首页 > 最新文献

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.最新文献

英文 中文
IPv6 based CDMA/WLAN heterogeneous network interworking 基于IPv6的CDMA/WLAN异构网络互联
Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim
This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service
提出了一种基于IPv6的CDMA/WLAN异构网络互通机制。具有两个不同链路层接口的节点可以选择一个接口与另一个节点通信。当节点在网络中移动时,可能会切换到另一个接口,因为节点无法再使用第一个选择的接口。在接口切换过程中,必须保留业务会话,且切换的持续时间要短,不能被用户识别。为了实现无缝服务,必须多方面考虑选择合适的接口,并仔细确定切换的时间点
{"title":"IPv6 based CDMA/WLAN heterogeneous network interworking","authors":"Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim","doi":"10.1109/ICACT.2005.245957","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245957","url":null,"abstract":"This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic load on interconnection lines of generalized double ring network structures 广义双环网结构互联线路上的交通负荷
J. Pedersen, T. Riaz, O. Madsen
Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter
广义双环(N2R)网络结构具有许多良好的性能,但由于其不是平面的,因此难以物理嵌入到通信网络中。然而,如果其中一些线路,即互连线路,是通过无线技术实现的,那么其余的结构由两个平面环组成,它们很容易被光纤或其他有线解决方案嵌入。研究表明,对于大型N2R结构,如果采用最短路径路由,互连线的负载明显低于其他线路,并探讨了其他两种路由方案的影响,从而以更大的有效平均距离和直径为代价降低互连线的负载
{"title":"Traffic load on interconnection lines of generalized double ring network structures","authors":"J. Pedersen, T. Riaz, O. Madsen","doi":"10.1109/ICACT.2005.246198","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246198","url":null,"abstract":"Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient multicast setup mechanism for mobile hosts in MPLS network MPLS网络中移动主机的高效组播建立机制
YoungHwan Kwon, S. Choi, J. Choi, Hyung Jun Kim, Jungsoo Park
This paper proposes an efficient multicast setup mechanism for mobile hosts in multiprotocol label switching (MPLS) network. A management of multicast tree is based on MPLS label. A mobile node (MN) can join a specific multicast group through egress LER after movement detecting. In our mechanism, egress LER has a responsibility to join multicast group and transmit multicast data traffic to MN as remote subscription. After MN joining, data forwarding method uses MPLS-based forwarding. This MPLS-based mobile multicast algorithm can improve performance and solve other mobile multicast problems such as tunnel convergence problem, late join latency, nonoptimized route and complexity
针对多协议标签交换(MPLS)网络中的移动主机,提出了一种高效的组播设置机制。一种基于MPLS标签的组播树管理方法。移动节点MN (mobile node, MN)经过运动检测后,可以通过出口LER加入指定的组播组。在我们的机制中,出口LER负责加入组播组,并将组播数据流量作为远程订阅传输到MN。MN加入后,数据转发方式采用mpls转发。这种基于mpls的移动组播算法可以提高组播性能,解决隧道收敛问题、加入延迟问题、未优化路由问题和复杂性问题
{"title":"Efficient multicast setup mechanism for mobile hosts in MPLS network","authors":"YoungHwan Kwon, S. Choi, J. Choi, Hyung Jun Kim, Jungsoo Park","doi":"10.1109/ICACT.2005.246113","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246113","url":null,"abstract":"This paper proposes an efficient multicast setup mechanism for mobile hosts in multiprotocol label switching (MPLS) network. A management of multicast tree is based on MPLS label. A mobile node (MN) can join a specific multicast group through egress LER after movement detecting. In our mechanism, egress LER has a responsibility to join multicast group and transmit multicast data traffic to MN as remote subscription. After MN joining, data forwarding method uses MPLS-based forwarding. This MPLS-based mobile multicast algorithm can improve performance and solve other mobile multicast problems such as tunnel convergence problem, late join latency, nonoptimized route and complexity","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127598720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion alert normalization method using AWK scripts and attack name database 采用AWK脚本和攻击名称数据库的入侵警报规范化方法
Dongyoung Kim, Hyochan Bang, Jungchan Na
The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.
目前的几种入侵警报具有不同的格式和语义。它通过各种协议传输。传输入侵警报的协议有IDXP、SNMP trap、SYSLOG协议等。这些不同的入侵警报格式使其难以同时使用。入侵警报规范化使各种入侵对相同的结构数据和相同的语义发出警报。我们需要这个规范化过程来统一来自各种安全设备的警报。本文介绍了如何规范化来自多个入侵检测系统和安全设备的警报。
{"title":"Intrusion alert normalization method using AWK scripts and attack name database","authors":"Dongyoung Kim, Hyochan Bang, Jungchan Na","doi":"10.1109/ICACT.2005.245944","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245944","url":null,"abstract":"The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multiple maneuvering target data association based on genetic algorithms 基于遗传算法的多机动目标数据关联
Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang
This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.
