首页 > 最新文献

2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.最新文献

英文 中文
An insight for consequences of e-business: possible case of cross border trading without using hard currency 对电子商务后果的洞察:不使用硬通货的跨境贸易的可能情况
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210143
Shiro Uesugi
E-business has entered into a new era, where new types of payment are present. The payments between the debtor and creditor are not necessarily carried out by traditional "cash vs. goods" style any more. The mechanism of credit enhancement has already been changing as direct settlements increase. In addition, new kind of money is emerging; money that is not issued by the government but the users. There are movements of new local currency systems in Japan. That is not particularly limited within Japan but increasing number can be counted all over the world. Many of those mechanisms utilize the features of electronic settlements. Recently, systems that propose the protocols for P2P settlement are gaining attention. This paper discusses the present evolution of such systems (ex. WAT-system) and foresees what comes next, that is to say, "Local currency becomes global currency" in cross border trading.
电子商务进入了一个新的时代,出现了新的支付方式。债务人和债权人之间的支付不再是以传统的“现金对货物”的方式进行。随着直接结算的增加,信用增信机制已经发生了变化。此外,新型货币正在出现;不是由政府发行,而是由用户发行的货币。日本出现了新的本地货币体系。这种情况并不局限于日本,但在世界各地都在增加。其中许多机制利用了电子结算的特点。最近,提出P2P结算协议的系统备受关注。本文讨论了这类制度(如瓦特制度)目前的演变,并预测了接下来会发生什么,也就是说,在跨境贸易中“本地货币成为全球货币”。
{"title":"An insight for consequences of e-business: possible case of cross border trading without using hard currency","authors":"Shiro Uesugi","doi":"10.1109/SAINTW.2003.1210143","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210143","url":null,"abstract":"E-business has entered into a new era, where new types of payment are present. The payments between the debtor and creditor are not necessarily carried out by traditional \"cash vs. goods\" style any more. The mechanism of credit enhancement has already been changing as direct settlements increase. In addition, new kind of money is emerging; money that is not issued by the government but the users. There are movements of new local currency systems in Japan. That is not particularly limited within Japan but increasing number can be counted all over the world. Many of those mechanisms utilize the features of electronic settlements. Recently, systems that propose the protocols for P2P settlement are gaining attention. This paper discusses the present evolution of such systems (ex. WAT-system) and foresees what comes next, that is to say, \"Local currency becomes global currency\" in cross border trading.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"17 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SNMP in the IPv6 context IPv6环境下的SNMP
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210167
G. Keeni, D. Chakraborty, Kazuhide Koide, N. Shiratori
Monitoring networks is important for operations, management and security as well as for research and development, but with the rapid pace in which the network is evolving and newer protocols are emerging it is becoming a challenge to monitor new generation networks. We describe the protocol implementation and deployment issues that exist in monitoring IPv6 networks using the Internet management protocol SNMP and then discuss some of the measures taken to work around the issues.
监控网络对运营、管理和安全以及研究和开发都很重要,但随着网络的快速发展和新协议的出现,监控新一代网络正成为一项挑战。我们描述了使用互联网管理协议SNMP监控IPv6网络中存在的协议实现和部署问题,然后讨论了围绕这些问题所采取的一些措施。
{"title":"SNMP in the IPv6 context","authors":"G. Keeni, D. Chakraborty, Kazuhide Koide, N. Shiratori","doi":"10.1109/SAINTW.2003.1210167","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210167","url":null,"abstract":"Monitoring networks is important for operations, management and security as well as for research and development, but with the rapid pace in which the network is evolving and newer protocols are emerging it is becoming a challenge to monitor new generation networks. We describe the protocol implementation and deployment issues that exist in monitoring IPv6 networks using the Internet management protocol SNMP and then discuss some of the measures taken to work around the issues.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116213332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure link state routing for mobile ad hoc networks 移动自组织网络的安全链路状态路由
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210190
Panos Papadimitratos, Z. Haas
Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.
