首页 > 最新文献

2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

英文 中文
Grasping contextual awareness inside aworkspace at the entrance to support group interaction 在入口的工作空间中把握上下文意识,以支持团队互动
Hironori Egi, H. Shigeno, Ken-ichi Okada
This research focuses on the entrance of a workspace, where two or more rooms are connected. We propose ASGate (AtmoSphericGate), which conveys change of the state inside the workspace to the members who approach the entrance. This system gathers and stores awareness information from various sensors, and displays the information on the screen integrated into the door. AS-Gate expresses change of the state inside the workspace using colors and animation, and enables members to perform effective works and to facilitate communication. We implemented this system and evaluated effects on the group interaction.
这项研究的重点是工作空间的入口,两个或更多的房间连接在一起。我们提出ASGate (AtmoSphericGate),它将工作区内状态的变化传递给接近入口的成员。该系统收集并存储来自各种传感器的感知信息,并将这些信息显示在集成在门上的屏幕上。AS-Gate使用颜色和动画来表达工作空间内部状态的变化,使成员能够进行有效的工作并方便沟通。我们实施了这个系统,并评估了对小组互动的影响。
{"title":"Grasping contextual awareness inside aworkspace at the entrance to support group interaction","authors":"Hironori Egi, H. Shigeno, Ken-ichi Okada","doi":"10.1109/ICITST.2009.5435099","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435099","url":null,"abstract":"This research focuses on the entrance of a workspace, where two or more rooms are connected. We propose ASGate (AtmoSphericGate), which conveys change of the state inside the workspace to the members who approach the entrance. This system gathers and stores awareness information from various sensors, and displays the information on the screen integrated into the door. AS-Gate expresses change of the state inside the workspace using colors and animation, and enables members to perform effective works and to facilitate communication. We implemented this system and evaluated effects on the group interaction.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Usability driven website design — An equine sports case study 可用性驱动的网站设计-马术运动案例研究
R. Wilkins, A. Nyamapfene
There is considerable anecdotal evidence that equine sports enthusiasts in Devon and Cornwall still shun equine event search websites in preference to traditional information sources such as newspapers, magazines and word of mouth. On this basis, we have carried out a usability analysis of key equine event search websites serving Devon and Cornwall. This analysis suggests that these websites are designed in ways that make them unfriendly and unwelcoming to prospective users. As a follow-up to this analysis, we have used Shneiderman's eight golden rules for interface design to develop a prototype search website. Tests carried out with participants drawn from the target user group suggest that this prototype website outperforms the currently leading equine event search website in Devon and Cornwall. This leads us to conclude that website design and development should be guided at all times by usability principles.
有相当多的轶事证据表明,德文郡和康沃尔郡的马运动爱好者仍然避开马事件搜索网站,而更喜欢传统的信息来源,如报纸、杂志和口口相传。在此基础上,我们对服务于德文郡和康沃尔郡的关键赛马事件搜索网站进行了可用性分析。这一分析表明,这些网站的设计方式使它们对潜在用户不友好和不受欢迎。作为这一分析的后续,我们使用了Shneiderman关于界面设计的八条黄金法则来开发一个原型搜索网站。从目标用户群中抽取的参与者进行的测试表明,这个原型网站优于目前在德文郡和康沃尔郡领先的马事件搜索网站。这让我们得出结论,网站设计和开发应该始终遵循可用性原则。
{"title":"Usability driven website design — An equine sports case study","authors":"R. Wilkins, A. Nyamapfene","doi":"10.1109/ICITST.2009.5402571","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402571","url":null,"abstract":"There is considerable anecdotal evidence that equine sports enthusiasts in Devon and Cornwall still shun equine event search websites in preference to traditional information sources such as newspapers, magazines and word of mouth. On this basis, we have carried out a usability analysis of key equine event search websites serving Devon and Cornwall. This analysis suggests that these websites are designed in ways that make them unfriendly and unwelcoming to prospective users. As a follow-up to this analysis, we have used Shneiderman's eight golden rules for interface design to develop a prototype search website. Tests carried out with participants drawn from the target user group suggest that this prototype website outperforms the currently leading equine event search website in Devon and Cornwall. This leads us to conclude that website design and development should be guided at all times by usability principles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of question classification systems using differing features 用不同的特征评价问题分类系统
A. Harb, M. Beigbeder, J. Girardot
Most question and answer systems”Q&A” are based on three research themes: question classification and analysis, document retrieval and answer extraction. The performance in every stage affects the final result. The classification of questions appears as an important task because it deduces the type of expected answers. A method of improving the performance of question classification is presented, based on linguistic analysis (semantic, syntactic and morphological) as well as statistical approaches guided by a layered semantic hierarchy of fine grained question types. Actually, methods of question expansion are studied. This method adds for each word a higher representation. Various features of questions, diverse term weightings and several machine learning algorithms are compared. Experiments were conducted on real data are presented. They demonstrate an improvement in precision for question classification.