研究了多机动目标定位与跟踪中的数据关联问题。遗传算法成功地应用于复杂优化和工业工程问题的求解。近年来,遗传算法的研究引起了人们的广泛关注。提出了一种利用遗传算法解决多目标数据关联问题的方法。仿真结果表明,本文所采用的算法能够避免局部极值,得到了满意的结果。
{"title":"Multiple maneuvering target data association based on genetic algorithms","authors":"Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang","doi":"10.1109/ICACT.2005.246130","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246130","url":null,"abstract":"This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security considerations for RFID technology adoption 采用RFID技术的安全考虑
Park Joo-Sang, Kim Young-il, Lee Yong-Joon
RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained
RFID技术有望取代条形码或其他识别方案。但它还没有被广泛使用。RFID技术使用方便,具有AIDC自动识别和数据捕获的优点,但也存在严重的安全问题。RFID的主要目标是供应链管理,其中可能包含客户和公司的重要信息。然而,安全威胁成为RFID技术推广的障碍。本文首先阐述了RFID技术的安全问题。说明了RFID的安全方法和必要的标签存储结构
{"title":"Security considerations for RFID technology adoption","authors":"Park Joo-Sang, Kim Young-il, Lee Yong-Joon","doi":"10.1109/ICACT.2005.246071","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246071","url":null,"abstract":"RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
High performance and low complexity Max-Log-MAP algorithm for FPGA turbo decoder FPGA turbo译码器的高性能低复杂度Max-Log-MAP算法
Mao-Hsiu Hsu, Jhin-Fang Huang
In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure
本文主要研究符合3GPP规范的turbo译码器,采用前向状态度量作为精度初始值的滑动窗口方法,采用改进的Max-Log-MAP算法,通过比例因子r来修改外部信息,从而实现了整个turbo译码器的单译码结构,在降低逻辑门使用率的同时实现了高数据吞吐量。我们提出的结构(sw修改的Max-Log-MAP)的FPGA设计在BER=10-4时与最佳结构(SW-Log-MAP)相差仅0.1 dB。与最优结构相比,可节省约29%的硬件成本
{"title":"High performance and low complexity Max-Log-MAP algorithm for FPGA turbo decoder","authors":"Mao-Hsiu Hsu, Jhin-Fang Huang","doi":"10.1109/ICACT.2005.246081","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246081","url":null,"abstract":"In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of a systematic framework for deploying SLA using six sigma methodology 使用六西格玛方法设计部署SLA的系统框架
Jaekyung Choi
Nowadays, in telecommunication market in Korea, there are intensive competitions among service providers and users become to call for enhanced QoS. In response to current business environment change, service providers strive to find solutions to be more competitive by differentiating from others or to meet users' expectations and needs. Among these endeavors, deployment of SLA (service level agreement) is one of effective alternative in achieving service providers' such purpose. But, in deploying SLA, most of service providers simply adopt either best practice of other service providers by benchmarking without consideration service providers' situation or restricted internal managerial quality index without filtering which SLOs (service level objectives) should be deployed, which SLOs has priorities, etc. Furthermore the process of SLA management consisted of operations of network infrastructures, operation staffs, service management has a problem that the SLA management process has not been dealt with sufficient care and systematic exertion. In this paper, we suggest a new framework for SLA deployment and management using the concept and methodology of six sigma. Namely, we present a systematic framework for SLA deployment from selecting SLO by collecting VOC (voice of customers) and deriving CTQ (critical to quality) by using six sigma methodology to SLA management by adopting process of QoS measurement and improvement by using six sigma methodology. In conclusion, we give insights to service providers about necessary factors to be considered in the process of quality management desired to enhance the degree of customers' satisfaction and service providers' network and service operational efficiency
目前,在韩国电信市场上,运营商之间的竞争非常激烈,用户对提高服务质量的要求也越来越高。为了应对当前商业环境的变化,服务提供商努力寻找解决方案,通过与他人区分或满足用户的期望和需求来提高竞争力。在这些努力中,部署SLA(服务水平协议)是实现服务提供者这一目的的有效替代方案之一。但是,在部署SLA时,大多数服务提供商只是通过基准测试来采用其他服务提供商的最佳实践,而没有考虑服务提供商的情况,或者只是采用有限的内部管理质量指标,而没有过滤应该部署哪些服务级别目标(slo),哪些slo具有优先级等。此外,SLA管理过程包括网络基础设施的运营、运营人员的运营、服务管理等,存在SLA管理过程没有得到足够重视和系统发挥的问题。在本文中,我们使用六西格玛的概念和方法提出了一个新的SLA部署和管理框架。也就是说,我们为SLA部署提供了一个系统框架,从通过收集VOC(客户声音)选择SLO,并通过使用六西格玛方法获得CTQ(质量关键),到通过使用六西格玛方法采用QoS测量和改进过程进行SLA管理。综上所述,我们为服务提供商提供了在质量管理过程中需要考虑的必要因素,以提高客户满意度和服务提供商的网络和服务运营效率