路由协议的安全运行是移动自组织网络(MANET)范式发展所面临的主要挑战之一。然而,安全增强主要针对响应式MANET协议提出。提出的安全链路状态路由协议(SLSP)提供了安全的主动拓扑发现,可以在许多方面有利于网络的运行。SLSP可以作为独立协议使用,也可以与响应式协议结合使用,自然地融入混合路由框架。SLSP对单个攻击者具有鲁棒性,能够在局部和全网范围的拓扑发现之间调整其范围,能够在拓扑和成员频繁变化的网络中运行。
{"title":"Secure link state routing for mobile ad hoc networks","authors":"Panos Papadimitratos, Z. Haas","doi":"10.1109/SAINTW.2003.1210190","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210190","url":null,"abstract":"Secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the mobile ad hoc networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed secure link state routing protocol (SLSP) provides secure proactive topology discovery, which can be beneficial to network operation in a number of ways. SLSP can be employed as a stand-alone protocol, or fit naturally into a hybrid routing framework, when combined with a reactive protocol. SLSP is robust against individual attackers, is capable of adjusting its scope between local and network-wide topology discovery, and is capable of operating in networks of frequently changing topology and membership.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 536
XCAST6: eXplicit multicast on IPv6 XCAST6: IPv6显式组播
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210164
Yuji Imai, H. Kishimoto, M. Shin, Young Han Kim
XCAST6: eXplicit Multicast on IPv6 is a new type of multicast datagram delivery system that enables multipoint visual communications, the killer-applications of the next-generation Internet. In the last decade, using the current scheme of group-address multicast, a good number of useful applications was developed and tested. However, the deployment of the multicast was very slow. XCAST6 solves these problems embedding an explicit list of destinations into the extension routing header of the IPv6 datagram. Intermediate routers may duplicate and forward the datagram only searching one's unicast routing tables. Moreover, using a semi-permeable capsule technique, users can ensure the reachability of the datagram. Deploying a very few number of XCAST6 routers, we could have operated the multi-point video conference trial on the academic IPv6 network among Japan, North America and Korea to prove employability and usefulness of XCAST6.
XCAST6: IPv6上的显式组播是一种新型的组播数据报传送系统,它支持多点视觉通信,这是下一代互联网的杀手级应用。在过去的十年中,使用当前的组地址组播方案,开发和测试了许多有用的应用程序。但是,组播的部署速度非常慢。XCAST6解决了这些问题,将一个显式的目的地列表嵌入到IPv6数据报的扩展路由报头中。中间路由器可以复制和转发数据报,只搜索自己的单播路由表。此外,使用半透性胶囊技术,用户可以确保数据报的可达性。在部署少量XCAST6路由器的情况下,我们可以在日本、北美和韩国的学术IPv6网络上进行多点视频会议试验,以证明XCAST6的可就业性和实用性。
{"title":"XCAST6: eXplicit multicast on IPv6","authors":"Yuji Imai, H. Kishimoto, M. Shin, Young Han Kim","doi":"10.1109/SAINTW.2003.1210164","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210164","url":null,"abstract":"XCAST6: eXplicit Multicast on IPv6 is a new type of multicast datagram delivery system that enables multipoint visual communications, the killer-applications of the next-generation Internet. In the last decade, using the current scheme of group-address multicast, a good number of useful applications was developed and tested. However, the deployment of the multicast was very slow. XCAST6 solves these problems embedding an explicit list of destinations into the extension routing header of the IPv6 datagram. Intermediate routers may duplicate and forward the datagram only searching one's unicast routing tables. Moreover, using a semi-permeable capsule technique, users can ensure the reachability of the datagram. Deploying a very few number of XCAST6 routers, we could have operated the multi-point video conference trial on the academic IPv6 network among Japan, North America and Korea to prove employability and usefulness of XCAST6.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Toward secure key distribution in truly ad-hoc networks 在真正的自组织网络中实现安全的密钥分发
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210183
A. Khalili, Jonathan Katz, W. Arbaugh
Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for small, resource-constrained devices. We propose to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks. We also discuss the available mechanisms and their suitability for the proposed task.
