首页 > 最新文献

2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.最新文献

英文 中文
Challenges in intrusion detection for wireless ad-hoc networks 无线自组织网络入侵检测的挑战
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210188
P. Brutch, C. Ko
This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detection in this environment, this paper reviews current efforts to detect attacks against the ad-hoc routing infrastructure, as well as detecting attacks directed against the mobile nodes. This paper also examines the intrusion detection architectures that may be deployed for different wireless ad-hoc network infrastructures, as well as proposed methods of intrusion response.
本文简要介绍了无线自组织网络入侵检测的研究现状。除了研究在这种环境中提供入侵检测的挑战之外,本文还回顾了目前在检测针对自组织路由基础设施的攻击以及检测针对移动节点的攻击方面所做的努力。本文还研究了可能部署在不同无线自组织网络基础设施上的入侵检测体系结构,以及入侵响应的建议方法。
{"title":"Challenges in intrusion detection for wireless ad-hoc networks","authors":"P. Brutch, C. Ko","doi":"10.1109/SAINTW.2003.1210188","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210188","url":null,"abstract":"This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detection in this environment, this paper reviews current efforts to detect attacks against the ad-hoc routing infrastructure, as well as detecting attacks directed against the mobile nodes. This paper also examines the intrusion detection architectures that may be deployed for different wireless ad-hoc network infrastructures, as well as proposed methods of intrusion response.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 250
KUPF: 2-phase selection model of classification records KUPF:分类记录的两阶段选择模型
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210169
Masatoshi Kakiuchi, N. Morishima, Yutaka Nakamura, K. Fujikawa, H. Sunahara
With the advance of computing and internetworking technologies, various services, which need classification of data, are provided. Firewall and QoS control are typical services which classify the data flow. These services are based on two or more rules, and select a rule to classify the data. However, some of their rules may conflict with one another and it is necessary to resolve conflicts in these classification mechanisms. We discuss the classification of data with generalization of the parameter filter. Then we arrange the parameter filter and propose a 2-phase selection model of classification records. In this model, we consider the procedure of the parameter filter as the phase depending only on the schema of the filter rule and the phase depending on the service. We also implement the KUPF framework based on this model and a sample service which provides QoS control over a IPv4/IPv6 network. With this sample implementation, we validate the availability and evaluate the performance of KUPF.
随着计算技术和网络技术的发展,各种需要对数据进行分类的业务应运而生。防火墙和QoS控制是对数据流进行分类的典型服务。这些服务基于两个或多个规则,并选择一个规则对数据进行分类。然而,它们的一些规则可能相互冲突,有必要解决这些分类机制中的冲突。利用参数滤波器的推广,讨论了数据的分类问题。然后对参数过滤器进行排序,提出了分类记录的两阶段选择模型。在该模型中,我们将参数筛选过程视为仅依赖于筛选规则模式的阶段和依赖于服务的阶段。我们还在此模型的基础上实现了KUPF框架,并提供了一个在IPv4/IPv6网络上提供QoS控制的示例服务。通过这个示例实现,我们验证了KUPF的可用性并评估了它的性能。
{"title":"KUPF: 2-phase selection model of classification records","authors":"Masatoshi Kakiuchi, N. Morishima, Yutaka Nakamura, K. Fujikawa, H. Sunahara","doi":"10.1109/SAINTW.2003.1210169","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210169","url":null,"abstract":"With the advance of computing and internetworking technologies, various services, which need classification of data, are provided. Firewall and QoS control are typical services which classify the data flow. These services are based on two or more rules, and select a rule to classify the data. However, some of their rules may conflict with one another and it is necessary to resolve conflicts in these classification mechanisms. We discuss the classification of data with generalization of the parameter filter. Then we arrange the parameter filter and propose a 2-phase selection model of classification records. In this model, we consider the procedure of the parameter filter as the phase depending only on the schema of the filter rule and the phase depending on the service. We also implement the KUPF framework based on this model and a sample service which provides QoS control over a IPv4/IPv6 network. With this sample implementation, we validate the availability and evaluate the performance of KUPF.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information extraction from HTML pages and its integration 从HTML页面中提取信息及其集成
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210172
K. Itai, A. Takasu, J. Adachi
We propose a method for transforming HTML tables that have different structures into a common XML list structure and integrating them. This integration enables us to browse and compare all information in separate HTML pages uniformly. This paper focuses on the tasks of information extraction from tables and its data categorization. For this purpose, we compare three algorithms: (I) data classification using a support vector machine, (II) table structure estimation and data categorization using a hidden Markov model, and (III) data classification by the combination of a support vector machine and hidden Markov model. Finally, we report the experimental results.
