This work proposes a hybrid traffic model for multimedia networks as a fundamental element in a network planning optimization procedure. The proposed model uses a combination of the fBm (fractional Brownian motion) and Markovian traffic characterization procedures combined with link parameters in order to produce more accurate values of QoS metrics. The hybrid traffic model was evaluated in a network scenario that aggregates different traffic types with different combinations of Hurst parameters and variance coefficients. The results show that the QoS metrics calculated with the hybrid traffic model appear to be more accurate than the ones obtained exclusively with the fBm or the Markovian models. With these results, the proposed model appears to be useful in network planning optimization methods. .
{"title":"Hybrid Traffic Model for Multimedia Network Performance Evaluation","authors":"P. S. Barreto, P. Carvalho","doi":"10.1109/WAINA.2008.187","DOIUrl":"https://doi.org/10.1109/WAINA.2008.187","url":null,"abstract":"This work proposes a hybrid traffic model for multimedia networks as a fundamental element in a network planning optimization procedure. The proposed model uses a combination of the fBm (fractional Brownian motion) and Markovian traffic characterization procedures combined with link parameters in order to produce more accurate values of QoS metrics. The hybrid traffic model was evaluated in a network scenario that aggregates different traffic types with different combinations of Hurst parameters and variance coefficients. The results show that the QoS metrics calculated with the hybrid traffic model appear to be more accurate than the ones obtained exclusively with the fBm or the Markovian models. With these results, the proposed model appears to be useful in network planning optimization methods. .","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115993423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Abramowicz, K. Haniewicz, M. Kaczmarek, Raúl Palma, D. Zyskowski
The success of Web services technology depends heavily on the effective discovery and sharing of services in distributed environments using various registries. These tasks should take into account both functional and non-functional properties (NFP) of a service. Such properties may be for example: execution time, reliability, security, cost or provider's reputation. However, currently known approaches focus mainly on the functional attributes of Web services and there is an ongoing discussion on the scope and methods that should be used to express the non-functional side of WS. This article presents an ontology of non-functional properties and shows, on the example of the WebSter registry, how it may be used within the WS discovery process in distributed environments.
{"title":"NFP Ontology for Discovery and Sharing Web Services in Distributed Registries","authors":"W. Abramowicz, K. Haniewicz, M. Kaczmarek, Raúl Palma, D. Zyskowski","doi":"10.1109/WAINA.2008.267","DOIUrl":"https://doi.org/10.1109/WAINA.2008.267","url":null,"abstract":"The success of Web services technology depends heavily on the effective discovery and sharing of services in distributed environments using various registries. These tasks should take into account both functional and non-functional properties (NFP) of a service. Such properties may be for example: execution time, reliability, security, cost or provider's reputation. However, currently known approaches focus mainly on the functional attributes of Web services and there is an ongoing discussion on the scope and methods that should be used to express the non-functional side of WS. This article presents an ontology of non-functional properties and shows, on the example of the WebSter registry, how it may be used within the WS discovery process in distributed environments.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116038132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jongwoo Sung, Sungjin Ahn, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang, Seong-eun Yoo, Pohkit Chong, Daeyoung Kim
Wireless sensor network technology has been proven to have a strong impact on our daily life from many real applications. In this paper wireless sensor networks for cultural property protection are introduced. We deployed wireless sensor networks in Bul-guk-sa Temple, which is one of the most important UNESCO cultural property sites in Korea. This paper presents our wireless sensor network system for monitoring and protecting cultural property from the aspect of application design to network system management.
{"title":"Wireless Sensor Networks for Cultural Property Protection","authors":"Jongwoo Sung, Sungjin Ahn, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang, Seong-eun Yoo, Pohkit Chong, Daeyoung Kim","doi":"10.1109/WAINA.2008.259","DOIUrl":"https://doi.org/10.1109/WAINA.2008.259","url":null,"abstract":"Wireless sensor network technology has been proven to have a strong impact on our daily life from many real applications. In this paper wireless sensor networks for cultural property protection are introduced. We deployed wireless sensor networks in Bul-guk-sa Temple, which is one of the most important UNESCO cultural property sites in Korea. This paper presents our wireless sensor network system for monitoring and protecting cultural property from the aspect of application design to network system management.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122051738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present a framework where access rights are provided to entities on the basis of the actual task that the entities must fulfill as part of their duties. For capturing the requirements of entities' duties we use the notion of workflow. Our main aim is to provide an access control mechanism that is able to balance the competing goals of flexibility and security. As the main beneficiary of our approach we consider e-Health Applications, where flexibility and security are major requirements. We also provide an implementation of a medical case study to illustrate the framework.