自组织网络——特别是无线移动自组织网络——具有独特的特性和限制,使得传统的加密机制和假设不合适。特别是,假定网络成员之间存在预先存在的共享秘密或存在公共PKI可能是不合理的。因此,自组织网络中的密钥分配问题是一个重要的问题。不幸的是,这个问题在很大程度上被忽视了;例如,大多数用于安全自组织路由的协议都假设已经进行了密钥分发。传统的密钥分发方案要么不适用于临时场景,要么对于小型、资源受限的设备不够有效。我们建议结合基于身份(id)和阈值加密的有效技术,以提供一种机制,在尊重自组织网络约束的同时,实现灵活有效的密钥分发。我们还讨论了可用的机制及其对拟议任务的适用性。
{"title":"Toward secure key distribution in truly ad-hoc networks","authors":"A. Khalili, Jonathan Katz, W. Arbaugh","doi":"10.1109/SAINTW.2003.1210183","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210183","url":null,"abstract":"Ad-hoc networks - and in particular wireless mobile ad-hoc networks $have unique characteristics and constraints that make traditional cryptographic mechanisms and assumptions inappropriate. In particular it may not be warranted to assume pre-existing shared secrets between members of the network or the presence of a common PKI. Thus, the issue of key distribution in ad-hoc networks represents an important problem. Unfortunately, this issue has been largely ignored; as an example, most protocols for secure ad-hoc routing assume that key distribution has already taken place. Traditional key distribution schemes either do not apply in an ad-hoc scenario or are not efficient enough for small, resource-constrained devices. We propose to combine efficient techniques from identity-based (ID-based) and threshold cryptography to provide a mechanism that enables flexible and efficient key distribution while respecting the constraints of ad-hoc networks. We also discuss the available mechanisms and their suitability for the proposed task.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 360
Applying Kerberos to the communication environment for information appliances 将Kerberos应用于信息设备的通信环境
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210159
S. Sakane, N. Okabe, K. Kamada, H. Esaki
When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a home networking environment. The information appliances shall move around the global network with the users. We assume these devices are used in the home and we describe the methodologies to achieve access control using Kerberos and to deal with changes of IP addresses using modified Kerberos. IPv6 has a security mechanism called "IPsec" for secure communication. In order to use the IPsec, peering communicating devices have to share a symmetric key to maintain the confidentiality and/or the integrity. We also describe a method so that these restricted devices can share a symmetric key securely.
当部署IPv6时,每个信息设备都应该有一个全局IP地址,并且彼此之间直接通信。由于各种限制(例如成本、物理尺寸、功耗),一些设备的处理性能可能比pc低得多。这些设备必须具有保密性、完整性和访问控制等安全功能,以便在家庭网络环境下提供隐私。信息家电将随着用户在全球网络中移动。我们假设这些设备在家中使用,并描述了使用Kerberos实现访问控制和使用修改后的Kerberos处理IP地址更改的方法。IPv6有一个名为“IPsec”的安全机制,用于安全通信。为了使用IPsec,对等通信设备必须共享一个对称密钥,以保持机密性和/或完整性。我们还描述了一种方法,使这些受限制的设备可以安全地共享对称密钥。
{"title":"Applying Kerberos to the communication environment for information appliances","authors":"S. Sakane, N. Okabe, K. Kamada, H. Esaki","doi":"10.1109/SAINTW.2003.1210159","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210159","url":null,"abstract":"When IPv6 deploys, each information appliance shall have a global IP address and communicate directly with each other. Some devices may have much lower processing performance than PCs have due to various limitations (e.g. cost, physical size, power consumption). Such devices must have a security function, that is confidentiality, integrity and access control, for provision of privacy even with a home networking environment. The information appliances shall move around the global network with the users. We assume these devices are used in the home and we describe the methodologies to achieve access control using Kerberos and to deal with changes of IP addresses using modified Kerberos. IPv6 has a security mechanism called \"IPsec\" for secure communication. In order to use the IPsec, peering communicating devices have to share a symmetric key to maintain the confidentiality and/or the integrity. We also describe a method so that these restricted devices can share a symmetric key securely.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115125847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An overview of metadata for e-learning, focusing on the Gateway to Educational Materials and activities of the Dublin Core Education Working Group 电子学习元数据概述,重点关注教育材料门户和都柏林核心教育工作组的活动
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210193
N. Morgan