我们提出了一种将具有不同结构的HTML表转换为通用XML列表结构并将其集成的方法。这种集成使我们能够统一地浏览和比较单独HTML页面中的所有信息。本文重点研究了从表中提取信息及其数据分类的任务。为此,我们比较了三种算法:(I)使用支持向量机的数据分类,(II)使用隐马尔可夫模型的表结构估计和数据分类,以及(III)使用支持向量机和隐马尔可夫模型相结合的数据分类。最后,我们报告了实验结果。
{"title":"Information extraction from HTML pages and its integration","authors":"K. Itai, A. Takasu, J. Adachi","doi":"10.1109/SAINTW.2003.1210172","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210172","url":null,"abstract":"We propose a method for transforming HTML tables that have different structures into a common XML list structure and integrating them. This integration enables us to browse and compare all information in separate HTML pages uniformly. This paper focuses on the tasks of information extraction from tables and its data categorization. For this purpose, we compare three algorithms: (I) data classification using a support vector machine, (II) table structure estimation and data categorization using a hidden Markov model, and (III) data classification by the combination of a support vector machine and hidden Markov model. Finally, we report the experimental results.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A comparative study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998 日本《个人资料保护法》与英国《1998年资料保护法》之比较研究
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210142
I. Takahashi
In Japan, "Personal Data Protection Bill" and "Law concerning Protection of Personal Data possessed by Administrative Organizations" were discussed in the Diets in 2002. Both bills failed to pass in the Diet. They will be discussed in the Diets in 2003 again. I can point out some problems involved in bills such as "data possessed in public organizations" International Aspects" "Enforcement" "Ambiguous status of rights of the data subjects" in comparing both bills with UK Data Protection Act 1998.
在日本,2002年国会讨论了“个人资料保护法案”和“关于保护行政机构拥有的个人资料的法律”。这两项法案都未能在国会通过。这些问题将在2003年的国会上再次讨论。在与英国1998年数据保护法案进行比较时,我可以指出法案中涉及的一些问题,如“公共组织拥有的数据”“国际方面”“执行”“数据主体的权利地位模糊”。
{"title":"A comparative study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998","authors":"I. Takahashi","doi":"10.1109/SAINTW.2003.1210142","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210142","url":null,"abstract":"In Japan, \"Personal Data Protection Bill\" and \"Law concerning Protection of Personal Data possessed by Administrative Organizations\" were discussed in the Diets in 2002. Both bills failed to pass in the Diet. They will be discussed in the Diets in 2003 again. I can point out some problems involved in bills such as \"data possessed in public organizations\" International Aspects\" \"Enforcement\" \"Ambiguous status of rights of the data subjects\" in comparing both bills with UK Data Protection Act 1998.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"24 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation and operation of a satellite-based broadcast IP network 基于卫星的广播IP网络的实现和运行
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210122
Hidetaka Izumiyama, H. Kusumoto
This paper summarizes the advantage of satellite communication in order to build a wide-coverage broadcast IP network in conjunction with the Internet. Taking various technical factors into consideration, the broadcast IP network has been designed and built in the Asia Pacific region by using an existing satellite. Details such as those regarding broadcast capable datalink technology, Earth station composition, satellite link budget (calculation of carrier-noise ratio margin), and IP and TCP performance are illustrated. This paper also discusses operational experiments conducted on the network exemplified by a vehicle for providing new distance education, and demonstrates the feasibility of practical use of the broadcast IP network using a unidirectional satellite link.
