首页 > 最新文献

22nd International Conference on Advanced Information Networking and Applications (aina 2008)最新文献

英文 中文
Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks 移动Ad Hoc网络的自适应和入侵容忍证书颁发
F. C. Pereira, J. Fraga, Ricardo Felipe Custódio
Dynamic distributed systems like peer-to-peer systems, overlay networks and mobile ad hoc networks must execute their applications using distributed resources and in a decentralized way. The structure (composition and topology) of these systems changes frequently due to nodes joining or leaving the network, or due to mobility, faults and networks partitions. Distributed algorithms projected to this class of systems must be able to deal with the occurrence of these events and to self-adapt dynamically the application according to changes in its execution environment. In this paper, we propose a dynamic, self-adaptable and intrusion tolerant certificate authority (CA) designed to operate in mobile ad hoc networks. This CA is composed by a set of mobile devices present in the network, which forms a group of servers that supports CA functions. This architecture is based on a dynamic systems model and was conceived to manage changes in the membership of the servers group. This paper introduces an algorithmic base that allows the CA to reconfigure itself, guaranteeing the availability and the inviolability of the certification service.
动态分布式系统,如点对点系统、覆盖网络和移动自组织网络,必须使用分布式资源并以分散的方式执行其应用程序。由于节点加入或离开网络,或者由于移动性、故障和网络分区,这些系统的结构(组成和拓扑)经常发生变化。投射到这类系统的分布式算法必须能够处理这些事件的发生,并根据其执行环境的变化动态地自适应应用程序。本文提出了一种动态的、自适应的、可容忍入侵的证书颁发机构(CA),用于移动自组织网络。该CA由网络中存在的一组移动设备组成,这些设备形成了一组支持CA功能的服务器。该体系结构基于动态系统模型,旨在管理服务器组成员的更改。本文介绍了一种允许CA重新配置自身的算法库,保证了认证服务的可用性和不可侵犯性。
{"title":"Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks","authors":"F. C. Pereira, J. Fraga, Ricardo Felipe Custódio","doi":"10.1109/AINA.2008.141","DOIUrl":"https://doi.org/10.1109/AINA.2008.141","url":null,"abstract":"Dynamic distributed systems like peer-to-peer systems, overlay networks and mobile ad hoc networks must execute their applications using distributed resources and in a decentralized way. The structure (composition and topology) of these systems changes frequently due to nodes joining or leaving the network, or due to mobility, faults and networks partitions. Distributed algorithms projected to this class of systems must be able to deal with the occurrence of these events and to self-adapt dynamically the application according to changes in its execution environment. In this paper, we propose a dynamic, self-adaptable and intrusion tolerant certificate authority (CA) designed to operate in mobile ad hoc networks. This CA is composed by a set of mobile devices present in the network, which forms a group of servers that supports CA functions. This architecture is based on a dynamic systems model and was conceived to manage changes in the membership of the servers group. This paper introduces an algorithmic base that allows the CA to reconfigure itself, guaranteeing the availability and the inviolability of the certification service.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123142109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Fair Channel Scheduling Algorithm in Optical Burst-Switched Networks 光突发交换网络中的公平信道调度算法
Chingfang Hsu, Li-Cheng Yang, Ke-Kuan Hsu
Among various signaling protocols designed for OBS networks, the most popular one is just-enough-time (JET) protocol. JET can utilize the network capacity efficiently and reduce end-to-end transmission delay effectively. However, it may suffer from an intrinsic deficiency -fairness problem. Fairness problem is a traditional problem existing in various kinds of networks. It not only results in a phenomenon that bursts with shorter hops are generally favored but also deteriorates the networks utilization. In this paper, we investigated this problem and proposed a fair channel scheduling algorithm as a solution. Generally speaking, there is usually a tradeoff between fairness and blocking performance. Hence, our objective is to keep balanced between the two conflicting metrics. It gives each burst a dynamic priority which is defined by several characteristics of the burst. When a contention occurs, the proposed scheme picks the preferable burst and drops the other one according to their priorities then. Simulation results show that our scheme can improve fairness without degrading dropping performance too much. In addition, it increases the effective link utilizations as well.