Summary form only given. Metadata for e-learning has existed for several years. Currently several widely implemented e-learning metadata standards exist including IEEE Learning Object Metadata (IEEE-LOM), SCORM, IMS, and GEM. The presentation will provide an overview of the major e-learning metadata initiatives, with a focus on the Gateway to Educational Materials, whose foundation is Dublin Core metadata, and the activities of the Dublin Core Education Working Group. GEM began in 1996 when the National Library of Education Task Force recommended using library and information science theory and technology to improve access to the large number of distributed collections of uncataloged education materials found on the Internet. GEM solved this resource discovery problem by extending and qualifying Dublin Core metadata so that it better describes education resources. GEM also developed many of the tools, such as a metadata generating and editing module and harvesting applications, needed to implement the project. Currently over 25,000 metadata records for GEM Consortium member resources are searchable through www.thegateway.org, providing educators with fast and efficient access to Internet-based educational resources. GEM metadata is also used by several organizations to organize and provide access to their education resources. GEM's research agenda includes metadata interoperability, registry services, OAI harvesting protocol, improving access to resources mapped to academic standards. Research partners included OCLC, Education Network Australia (EdNA), McREL, and the Center for Natural Language Processing at Syracuse University. GEM's next version of The Gateway will use RDF-XML metadata. GEM is sponsored by the U.S. Department of Education, and is located at the Information Institute of Syracuse at Syracuse University. In 1999, the Dublin Core Education Working Group was formed, with the objective to discuss and develop a proposal for the use of Dublin Core metadata in the description of education resources. The 2002-2003 workplan includes the development of an IEEE LTSC LOM and DCMI application profile, and vocabulary development.
只提供摘要形式。用于电子学习的元数据已经存在好几年了。目前广泛实施的电子学习元数据标准包括IEEE学习对象元数据(IEEE- lom)、SCORM、IMS和GEM。本次演讲将概述主要的电子学习元数据计划,重点介绍以都柏林核心元数据为基础的教育材料门户,以及都柏林核心教育工作组的活动。GEM始于1996年,当时国家教育图书馆特别工作组建议使用图书馆和信息科学理论和技术来改善对互联网上大量未编目的分布式教育资料的访问。GEM通过扩展和限定Dublin Core元数据解决了这个资源发现问题,以便更好地描述教育资源。GEM还开发了许多工具,例如实现项目所需的元数据生成和编辑模块以及收获应用程序。目前,通过www.thegateway.org可查询GEM联盟成员资源的元数据记录超过25,000条,为教育工作者提供快速有效的互联网教育资源访问。GEM元数据也被一些组织用来组织和提供对其教育资源的访问。GEM的研究议程包括元数据互操作性、注册服务、OAI收获协议、改进对映射到学术标准的资源的访问。研究合作伙伴包括OCLC、澳大利亚教育网络(EdNA)、McREL和雪城大学自然语言处理中心。GEM的下一个网关版本将使用RDF-XML元数据。GEM由美国教育部赞助,位于锡拉丘兹大学锡拉丘兹信息学院。1999年,都柏林核心教育工作组成立,其目标是讨论和制定在教育资源描述中使用都柏林核心元数据的建议。2002-2003年的工作计划包括IEEE LTSC LOM和DCMI应用概要的开发,以及词汇开发。
{"title":"An overview of metadata for e-learning, focusing on the Gateway to Educational Materials and activities of the Dublin Core Education Working Group","authors":"N. Morgan","doi":"10.1109/SAINTW.2003.1210193","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210193","url":null,"abstract":"Summary form only given. Metadata for e-learning has existed for several years. Currently several widely implemented e-learning metadata standards exist including IEEE Learning Object Metadata (IEEE-LOM), SCORM, IMS, and GEM. The presentation will provide an overview of the major e-learning metadata initiatives, with a focus on the Gateway to Educational Materials, whose foundation is Dublin Core metadata, and the activities of the Dublin Core Education Working Group. GEM began in 1996 when the National Library of Education Task Force recommended using library and information science theory and technology to improve access to the large number of distributed collections of uncataloged education materials found on the Internet. GEM solved this resource discovery problem by extending and qualifying Dublin Core metadata so that it better describes education resources. GEM also developed many of the tools, such as a metadata generating and editing module and harvesting applications, needed to implement the project. Currently over 25,000 metadata records for GEM Consortium member resources are searchable through www.thegateway.org, providing educators with fast and efficient access to Internet-based educational resources. GEM metadata is also used by several organizations to organize and provide access to their education resources. GEM's research agenda includes metadata interoperability, registry services, OAI harvesting protocol, improving access to resources mapped to academic standards. Research partners included OCLC, Education Network Australia (EdNA), McREL, and the Center for Natural Language Processing at Syracuse University. GEM's next version of The Gateway will use RDF-XML metadata. GEM is sponsored by the U.S. Department of Education, and is located at the Information Institute of Syracuse at Syracuse University. In 1999, the Dublin Core Education Working Group was formed, with the objective to discuss and develop a proposal for the use of Dublin Core metadata in the description of education resources. The 2002-2003 workplan includes the development of an IEEE LTSC LOM and DCMI application profile, and vocabulary development.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116954695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Degradation detection of wireless IP links based on local stationary binomial distribution models 基于局部平稳二项分布模型的无线IP链路退化检测
