• Title/Summary/Keyword: cooperative computing

Search Result 96, Processing Time 0.033 seconds

CoSpace: A Web-based Collaborative Environment Supporting Shared Workspaces (CoSpace: 공유작업공간을 지원하는 웹 기반 공동작업환경)

  • Jeong, Su-Gwon;Kim, Gyu-Wan;Kim, In-Ho;Jeong, Jae-Hun;Lee, Myeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3420-3433
    • /
    • 1999
  • Since most of CSCW(Computer-Supported Cooperative Work) systems have been developed for particular computing platforms, they are usable only within the specific organizations supporting those particular platforms. Recently, according to the rapid growth and continuing success of the World-Wide Web(WWW or Web) which offers a globally accessible platform-independent infrastructure, many CSCW systems has been constructed and is being developed on the basis of the Web. As one of such CSCW systems, in this paper, we describe the design and implementation of the CoSpace system. The CoSpace system provides shared workspaces, which enable members of a work group easily share information for collaborative work through their Web Browsers. The shared workspaces support information sharing and management between users, and also support event monitoring and synchronization between collaborative works.

  • PDF

A Study on the Cloud Collection (클라우드 컬렉션에 관한 연구)

  • Cho, Jane
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.201-219
    • /
    • 2012
  • Cloud collection, which is derived from cloud computing, is a framework that creates new value through library cooperative platform to preserve and manage libraries' duplicated collection. Due to E-book market vitalization and mass digitalization of retrospective print material, new library collection management paradigm has been expected that licensed based E-book service and management of shared print repository. This study discuss cloud collection concept which digital repository and Shared print repository are in complementary relations. And suggest cloud collection model can be applicable to Korean university libraries.

A Study on the Use of Ubiquitous Technologies in Military Sector

  • Ju Min-Seong;Kim Seok-Soo
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.6-9
    • /
    • 2006
  • The style of war in the $21^{st}$ century became digitalized cooperative union tactic, which relies heavily on the system providing real time information. Critical information is provided during the war from sensing to shooting. Therefore, epochal development in observation, reconnaissance (ISR), commanding (C4I) and precision strike (PGM) are necessary. Application of ubiquitous computing and network technologies in national defense is necessary for carrying out with various types of wars in the $21^{st}$ century. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. Also plans for applying recent u-Defense technology to the military sector had been suggested. Particularly, the author have suggested plans for utilizing combined future information technologies such as ad-hoc network, RFID for the logistic supply in construction of u-Defense system. By utilizing these information technologies, combat power and strategic capabilities of the military can be enhanced greatly.

  • PDF

THE MULTILEVEL SECURITY PROBLEM OVER CLASS SEMIGROUPS OF IMAGINARY QUADRATIC NON-MAXIMAL ORDERS

  • KIM, YONGTAE
    • Honam Mathematical Journal
    • /
    • v.28 no.2
    • /
    • pp.185-196
    • /
    • 2006
  • A scheme based on the cryptography for enforcing multilevel security in a system where hierarchy is represented by a partially ordered set was first introduced by Akl et al. But the key generation algorithm of Akl et al. is infeasible when there is a large number of users. In 1985, MacKinnon et al. proposed a paper containing a condition which prevents cooperative attacks and optimizes the assignment in order to overcome this shortage. In 2005, Kim et al. proposed key management systems for multilevel security using one-way hash function, RSA algorithm, Poset dimension and Clifford semigroup in the context of modern cryptography. In particular, the key management system using Clifford semigroup of imaginary quadratic non-maximal orders is based on the fact that the computation of a key ideal $K_0$ from an ideal $EK_0$ seems to be difficult unless E is equivalent to O. We, in this paper, show that computing preimages under the bonding homomorphism is not difficult, and that the multilevel cryptosystem based on the Clifford semigroup is insecure and improper to the key management system.

  • PDF

An Error Control for Media Multi-channel running on Machine to Machine Environment (사물 지능 통신 환경에서 미디어 다중 채널을 위한 오류 제어)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.74-77
    • /
    • 2014
  • This paper suggested an error control for multi-channel running on machine to machine environment. This system is suitable for recovering software fault for multimedia CSCW(Computer Supported Cooperative Works) based on machine to machine environment. It is necessary for the system to be protected by reactivity of media service instance instead of breaking process of session. This paper explains a performance analysis of an error recovery system of M2M based computing collaboration environment using rule-based DEVS modeling and simulation techniques.