本文总结了卫星通信的优势,以便与Internet相结合,构建一个覆盖广泛的广播IP网络。考虑到各种技术因素,广播IP网络是利用现有卫星在亚太地区设计和建设的。详细说明了有关具有广播能力的数据链技术、地面站组成、卫星链路预算(载波噪声比余量的计算)以及IP和TCP性能的细节。本文还讨论了在网络上进行的操作实验,以提供新型远程教育的车辆为例,并演示了使用单向卫星链路实际使用广播IP网络的可行性。
{"title":"Implementation and operation of a satellite-based broadcast IP network","authors":"Hidetaka Izumiyama, H. Kusumoto","doi":"10.1109/SAINTW.2003.1210122","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210122","url":null,"abstract":"This paper summarizes the advantage of satellite communication in order to build a wide-coverage broadcast IP network in conjunction with the Internet. Taking various technical factors into consideration, the broadcast IP network has been designed and built in the Asia Pacific region by using an existing satellite. Details such as those regarding broadcast capable datalink technology, Earth station composition, satellite link budget (calculation of carrier-noise ratio margin), and IP and TCP performance are illustrated. This paper also discusses operational experiments conducted on the network exemplified by a vehicle for providing new distance education, and demonstrates the feasibility of practical use of the broadcast IP network using a unidirectional satellite link.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vulnerability assessment in wireless networks 无线网络脆弱性评估
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210186
R. Henning
Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality that can intentionally or inadvertently pose a threat to their wired colleagues. A comprehensive network vulnerability analysis must address wireless environment threats and vulnerabilities, including identification of unauthorized Wireless Access Points and incorrectly configured clients. This paper discusses the issues associated with vulnerability assessment in a wireless network and a recommended approach to integrating wireless devices into vulnerability scanning methodologies.
无线接入点给企业网络带来了极大的便利,同时也给企业环境带来了大量的漏洞。无线用户在身份验证和机密性方面带来了新的困难,这可能有意或无意地对有线同事构成威胁。全面的网络漏洞分析必须解决无线环境威胁和漏洞,包括识别未经授权的无线接入点和不正确配置的客户端。本文讨论了与无线网络中的漏洞评估相关的问题,以及将无线设备集成到漏洞扫描方法中的推荐方法。
{"title":"Vulnerability assessment in wireless networks","authors":"R. Henning","doi":"10.1109/SAINTW.2003.1210186","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210186","url":null,"abstract":"Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality that can intentionally or inadvertently pose a threat to their wired colleagues. A comprehensive network vulnerability analysis must address wireless environment threats and vulnerabilities, including identification of unauthorized Wireless Access Points and incorrectly configured clients. This paper discusses the issues associated with vulnerability assessment in a wireless network and a recommended approach to integrating wireless devices into vulnerability scanning methodologies.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Satellite bandwidth requirements for an MCS based multimedia conference 基于MCS的多媒体会议的卫星带宽需求
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210127
S. Ramadass, R. Budiarto, V. Siva
Videoconferencing has always been associated with deterministic networks or circuit switched networks (physical or virtual). In the past, it was almost unthinkable to send voice and video over an undeterministic network like Ethernet. However, recent trends in the field of multimedia communications (audio, video and documents) have indicated that it is not only possible but also practical to carry such communications over Ethernet. The MCS (Multimedia Conferencing System) which was recently developed and implemented by the Network Research Group, School of Computer Sciences, USM is a full blown audio, video and document conferencing system that works on classical Ethernet as well as satellite networks using the RSW Control Criteria. This paper discusses the bandwidth requirements of using the MCS system on satellite-based networks.