在为OBS网络设计的各种信令协议中,最受欢迎的是刚好足够时间(JET)协议。JET可以有效地利用网络容量,有效地降低端到端传输延迟。然而,它可能存在一个内在缺陷——公平性问题。公平性问题是存在于各种网络中的一个传统问题。这不仅会导致跳数较短的突发普遍受到青睐,而且会降低网络的利用率。本文对这一问题进行了研究,并提出了一种公平信道调度算法作为解决方案。一般来说,通常会在公平性和阻塞性能之间进行权衡。因此,我们的目标是在两个相互冲突的指标之间保持平衡。它给每个突发一个动态优先级,该优先级由突发的几个特征定义。当出现争用时,该方案根据优先级选择一个更优的突发,然后丢弃另一个突发。仿真结果表明,该方案在不降低丢包性能的前提下提高了公平性。此外,它还提高了有效的链路利用率。
{"title":"A Fair Channel Scheduling Algorithm in Optical Burst-Switched Networks","authors":"Chingfang Hsu, Li-Cheng Yang, Ke-Kuan Hsu","doi":"10.1109/AINA.2008.30","DOIUrl":"https://doi.org/10.1109/AINA.2008.30","url":null,"abstract":"Among various signaling protocols designed for OBS networks, the most popular one is just-enough-time (JET) protocol. JET can utilize the network capacity efficiently and reduce end-to-end transmission delay effectively. However, it may suffer from an intrinsic deficiency -fairness problem. Fairness problem is a traditional problem existing in various kinds of networks. It not only results in a phenomenon that bursts with shorter hops are generally favored but also deteriorates the networks utilization. In this paper, we investigated this problem and proposed a fair channel scheduling algorithm as a solution. Generally speaking, there is usually a tradeoff between fairness and blocking performance. Hence, our objective is to keep balanced between the two conflicting metrics. It gives each burst a dynamic priority which is defined by several characteristics of the burst. When a contention occurs, the proposed scheme picks the preferable burst and drops the other one according to their priorities then. Simulation results show that our scheme can improve fairness without degrading dropping performance too much. In addition, it increases the effective link utilizations as well.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131943945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Stealthy Communication Protocol 混合隐身通信协议
A. Durresi, V. Paruchuri, L. Barolli
This paper presents a new architecture for flexible and secure networking in battlefields. Our architecture is based on the combination of optical (fiber) and wireless links. Our objective is to be able to carry on undeterred communication without the attack/eavesdropping nodes being able to detect the presence of any communications. We combine the advantages of optical links, such as high bandwidth, low delays, low error rates, good security, with the advantages of wireless links such as mobility and flexibility. From security point of view, we also assume presence of red zones, which are the ones controlled by the adversary or where the adversary can trace wireless activities. The advantage of fiber optical links was demonstrated in various military conflicts. On the other hand, in a dynamic environment, such as those of battlefields, it is expected that fiber cabling will be limited or difficult to be extended. Based on these assumptions we develop our hybrid wireless-optical protocol. The wireless communications are also optimized by searching the best tradeoff among coverage, energy use and security, which means that the wireless propagation should avoid overlapping with red areas, controlled by the adversary. In order to achieve the required optimization among the above mentioned factors, in our wireless protocols we change the transmission power (range) and the selection of retransmitting nodes.
