首页 > 最新文献

2007 4th IEEE Consumer Communications and Networking Conference最新文献

英文 中文
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users 一种强保护无辜用户的短2安全概率指纹码跟踪算法
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.215
S. Fujitsu, K. Nuida, M. Hagiwara, T. Kitagawa, Hajime Watanabe, Kazuto Ogawa, H. Imai
We give a tracing algorithm for 2-secure probabilis- tic fingerprinting codes with the property that it never accuses innocent users when there are up to 2 attackers. Moreover, by using our code and tracing algorithm, innocent users are also unlikely to be accused even if either the number of attackers or attackers' abilities exceed our assumption. Our code is the first example of collusion-secure fingerprinting codes with both of these two properties. Furthermore, our code has shorter length among the preceding 2-secure codes, and possesses further properties desirable in a practical use.
本文给出了一种双安全概率指纹码的跟踪算法,该算法在攻击者多达2个的情况下不会指责无辜用户。此外,通过使用我们的代码和跟踪算法,即使攻击者的数量或攻击者的能力超过我们的假设,无辜的用户也不太可能被指控。我们的代码是具有这两个属性的合谋安全指纹代码的第一个示例。此外,我们的代码在前面的2个安全代码中具有较短的长度,并且具有实际使用所需的进一步特性。
{"title":"A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users","authors":"S. Fujitsu, K. Nuida, M. Hagiwara, T. Kitagawa, Hajime Watanabe, Kazuto Ogawa, H. Imai","doi":"10.1109/CCNC.2007.215","DOIUrl":"https://doi.org/10.1109/CCNC.2007.215","url":null,"abstract":"We give a tracing algorithm for 2-secure probabilis- tic fingerprinting codes with the property that it never accuses innocent users when there are up to 2 attackers. Moreover, by using our code and tracing algorithm, innocent users are also unlikely to be accused even if either the number of attackers or attackers' abilities exceed our assumption. Our code is the first example of collusion-secure fingerprinting codes with both of these two properties. Furthermore, our code has shorter length among the preceding 2-secure codes, and possesses further properties desirable in a practical use.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PUCC Architecture, Protocols and Applications PUCC体系结构、协议和应用
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.160
H. Sumino, N. Ishikawa, Shingo Murakami, Takeshi Kato, J. Hjelm
Compared with traditional Internet technologies, peer-to-peer has functions to realize resource discovery, resource sharing, and load balancing in a highly distributed manner. In addition to the Internet, new networks such as home network, ad-hoc network and sensor network are emerging. An easy prediction is the emergence of a new environment in which many sensors, people, and many different kinds of devices coexist, move, and communicate with one another over such heterogeneous networks. Peer-to-peer is one of the most important and suitable technologies for such ubiquitous networking since it supports discovery mechanisms, simple one-to-one communication, free and extensible distribution of resources, and distributed search to handle the enormous number of resources. Peer-to-peer Universal Computing Consortium (PUCC) was established in 2005 to develop a peer-to-peer networking platform for realizing applications in ubiquitous networking environment, which include home appliance applications. This paper presents PUCC architecture, protocols and applications.
