Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Mathematics
Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn
Unit Rectangle Visibility Graphs, Alice M. Dean, Joanna A. Ellis-Monaghan, Sarah J. Hamilton, Greta Pangborn
Mathematics, Statistics and Computer Science Faculty Research and Publications
Over the past twenty years, rectangle visibility graphs have generated consider- able interest, in part due to their applicability to VLSI chip design. Here we study unit rectangle visibility graphs, with fixed dimension restrictions more closely modeling the constrained dimensions of gates and other circuit components in computer chip applications. A graph G is a unit rectangle visibility graph (URVG) if its vertices can be represented by closed unit squares in the plane with sides parallel to the axes and pairwise disjoint interiors, in such a way that two vertices are adjacent if and only if there is a non-degenerate …
A Software-Based Trust Framework For Distributed Industrial Management Systems, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe
A Software-Based Trust Framework For Distributed Industrial Management Systems, Sheikh Iqbal Ahamed, Mohammad Zulkernine, Steve Wolfe
Mathematics, Statistics and Computer Science Faculty Research and Publications
One of the major problems in industrial security management is that most organizations or enterprises do not provide adequate guidelines or well-defined policy with respect to trust management, and trust is still an afterthought in most security engineering projects. With the increase of handheld devices, managers of business organizations tend to use handheld devices to access the information systems. However, the connection or access to an information system requires appropriate level of trust. In this paper, we present a flexible, manageable, and configurable software-based trust framework for the handheld devices of mangers to access distributed information systems. The presented framework …
Ets (Efficient, Transparent, And Secured) Self-Healing Service For Pervasive Computing Applications, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed
Ets (Efficient, Transparent, And Secured) Self-Healing Service For Pervasive Computing Applications, Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed
Mathematics, Statistics and Computer Science Faculty Research and Publications
To ensure smooth functioning of numerous handheld devices anywhere anytime, the importance of self-healing mechanism cannot be overlooked. Incorporation of efficient fault detection and recovery in device itself is the quest for long but there is no existing self-healing scheme for devices running in pervasive computing environments that can be claimed as the ultimate solution. Moreover, the highest degree of transparency, security and privacy attainability should also be maintained. ETS Self-healing service, an integral part of our developing middleware named MARKS (Middleware Adaptability for Resource discovery, Knowledge usability, and Self-healing), holds promise for offering all of those functionalities.