Concurrency Control in a Computer-Supported Cooperative Environment (컴퓨터 지원, 협업 환경 하에서의 동시성 제어)

  • Seo, Yong-Mu
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.219-235
    • /
    • 1995
  • Complexity of some problems often transcends the problem solving capability of human individuals. As such, we cannot but take a collaborative approach to those complex problems. Collaboration while using computing systems can take place through shared objects. However, current commercial DBMSs do not provide a satisfactory control for concurrent access to objects shared by collaborators. A new concurrency control scheme is proposed which will help a group of people work in a more collaborative and natural way. The idea of softlock is refined into three different kinds of softlocks and the roles of collaborators are taken into account in the proposal of the new scheme. Although these softlocks are illustrated together with read/write hardlocks in this paper, the use of softlocks can be extended to be exploited with other kinds of hardlocks, for example, of granularity locking.

  • PDF

ETRI AI Strategy #4: Expanding AI Open Platform (ETRI AI 실행전략 4: AI 개방형 플랫폼 제공 확대)

  • Kim, S.M.;Hong, A.R.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.36-45
    • /
    • 2020
  • The method and process of research and development (R&D) is changing when we develop artificial intelligence (AI), and the way R&D results are dispersed is also changing. For the R&D process, using and participating in open-source ecosystems has become more important, so we need to be prepared for open source. For product and service development, a combination of AI algorithm, data, and computing power is needed. In this paper, we introduce ETRI AI Strategy #4, "Expanding AI Open Platform." It consists of two key tasks: one to build an AI open source platform (OSP) to create a cooperative AI R&D ecosystem, and another to systematize the "x+AI" open platform (XOP) to disperse AI technologies into the ecosystem.

Proposition of Information Processing and Analysis Technology Education in the Era of Hyperconnection, Hyperintelligence, and Hyperconvergence

  • Seung-Woo, LEE;Sangwon, LEE
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.94-101
    • /
    • 2022
  • For the purpose of this study, in order to adapt to the era of intelligent informatization in the 4th Industrial Revolution, we propose an information processing and analysis technology education plan that can solve problems through information search and collection. To this end, first, we explored the necessity and content of information processing and analysis technology in hyperconnection, hyperintelligence, and hyperconvergence under the theme of various majors in IT, focusing on understanding information technology in the software and hardware curriculum. Second, the curriculum improvement plan was proposed based on information literacy, computing thinking skills, and cooperative problem-solving skills for efficient software and hardware-linked curriculum operation based on information processing and analysis technology. Third, I would like to emphasize that it is essential to secure connectivity between other studies for future innovation in new technologies related to computer technology, machine technology, and infrastructure technology through hyperconnection, hyperintelligence, and hyperconvergence in the software and hardware curriculum. Through this, we intend to cultivate creative convergence talent required by the future society.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

Implementation of the Revised Common Rule in the United States and its implications for Human Research in Korea (미국 Common Rule의 주요 개정 내용과 시사점)

  • Choe, Byung In
    • The Journal of KAIRB
    • /
    • v.2 no.1
    • /
    • pp.1-5
    • /
    • 2020
  • The U.S. Department of Health and Human Services and fifteen other Federal Departments and Agencies have issued final revisions to the Federal Policy for the Protection of Human Subjects (the Common Rule, 45 CFR 46, Subpart A). The Common Rule was initially promulgated in 1991 and amended in 2005. The Final Rule to update the current regulations was published in the Federal Register on 19 January 2017. The final compliance date of the revised Common Rule including the cooperative research requirement is effective on 20 January 2020 after twice to delay. The revised Common Rule aims to make more effective conduct of minimal risk research reflecting modern research activities and recognize evolving technologies, including mobile technologies, internet, and the growth in computing power. The revisions to the Common Rule were based on a variety of sources of public, stakeholder, and expert comments. The author summarized the key changes and the implications to Korean human research regulations.

  • PDF