与传统的Internet技术相比,点对点具有高度分布式的资源发现、资源共享和负载均衡功能。除了互联网之外,家庭网络、自组网、传感器网络等新型网络也在不断涌现。一个简单的预测是一个新环境的出现,在这个新环境中,许多传感器、人员和许多不同类型的设备在这种异构网络上共存、移动和相互通信。点对点技术支持发现机制、简单的一对一通信、免费和可扩展的资源分发以及处理海量资源的分布式搜索,是这种无处不在的网络中最重要和最合适的技术之一。点对点通用计算联盟(PUCC)成立于2005年,旨在开发一个点对点网络平台,以实现普适网络环境下的应用,包括家电应用。本文介绍了PUCC的体系结构、协议和应用。
{"title":"PUCC Architecture, Protocols and Applications","authors":"H. Sumino, N. Ishikawa, Shingo Murakami, Takeshi Kato, J. Hjelm","doi":"10.1109/CCNC.2007.160","DOIUrl":"https://doi.org/10.1109/CCNC.2007.160","url":null,"abstract":"Compared with traditional Internet technologies, peer-to-peer has functions to realize resource discovery, resource sharing, and load balancing in a highly distributed manner. In addition to the Internet, new networks such as home network, ad-hoc network and sensor network are emerging. An easy prediction is the emergence of a new environment in which many sensors, people, and many different kinds of devices coexist, move, and communicate with one another over such heterogeneous networks. Peer-to-peer is one of the most important and suitable technologies for such ubiquitous networking since it supports discovery mechanisms, simple one-to-one communication, free and extensible distribution of resources, and distributed search to handle the enormous number of resources. Peer-to-peer Universal Computing Consortium (PUCC) was established in 2005 to develop a peer-to-peer networking platform for realizing applications in ubiquitous networking environment, which include home appliance applications. This paper presents PUCC architecture, protocols and applications.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116481879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Digital Signatures for Centralized DSA Networks 集中式DSA网络的数字签名
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.209
C. N. Mathur, K.P. Subbalakshmi
Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. In this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.
在过去几年中,对无线电资源的需求不断增长,同时由于静态频谱分配技术,这些资源没有得到充分利用。动态频谱接入(DSA)被认为是一种既能满足日益增长的无线电资源需求,又能有效利用频谱的解决方案。具有动态感知频谱和访问未充分利用频段能力的无线电设备称为认知无线电(CR)。CR有两大类用户,主要用户是特定无线电频段的许可用户,次要用户是未许可的用户,他们在认知上操作而不会对主要用户造成有害干扰。在本文中,我们考虑了对集中式DSA网络的拒绝攻击,其中恶意的辅助用户伪装成主用户并有效地关闭对所有其他辅助用户的访问。注意,由于主用户和辅助用户之间的区别,这个问题是CR独有的。我们提出了一种基于公钥加密的主用户识别机制,以防止恶意的辅助用户伪装成主用户。我们证明了所提出的识别机制和相关密钥管理在计算上是轻量级的。我们还讨论了所提出的识别机制的一些优点和局限性。
{"title":"Digital Signatures for Centralized DSA Networks","authors":"C. N. Mathur, K.P. Subbalakshmi","doi":"10.1109/CCNC.2007.209","DOIUrl":"https://doi.org/10.1109/CCNC.2007.209","url":null,"abstract":"Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. In this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129747411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
The Optimization of Location Management 位置管理的优化
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.81
Xiwei Zhao, N. Pissinou, S. Makki
Binding and tracking are the two major phases of Location Management System (LMS). Thus, the communication costs during these two phases should be considered mostly for LMS optimization, without impairing the LMS performance. This paper describes a new optimization algorithm and, the key points of our improvement are: first, for each mobile terminal, we define more than one “anchor” node between its HLR and the serving VLR and construct a logical chain among all of them; second, the mobile terminal would memorize the current chain structure. Whenever the mobile terminal moves into a region served by a new VLR, the terminal will submit the chain structure which is saved in its memory to the new VLR. Then, the optimizing algorithm is conducted at the new VLR. The Records (that come from the terminal) and the routing information (of the new VLR) are used in the optimizing algorithm. The result of the optimization is a new chain structure in which the new VLR is one end of the chain, (the other end is always HLR of the terminal). After that, the new VLR updates the anchor chain according to the optimization result, and also downloads the new chain structure (the optimization result) to update the terminal’s memory. The binding cost and the tracking cost are both considered in the optimization algorithm. The complexity analysis shows that in the worst case, the total cost (binding plus tracking) with zero call blocking probability can be O(M), which is better than the latest result O(M·log(M)). Here, M is the distance that the terminal has moved. The simulation investigates the efficiency of our improvement with different CMR (Call-toMobility Ratio). Keywords-wireless network, cellular system, mobile computing, mobility management, location management, anchor chain.