{"title":"Design of a systematic framework for deploying SLA using six sigma methodology","authors":"Jaekyung Choi","doi":"10.1109/ICACT.2005.245964","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245964","url":null,"abstract":"Nowadays, in telecommunication market in Korea, there are intensive competitions among service providers and users become to call for enhanced QoS. In response to current business environment change, service providers strive to find solutions to be more competitive by differentiating from others or to meet users' expectations and needs. Among these endeavors, deployment of SLA (service level agreement) is one of effective alternative in achieving service providers' such purpose. But, in deploying SLA, most of service providers simply adopt either best practice of other service providers by benchmarking without consideration service providers' situation or restricted internal managerial quality index without filtering which SLOs (service level objectives) should be deployed, which SLOs has priorities, etc. Furthermore the process of SLA management consisted of operations of network infrastructures, operation staffs, service management has a problem that the SLA management process has not been dealt with sufficient care and systematic exertion. In this paper, we suggest a new framework for SLA deployment and management using the concept and methodology of six sigma. Namely, we present a systematic framework for SLA deployment from selecting SLO by collecting VOC (voice of customers) and deriving CTQ (critical to quality) by using six sigma methodology to SLA management by adopting process of QoS measurement and improvement by using six sigma methodology. In conclusion, we give insights to service providers about necessary factors to be considered in the process of quality management desired to enhance the degree of customers' satisfaction and service providers' network and service operational efficiency","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A middleware for context-aware application services in ubiquitous environments 在通用环境中用于上下文感知应用程序服务的中间件
Nam-Shik Park, Kang-Woo Lee, Hyun Kim, Seong-il Jin
Ubiquitous computing is the idea that invisible computation everywhere can enhance life in the real world. Applications and services in ubiquitous environments must be aware of their changing environments and adapt according to changing contexts. However, developing such systems providing context-aware applications or services is still a complex and time-consuming task. Therefore, we introduce architecture of context-aware service middleware (CASM) that provides a middleware-level support for building and rapid prototyping of context-aware services and describe interactions based on the architecture
无处不在的计算是指无处不在的无形计算可以增强现实世界的生活。无处不在的环境中的应用程序和服务必须了解其不断变化的环境,并根据不断变化的上下文进行调整。然而,开发这种提供上下文感知应用程序或服务的系统仍然是一项复杂且耗时的任务。因此,我们引入了上下文感知服务中间件(CASM)的体系结构,它为构建和快速原型化上下文感知服务提供了中间件级别的支持,并描述了基于该体系结构的交互
{"title":"A middleware for context-aware application services in ubiquitous environments","authors":"Nam-Shik Park, Kang-Woo Lee, Hyun Kim, Seong-il Jin","doi":"10.1109/ICACT.2005.246058","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246058","url":null,"abstract":"Ubiquitous computing is the idea that invisible computation everywhere can enhance life in the real world. Applications and services in ubiquitous environments must be aware of their changing environments and adapt according to changing contexts. However, developing such systems providing context-aware applications or services is still a complex and time-consuming task. Therefore, we introduce architecture of context-aware service middleware (CASM) that provides a middleware-level support for building and rapid prototyping of context-aware services and describe interactions based on the architecture","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122612983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retrieval of element lists using the 2-level deterministic inverted index for accelerating structural joins 使用2级确定性倒排索引检索元素列表,以加速结构连接
Jongik Kim, Jun-Ki Min, O. Kwon
In this paper, we propose an inverted index technique and a novel structural join technique for accelerating XML path query evaluation. Our inverted index can retrieve element lists for path segments in a parent-child relationship. Our structural join technique can handle lists of element pairs while the existing techniques handle lists of elements. We show through experiments that these two proposed techniques are integrated to accelerate evaluation of XML path queries
在本文中,我们提出了一种倒排索引技术和一种新的结构连接技术来加速XML路径查询的计算。我们的倒排索引可以检索父子关系中路径段的元素列表。我们的结构连接技术可以处理元素对列表,而现有的技术处理元素列表。我们通过实验证明,将这两种提出的技术集成在一起可以加速XML路径查询的计算
{"title":"Retrieval of element lists using the 2-level deterministic inverted index for accelerating structural joins","authors":"Jongik Kim, Jun-Ki Min, O. Kwon","doi":"10.1109/ICACT.2005.246223","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246223","url":null,"abstract":"In this paper, we propose an inverted index technique and a novel structural join technique for accelerating XML path query evaluation. Our inverted index can retrieve element lists for path segments in a parent-child relationship. Our structural join technique can handle lists of element pairs while the existing techniques handle lists of elements. We show through experiments that these two proposed techniques are integrated to accelerate evaluation of XML path queries","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122895022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1