首页 > 最新文献

2011 Third International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Knowledge Reuse: Its Role and Implications for Upper Level Ontologies 知识重用:它对上层本体的作用和含义
J. Conesa, V. Storey, V. Sugumaran, S. Caballé
There have been many ambitious attempts to develop both domain and large-scale, upper level ontologies, in the belief that ontologies are the key to success in the Semantic Web, web services, and other applications. However, there has been little research conducted on how to assess the effectiveness of these ontologies and how to reuse them in different contexts. This paper analyzes a well-known upper level ontology, CYC, using its ResearchCyc version. Problems and challenges faced in using ResearchCyc are identified and suggestions proposed for overcoming them. The solutions are intended to be generalizable to other upper level ontologies. Finally, based on the investigations presented in this paper, an application to the domain of collaborative learning is provided.
由于相信本体是在语义Web、Web服务和其他应用程序中取得成功的关键,已经有许多雄心勃勃的尝试开发领域和大规模的上层本体。然而,关于如何评估这些本体的有效性以及如何在不同的上下文中重用它们的研究很少。本文利用CYC的ResearchCyc版本对一个知名的上层本体CYC进行了分析。指出了使用ResearchCyc所面临的问题和挑战,并提出了克服这些问题的建议。这些解决方案旨在推广到其他上层本体。最后,在本文研究的基础上,提出了在协作学习领域的应用。
{"title":"Knowledge Reuse: Its Role and Implications for Upper Level Ontologies","authors":"J. Conesa, V. Storey, V. Sugumaran, S. Caballé","doi":"10.1109/incos.2011.110","DOIUrl":"https://doi.org/10.1109/incos.2011.110","url":null,"abstract":"There have been many ambitious attempts to develop both domain and large-scale, upper level ontologies, in the belief that ontologies are the key to success in the Semantic Web, web services, and other applications. However, there has been little research conducted on how to assess the effectiveness of these ontologies and how to reuse them in different contexts. This paper analyzes a well-known upper level ontology, CYC, using its ResearchCyc version. Problems and challenges faced in using ResearchCyc are identified and suggestions proposed for overcoming them. The solutions are intended to be generalizable to other upper level ontologies. Finally, based on the investigations presented in this paper, an application to the domain of collaborative learning is provided.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dispersive Video Frame Importance Driven Probabilistic Packet Mapping for 802.11e Based Video Transmission 基于802.11e视频传输的分散视频帧重要性驱动的概率分组映射
Wen-Ping Lai, En-Cheng Liou, Wei-Hao Fu
The FIFO characteristic of the access category queue (AC_VI) reserved for video in the 802.11e MAC limits its performance for high quality video transmission during traffic congestions. To enhance video transmission quality, further service differentiation among the video packets is preferred. To achieve this, this paper presents a novel cross-layer design by proposing a dispersive video frame importance (DVFI) scheme from the Application layer and a dispersive random early detection (DRED) algorithm for video packet mapping among ACs. DVFI is calculated from a single frame loss induced video quality impairment, including the effects of imperfect concealment for the lost video frame itself and its error propagation to the surrounding video frames. Whereas DRED can dynamically determine the packet mapping probabilities among ACs based on the dispersive values of packet importance. Our results show the superiority of the proposed (DVFI+DRED) framework over the existing ones, including EDCA and (I/P/B+AM), and it can reach a largest gain of 3.2 dB over EDCA, and 2.6 dB over (I/P/B+AM).