绑定和跟踪是定位管理系统(LMS)的两个主要阶段。因此,这两个阶段的通信成本应该主要考虑LMS优化,而不影响LMS性能。本文提出了一种新的优化算法,改进的重点是:首先,对于每个移动终端,在其HLR和服务的VLR之间定义一个以上的“锚”节点,并构建它们之间的逻辑链;第二,移动终端会记忆当前的链结构。当移动终端移动到有新的VLR服务的区域时,终端会将存储在其内存中的链结构提交给新的VLR。然后,在新的VLR上进行优化算法。优化算法中使用了来自终端的记录和新VLR的路由信息。优化的结果是一个新的链结构,其中新的VLR是链的一端(另一端总是终端的HLR)。之后,新的VLR根据优化结果更新锚链,同时下载新的链结构(优化结果)更新终端内存。优化算法同时考虑了约束代价和跟踪代价。复杂度分析表明,在最坏情况下,调用阻塞概率为零的总成本(绑定加跟踪)为O(M),优于最新结果O(M·log(M))。这里M是终端移动的距离。仿真结果表明,在不同的CMR (Call-toMobility Ratio)条件下,改进算法的有效性得到了验证。关键词:无线网络,蜂窝系统,移动计算,移动管理,位置管理,锚链。
{"title":"The Optimization of Location Management","authors":"Xiwei Zhao, N. Pissinou, S. Makki","doi":"10.1109/CCNC.2007.81","DOIUrl":"https://doi.org/10.1109/CCNC.2007.81","url":null,"abstract":"Binding and tracking are the two major phases of Location Management System (LMS). Thus, the communication costs during these two phases should be considered mostly for LMS optimization, without impairing the LMS performance. This paper describes a new optimization algorithm and, the key points of our improvement are: first, for each mobile terminal, we define more than one “anchor” node between its HLR and the serving VLR and construct a logical chain among all of them; second, the mobile terminal would memorize the current chain structure. Whenever the mobile terminal moves into a region served by a new VLR, the terminal will submit the chain structure which is saved in its memory to the new VLR. Then, the optimizing algorithm is conducted at the new VLR. The Records (that come from the terminal) and the routing information (of the new VLR) are used in the optimizing algorithm. The result of the optimization is a new chain structure in which the new VLR is one end of the chain, (the other end is always HLR of the terminal). After that, the new VLR updates the anchor chain according to the optimization result, and also downloads the new chain structure (the optimization result) to update the terminal’s memory. The binding cost and the tracking cost are both considered in the optimization algorithm. The complexity analysis shows that in the worst case, the total cost (binding plus tracking) with zero call blocking probability can be O(M), which is better than the latest result O(M·log(M)). Here, M is the distance that the terminal has moved. The simulation investigates the efficiency of our improvement with different CMR (Call-toMobility Ratio). Keywords-wireless network, cellular system, mobile computing, mobility management, location management, anchor chain.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cure for Spam Over Internet Telephony 解决互联网电话中的垃圾邮件
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.181
J. Lindqvist, M. Komu
Unsolicited bulk email or spam is a menace to the usability of Internet email. The possibility of cheap Voice over IP (VoIP) services have introduced the threat of Spam over Internet Telephony (SPIT). A previously unexperimented solution for tackling the spam machinery is to increase its cost via Human Interactive Proofs (HIP). These proofs are basically applicable to all kind of spam, including email, but we concentrate on the Session Initiation Protocol (SIP) in this paper. Our approach allows the use of varying kinds of HIPs to prevent automated call connection attempts. The HIPs are used as an enrollment feature for configuring the call-recipient's call pass or block lists. By giving a proof of humanity, the caller is automatically put e.g. to the call-recipient's graylist for further processing by the user. The approach can be also used to mitigate unsolicited call connection attempts made by humans. We also present our SIP signaling based solution to address the SPIT threat.