本文提出了一种灵活、安全的战场组网新架构。我们的架构基于光(光纤)和无线链路的结合。我们的目标是能够在没有攻击/窃听节点能够检测到任何通信存在的情况下进行无阻碍的通信。我们将光链路的高带宽、低时延、低错误率、良好的安全性等优点与无线链路的移动性、灵活性等优点结合起来。从安全的角度来看,我们还假设存在红色区域,这些区域是由攻击者控制的,或者攻击者可以跟踪无线活动的区域。光纤链路的优势在各种军事冲突中得到了证明。另一方面,在战场等动态环境中,预计光纤布线将受到限制或难以扩展。基于这些假设,我们开发了混合无线光学协议。通过在覆盖范围、能耗和安全性之间寻找最佳平衡点来优化无线通信,即无线传播应避免与敌方控制的红色区域重叠。为了在上述因素之间达到所需的优化,我们在无线协议中改变了传输功率(距离)和重传节点的选择。
{"title":"Hybrid Stealthy Communication Protocol","authors":"A. Durresi, V. Paruchuri, L. Barolli","doi":"10.1109/AINA.2008.154","DOIUrl":"https://doi.org/10.1109/AINA.2008.154","url":null,"abstract":"This paper presents a new architecture for flexible and secure networking in battlefields. Our architecture is based on the combination of optical (fiber) and wireless links. Our objective is to be able to carry on undeterred communication without the attack/eavesdropping nodes being able to detect the presence of any communications. We combine the advantages of optical links, such as high bandwidth, low delays, low error rates, good security, with the advantages of wireless links such as mobility and flexibility. From security point of view, we also assume presence of red zones, which are the ones controlled by the adversary or where the adversary can trace wireless activities. The advantage of fiber optical links was demonstrated in various military conflicts. On the other hand, in a dynamic environment, such as those of battlefields, it is expected that fiber cabling will be limited or difficult to be extended. Based on these assumptions we develop our hybrid wireless-optical protocol. The wireless communications are also optimized by searching the best tradeoff among coverage, energy use and security, which means that the wireless propagation should avoid overlapping with red areas, controlled by the adversary. In order to achieve the required optimization among the above mentioned factors, in our wireless protocols we change the transmission power (range) and the selection of retransmitting nodes.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"61 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Certificateless Signature and Group Signature Schemes against Malicious PKG 一种针对恶意PKG的无证书签名和组签名方案
Guoyan Zhang, Shaohui Wang
Identity-based crypto system has many advantages over PKI-based cryptosystem in key distribution, but key escrow is always an inherent drawback. In order to solve the problem, certificateless public key cryptography was introduced by Al-Riyami and Paterson in [8]. In this paper, we first introduce a certificateless signature scheme secure against both malicious PKG attack and DOD attack without random oracle, which is the first scheme satisfying theses properties in the literature. Based on the certificateless signature scheme, we also present a constant-size group signature scheme against malicious group manager.
基于身份的密码系统在密钥分发方面比基于pki的密码系统有许多优点,但密钥托管一直是一个固有的缺点。为了解决这个问题,Al-Riyami和Paterson在2010年提出了无证书公钥加密。本文首先提出了一种无证书签名方案,该方案在不使用随机oracle的情况下,能够同时抵御恶意PKG攻击和DOD攻击,是目前文献中第一个满足上述特性的方案。在无证书签名方案的基础上,提出了一种针对恶意组管理器的恒长组签名方案。
{"title":"A Certificateless Signature and Group Signature Schemes against Malicious PKG","authors":"Guoyan Zhang, Shaohui Wang","doi":"10.1109/AINA.2008.84","DOIUrl":"https://doi.org/10.1109/AINA.2008.84","url":null,"abstract":"Identity-based crypto system has many advantages over PKI-based cryptosystem in key distribution, but key escrow is always an inherent drawback. In order to solve the problem, certificateless public key cryptography was introduced by Al-Riyami and Paterson in [8]. In this paper, we first introduce a certificateless signature scheme secure against both malicious PKG attack and DOD attack without random oracle, which is the first scheme satisfying theses properties in the literature. Based on the certificateless signature scheme, we also present a constant-size group signature scheme against malicious group manager.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115081795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On Improving WLAN Medium Access Control via Uniform Transmission Cycle and Performance Analysis 基于统一传输周期和性能分析改进WLAN介质访问控制
W. Srichavengsup, S. Siwamogsatham, S. Nakpeerayuth, L. Wuttisittikulkij
In this paper, we propose a modified backoff mechanism that can be used in conjunction with the existing backoff algorithms for medium access sharing among wireless stations via the CSMA protocol. With a proper design, the resulting scheme can achieve better short-term throughput fairness performance without degradation in the average throughput performance. The main idea of the proposed scheme is to virtually create a transmission cycle for each wireless station. After getting a turn to access the medium, each wireless station is not allowed to start the backoff procedure for its next transmission until it has waited for some additional number of backoff slots. Moreover, the average throughput performance of the proposed scheme is analytically evaluated in this work via the Markov chain approach. The simulation results show that the performance analysis model derived here for the proposed scheme is valid and accurate. In addition, the proposed scheme noticeably improves the short-term throughput fairness performance of the conventional backoff scheme.