大多数问答系统“Q&A”基于三个研究主题:问题分类和分析,文档检索和答案提取。每个阶段的表现都会影响最终的结果。问题分类似乎是一项重要的任务,因为它推断出预期答案的类型。提出了一种基于语言分析(语义、句法和形态)以及基于细粒度问题类型分层语义层次的统计方法来提高问题分类性能的方法。实际上,研究了问题展开的方法。这种方法为每个单词添加了更高的表示形式。比较了问题的各种特征、不同的术语权重和几种机器学习算法。并在实际数据上进行了实验。他们展示了问题分类精度的提高。
{"title":"Evaluation of question classification systems using differing features","authors":"A. Harb, M. Beigbeder, J. Girardot","doi":"10.1109/ICITST.2009.5402567","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402567","url":null,"abstract":"Most question and answer systems”Q&A” are based on three research themes: question classification and analysis, document retrieval and answer extraction. The performance in every stage affects the final result. The classification of questions appears as an important task because it deduces the type of expected answers. A method of improving the performance of question classification is presented, based on linguistic analysis (semantic, syntactic and morphological) as well as statistical approaches guided by a layered semantic hierarchy of fine grained question types. Actually, methods of question expansion are studied. This method adds for each word a higher representation. Various features of questions, diverse term weightings and several machine learning algorithms are compared. Experiments were conducted on real data are presented. They demonstrate an improvement in precision for question classification.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cloud Computing: The impact on digital forensic investigations 云计算:对数字取证调查的影响
S. Biggs, S. Vidalis
Cloud Computing (CC) as a concept and business opportunity is likely to see many organisations experiencing the 'credit crunch', embrace the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME's who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline the tasks that the authors undertook for the CLOIDIFIN project and highlight where the Impact of CC will diversely effect digital forensic investigations.
云计算(CC)作为一个概念和商业机会,可能会看到许多组织经历“信贷紧缩”,拥抱相对低成本的CC选择,以确保持续的业务可行性和可持续性。CC业务模型的现收现付结构通常适合没有资源来完全满足其IT需求的中小企业。私人终端用户也将寻求利用CC提供的巨大资源库,试图提供移动信息自由。然而,正当用户可以从中获得巨大利益的同时,肆无忌惮的犯罪用户也会利用CC来利用这种新概念、设计和商业模式中可能存在的漏洞。本文将概述作者为CLOIDIFIN项目承担的任务,并强调CC的影响将对数字法医调查产生不同的影响。
{"title":"Cloud Computing: The impact on digital forensic investigations","authors":"S. Biggs, S. Vidalis","doi":"10.1109/ICITST.2009.5402561","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402561","url":null,"abstract":"Cloud Computing (CC) as a concept and business opportunity is likely to see many organisations experiencing the 'credit crunch', embrace the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME's who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline the tasks that the authors undertook for the CLOIDIFIN project and highlight where the Impact of CC will diversely effect digital forensic investigations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125826453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
Towards security goals in summative e-assessment security 迈向总结性电子评估安全的安全目标
Kikelomo Maria Apampa, G. Wills, David Argles
The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security.