802.11e MAC中为视频预留的访问类别队列(AC_VI)的FIFO特性,限制了其在流量拥塞时传输高质量视频的性能。为了提高视频传输质量,最好对视频包进行进一步的业务区分。为了实现这一目标,本文提出了一种新的跨层设计,提出了一种来自应用层的分散视频帧重要性(DVFI)方案和一种用于ac之间视频分组映射的分散随机早期检测(DRED)算法。DVFI是根据单个帧丢失引起的视频质量损害来计算的,包括丢失的视频帧本身不完全隐藏的影响以及它的错误传播到周围的视频帧。而DRED可以根据分组重要性的弥散值动态确定ac之间的分组映射概率。我们的研究结果表明,所提出的(DVFI+DRED)框架优于现有的框架,包括EDCA和(I/P/B+AM),它比EDCA可以达到3.2 dB的最大增益,比(I/P/B+AM)可以达到2.6 dB。
{"title":"Dispersive Video Frame Importance Driven Probabilistic Packet Mapping for 802.11e Based Video Transmission","authors":"Wen-Ping Lai, En-Cheng Liou, Wei-Hao Fu","doi":"10.1109/INCoS.2011.77","DOIUrl":"https://doi.org/10.1109/INCoS.2011.77","url":null,"abstract":"The FIFO characteristic of the access category queue (AC_VI) reserved for video in the 802.11e MAC limits its performance for high quality video transmission during traffic congestions. To enhance video transmission quality, further service differentiation among the video packets is preferred. To achieve this, this paper presents a novel cross-layer design by proposing a dispersive video frame importance (DVFI) scheme from the Application layer and a dispersive random early detection (DRED) algorithm for video packet mapping among ACs. DVFI is calculated from a single frame loss induced video quality impairment, including the effects of imperfect concealment for the lost video frame itself and its error propagation to the surrounding video frames. Whereas DRED can dynamically determine the packet mapping probabilities among ACs based on the dispersive values of packet importance. Our results show the superiority of the proposed (DVFI+DRED) framework over the existing ones, including EDCA and (I/P/B+AM), and it can reach a largest gain of 3.2 dB over EDCA, and 2.6 dB over (I/P/B+AM).","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117182152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Emotion Measurement in Intelligent Tutoring Systems: What, When and How to Measure 智能辅导系统中的情绪测量:测量什么、何时以及如何测量
M. Feidakis, T. Daradoumis, S. Caballé
Affective or Emotion oriented computing constitutes an emerging research field that is still in its early stages. The lack of empirical results together with the complexity that attributes emotions, subjects research to a diversity of theories, models and tools. In the current paper we present a critical review of the state of the art on emotion measurement models, methods and tools and we suggest some informal rules towards their realistic use in education settings.
情感或面向情感的计算构成了一个仍处于早期阶段的新兴研究领域。实证结果的缺乏,加上情感的复杂性,使得研究受制于各种各样的理论、模型和工具。在本文中,我们对情感测量模型、方法和工具的现状进行了批判性回顾,并提出了一些在教育环境中实际使用的非正式规则。
{"title":"Emotion Measurement in Intelligent Tutoring Systems: What, When and How to Measure","authors":"M. Feidakis, T. Daradoumis, S. Caballé","doi":"10.1109/INCOS.2011.82","DOIUrl":"https://doi.org/10.1109/INCOS.2011.82","url":null,"abstract":"Affective or Emotion oriented computing constitutes an emerging research field that is still in its early stages. The lack of empirical results together with the complexity that attributes emotions, subjects research to a diversity of theories, models and tools. In the current paper we present a critical review of the state of the art on emotion measurement models, methods and tools and we suggest some informal rules towards their realistic use in education settings.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Genetically Evolved Fuzzy Predictor for Photovoltaic Power Output Estimation 光伏发电输出估计的遗传进化模糊预测器
P. Krömer, V. Snás̃el, J. Platoš, A. Abraham, L. Prokop, S. Mišák
Fuzzy sets and fuzzy logic can be used for efficient data mining, classification, and value prediction. We propose a genetically evolved fuzzy predictor to estimate the output of a Photovoltaic Power Plant. Photovoltaic Power Plants (PVPPs) are classified as power energy sources with unstable supply of electrical energy. It is necessary to back up power energy from PVPPs for stable electric network operation. An optimal value of back up power can be set with reliable prediction models and significantly contribute to the robustness of the electric network and therefore help in the building of intelligent power grids.