在本文中,我们提出了一种改进的退避机制,该机制可以与现有的退避算法结合使用,通过CSMA协议实现无线站之间的媒体访问共享。通过适当的设计,该方案可以在不降低平均吞吐量性能的情况下获得较好的短期吞吐量公平性能。该方案的主要思想是为每个无线站创建一个传输周期。在获得访问介质的机会后,每个无线站不允许开始下一次传输的后退程序,直到它等待了一些额外的后退槽数。此外,本文还通过马尔可夫链方法对所提出方案的平均吞吐量性能进行了分析评估。仿真结果表明,本文所建立的性能分析模型是有效和准确的。此外,该方案显著提高了传统回退方案的短期吞吐量公平性能。
{"title":"On Improving WLAN Medium Access Control via Uniform Transmission Cycle and Performance Analysis","authors":"W. Srichavengsup, S. Siwamogsatham, S. Nakpeerayuth, L. Wuttisittikulkij","doi":"10.1109/AINA.2008.137","DOIUrl":"https://doi.org/10.1109/AINA.2008.137","url":null,"abstract":"In this paper, we propose a modified backoff mechanism that can be used in conjunction with the existing backoff algorithms for medium access sharing among wireless stations via the CSMA protocol. With a proper design, the resulting scheme can achieve better short-term throughput fairness performance without degradation in the average throughput performance. The main idea of the proposed scheme is to virtually create a transmission cycle for each wireless station. After getting a turn to access the medium, each wireless station is not allowed to start the backoff procedure for its next transmission until it has waited for some additional number of backoff slots. Moreover, the average throughput performance of the proposed scheme is analytically evaluated in this work via the Markov chain approach. The simulation results show that the performance analysis model derived here for the proposed scheme is valid and accurate. In addition, the proposed scheme noticeably improves the short-term throughput fairness performance of the conventional backoff scheme.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiple Layered Audiovisual Streaming System Using the Two-Phase Synchronization and FGS/BSAC Techniques 基于两相同步和FGS/BSAC技术的多层视听流系统
Chung-Ming Huang, Chung-Wei Lin, Cheng-Yen Chuang
For a ubiquitous multimedia streaming, an adaptive multimedia streaming scheme with multiple layered audiovisual (AV) coding is required over heterogeneous networks. This paper proposes a multiple layered audiovisual streaming scheme denoted ML-AVSS to deliver layered audiovisual data. Fine-granular scalability (FGS) and bit sliced arithmetic coding (BSAC) techniques are used to segment video and audio data into individual base-layer and multiple enhancement-layer bitstreams. With advantages of layered coding, two phases of streaming synchronization, including a human-perceptual based transmission scheme, de-jitter procedure, conditional retransmission and play- out synchronization, are proposed to transmit hybrid multiple layered audiovisual bitstreams. Experiment results show that the proposed ML-AVSS is a feasible streaming scheme to overcome challenges of the ubiquitous multimedia streaming, e.g., constrained available bandwidth, quality degradation, unsmooth playback, etc.