未经请求的大量电子邮件或垃圾邮件对互联网电子邮件的可用性构成威胁。廉价的IP语音(VoIP)服务的可能性带来了网络电话垃圾邮件(SPIT)的威胁。对付垃圾邮件机器的一个以前没有实验过的解决方案是通过人类交互证明(Human Interactive Proofs, HIP)来增加其成本。这些证明基本上适用于包括电子邮件在内的所有类型的垃圾邮件,但本文主要研究会话发起协议(SIP)。我们的方法允许使用各种类型的HIPs来防止自动呼叫连接尝试。HIPs用作注册特性,用于配置呼叫接收方的呼叫通过或阻止列表。通过提供人性化的证明,呼叫者会自动被列入被呼叫者的灰名单,供用户进一步处理。该方法还可用于减少人类进行的未经请求的呼叫连接尝试。我们还提出了基于SIP信令的解决方案来解决SPIT威胁。
{"title":"Cure for Spam Over Internet Telephony","authors":"J. Lindqvist, M. Komu","doi":"10.1109/CCNC.2007.181","DOIUrl":"https://doi.org/10.1109/CCNC.2007.181","url":null,"abstract":"Unsolicited bulk email or spam is a menace to the usability of Internet email. The possibility of cheap Voice over IP (VoIP) services have introduced the threat of Spam over Internet Telephony (SPIT). A previously unexperimented solution for tackling the spam machinery is to increase its cost via Human Interactive Proofs (HIP). These proofs are basically applicable to all kind of spam, including email, but we concentrate on the Session Initiation Protocol (SIP) in this paper. Our approach allows the use of varying kinds of HIPs to prevent automated call connection attempts. The HIPs are used as an enrollment feature for configuring the call-recipient's call pass or block lists. By giving a proof of humanity, the caller is automatically put e.g. to the call-recipient's graylist for further processing by the user. The approach can be also used to mitigate unsolicited call connection attempts made by humans. We also present our SIP signaling based solution to address the SPIT threat.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Multi-Protocol Service-Oriented Platform for Home Control Applications 面向服务的多协议家庭控制应用平台
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.239
D. Donsez, Johann Bourcier, C. Escoffier, P. Lalanda, A. Bottaro
The convergence of smart home appliances and business services stands to profoundly change the way we interact with our environment. However, implementing and maintaining home-control applications is still far from easy. This demonstration presents our service-oriented platform to facilitate the development of home-control applications. This prototype is used in the ANSO industrial European project.
智能家电和商业服务的融合将深刻改变我们与环境互动的方式。然而,实现和维护家庭控制应用程序仍然远非易事。本演示展示了我们的面向服务的平台,以促进家庭控制应用的开发。该原型机用于ANSO工业欧洲项目。
{"title":"A Multi-Protocol Service-Oriented Platform for Home Control Applications","authors":"D. Donsez, Johann Bourcier, C. Escoffier, P. Lalanda, A. Bottaro","doi":"10.1109/CCNC.2007.239","DOIUrl":"https://doi.org/10.1109/CCNC.2007.239","url":null,"abstract":"The convergence of smart home appliances and business services stands to profoundly change the way we interact with our environment. However, implementing and maintaining home-control applications is still far from easy. This demonstration presents our service-oriented platform to facilitate the development of home-control applications. This prototype is used in the ANSO industrial European project.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and Implementation of Sender Initiated Congestion Control 发送方发起的拥塞控制的设计与实现
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.223
Eiichi Muramoto, T. Yoneda, Kazunobu Konishi
This paper reports the design and implementation of a multicast transport-layer protocol called Sender Initiated Congestion Control (SICC) which provides adaptive flow control for multicast methods such as Application Layer Multicast (ALM) or eXplicit multi-unicast (XCAST). SICC is a NAK based protocol and is designed to be extensible to adapt to various codecs, able to handle variable length of application data units (ADU) and to notify availability of ADU at the receiver for real-time streaming. We have implemented SICC in both user space on NetBSD and kernel space on Linux 2.6.10, and have used these implementations to evaluate TCP fairness. The results show the fairly shared bandwidth with 128 competing TCP flows with 1ms timer accuracy in various RTT. We also verified the applicability to small appliance by implementing SICC/XCAST6 on a prototype network camera and evaluated SICC in a field experiment.