视频会议总是与确定性网络或电路交换网络(物理的或虚拟的)联系在一起。在过去,通过以太网这样的不确定网络发送语音和视频几乎是不可想象的。然而,多媒体通信(音频、视频和文件)领域的最新趋势表明,通过以太网进行这种通信不仅是可能的,而且是实际的。多媒体会议系统(MCS)是由USM计算机科学学院网络研究小组最近开发和实施的,是一个完整的音频、视频和文件会议系统,使用RSW控制标准在经典以太网和卫星网络上工作。本文讨论了在星基网络中使用MCS系统的带宽需求。
{"title":"Satellite bandwidth requirements for an MCS based multimedia conference","authors":"S. Ramadass, R. Budiarto, V. Siva","doi":"10.1109/SAINTW.2003.1210127","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210127","url":null,"abstract":"Videoconferencing has always been associated with deterministic networks or circuit switched networks (physical or virtual). In the past, it was almost unthinkable to send voice and video over an undeterministic network like Ethernet. However, recent trends in the field of multimedia communications (audio, video and documents) have indicated that it is not only possible but also practical to carry such communications over Ethernet. The MCS (Multimedia Conferencing System) which was recently developed and implemented by the Network Research Group, School of Computer Sciences, USM is a full blown audio, video and document conferencing system that works on classical Ethernet as well as satellite networks using the RSW Control Criteria. This paper discusses the bandwidth requirements of using the MCS system on satellite-based networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current status of IAA (I Am Alive) system and IAA alliance IAA (I Am Alive)系统和IAA联盟的现状
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210178
M. Nakayama, Hiroyuki Ohno
This paper describes an overview of the IAA (I Am Alive) system, which was originally developed in the WIDE project from 1995, and its current status. The IAA system is a distributed database system which contains victims' safety information. When a disaster occurs, victims can register their safety status information to the database and anyone who knows the victim's name can check his/her situation at any time. The IAA system has many user interfaces to accept any kind of user requests, e.g. Web client interface, windows client interface, fax interface using OCR/OMR, phone interface using DTMF tone and i-mode mobile phone interface. The IAA system also consists of many database nodes called "IAA clusters" to avoid paralysis of the system and network from a huge number of simultaneous requests. IAA clusters are located at deferent places and users' requests are distributed among them. All IAA clusters are loosely coupled by the IAA transport mechanism and synchronize victim information among them. In 1998, a prototype implementation was developed, so victim data format and request/response format between the client program and IAA cluster was established. Many organizations started to develop other implementations of the IAA system such as the CRL-IAA system, Monster-IAA system and NetStar-IAA system. The IAA Alliance was organized in 2002 to examine interoperability of these implementations and exchange information between developers. This organization also introduces the IAA system to many organizations including local government and gathers feedback from them to developers. We also introduce activity of this organization briefly.
本文介绍了IAA (I Am Alive)系统的概况,该系统最初是在1995年的WIDE项目中开发的,以及它的现状。IAA系统是一个包含受害者安全信息的分布式数据库系统。当灾难发生时,受害者可以将他们的安全状态信息登记到数据库中,任何知道受害者名字的人都可以随时查看他/她的情况。IAA系统具有多种用户接口,可接受各种用户请求,如Web客户端接口、windows客户端接口、使用OCR/OMR的传真接口、使用DTMF音的电话接口和i-mode手机接口等。IAA系统还由许多称为“IAA集群”的数据库节点组成,以避免系统和网络因大量同时请求而瘫痪。IAA集群分布在不同的地方,用户的请求分布在不同的集群之间。所有IAA集群通过IAA传输机制松散耦合,并在它们之间同步受害者信息。1998年,开发了一个原型实现,建立了客户端程序与IAA集群之间的受害者数据格式和请求/响应格式。许多组织开始开发IAA系统的其他实现,如CRL-IAA系统、Monster-IAA系统和NetStar-IAA系统。IAA联盟成立于2002年,目的是检查这些实现的互操作性,并在开发人员之间交换信息。该组织还向包括地方政府在内的许多组织介绍IAA系统,并收集他们向开发人员提供的反馈。我们还简要介绍了该组织的活动。
{"title":"Current status of IAA (I Am Alive) system and IAA alliance","authors":"M. Nakayama, Hiroyuki Ohno","doi":"10.1109/SAINTW.2003.1210178","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210178","url":null,"abstract":"This paper describes an overview of the IAA (I Am Alive) system, which was originally developed in the WIDE project from 1995, and its current status. The IAA system is a distributed database system which contains victims' safety information. When a disaster occurs, victims can register their safety status information to the database and anyone who knows the victim's name can check his/her situation at any time. The IAA system has many user interfaces to accept any kind of user requests, e.g. Web