为了实现无处不在的多媒体流,需要在异构网络上采用多层视听编码的自适应多媒体流方案。本文提出了一种多层视听流传输方案ML-AVSS,以实现分层视听数据的传输。采用细粒度可扩展性(FGS)和比特切片算术编码(BSAC)技术将视频和音频数据分割为单个基础层和多个增强层比特流。利用分层编码的优点,提出了基于人感知的传输方案、去抖动过程、条件重传和播放同步两个阶段的流同步,以传输混合多层视听比特流。实验结果表明,本文提出的ML-AVSS是一种可行的流媒体方案,可以克服当前无处不在的多媒体流媒体存在的可用带宽受限、质量下降、播放不流畅等问题。
{"title":"A Multiple Layered Audiovisual Streaming System Using the Two-Phase Synchronization and FGS/BSAC Techniques","authors":"Chung-Ming Huang, Chung-Wei Lin, Cheng-Yen Chuang","doi":"10.1109/AINA.2008.56","DOIUrl":"https://doi.org/10.1109/AINA.2008.56","url":null,"abstract":"For a ubiquitous multimedia streaming, an adaptive multimedia streaming scheme with multiple layered audiovisual (AV) coding is required over heterogeneous networks. This paper proposes a multiple layered audiovisual streaming scheme denoted ML-AVSS to deliver layered audiovisual data. Fine-granular scalability (FGS) and bit sliced arithmetic coding (BSAC) techniques are used to segment video and audio data into individual base-layer and multiple enhancement-layer bitstreams. With advantages of layered coding, two phases of streaming synchronization, including a human-perceptual based transmission scheme, de-jitter procedure, conditional retransmission and play- out synchronization, are proposed to transmit hybrid multiple layered audiovisual bitstreams. Experiment results show that the proposed ML-AVSS is a feasible streaming scheme to overcome challenges of the ubiquitous multimedia streaming, e.g., constrained available bandwidth, quality degradation, unsmooth playback, etc.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129911433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XOP: Sharing XML Data Objects through Peer-to-Peer Networks XOP:通过对等网络共享XML数据对象
Itamar de Rezende, Frank Siqueira
This paper describes an architecture for sharing data in XML format through a peer-to-peer (P2P) network, which interconnects devices ranging from high-end servers to mobile devices. The XOP architecture allows devices with low storage capacity and subject to disconnection to use other peers of the P2P network for storing data. Users are able to locate and access data in a friendly and flexible way. Shared data is described using an extensible ontology, built using the OWL language, in order to provide more precise search results. This paper also describes a prototype of this architecture and analyzes the obtained performance.
本文描述了一种通过点对点(P2P)网络共享XML格式数据的体系结构,该网络连接了从高端服务器到移动设备的各种设备。XOP架构允许低存储容量和受断开连接影响的设备使用P2P网络的其他对等点来存储数据。用户能够以友好和灵活的方式定位和访问数据。共享数据使用使用OWL语言构建的可扩展本体进行描述,以便提供更精确的搜索结果。本文还介绍了该体系结构的原型,并对其性能进行了分析。
{"title":"XOP: Sharing XML Data Objects through Peer-to-Peer Networks","authors":"Itamar de Rezende, Frank Siqueira","doi":"10.1109/AINA.2008.37","DOIUrl":"https://doi.org/10.1109/AINA.2008.37","url":null,"abstract":"This paper describes an architecture for sharing data in XML format through a peer-to-peer (P2P) network, which interconnects devices ranging from high-end servers to mobile devices. The XOP architecture allows devices with low storage capacity and subject to disconnection to use other peers of the P2P network for storing data. Users are able to locate and access data in a friendly and flexible way. Shared data is described using an extensible ontology, built using the OWL language, in order to provide more precise search results. This paper also describes a prototype of this architecture and analyzes the obtained performance.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Web Service Composition: A New Approach in Building Reliable Web Service 动态Web服务组合:构建可靠Web服务的新方法
P. Chan, Michael R. Lyu
The use of services, especially Web services, became a common practice. In Web services, standard communication protocols and simple broker-request architectures are needed to facilitate exchange of services, and this standardization simplifies interoperability. In the coming few years, services are expected to dominate software industry. There are increasing amount of Web services being made available in the Internet, and an efficient Web services composition algorithm would help to integrate different algorithm together to provide a variety of services. In this paper, we provide a dynamic Web service composition algorithm with verification of Petri-Nets. Each Web service is described by Web Service Definition Language (WSDL) and their interactions with other services are described by Web Service Choreography Interface (WSCI). Our algorithm compose the Web services with the information provided by these two descriptions. After the composition, we verify the Web service to be deadlock free with modeling the Web service as a Petri-Net. We conduct a series of experiments to evaluate the correctness and performance of the composed Web service.