本文报道了一种称为发送方发起的拥塞控制(SICC)的组播传输层协议的设计和实现,该协议为应用层组播(ALM)或显式多播(XCAST)等组播方法提供自适应流量控制。SICC是一个基于NAK的协议,被设计为可扩展以适应各种编解码器,能够处理可变长度的应用数据单元(ADU),并在接收器上通知实时流的ADU可用性。我们已经在NetBSD的用户空间和Linux 2.6.10的内核空间实现了SICC,并使用这些实现来评估TCP公平性。结果表明,在各种RTT中,128个竞争TCP流以1ms的定时器精度相当共享带宽。通过在一台网络摄像机样机上实现SICC/XCAST6,验证了SICC/XCAST6在小家电上的适用性,并在现场实验中对SICC进行了评估。
{"title":"Design and Implementation of Sender Initiated Congestion Control","authors":"Eiichi Muramoto, T. Yoneda, Kazunobu Konishi","doi":"10.1109/CCNC.2007.223","DOIUrl":"https://doi.org/10.1109/CCNC.2007.223","url":null,"abstract":"This paper reports the design and implementation of a multicast transport-layer protocol called Sender Initiated Congestion Control (SICC) which provides adaptive flow control for multicast methods such as Application Layer Multicast (ALM) or eXplicit multi-unicast (XCAST). SICC is a NAK based protocol and is designed to be extensible to adapt to various codecs, able to handle variable length of application data units (ADU) and to notify availability of ADU at the receiver for real-time streaming. We have implemented SICC in both user space on NetBSD and kernel space on Linux 2.6.10, and have used these implementations to evaluate TCP fairness. The results show the fairly shared bandwidth with 128 competing TCP flows with 1ms timer accuracy in various RTT. We also verified the applicability to small appliance by implementing SICC/XCAST6 on a prototype network camera and evaluated SICC in a field experiment.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Telemedicine and M-Heath 无线远程医疗和移动医疗
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.148
Yang Xiao, Fei Hu
Telemedicine is not medicine but to use computing and communications to delivery access to high-quality medical care regardless of locations. It reduces cost, time, and resources and it saves lives. Furthermore, wireless technologies play significant roles in telemedicine, and therefore, it is called wireless telemedicine or mobile-heath. This paper provides a short survey on wireless telemedicine and mobile-heath, and introduces wireless technologies for wireless telemedicine. Keywords-Telemedicine, Wireless, E-heath, RFID, WLAN, WPAN, 3G/4G
远程医疗不是医学,而是利用计算和通信来提供高质量的医疗服务,无论地点如何。它降低了成本、时间和资源,并挽救了生命。此外,无线技术在远程医疗中发挥着重要作用,因此,它被称为无线远程医疗或移动医疗。本文对无线远程医疗和移动医疗进行了综述,介绍了无线远程医疗的无线技术。关键词:远程医疗,无线,电子健康,RFID, WLAN, WPAN, 3G/4G
{"title":"Wireless Telemedicine and M-Heath","authors":"Yang Xiao, Fei Hu","doi":"10.1109/CCNC.2007.148","DOIUrl":"https://doi.org/10.1109/CCNC.2007.148","url":null,"abstract":"Telemedicine is not medicine but to use computing and communications to delivery access to high-quality medical care regardless of locations. It reduces cost, time, and resources and it saves lives. Furthermore, wireless technologies play significant roles in telemedicine, and therefore, it is called wireless telemedicine or mobile-heath. This paper provides a short survey on wireless telemedicine and mobile-heath, and introduces wireless technologies for wireless telemedicine. Keywords-Telemedicine, Wireless, E-heath, RFID, WLAN, WPAN, 3G/4G","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Design of Interpretation of REL License Using Expert Systems 基于专家系统的REL许可解释的高效设计
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.214
Chun Hui Suen
