minimal security concerns, to private data containing highly sensitive information (such as social security numbers, medical records, or shipping manifests for hazardous material). Does using a cloud environment alleviate the business entities of their responsibility to ensure that proper security measures are in place for both their data and applications, or do they share joint responsibility with service providers? The answers to this and other questions lie within the realm of yet-to-be-written law. As with most technological advances, regulators are typically in a \mode to identify policy, governance, and law. Cloud computing presents an extension of problems heretofore experienced with the Internet. To

23

ensure that such decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.

8.题名:Optimization of Resource Provisioning Cost in Cloud Computing 作者:Chaisiri, S. Bu-Sung Lee Niyato, D. 出处:Services Computing, IEEE Transactions on

Volume: 5 Issue: 2 Date: April-June 2012 Page(s):164 - 177 Digital Object Identifier : 10.1109/TSC.2011.7

摘要:In cloud computing, cloud providers can offer cloud consumers two provisioning plans for computing resources, namely reservation and on-demand plans. In general, cost of utilizing computing resources provisioned by reservation plan is cheaper than that provisioned by on-demand plan, since cloud consumer has to pay to provider in advance. With the reservation plan, the consumer can reduce the total resource provisioning cost. However, the best advance reservation of resources is difficult to be achieved due to uncertainty of consumer's future demand and providers' resource prices. To address this problem, an optimal cloud resource provisioning (OCRP) algorithm is proposed by formulating a stochastic programming model. The OCRP algorithm can provision computing resources for being used in multiple provisioning stages as well as a long-term plan, e.g., four stages in a quarter plan and twelve stages in a yearly plan. The demand and price uncertainty is considered in OCRP. In this paper, different approaches to obtain the solution of the OCRP algorithm are considered including deterministic equivalent formulation, sample-average approximation, and Benders decomposition. Numerical studies are extensively performed in which the results clearly show that with the OCRP algorithm, cloud consumer can successfully minimize total cost of resource provisioning in cloud computing environments.

9.题名:Signal Vector Based List Detection for Spatial Modulation 作者:Jianping Zheng

出处:Wireless Communications Letters, IEEE

Volume: 1 Issue: 4 Date: August 2012 Page(s):265 - 267 Digital Object Identifier : 10.1109/WCL.2012.050112.120178

摘要:In this Letter, a list variant of the signal vector based detection (SVD) for the spatial modulation system is proposed. In the proposed list SVD, the transmit antenna index detection is first performed and a list of the best candidates survives, then the constellation symbol detection is performed conditioned on the candidate list. Simulation results show that the proposed list SVD can approach the optimal detection performance with a small list size, i.e., an excellent performance-complexity tradeoff is achieved.

10.题名:Research on cloud computing security problem and strategy 作者:Wentao Liu

出处:Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on Page(s):1216 - 1219

Digital Object Identifier : 10.1109/CECNet.2012.6202020

摘要:The cloud computing is a new computing model which comes from grid computing,

24

distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. The security problem of cloud computing is very important and it can prevent the rapid development of cloud computing. This paper introduces some cloud computing systems and analyzes cloud computing security problem and its strategy according to the cloud computing concepts and characters. The data privacy and service availability in cloud computing are the key security problem. Single security method cannot solve the cloud computing security problem and many traditional and new technologies and strategies must be used together for protecting the total cloud computing system.

11.题名:Particle swarm optimization 作者:Kennedy, J. Eberhart, R.

出处:Neural Networks, 1995. Proceedings., IEEE International Conference on Volume: 4 Page(s):1942 - 1948 vol.4

Digital Object Identifier : 10.1109/ICNN.1995.488968

摘要:A concept for the optimization of nonlinear functions using particle swarm methodology is introduced. The evolution of several paradigms is outlined, and an implementation of one of the paradigms is discussed. Benchmark testing of the paradigm is described, and applications, including nonlinear function optimization and neural network training, are proposed. The relationships between particle swarm optimization and both artificial life and genetic algorithms are described

12.题名:Modulation Scheme Based on Precoder Matrix for MIMO Optical Wireless Communication Systems

作者:Liang Wu Zaichen Zhang Huaping Liu 出处:Communications Letters, IEEE

Volume: 16 Issue: 9 Date: September 2012 Page(s):1516 - 1519 Digital Object Identifier : 10.1109/LCOMM.2012.071612.120973

摘要:A modulation scheme for multiple-input multiple-output (MIMO) optical wireless systems that employ intensity modulation (IM) is proposed. This scheme, called precoder matrix modulation (PMM), exploits the properties of MIMO optical wireless communications to translate the spatial dimension into the constellation parameters by using a 'precoder matrix'. The transmitted signals in PMM are guaranteed to be nonnegative, as required in IM optical wireless communications. Existing schemes such as pulse-amplitude modulation could be used in such systems, but the proposed scheme has a much better performance. The constellation size of PMM can be flexibly increased, mitigating the bandwidth shortage issue due to the limitation of light emitting diodes (the transmitters).