服务(尤其是Web服务)的使用成为一种常见的实践。在Web服务中,需要标准的通信协议和简单的代理请求体系结构来促进服务的交换,这种标准化简化了互操作性。在未来几年,服务有望主导软件行业。Internet上可用的Web服务越来越多,有效的Web服务组合算法将有助于将不同的算法集成在一起,以提供各种服务。本文提出了一种动态Web服务组合算法,并对Petri-Nets进行了验证。每个Web服务都由Web服务定义语言(WSDL)描述,它们与其他服务的交互由Web服务编排接口(WSCI)描述。我们的算法用这两个描述提供的信息组合Web服务。在组合之后,我们通过将Web服务建模为Petri-Net来验证Web服务是否没有死锁。我们进行了一系列实验来评估组合Web服务的正确性和性能。
{"title":"Dynamic Web Service Composition: A New Approach in Building Reliable Web Service","authors":"P. Chan, Michael R. Lyu","doi":"10.1109/AINA.2008.133","DOIUrl":"https://doi.org/10.1109/AINA.2008.133","url":null,"abstract":"The use of services, especially Web services, became a common practice. In Web services, standard communication protocols and simple broker-request architectures are needed to facilitate exchange of services, and this standardization simplifies interoperability. In the coming few years, services are expected to dominate software industry. There are increasing amount of Web services being made available in the Internet, and an efficient Web services composition algorithm would help to integrate different algorithm together to provide a variety of services. In this paper, we provide a dynamic Web service composition algorithm with verification of Petri-Nets. Each Web service is described by Web Service Definition Language (WSDL) and their interactions with other services are described by Web Service Choreography Interface (WSCI). Our algorithm compose the Web services with the information provided by these two descriptions. After the composition, we verify the Web service to be deadlock free with modeling the Web service as a Petri-Net. We conduct a series of experiments to evaluate the correctness and performance of the composed Web service.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A Learning Content Adaptation Tool with Templates for Different Handhelds 一个学习内容适应工具与模板不同的手持设备
Hsuan-Pu Chang, J. C. Hung, Chun-Chia Wang, Meng-Ting Weng, T. Shih, Chen-Yu Lee
A large number of excellent digital learning materials have been created and distributed for e- learning. These contents are mostly designed for reading on regular PCs that have big screens, powerful computing, large storage and wide bandwidth compared to handheld devices. Therefore, a lot of studies about automatic content adaptation have been done and are proposed to overcome the drawbacks of browsing regular content with handheld devices such as pocket PCs and smartphones. But we argue that the total automatic adaptation algorithm designed by an engineer to transform Web Page presentation is still appropriate to be applied on educational content. We believe the quality of the result can not be assured and supervised by educators, and educational essence may be damaged during the real time adaptation process. This paper proposes a content adaptation tool that provides different adaptation templates to help the author automatically and efficiently reproduce high-quality learning content for specific handhelds. Furthermore, the author will not only be able to preview the adaptation result before publishing the course but also be able to adjust the template parameters manually to affect the process if they are not satisfied with the current result.