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210176
Kazunori Matsumoto, S. Muramatsu, N. Inoue, H. Mori
A degradation detection problem of link quality in a long-distance 2.4 GHz wireless system is discussed. The time series to be monitored is periodic and non-stationary. The decision algorithm for degradation is difficult to define, and methods based on conventional traffic theory are not useful for IP link quality. Thus we should introduce some kind of intelligent data analysis technique. The authors propose to apply an AI-based method which solves a similar problem in a commercial switching telephone and ISDN network. The method partitions a target time-series into local stationary segments. Optimization of partitioning is based on the minimal Akaike (1974) information criterion principle. The technique called sequential probability ratio test is also applied to make efficient decisions about degradation. Thus experiments to apply our proposed method to this domain are conducted with wireless systems at a real field. The result shows the AI-based method is also effective for the degradation detection of wireless IP links.
讨论了远程2.4 GHz无线系统中链路质量的退化检测问题。待监测的时间序列是周期性和非平稳的。降级的判定算法难以定义,基于传统流量理论的方法对IP链路质量的判定也不适用。因此,我们应该引入某种智能数据分析技术。作者提出了一种基于人工智能的方法来解决商业交换电话和ISDN网络中的类似问题。该方法将目标时间序列划分为局部平稳段。分区优化基于最小Akaike(1974)信息准则原则。序列概率比检验技术也被应用于对退化进行有效决策。因此,将我们提出的方法应用于该领域的实验在一个真实的现场进行了无线系统。结果表明,基于人工智能的方法对无线IP链路的退化检测也是有效的。
{"title":"Degradation detection of wireless IP links based on local stationary binomial distribution models","authors":"Kazunori Matsumoto, S. Muramatsu, N. Inoue, H. Mori","doi":"10.1109/SAINTW.2003.1210176","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210176","url":null,"abstract":"A degradation detection problem of link quality in a long-distance 2.4 GHz wireless system is discussed. The time series to be monitored is periodic and non-stationary. The decision algorithm for degradation is difficult to define, and methods based on conventional traffic theory are not useful for IP link quality. Thus we should introduce some kind of intelligent data analysis technique. The authors propose to apply an AI-based method which solves a similar problem in a commercial switching telephone and ISDN network. The method partitions a target time-series into local stationary segments. Optimization of partitioning is based on the minimal Akaike (1974) information criterion principle. The technique called sequential probability ratio test is also applied to make efficient decisions about degradation. Thus experiments to apply our proposed method to this domain are conducted with wireless systems at a real field. The result shows the AI-based method is also effective for the degradation detection of wireless IP links.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A video metadata application and its verification test using NIPEG-7 description and watermarked content ID 一个使用NIPEG-7描述和带水印的内容ID的视频元数据应用及其验证测试
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210194
Yoichi Ishibashi, Shigehiko Watabe, M. Ito, T. Kogure, H. Hiki, Y. Tanno, Masaru Kawabata, H. Mishima, Chih-Chang Hsu, F. Hasegawa
Because of the rapid progress of broadband networks and the rise of digital broadcasting, there is a great demand for creation of an environment for digital content production and establishment of system for smooth content distribution. Yamagata Video Archive Research Center (YRC) has been involved in the development of technology for a large-scale video archive system and in research activities, through various verification tests, for applicable operation of the system. We adopt a MPEG-7 description scheme for constructing retrieval keywords in order to deal with video distribution and to achieve easy content retrieval for users outside of YRC In addition, we use a watermarked unique code (cid) system propounded by the Content ID Forum (CIDF) for managing the content identification number. A part of content ID is watermarked on video itself and a time code, which is extracted from an original tape, is watermarked for editing purposes to keep MPEG picture quality in an edited video stream. We describe the research through tests from content retrieval to content distribution.