模糊集和模糊逻辑可以用于有效的数据挖掘、分类和价值预测。我们提出了一个遗传进化模糊预测器来估计光伏电站的输出。光伏电站被归类为电能供应不稳定的电力能源。为保证电网的稳定运行,需要从光伏电站中备份电能。通过建立可靠的预测模型,确定备用功率的最优值,可以显著提高电网的鲁棒性,从而有助于智能电网的建设。
{"title":"Genetically Evolved Fuzzy Predictor for Photovoltaic Power Output Estimation","authors":"P. Krömer, V. Snás̃el, J. Platoš, A. Abraham, L. Prokop, S. Mišák","doi":"10.1109/INCOS.2011.97","DOIUrl":"https://doi.org/10.1109/INCOS.2011.97","url":null,"abstract":"Fuzzy sets and fuzzy logic can be used for efficient data mining, classification, and value prediction. We propose a genetically evolved fuzzy predictor to estimate the output of a Photovoltaic Power Plant. Photovoltaic Power Plants (PVPPs) are classified as power energy sources with unstable supply of electrical energy. It is necessary to back up power energy from PVPPs for stable electric network operation. An optimal value of back up power can be set with reliable prediction models and significantly contribute to the robustness of the electric network and therefore help in the building of intelligent power grids.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125023065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance Evaluation R-MAC:一种基于负载估计和性能评估的无线传感器网络降功耗MAC协议
A. Koyama, Ryoma Watanabe, L. Barolli, M. Takizawa
In sensor networks, small sensor nodes which are distributed in an area send various data and send them to the sink node by multi-hop transmission. The sensor networks cover various application fields such as safety management, health management, grasping of nature environment, military and so on. The sensor networks will be used as a technique for constructing ubiquitous society because of low cost and easy construction. However, since the nodes are small, the consumption power is limited. Also, they have problems with transmission power and speed. To solve these problems, various protocols are proposed. In this paper, we propose a MAC protocol for power reduction based on load estimation called R-MAC. The R-MAC estimates the network load and its behavior is adapted based on the network load. Therefore, it is possible to improve the power consumption and transmission delay. We evaluated the performance of R-MAC protocol by computer simulation and verified that R-MAC has better performance than S-MAC conventional MAC protocol. We also evaluate the performance of R-MAC for 2 scenarios and show that R-MAC has a very good and adaptive behavior.
在传感器网络中,分布在一个区域内的小传感器节点发送各种数据,并通过多跳传输的方式发送给汇聚节点。传感器网络涵盖了安全管理、健康管理、自然环境把握、军事等各个应用领域。传感器网络具有成本低、建设方便等优点,将成为建设泛在社会的一种技术手段。但是,由于节点较小,因此消耗能力有限。此外,它们在传输功率和速度方面也存在问题。为了解决这些问题,提出了各种协议。在本文中,我们提出了一种基于负荷估计的MAC协议,称为R-MAC。R-MAC估计网络负载,并根据网络负载调整其行为。因此,有可能提高功耗和传输延迟。通过计算机仿真对R-MAC协议的性能进行了评估,验证了R-MAC协议的性能优于S-MAC常规MAC协议。我们还对两种场景下R-MAC的性能进行了评估,结果表明R-MAC具有良好的自适应行为。
{"title":"R-MAC: A MAC Protocol for Power Reduction in Wireless Sensor Networks Based on Load Estimation and Its Performance Evaluation","authors":"A. Koyama, Ryoma Watanabe, L. Barolli, M. Takizawa","doi":"10.1109/INCoS.2011.144","DOIUrl":"https://doi.org/10.1109/INCoS.2011.144","url":null,"abstract":"In sensor networks, small sensor nodes which are distributed in an area send various data and send them to the sink node by multi-hop transmission. The sensor networks cover various application fields such as safety management, health management, grasping of nature environment, military and so on. The sensor networks will be used as a technique for constructing ubiquitous society because of low cost and easy construction. However, since the nodes are small, the consumption power is limited. Also, they have problems with transmission power and speed. To solve these problems, various protocols are proposed. In this paper, we propose a MAC protocol for power reduction based on load estimation called R-MAC. The R-MAC estimates the network load and its behavior is adapted based on the network load. Therefore, it is possible to improve the power consumption and transmission delay. We evaluated the performance of R-MAC protocol by computer simulation and verified that R-MAC has better performance than S-MAC conventional MAC protocol. We also evaluate the performance of R-MAC for 2 scenarios and show that R-MAC has a very good and adaptive behavior.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Micro E-board: An Interactive Teaching Aid Using Mobile Devices 微型电子板:使用移动设备的交互式教学辅助工具
Hiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, K. Utsumiya
Advanced computer technology has a potential power to completely change education style. Ubiquitous computing framework allows students to learn anywhere at any time. It also enables a teacher to electronically organize some materials on site and present them according to students' situation. In this paper, we describe an interactive teaching aid called Micro E-Board designed and implemented to solve some problems existing in currently available e-learning technology. The proposed system allows users to easily build an intuitive e-learning environment anywhere at any time based on mobile technology and prompts interactions between a teacher and students with a set of easy-to-use functions.
先进的计算机技术具有彻底改变教育方式的潜在力量。普适计算框架允许学生随时随地学习。它还使教师能够在现场以电子方式组织一些材料,并根据学生的情况进行展示。为了解决当前电子学习技术中存在的一些问题,我们设计并实现了一种名为微型电子板的交互式教学辅助工具。该系统允许用户基于移动技术随时随地轻松构建直观的电子学习环境,并通过一套易于使用的功能促进教师和学生之间的互动。
{"title":"Micro E-board: An Interactive Teaching Aid Using Mobile Devices","authors":"Hiroaki Nishino, Shota Hidaka, Tsuneo Kagawa, K. Utsumiya","doi":"10.1109/INCoS.2011.118","DOIUrl":"https://doi.org/10.1109/INCoS.2011.118","url":null,"abstract":"Advanced computer technology has a potential power to completely change education style. Ubiquitous computing framework allows students to learn anywhere at any time. It also enables a teacher to electronically organize some materials on site and present them according to students' situation. In this paper, we describe an interactive teaching aid called Micro E-Board designed and implemented to solve some problems existing in currently available e-learning technology. The proposed system allows users to easily build an intuitive e-learning environment anywhere at any time based on mobile technology and prompts interactions between a teacher and students with a set of easy-to-use functions.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122029809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Doppler Shifted Scattering from a Target Moving Along Inhomogeneous Random Rough Surface 目标沿非均匀随机粗糙表面运动时的多普勒频移散射
S. Nakashima, J. Honda, K. Uchida
This paper is concerned with an analysis of backscattering of electromagnetic waves from a target moving along random rough surfaces (RRSs) such as desert, hilly terrain, forest, sea surface and so on. First we introduce the discrete ray tracing method (DRTM), and second we apply this method to the backscattering problem in order to investigate the influence of the backscattering from RRSs on the radar cross section. Finally we show some numerical examples for the Doppler shifted backscattering of the total fields in comparison with that of the subtracted fields. The subtracted express reflection from the target as well as electromagnetic interaction between target and rough surface. It is numerically demonstrated that the total backscattering dominates almost everywhere except for the near region of radar, even if we employ an antenna with a very sharp directivity. We also investigate statistics of Doppler shifted backscattering from a target.