大量优秀的数字学习材料已被创建并分发给电子学习。与手持设备相比,这些内容主要是为在屏幕大、计算能力强、存储空间大、带宽宽的普通个人电脑上阅读而设计的。因此,人们对内容的自动适配进行了大量的研究,并提出了自动适配的方法来克服在掌上电脑、智能手机等手持设备上浏览常规内容的弊端。但我们认为,由工程师设计的用于转换Web页面表示的完全自动自适应算法仍然适合应用于教育内容。我们认为,结果的质量无法得到教育者的保证和监督,并且在实时适应过程中可能会破坏教育本质。本文提出了一种内容自适应工具,该工具提供了不同的自适应模板,帮助作者自动高效地为特定的手持设备复制高质量的学习内容。此外,作者不仅可以在发布课程之前预览适配结果,而且如果对当前结果不满意,还可以手动调整模板参数以影响过程。
{"title":"A Learning Content Adaptation Tool with Templates for Different Handhelds","authors":"Hsuan-Pu Chang, J. C. Hung, Chun-Chia Wang, Meng-Ting Weng, T. Shih, Chen-Yu Lee","doi":"10.1109/AINA.2008.101","DOIUrl":"https://doi.org/10.1109/AINA.2008.101","url":null,"abstract":"A large number of excellent digital learning materials have been created and distributed for e- learning. These contents are mostly designed for reading on regular PCs that have big screens, powerful computing, large storage and wide bandwidth compared to handheld devices. Therefore, a lot of studies about automatic content adaptation have been done and are proposed to overcome the drawbacks of browsing regular content with handheld devices such as pocket PCs and smartphones. But we argue that the total automatic adaptation algorithm designed by an engineer to transform Web Page presentation is still appropriate to be applied on educational content. We believe the quality of the result can not be assured and supervised by educators, and educational essence may be damaged during the real time adaptation process. This paper proposes a content adaptation tool that provides different adaptation templates to help the author automatically and efficiently reproduce high-quality learning content for specific handhelds. Furthermore, the author will not only be able to preview the adaptation result before publishing the course but also be able to adjust the template parameters manually to affect the process if they are not satisfied with the current result.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating Performance and Fault Tolerance in a Virtual Large-Scale Disk 大规模虚拟磁盘的性能与容错性评估
E. Chai, M. Uehara, H. Mori
Recently, the exchange of data has increased with progress in information technology. The capacity of for storing data is also increasing. However, even if the capacity of global storage becomes extremely large, the capacity of local storage is always limited. Moreover, storage of files larger then the available local storage is impossible. This paper discusses use of a network to construct a cheap, high trust and PB class, decentralized storage system using many hundreds of PCs in an educational environment. The performance of this 'large-scale virtual disk' is investigated both during normal operation and in instances of failure.
最近,随着信息技术的进步,数据的交换也在增加。存储数据的容量也在增加。然而,即使全局存储的容量变得非常大,本地存储的容量也总是有限的。此外,存储比可用本地存储更大的文件是不可能的。本文讨论了在教育环境中使用网络构建一个使用数百台pc机的廉价、高信任、PB级的分散存储系统。这个“大型虚拟磁盘”的性能在正常操作和故障情况下都进行了研究。
{"title":"Evaluating Performance and Fault Tolerance in a Virtual Large-Scale Disk","authors":"E. Chai, M. Uehara, H. Mori","doi":"10.1109/AINA.2008.158","DOIUrl":"https://doi.org/10.1109/AINA.2008.158","url":null,"abstract":"Recently, the exchange of data has increased with progress in information technology. The capacity of for storing data is also increasing. However, even if the capacity of global storage becomes extremely large, the capacity of local storage is always limited. Moreover, storage of files larger then the available local storage is impossible. This paper discusses use of a network to construct a cheap, high trust and PB class, decentralized storage system using many hundreds of PCs in an educational environment. The performance of this 'large-scale virtual disk' is investigated both during normal operation and in instances of failure.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134402995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
22nd International Conference on Advanced Information Networking and Applications (aina 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1