client interface, windows client interface, fax interface using OCR/OMR, phone interface using DTMF tone and i-mode mobile phone interface. The IAA system also consists of many database nodes called \"IAA clusters\" to avoid paralysis of the system and network from a huge number of simultaneous requests. IAA clusters are located at deferent places and users' requests are distributed among them. All IAA clusters are loosely coupled by the IAA transport mechanism and synchronize victim information among them. In 1998, a prototype implementation was developed, so victim data format and request/response format between the client program and IAA cluster was established. Many organizations started to develop other implementations of the IAA system such as the CRL-IAA system, Monster-IAA system and NetStar-IAA system. The IAA Alliance was organized in 2002 to examine interoperability of these implementations and exchange information between developers. This organization also introduces the IAA system to many organizations including local government and gathers feedback from them to developers. We also introduce activity of this organization briefly.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When and where is a service? Investigating temporal and locative service properties 何时何地提供服务?调查时间和位置服务属性
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210133
Justin O'Sullivan, D. Edmond
An understanding of the temporal and locative constraints surrounding a service are important for interacting with it. These constraints apply to both the service requestor and the service provider. We discuss service interactions including the less common ones of cancellation, suspension and resumption. We then discuss various kinds of temporal windows and argue for certain locative constraints.
了解围绕服务的时间和位置约束对于与服务交互非常重要。这些约束同时适用于服务请求者和服务提供者。我们讨论服务交互,包括不太常见的取消、暂停和恢复。然后,我们讨论了各种时间窗口,并论证了某些位置约束。
{"title":"When and where is a service? Investigating temporal and locative service properties","authors":"Justin O'Sullivan, D. Edmond","doi":"10.1109/SAINTW.2003.1210133","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210133","url":null,"abstract":"An understanding of the temporal and locative constraints surrounding a service are important for interacting with it. These constraints apply to both the service requestor and the service provider. We discuss service interactions including the less common ones of cancellation, suspension and resumption. We then discuss various kinds of temporal windows and argue for certain locative constraints.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Planning for web services the hard way 艰难地规划web服务
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210130
Mark James Carman, L. Serafini
We outline a framework for performing automated discovery, composition and execution of Web services based solely on the information available in interface descriptions and service directories. In our framework we do not rely on the existence of semantic mark-up in service descriptions, thus making our approach "hard". (From a planning perspective, we tackle the problem of planning in a semantically heterogeneous domain.) The framework consists of a domain model, a planning and execution algorithm, and learning procedures. Preliminary work on implementing a service matching system is also discussed.
我们概述了一个框架,该框架仅基于接口描述和服务目录中提供的信息来执行Web服务的自动发现、组合和执行。在我们的框架中,我们不依赖于服务描述中存在的语义标记,从而使我们的方法变得“困难”。(从规划的角度来看,我们处理在语义异构领域中的规划问题。)该框架由领域模型、规划和执行算法以及学习过程组成。本文还讨论了实施服务匹配系统的初步工作。
{"title":"Planning for web services the hard way","authors":"Mark James Carman, L. Serafini","doi":"10.1109/SAINTW.2003.1210130","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210130","url":null,"abstract":"We outline a framework for performing automated discovery, composition and execution of Web services based solely on the information available in interface descriptions and service directories. In our framework we do not rely on the existence of semantic mark-up in service descriptions, thus making our approach \"hard\". (From a planning perspective, we tackle the problem of planning in a semantically heterogeneous domain.) The framework consists of a domain model, a planning and execution algorithm, and learning procedures. Preliminary work on implementing a service matching system is also discussed.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123126584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1