本文研究了在沙漠、丘陵、森林、海面等随机粗糙表面上运动的目标电磁波的后向散射问题。首先介绍了离散射线追踪法(DRTM),然后将该方法应用于后向散射问题,研究RRSs后向散射对雷达截面的影响。最后给出了总场和减场后向多普勒频移散射的数值算例。减相式表示目标的反射以及目标与粗糙表面的电磁相互作用。数值计算表明,除了雷达附近区域外,即使我们使用具有非常尖锐指向性的天线,总后向散射几乎在任何地方都占主导地位。我们还研究了目标的多普勒后向散射的统计。
{"title":"Doppler Shifted Scattering from a Target Moving Along Inhomogeneous Random Rough Surface","authors":"S. Nakashima, J. Honda, K. Uchida","doi":"10.1109/INCoS.2011.79","DOIUrl":"https://doi.org/10.1109/INCoS.2011.79","url":null,"abstract":"This paper is concerned with an analysis of backscattering of electromagnetic waves from a target moving along random rough surfaces (RRSs) such as desert, hilly terrain, forest, sea surface and so on. First we introduce the discrete ray tracing method (DRTM), and second we apply this method to the backscattering problem in order to investigate the influence of the backscattering from RRSs on the radar cross section. Finally we show some numerical examples for the Doppler shifted backscattering of the total fields in comparison with that of the subtracted fields. The subtracted express reflection from the target as well as electromagnetic interaction between target and rough surface. It is numerically demonstrated that the total backscattering dominates almost everywhere except for the near region of radar, even if we employ an antenna with a very sharp directivity. We also investigate statistics of Doppler shifted backscattering from a target.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation 支持强安全的无证书聚合签名,适用于移动计算
H. Xiong, Qianhong Wu, Zhong Chen
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificate less aggregate signature scheme. Compared with up-to-date certificate less aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model, (2) the security is proven in the strongest security model so far, (3) the signers do not need to be synchronized, and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.
聚合签名方案允许公共算法将来自n个签名者的n个不同消息的n个签名聚合为单个签名。通过验证单个结果签名,可以确信消息已得到所有签名者的认可。无证书聚合签名允许签名者对消息进行身份验证,而不存在传统公钥加密中复杂的证书管理问题或基于身份的加密中的密钥托管问题。本文提出了一种新的高效的无证书聚合签名方案。与最新的无证书聚合签名相比,我们的方案具有许多吸引人的特点:(1)在随机oracle模型的标准计算Diffie-Hellman假设下证明了它的安全性;(2)在迄今为止最强的安全模型中证明了它的安全性;(3)签名者不需要同步;(4)它的性能可与最有效的最新方案相媲美。这些特征是在终端设备存储/计算能力有限的移动网络和计算环境中所需要的,并且由于无线连接和分布式特性,计算设备容易被攻击,难以同步。
{"title":"Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation","authors":"H. Xiong, Qianhong Wu, Zhong Chen","doi":"10.1109/INCoS.2011.151","DOIUrl":"https://doi.org/10.1109/INCoS.2011.151","url":null,"abstract":"An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate signatures allow the signers to authenticate messages without suffering from the complex certificate management in the traditional public key cryptography or the key escrow problem in identity-based cryptography. In this paper, we present a new efficient certificate less aggregate signature scheme. Compared with up-to-date certificate less aggregate signatures, our scheme is equipped with a number of attracting features: (1) it is shown to be secure under the standard computational Diffie-Hellman assumption in the random oracle model, (2) the security is proven in the strongest security model so far, (3) the signers do not need to be synchronized, and (4) its performance is comparable to the most efficient up-to-date schemes. These features are desirable in a mobile networking and computing environment where the storage/computation capacity of the end devices are limited, and due to the wireless connection and distributed feature, the computing devices are easy to be attacked and hard to be synchronized.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Framework for Dealing with Knowledge about On-line Collaborative Learning Sessions 联机协作学习课程的知识处理框架
J. Conesa, S. Caballé, D. Gañán, Josep Prieto
In this paper we propose a framework for modeling, representing populating and enriching knowledge from online collaborative sessions within Web forums. The main piece of the framework is an ontology called Collaborative Session Conceptual Schema (CS2) that allows specifying collaborative sessions. The paper describes the knowledge this ontology needs to know, the alignment of the ontology with the ontologies of relevant specifications, how the ontology can be automatically populated from the data existent in forums, and how to enrich such data into useful knowledge about what is happening during the collaboration. The research reported in this paper is currently undertaken within a FP7 European project called ALICE.