13.题名:Compressed sensing 作者:Donoho, D.L.

出处:Information Theory, IEEE Transactions on

Volume: 52 Issue: 4 Date: April 2006 Page(s):1289 - 1306 Digital Object Identifier : 10.1109/TIT.2006.871582

摘要:Suppose x is an unknown vector in Ropfm (a digital image or signal); we plan to measure n

25

general linear functionals of x and then reconstruct. If x is known to be compressible by transform coding with a known transform, and we reconstruct via the nonlinear procedure defined here, the number of measurements n can be dramatically smaller than the size m. Thus, certain natural classes of images with m pixels need only n=O(m1/4log5/2(m)) nonadaptive nonpixel samples for faithful recovery, as opposed to the usual m pixel samples. More specifically, suppose x has a sparse representation in some orthonormal basis (e.g., wavelet, Fourier) or tight frame (e.g., curvelet, Gabor)-so the coefficients belong to an lscrp ball for 0

14.题名:A tutorial on hidden Markov models and selected applications in speech recognition 作者:Rabiner, L.R.

出处:Proceedings of the IEEE

Volume: 77 Issue: 2 Date: Feb 1989 Page(s):257 - 286 Digital Object Identifier : 10.1109/5.18626 摘要:This tutorial provides an overview of the basic theory of hidden Markov models (HMMs) as originated by L.E. Baum and T. Petrie (1966) and gives practical details on methods of implementation of the theory along with a description of selected applications of the theory to distinct problems in speech recognition. Results from a number of original sources are combined to provide a single source of acquiring the background required to pursue further this area of research. The author first reviews the theory of discrete Markov chains and shows how the concept of hidden states, where the observation is a probabilistic function of the state, can be used effectively. The theory is illustrated with two simple examples, namely coin-tossing, and the classic balls-in-urns system. Three fundamental problems of HMMs are noted and several practical techniques for solving these problems are given. The various types of HMMs that have been studied, including ergodic as well as left-right models, are described

15.题名:Understanding the Basis of the Kalman Filter Via a Simple and Intuitive Derivation [Lecture Notes]

作者:Faragher, R.

出处:Signal Processing Magazine, IEEE

Volume: 29 Issue: 5 Date: Sept. 2012 Page(s):128 - 132 Digital Object Identifier : 10.1109/MSP.2012.2203621

摘要:This article provides a simple and intuitive derivation of the Kalman filter, with the aim of teaching this useful tool to students from disciplines that do not require a strong mathematical

26

background. The most complicated level of mathematics required to understand this derivation is the ability to multiply two Gaussian functions together and reduce the result to a compact form.

16.题名:A survey on sensor networks

作者:Akyildiz, I.F. Weilian Su Sankarasubramaniam, Y. Cayirci, E. 出处:Communications Magazine, IEEE

Volume: 40 Issue: 8 Date: Aug 2002 Page(s): 102 - 114 Digital Object Identifier : 10.1109/MCOM.2002.1024422

摘要:The advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas (e.g., health, military, home). For different application areas, there are different technical issues that researchers are currently resolving. The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections. This article also points out the open research issues and intends to spark new interests and developments in this field.

17.题名:Cloud computing - concepts, architecture and challenges 作者:Jadeja, Y. Modi, K.

出处:Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on Page(s):877 - 880

Digital Object Identifier : 10.1109/ICCEET.2012.6203873

摘要:With the advent internet in the 1990s to the present day facilities of ubiquitous computing, the internet has changed the computing world in a drastic way. It has traveled from the concept of parallel computing to distributed computing to grid computing and recently to cloud computing. Although the idea of cloud computing has been around for quite some time, it is an emerging field of computer science. Cloud computing can be defined as a computing environment where computing needs by one party can be outsourced to another party and when need be arise to use the computing power or resources like database or emails, they can access them via internet. Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers. The main advantage of cloud computing is that customers do not have to pay for infrastructure, its installation, required man power to handle such infrastructure and maintenance. In this paper we will discuss what makes all this possible, what is the architectural design of cloud computing and its applications.

18.题名:LTE-advanced: next-generation wireless broadband technology [Invited Paper] 作者:Ghosh, A. Ratasuk, R. Mondal, B. Mangalvedhe, N. Thomas, T. 出处:Wireless Communications, IEEE

Volume: 17 Issue: 3 Date: June 2010 Page(s):10 - 22 Digital Object Identifier : 10.1109/MWC.2010.5490974

摘要:LTE Release 8 is one of the primary broadband technologies based on OFDM, which is currently being commercialized. LTE Release 8, which is mainly deployed in a macro/microcell layout, provides improved system capacity and coverage, high peak data rates, low latency, reduced operating costs, multi-antenna support, flexible bandwidth operation and seamless

27


图书情报专题研究2012-3(6).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:八年级投资组合报告的解释

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: