Pub Date : 2009-12-01DOI: 10.1109/ICITST.2009.5435099
Hironori Egi, H. Shigeno, Ken-ichi Okada
This research focuses on the entrance of a workspace, where two or more rooms are connected. We propose ASGate (AtmoSphericGate), which conveys change of the state inside the workspace to the members who approach the entrance. This system gathers and stores awareness information from various sensors, and displays the information on the screen integrated into the door. AS-Gate expresses change of the state inside the workspace using colors and animation, and enables members to perform effective works and to facilitate communication. We implemented this system and evaluated effects on the group interaction.
{"title":"Grasping contextual awareness inside aworkspace at the entrance to support group interaction","authors":"Hironori Egi, H. Shigeno, Ken-ichi Okada","doi":"10.1109/ICITST.2009.5435099","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435099","url":null,"abstract":"This research focuses on the entrance of a workspace, where two or more rooms are connected. We propose ASGate (AtmoSphericGate), which conveys change of the state inside the workspace to the members who approach the entrance. This system gathers and stores awareness information from various sensors, and displays the information on the screen integrated into the door. AS-Gate expresses change of the state inside the workspace using colors and animation, and enables members to perform effective works and to facilitate communication. We implemented this system and evaluated effects on the group interaction.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-01DOI: 10.1109/ICITST.2009.5402571
R. Wilkins, A. Nyamapfene
There is considerable anecdotal evidence that equine sports enthusiasts in Devon and Cornwall still shun equine event search websites in preference to traditional information sources such as newspapers, magazines and word of mouth. On this basis, we have carried out a usability analysis of key equine event search websites serving Devon and Cornwall. This analysis suggests that these websites are designed in ways that make them unfriendly and unwelcoming to prospective users. As a follow-up to this analysis, we have used Shneiderman's eight golden rules for interface design to develop a prototype search website. Tests carried out with participants drawn from the target user group suggest that this prototype website outperforms the currently leading equine event search website in Devon and Cornwall. This leads us to conclude that website design and development should be guided at all times by usability principles.
{"title":"Usability driven website design — An equine sports case study","authors":"R. Wilkins, A. Nyamapfene","doi":"10.1109/ICITST.2009.5402571","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402571","url":null,"abstract":"There is considerable anecdotal evidence that equine sports enthusiasts in Devon and Cornwall still shun equine event search websites in preference to traditional information sources such as newspapers, magazines and word of mouth. On this basis, we have carried out a usability analysis of key equine event search websites serving Devon and Cornwall. This analysis suggests that these websites are designed in ways that make them unfriendly and unwelcoming to prospective users. As a follow-up to this analysis, we have used Shneiderman's eight golden rules for interface design to develop a prototype search website. Tests carried out with participants drawn from the target user group suggest that this prototype website outperforms the currently leading equine event search website in Devon and Cornwall. This leads us to conclude that website design and development should be guided at all times by usability principles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-09DOI: 10.1109/ICITST.2009.5402567
A. Harb, M. Beigbeder, J. Girardot
Most question and answer systems”Q&A” are based on three research themes: question classification and analysis, document retrieval and answer extraction. The performance in every stage affects the final result. The classification of questions appears as an important task because it deduces the type of expected answers. A method of improving the performance of question classification is presented, based on linguistic analysis (semantic, syntactic and morphological) as well as statistical approaches guided by a layered semantic hierarchy of fine grained question types. Actually, methods of question expansion are studied. This method adds for each word a higher representation. Various features of questions, diverse term weightings and several machine learning algorithms are compared. Experiments were conducted on real data are presented. They demonstrate an improvement in precision for question classification.
{"title":"Evaluation of question classification systems using differing features","authors":"A. Harb, M. Beigbeder, J. Girardot","doi":"10.1109/ICITST.2009.5402567","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402567","url":null,"abstract":"Most question and answer systems”Q&A” are based on three research themes: question classification and analysis, document retrieval and answer extraction. The performance in every stage affects the final result. The classification of questions appears as an important task because it deduces the type of expected answers. A method of improving the performance of question classification is presented, based on linguistic analysis (semantic, syntactic and morphological) as well as statistical approaches guided by a layered semantic hierarchy of fine grained question types. Actually, methods of question expansion are studied. This method adds for each word a higher representation. Various features of questions, diverse term weightings and several machine learning algorithms are compared. Experiments were conducted on real data are presented. They demonstrate an improvement in precision for question classification.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-09DOI: 10.1109/ICITST.2009.5402561
S. Biggs, S. Vidalis
Cloud Computing (CC) as a concept and business opportunity is likely to see many organisations experiencing the 'credit crunch', embrace the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME's who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline the tasks that the authors undertook for the CLOIDIFIN project and highlight where the Impact of CC will diversely effect digital forensic investigations.
{"title":"Cloud Computing: The impact on digital forensic investigations","authors":"S. Biggs, S. Vidalis","doi":"10.1109/ICITST.2009.5402561","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402561","url":null,"abstract":"Cloud Computing (CC) as a concept and business opportunity is likely to see many organisations experiencing the 'credit crunch', embrace the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME's who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline the tasks that the authors undertook for the CLOIDIFIN project and highlight where the Impact of CC will diversely effect digital forensic investigations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125826453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-09DOI: 10.1109/ICITST.2009.5402505
Kikelomo Maria Apampa, G. Wills, David Argles
The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security.