在本文中,我们提出了一个用于建模的框架,表示来自Web论坛中的在线协作会议的填充和丰富知识。该框架的主要部分是一个称为协作会话概念模式(CS2)的本体,它允许指定协作会话。本文描述了该本体需要知道的知识,本体与相关规范的本体的对齐,如何从论坛中存在的数据自动填充本体,以及如何将这些数据丰富为关于协作过程中发生的事情的有用知识。本文中报告的研究目前是在一个名为ALICE的FP7欧洲项目中进行的。
{"title":"A Framework for Dealing with Knowledge about On-line Collaborative Learning Sessions","authors":"J. Conesa, S. Caballé, D. Gañán, Josep Prieto","doi":"10.1109/INCOS.2011.18","DOIUrl":"https://doi.org/10.1109/INCOS.2011.18","url":null,"abstract":"In this paper we propose a framework for modeling, representing populating and enriching knowledge from online collaborative sessions within Web forums. The main piece of the framework is an ontology called Collaborative Session Conceptual Schema (CS2) that allows specifying collaborative sessions. The paper describes the knowledge this ontology needs to know, the alignment of the ontology with the ontologies of relevant specifications, how the ontology can be automatically populated from the data existent in forums, and how to enrich such data into useful knowledge about what is happening during the collaboration. The research reported in this paper is currently undertaken within a FP7 European project called ALICE.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129107969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Slot Assignment Method for Slotted CSMA Based on Maximum Clique Extraction 基于最大团提取的槽型CSMA槽分配新方法
Tetsuya Shigeyasu, Xiong Liu, H. Matsuno
With the development of information and communications technology, numerous small digital devices equipped for wireless communication have been produced. For controlling network communication easily, most use a CSMA-based protocol in the media access control layer. Although any terminal can get its new transmission opportunity easily and autonomously using a CSMA-based protocol, both packet collision probability and throughput degradation become increasingly high if the network contains hidden terminals. In this paper, we propose a new slot assignment method for a slotted CSMA-based protocol using an algorithm to find the maximum clique for addressing packet collisions with hidden terminals completely.
随着信息通信技术的发展,出现了许多用于无线通信的小型数字设备。为了方便地控制网络通信,大多数在媒体访问控制层中使用基于csma的协议。尽管使用基于csma的协议,任何终端都可以轻松、自主地获得新的传输机会,但如果网络中存在隐藏终端,则报文碰撞概率和吞吐量降低都会越来越高。在本文中,我们提出了一种新的基于槽式csma协议的槽分配方法,该方法使用一种算法来寻找最大团,以完全寻址具有隐藏终端的分组冲突。
{"title":"A New Slot Assignment Method for Slotted CSMA Based on Maximum Clique Extraction","authors":"Tetsuya Shigeyasu, Xiong Liu, H. Matsuno","doi":"10.1109/INCoS.2011.30","DOIUrl":"https://doi.org/10.1109/INCoS.2011.30","url":null,"abstract":"With the development of information and communications technology, numerous small digital devices equipped for wireless communication have been produced. For controlling network communication easily, most use a CSMA-based protocol in the media access control layer. Although any terminal can get its new transmission opportunity easily and autonomously using a CSMA-based protocol, both packet collision probability and throughput degradation become increasingly high if the network contains hidden terminals. In this paper, we propose a new slot assignment method for a slotted CSMA-based protocol using an algorithm to find the maximum clique for addressing packet collisions with hidden terminals completely.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 Third International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1