众所周知,计算机系统的一般安全目标包括机密性、完整性和可用性(C-I-A),以防止关键资产受到潜在威胁。C-I-A的安全目标是经过充分研究的领域;然而,它们可能不足以满足总结性电子评估的所有需求。在本文中,我们没有放弃基本的C-I-A安全目标;相反,我们定义了特定于总结性电子评估安全性的安全目标。
{"title":"Towards security goals in summative e-assessment security","authors":"Kikelomo Maria Apampa, G. Wills, David Argles","doi":"10.1109/ICITST.2009.5402505","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402505","url":null,"abstract":"The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121656604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A framework for online counter terrorism 网络反恐框架
K. Zolfaghar, Arash Barfar, S. Mohammadi
Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.
如今,大多数国家都得出了这样的结论:他们的反恐计划应该从“被动”转变为“主动”。与此一致的是,这应该反映在互联网作为许多国家沟通和做生意的重要渠道上。然而,实现有效的网络反恐存在着“合作”和“普遍立法”的缺失等障碍。因此,迈向有效的网络反恐的第一步是消除这些障碍。在本文中,提出了一个框架,旨在缓解这些问题,使用“蜜罐”和“web挖掘”技术。
{"title":"A framework for online counter terrorism","authors":"K. Zolfaghar, Arash Barfar, S. Mohammadi","doi":"10.1109/ICITST.2009.5402641","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402641","url":null,"abstract":"Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The website census 网站普查
A. Qadeer, Waqar Mahmood, A. Waheed
The website census is an effort to enumerate all the websites on the World Wide Web (WWW) without using crawling. Crawling is a traditional way of website discovery. It is conceptually simple but the very size of the WWW makes the implementation complex and resource demanding. The enormous amount of bandwidth, a huge persistent storage pool, a sufficiently large cluster of machines for data processing and a complex set of software systems are just a few examples of the needed resources. In this work, we use exhaustive IP range probing to detect the presence of a web server on TCP port 80. Although this probing is exhaustive in nature, it is lightweight in terms of resource demands. This enumeration of websites has many applications. The most obvious is to use it as a seed to the conventional crawling. It can be refined to be used as a top level domain (TLD) specific seed for targeted crawling.
网站普查是在不使用爬行的情况下枚举万维网(WWW)上的所有网站。爬行是一种传统的网站发现方式。它在概念上很简单,但是WWW的大小使得实现变得复杂并且需要大量的资源。巨大的带宽、巨大的持久存储池、用于数据处理的足够大的机器集群和一组复杂的软件系统只是所需资源的几个例子。在这项工作中,我们使用详尽的IP范围探测来检测TCP端口80上web服务器的存在。虽然这种探查本质上是详尽的,但就资源需求而言,它是轻量级的。这个网站列表有很多应用。最明显的是用它作为常规爬行的种子。它可以被细化为用于目标爬行的顶级域(TLD)特定种子。
{"title":"The website census","authors":"A. Qadeer, Waqar Mahmood, A. Waheed","doi":"10.1109/ICITST.2009.5402623","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402623","url":null,"abstract":"The website census is an effort to enumerate all the websites on the World Wide Web (WWW) without using crawling. Crawling is a traditional way of website discovery. It is conceptually simple but the very size of the WWW makes the implementation complex and resource demanding. The enormous amount of bandwidth, a huge persistent storage pool, a sufficiently large cluster of machines for data processing and a complex set of software systems are just a few examples of the needed resources. In this work, we use exhaustive IP range probing to detect the presence of a web server on TCP port 80. Although this probing is exhaustive in nature, it is lightweight in terms of resource demands. This enumeration of websites has many applications. The most obvious is to use it as a seed to the conventional crawling. It can be refined to be used as a top level domain (TLD) specific seed for targeted crawling.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the fractal characteristics of Internet network traffic and its utilization in covert communications 互联网网络流量的分形特征及其在隐蔽通信中的应用
R. Marie, J. Blackledge, H. Bez
There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.