{"title":"A Workflow-Based Access Control Framework for e-Health Applications","authors":"G. Russello, Changyu Dong, Naranker Dulay","doi":"10.1109/WAINA.2008.131","DOIUrl":"https://doi.org/10.1109/WAINA.2008.131","url":null,"abstract":"In this paper, we present a framework where access rights are provided to entities on the basis of the actual task that the entities must fulfill as part of their duties. For capturing the requirements of entities' duties we use the notion of workflow. Our main aim is to provide an access control mechanism that is able to balance the competing goals of flexibility and security. As the main beneficiary of our approach we consider e-Health Applications, where flexibility and security are major requirements. We also provide an implementation of a medical case study to illustrate the framework.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124460692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The mobile phone environment is today highly concerned about security threats of buggy, malicious or viruses' code that an end user could download and crash the phone. To prevent this, mobile phones applications operates a virtual sandbox that runs each application in a tightly constrained environment separated from each other. This work proposes a device middleware, namely D-Mid, which leverages an existent device framework to provide an agonistic application model that supports heterogeneous access to the middleware with a minimal impact on performance. Besides mobile devices are likely to have scarce resources, such as memory and CPU clock, so D-Mid provides an inversion of control mechanism that targets a minimal execution environment.
{"title":"Device Middleware for Heterogeneous Access to Java Services","authors":"Andre Elia Assad, N. Rosa","doi":"10.1109/WAINA.2008.251","DOIUrl":"https://doi.org/10.1109/WAINA.2008.251","url":null,"abstract":"The mobile phone environment is today highly concerned about security threats of buggy, malicious or viruses' code that an end user could download and crash the phone. To prevent this, mobile phones applications operates a virtual sandbox that runs each application in a tightly constrained environment separated from each other. This work proposes a device middleware, namely D-Mid, which leverages an existent device framework to provide an agonistic application model that supports heterogeneous access to the middleware with a minimal impact on performance. Besides mobile devices are likely to have scarce resources, such as memory and CPU clock, so D-Mid provides an inversion of control mechanism that targets a minimal execution environment.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines the extended use of different coding schemes (Scalable vs. Multiple Description or MD) in different video formats (MPEG vs. Motion JPEG or MJPEG) in a Mobile Ad Hoc Network (MANET) environment and proposes a set of redundancy solutions at different coding levels. Simulations and analysis demonstrate and explain the relationship among the coding schemes, video formats, level and amount of redundancy, mobility of mobile devices, CPU load and battery life and frame loss rate at the receiver side. Finally, two practical scenarios are used to illustrate these findings and proposed solutions.
{"title":"The Effects of Mobility and Redundancy on Wireless Video Streaming over MANETs","authors":"Lei Chen, Chung-wei Lee","doi":"10.1109/WAINA.2008.282","DOIUrl":"https://doi.org/10.1109/WAINA.2008.282","url":null,"abstract":"This study examines the extended use of different coding schemes (Scalable vs. Multiple Description or MD) in different video formats (MPEG vs. Motion JPEG or MJPEG) in a Mobile Ad Hoc Network (MANET) environment and proposes a set of redundancy solutions at different coding levels. Simulations and analysis demonstrate and explain the relationship among the coding schemes, video formats, level and amount of redundancy, mobility of mobile devices, CPU load and battery life and frame loss rate at the receiver side. Finally, two practical scenarios are used to illustrate these findings and proposed solutions.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The enhanced routers which can provide tracing service are referred to as tracers. In this paper, we propose a new hierarchical tracers deployment which can guarantee that the distance between any attack origin and its first met tracer be within an assigned hop distance. Networks are partitioned into hierarchical areas which are surrounded by tracers. Based on hierarchical tracers deployment, we design a multi-layer traceback method which can guarantee to find all of attack origins. Packets are marked only by their first met tracer in low probability. A single marked packet can be used to locate where the area attack origin is from. If the number of nodes in the found area is more than a threshold, the proposed multi-layer traceback will be recursively executed till attack origins are found. Extended simulation shows that the searching cost of finding attack origins can be bounded.