{"title":"Towards security goals in summative e-assessment security","authors":"Kikelomo Maria Apampa, G. Wills, David Argles","doi":"10.1109/ICITST.2009.5402505","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402505","url":null,"abstract":"The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121656604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICITST.2009.5402641
K. Zolfaghar, Arash Barfar, S. Mohammadi
Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.
{"title":"A framework for online counter terrorism","authors":"K. Zolfaghar, Arash Barfar, S. Mohammadi","doi":"10.1109/ICITST.2009.5402641","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402641","url":null,"abstract":"Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICITST.2009.5402623
A. Qadeer, Waqar Mahmood, A. Waheed
The website census is an effort to enumerate all the websites on the World Wide Web (WWW) without using crawling. Crawling is a traditional way of website discovery. It is conceptually simple but the very size of the WWW makes the implementation complex and resource demanding. The enormous amount of bandwidth, a huge persistent storage pool, a sufficiently large cluster of machines for data processing and a complex set of software systems are just a few examples of the needed resources. In this work, we use exhaustive IP range probing to detect the presence of a web server on TCP port 80. Although this probing is exhaustive in nature, it is lightweight in terms of resource demands. This enumeration of websites has many applications. The most obvious is to use it as a seed to the conventional crawling. It can be refined to be used as a top level domain (TLD) specific seed for targeted crawling.
{"title":"The website census","authors":"A. Qadeer, Waqar Mahmood, A. Waheed","doi":"10.1109/ICITST.2009.5402623","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402623","url":null,"abstract":"The website census is an effort to enumerate all the websites on the World Wide Web (WWW) without using crawling. Crawling is a traditional way of website discovery. It is conceptually simple but the very size of the WWW makes the implementation complex and resource demanding. The enormous amount of bandwidth, a huge persistent storage pool, a sufficiently large cluster of machines for data processing and a complex set of software systems are just a few examples of the needed resources. In this work, we use exhaustive IP range probing to detect the presence of a web server on TCP port 80. Although this probing is exhaustive in nature, it is lightweight in terms of resource demands. This enumeration of websites has many applications. The most obvious is to use it as a seed to the conventional crawling. It can be refined to be used as a top level domain (TLD) specific seed for targeted crawling.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICITST.2009.5402542
R. Marie, J. Blackledge, H. Bez
There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.
{"title":"On the fractal characteristics of Internet network traffic and its utilization in covert communications","authors":"R. Marie, J. Blackledge, H. Bez","doi":"10.1109/ICITST.2009.5402542","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402542","url":null,"abstract":"There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICITST.2009.5402570
R. Vasilescu
Usually content management systems are based on core technologies such as database management systems and file systems. Content management is now being regarded as a base technology for other more complex applications which offer a wide range of functionality for accessing and transforming large data volumes. While content management tasks can be easily implemented using the existing database systems, we believe that high performance implementations require specialized processing and architectures. This paper will describe the proposed architecture of a high performance content management system and will present some experimental conclusions from a model implementation. The proposed architecture focuses on the content management specific characteristics identification and describes a new implementation model, aiming at supplying greater performance than conventional ones.
{"title":"Architectural model for a high performance content management system","authors":"R. Vasilescu","doi":"10.1109/ICITST.2009.5402570","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402570","url":null,"abstract":"Usually content management systems are based on core technologies such as database management systems and file systems. Content management is now being regarded as a base technology for other more complex applications which offer a wide range of functionality for accessing and transforming large data volumes. While content management tasks can be easily implemented using the existing database systems, we believe that high performance implementations require specialized processing and architectures. This paper will describe the proposed architecture of a high performance content management system and will present some experimental conclusions from a model implementation. The proposed architecture focuses on the content management specific characteristics identification and describes a new implementation model, aiming at supplying greater performance than conventional ones.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115028830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-11-01DOI: 10.1109/ICITST.2009.5402609
Jarle Hansen, G. Ghinea
Traditionally, mobile devices have come with a set number of functionalities. Even when these have been augmented, this has rarely involved taking advantage of their complementary wireless capabilities (such as Bluetooth and GPS). The main focus of the research described in this paper was to create an application that takes advantage of the capabilities of Bluetooth to remote control any computer with Bluetooth connectivity. The proposed solution received positive feedback in the user evaluation.
{"title":"Multi-platform Bluetooth remote control","authors":"Jarle Hansen, G. Ghinea","doi":"10.1109/ICITST.2009.5402609","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402609","url":null,"abstract":"Traditionally, mobile devices have come with a set number of functionalities. Even when these have been augmented, this has rarely involved taking advantage of their complementary wireless capabilities (such as Bluetooth and GPS). The main focus of the research described in this paper was to create an application that takes advantage of the capabilities of Bluetooth to remote control any computer with Bluetooth connectivity. The proposed solution received positive feedback in the user evaluation.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}