other flexible rights language is often a difficult task, due to the flexibility of the language and the lack of formal semantics. An efficient way to manage this complexity is to translate the license into a set of clearly defined knowledge predicate, and process this knowledge via inference rules using an expert system. This improves computational efficiency and allows authorization request to be verified against a large number of licenses without dependency issues. I. INTRODUCTION ith the increased proliferation of digital information and media, especially in the field of on-line sales of digital media, brings about a change in the business model of sales of information. In order to support more creative business models, which was not possible before, a method in which rights and transactions can be described with greater flexibility is required. Through an intensive standardization process, the Rights Expression Language (REL) [1] from MPEG-21 [2], strives to define a flexible and extensible description language, which can be used to describe generic rights model between different parties. Digital Rights Management (DRM) systems use rights expression languages together with cryptographic algorithms to protect and manage digital contents. A more flexible or expressive rights expression language, which can closely model the rights exchange between consumers and content providers, would brings about greater convenience for users and improve the user experience. This would be crucial to the acceptance of DRM systems, as DRM becomes a convenient means of exchange of digital information, without placing unnecessary restrictions on the user. However, with the increased flexibility, brings about greater complexity in analyzing and interpreting licenses. Thus, this paper proposes an efficient design for a license interpretation engine, based on an expert system architecture. Part II of this paper describes the implementation of this expert system based license interpreter. Section A shows the
其他灵活的权利语言往往是一项艰巨的任务,由于语言的灵活性和缺乏形式语义。一种有效的管理这种复杂性的方法是将许可转换为一组定义明确的知识谓词,并使用专家系统通过推理规则处理这些知识。这提高了计算效率,并允许根据大量许可证验证授权请求,而不会出现依赖关系问题。随着数字信息和媒体的日益泛滥,特别是数字媒体的在线销售领域,带来了信息销售的商业模式的变化。为了支持以前不可能实现的更具创造性的商业模式,需要一种能够更灵活地描述权利和交易的方法。MPEG-21[2]中的权利表达语言(Rights Expression Language, REL)[1]通过密集的标准化过程,力求定义一种灵活、可扩展的描述语言,用于描述不同主体之间的通用权利模型。数字版权管理(DRM)系统使用权利表达语言和加密算法对数字内容进行保护和管理。一种更灵活或更具表现力的权利表达语言,可以更紧密地模拟消费者与内容提供者之间的权利交换,为用户带来更大的便利,改善用户体验。这对于接受DRM系统至关重要,因为DRM成为交换数字信息的方便手段,而不会对用户施加不必要的限制。但是,随着灵活性的增加,许可证的分析和解释也变得更加复杂。因此,本文提出了一种基于专家系统架构的许可证解释引擎的高效设计。本文的第二部分介绍了基于专家系统的许可证解释器的实现。A部分展示了
{"title":"Efficient Design of Interpretation of REL License Using Expert Systems","authors":"Chun Hui Suen","doi":"10.1109/CCNC.2007.214","DOIUrl":"https://doi.org/10.1109/CCNC.2007.214","url":null,"abstract":"other flexible rights language is often a difficult task, due to the flexibility of the language and the lack of formal semantics. An efficient way to manage this complexity is to translate the license into a set of clearly defined knowledge predicate, and process this knowledge via inference rules using an expert system. This improves computational efficiency and allows authorization request to be verified against a large number of licenses without dependency issues. I. INTRODUCTION ith the increased proliferation of digital information and media, especially in the field of on-line sales of digital media, brings about a change in the business model of sales of information. In order to support more creative business models, which was not possible before, a method in which rights and transactions can be described with greater flexibility is required. Through an intensive standardization process, the Rights Expression Language (REL) [1] from MPEG-21 [2], strives to define a flexible and extensible description language, which can be used to describe generic rights model between different parties. Digital Rights Management (DRM) systems use rights expression languages together with cryptographic algorithms to protect and manage digital contents. A more flexible or expressive rights expression language, which can closely model the rights exchange between consumers and content providers, would brings about greater convenience for users and improve the user experience. This would be crucial to the acceptance of DRM systems, as DRM becomes a convenient