{"title":"Multi-Layer Traceback under the Hierarchical Tracers Deployment","authors":"Chun-Hsin Wang, Yen-Chih Chiang","doi":"10.1109/WAINA.2008.186","DOIUrl":"https://doi.org/10.1109/WAINA.2008.186","url":null,"abstract":"The enhanced routers which can provide tracing service are referred to as tracers. In this paper, we propose a new hierarchical tracers deployment which can guarantee that the distance between any attack origin and its first met tracer be within an assigned hop distance. Networks are partitioned into hierarchical areas which are surrounded by tracers. Based on hierarchical tracers deployment, we design a multi-layer traceback method which can guarantee to find all of attack origins. Packets are marked only by their first met tracer in low probability. A single marked packet can be used to locate where the area attack origin is from. If the number of nodes in the found area is more than a threshold, the proposed multi-layer traceback will be recursively executed till attack origins are found. Extended simulation shows that the searching cost of finding attack origins can be bounded.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128374300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To maintain the quality of multicast tree in supporting dynamic membership is critical important for the tree receivers. We propose an integrated approach that combines core migration with local search to afford the receivers a consistent quality service. The main ideas are always to migrate the core to the topological center of multicast tree within limited overhead and to provide multiple routes via local search for a new receiver to meet its quality requirements. Our algorithm aims to meet a predefined upper bound delay along path to individual receiver and satisfy the constraint of inter-destination delay variation among all receivers. In simulation results, it is shown that the proposed algorithm approximately provides the cost saving of 10%, the maximum delays of 25% and the inter-destination delay variation of 12%, compared to the existing approaches.
{"title":"A Core Migration Method to Minimize Inter-Destination Delay Variation","authors":"Wu-Hong Tsai, Y. Chu","doi":"10.1109/WAINA.2008.224","DOIUrl":"https://doi.org/10.1109/WAINA.2008.224","url":null,"abstract":"To maintain the quality of multicast tree in supporting dynamic membership is critical important for the tree receivers. We propose an integrated approach that combines core migration with local search to afford the receivers a consistent quality service. The main ideas are always to migrate the core to the topological center of multicast tree within limited overhead and to provide multiple routes via local search for a new receiver to meet its quality requirements. Our algorithm aims to meet a predefined upper bound delay along path to individual receiver and satisfy the constraint of inter-destination delay variation among all receivers. In simulation results, it is shown that the proposed algorithm approximately provides the cost saving of 10%, the maximum delays of 25% and the inter-destination delay variation of 12%, compared to the existing approaches.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128528391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computing demands for science and technology calculations, business use, and imaging techniques are continually rising. Grid computing that uses idle resources is discussed as a platform for such applications. Grid computing is a distributed technology that has high-throughput computing (HTC) as its principal objective. Moreover, several middleware solutions are offered as open source software, and thus a grid has the advantage that it can be constructed at a lower cost than a cluster. However, in current grids, it is not possible to use PCs running Windows OS. Therefore, we have chosen to use a virtual machine. In this paper, we compare a Linux grid of virtual machines with a similar Windows grid.
{"title":"A Case Study of a Linux Grid on Windows Using Virtual Machines","authors":"Kenichi Tanaka, M. Uehara, H. Mori","doi":"10.1109/WAINA.2008.297","DOIUrl":"https://doi.org/10.1109/WAINA.2008.297","url":null,"abstract":"Computing demands for science and technology calculations, business use, and imaging techniques are continually rising. Grid computing that uses idle resources is discussed as a platform for such applications. Grid computing is a distributed technology that has high-throughput computing (HTC) as its principal objective. Moreover, several middleware solutions are offered as open source software, and thus a grid has the advantage that it can be constructed at a lower cost than a cluster. However, in current grids, it is not possible to use PCs running Windows OS. Therefore, we have chosen to use a virtual machine. In this paper, we compare a Linux grid of virtual machines with a similar Windows grid.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The information resources on the Web are diversified, and the amount is increasing rapidly. Demands for selecting useful information from the Internet, managing personal contents, and sharing contents under control have risen. In this study, we propose the ubiquitous personal study (UPS), a framework of personalized virtual study to support accessing, managing, organizing, sharing and recommending information. In this paper, we focus on discussing the issues on how to implement it with Web 2.0 mash-up technology and open source software.
{"title":"Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS Technologies","authors":"Hong Chen, Nozomi Ikeuchi, Qun Jin","doi":"10.1109/WAINA.2008.169","DOIUrl":"https://doi.org/10.1109/WAINA.2008.169","url":null,"abstract":"The information resources on the Web are diversified, and the amount is increasing rapidly. Demands for selecting useful information from the Internet, managing personal contents, and sharing contents under control have risen. In this study, we propose the ubiquitous personal study (UPS), a framework of personalized virtual study to support accessing, managing, organizing, sharing and recommending information. In this paper, we focus on discussing the issues on how to implement it with Web 2.0 mash-up technology and open source software.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128701900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}