文献中有许多模型通过在时域或频域处理流量的实际测量来考虑互联网流量的主要特征。本文采用后一种方法,提出了一种捕获互联网流量分形行为的新方法,即采用随机缩放分形模型来模拟互联网流量的自仿射特征。在本文中,我们利用互联网流量的自仿射特性,通过将文件分割成许多二进制块(文件)来伪装数字文件的传输,这些二进制块的大小和提交时间与互联网流量的突发长度兼容。我们将研究两个不同的时间序列。大小系列包含单个数据包到达时的实际数据包大小,到达间系列包含连续数据包之间的时间戳差异。
{"title":"On the fractal characteristics of Internet network traffic and its utilization in covert communications","authors":"R. Marie, J. Blackledge, H. Bez","doi":"10.1109/ICITST.2009.5402542","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402542","url":null,"abstract":"There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architectural model for a high performance content management system 高性能内容管理系统的体系结构模型
R. Vasilescu
Usually content management systems are based on core technologies such as database management systems and file systems. Content management is now being regarded as a base technology for other more complex applications which offer a wide range of functionality for accessing and transforming large data volumes. While content management tasks can be easily implemented using the existing database systems, we believe that high performance implementations require specialized processing and architectures. This paper will describe the proposed architecture of a high performance content management system and will present some experimental conclusions from a model implementation. The proposed architecture focuses on the content management specific characteristics identification and describes a new implementation model, aiming at supplying greater performance than conventional ones.
通常,内容管理系统都是基于数据库管理系统和文件系统等核心技术。内容管理现在被视为其他更复杂的应用程序的基础技术,这些应用程序为访问和转换大量数据提供了广泛的功能。虽然使用现有的数据库系统可以很容易地实现内容管理任务,但我们认为高性能的实现需要专门的处理和体系结构。本文将描述一个高性能内容管理系统的架构,并从模型实现中给出一些实验结论。所建议的体系结构侧重于内容管理特定的特征识别,并描述了一个新的实现模型,旨在提供比传统模型更好的性能。
{"title":"Architectural model for a high performance content management system","authors":"R. Vasilescu","doi":"10.1109/ICITST.2009.5402570","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402570","url":null,"abstract":"Usually content management systems are based on core technologies such as database management systems and file systems. Content management is now being regarded as a base technology for other more complex applications which offer a wide range of functionality for accessing and transforming large data volumes. While content management tasks can be easily implemented using the existing database systems, we believe that high performance implementations require specialized processing and architectures. This paper will describe the proposed architecture of a high performance content management system and will present some experimental conclusions from a model implementation. The proposed architecture focuses on the content management specific characteristics identification and describes a new implementation model, aiming at supplying greater performance than conventional ones.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115028830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-platform Bluetooth remote control 多平台蓝牙遥控器
Jarle Hansen, G. Ghinea
Traditionally, mobile devices have come with a set number of functionalities. Even when these have been augmented, this has rarely involved taking advantage of their complementary wireless capabilities (such as Bluetooth and GPS). The main focus of the research described in this paper was to create an application that takes advantage of the capabilities of Bluetooth to remote control any computer with Bluetooth connectivity. The proposed solution received positive feedback in the user evaluation.
传统上,移动设备具有一定数量的功能。即使这些功能得到了增强,也很少涉及到利用它们互补的无线功能(如蓝牙和GPS)。本文所描述的主要研究重点是创建一个应用程序,利用蓝牙的功能来远程控制任何具有蓝牙连接的计算机。提出的解决方案在用户评价中得到了积极的反馈。
{"title":"Multi-platform Bluetooth remote control","authors":"Jarle Hansen, G. Ghinea","doi":"10.1109/ICITST.2009.5402609","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402609","url":null,"abstract":"Traditionally, mobile devices have come with a set number of functionalities. Even when these have been augmented, this has rarely involved taking advantage of their complementary wireless capabilities (such as Bluetooth and GPS). The main focus of the research described in this paper was to create an application that takes advantage of the capabilities of Bluetooth to remote control any computer with Bluetooth connectivity. The proposed solution received positive feedback in the user evaluation.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1