随着宽带网络的快速发展和数字广播的兴起,对数字内容生产环境的创造和内容分发系统的建立有着巨大的需求。山形视频档案研究中心(YRC)参与了大规模视频档案系统的技术开发,并通过各种验证测试参与了该系统适用操作的研究活动。我们采用MPEG-7描述方案构建检索关键字,以处理视频分发,并使YRC以外的用户能够方便地检索内容。此外,我们使用了由内容标识论坛(content ID Forum, CIDF)提出的水印唯一码(cid)系统来管理内容标识号。视频本身的一部分内容ID被打上了水印,从原始磁带中提取的时间代码被打上了水印,用于编辑目的,以在编辑后的视频流中保持MPEG图像质量。我们通过测试描述了从内容检索到内容分发的研究。
{"title":"A video metadata application and its verification test using NIPEG-7 description and watermarked content ID","authors":"Yoichi Ishibashi, Shigehiko Watabe, M. Ito, T. Kogure, H. Hiki, Y. Tanno, Masaru Kawabata, H. Mishima, Chih-Chang Hsu, F. Hasegawa","doi":"10.1109/SAINTW.2003.1210194","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210194","url":null,"abstract":"Because of the rapid progress of broadband networks and the rise of digital broadcasting, there is a great demand for creation of an environment for digital content production and establishment of system for smooth content distribution. Yamagata Video Archive Research Center (YRC) has been involved in the development of technology for a large-scale video archive system and in research activities, through various verification tests, for applicable operation of the system. We adopt a MPEG-7 description scheme for constructing retrieval keywords in order to deal with video distribution and to achieve easy content retrieval for users outside of YRC In addition, we use a watermarked unique code (cid) system propounded by the Content ID Forum (CIDF) for managing the content identification number. A part of content ID is watermarked on video itself and a time code, which is extracted from an original tape, is watermarked for editing purposes to keep MPEG picture quality in an edited video stream. We describe the research through tests from content retrieval to content distribution.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125162880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Metadata and new challenges 元数据和新挑战
Pub Date : 2003-01-27 DOI: 10.1109/SAINTW.2003.1210192
Ray S. Atarashi, J. Kishigami, S. Sugimoto
Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperability between each metadata set and associations with networks. We describe a few metadata-related activities. We also propose a metadata framework that will allow for the integration of metadata and networks.
元数据技术及其标准化已经在图书馆学、广播学等诸多领域得到发展,并已进入实际应用阶段。具有元数据的内容比非元数据内容更容易管理和发现资源。随着Internet的发展,元数据在内容的有效传递中发挥了越来越重要的作用,从而发展了各元数据集之间的互操作性以及与网络的关联。我们描述了一些与元数据相关的活动。我们还提出了一个元数据框架,允许元数据和网络的集成。
{"title":"Metadata and new challenges","authors":"Ray S. Atarashi, J. Kishigami, S. Sugimoto","doi":"10.1109/SAINTW.2003.1210192","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210192","url":null,"abstract":"Metadata technologies and its standardizations have been developed in many fields such as library science, broadcasting, etc., and they are already in practical use. Content having metadata is easier to manage and discover resources than non-metadata contents. With the growth of the Internet, metadata has become a more important function in the efficient delivery of content to develop interoperability between each metadata set and associations with networks. We describe a few metadata-related activities. We also propose a metadata framework that will allow for the integration of metadata and networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114947280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1