means of exchange of digital information, without placing unnecessary restrictions on the user. However, with the increased flexibility, brings about greater complexity in analyzing and interpreting licenses. Thus, this paper proposes an efficient design for a license interpretation engine, based on an expert system architecture. Part II of this paper describes the implementation of this expert system based license interpreter. Section A shows the","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Media-Push Technology in Multimedia Mobile Environment 多媒体移动环境下的媒体推送技术
Pub Date : 1900-01-01 DOI: 10.1109/CCNC.2007.243
Pavlo Krasovs'ky, M. Debes, J. Seitz
The usage of mobile phones has rapidly increased in the recent years. As the result of this, many companies have appeared at the markets that propose various services for mobile communication. Therefore, the customer's choice of the telephone provider depends both on the cost policy and the proposed services of the companies. In our work, innovative services for providers are introduced. They implement both centralized and decentralized control of mobile phones by having access to the kernel of the operating system running on the mobile phone. The delivery of multimedia contents to the mobile device can be done using one of the following options: direct communication between two mobile phones or indirect communication between two mobile phones via a server providing the multimedia content. This leads to an IP-based distributed multimedia mobile system in local and global areas. Our research in this field shows that mobile devices are comparable to any computer in the network that gives opportunity to download multimedia information. Our demonstration with client and server software will show the functional features of the developed system.
近年来,移动电话的使用迅速增加。因此,市场上出现了很多提出各种移动通信服务的公司。因此,客户对电话供应商的选择取决于公司的成本政策和建议的服务。在我们的工作中,为供应商引入了创新服务。它们通过访问运行在移动电话上的操作系统内核来实现对移动电话的集中和分散控制。将多媒体内容传送到移动设备可以使用以下选择之一来完成:两个移动电话之间的直接通信或通过提供多媒体内容的服务器在两个移动电话之间进行间接通信。这就形成了一个基于ip的本地和全球分布式多媒体移动系统。我们在这一领域的研究表明,移动设备与网络中的任何一台计算机相媲美,提供了下载多媒体信息的机会。我们用客户端和服务器端软件进行演示,展示所开发系统的功能特点。
{"title":"Media-Push Technology in Multimedia Mobile Environment","authors":"Pavlo Krasovs'ky, M. Debes, J. Seitz","doi":"10.1109/CCNC.2007.243","DOIUrl":"https://doi.org/10.1109/CCNC.2007.243","url":null,"abstract":"The usage of mobile phones has rapidly increased in the recent years. As the result of this, many companies have appeared at the markets that propose various services for mobile communication. Therefore, the customer's choice of the telephone provider depends both on the cost policy and the proposed services of the companies. In our work, innovative services for providers are introduced. They implement both centralized and decentralized control of mobile phones by having access to the kernel of the operating system running on the mobile phone. The delivery of multimedia contents to the mobile device can be done using one of the following options: direct communication between two mobile phones or indirect communication between two mobile phones via a server providing the multimedia content. This leads to an IP-based distributed multimedia mobile system in local and global areas. Our research in this field shows that mobile devices are comparable to any computer in the network that gives opportunity to download multimedia information. Our demonstration with client and server software will show the functional features of the developed system.","PeriodicalId":166361,"journal":{"name":"2007 4th IEEE Consumer Communications and Networking Conference","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116638097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2007 4th IEEE Consumer Communications and Networking Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1