首页 > 最新文献

2015 International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Application of WMN-SA Web Interface and NS-3 for Optimization and Analysis in WMNs Considering Different Number of Mesh Routers and Architectures WMN-SA Web接口和NS-3在考虑不同Mesh路由器数量和结构的wmn网络优化分析中的应用
Vladi Koliçi, Tetsuya Oda, Admir Barolli, Algenti Lala, L. Barolli, F. Xhafa
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers. Node placement problems have been investigated for a long time in the optimization field due to numerous applications in location science. In this work, we evaluated WMN-SA system which is based on Simulated Annealing (SA) to find an optimal location assignment for mesh routers. As evaluation metrics, we used throughput, one-way delay, jitter, fairness index and residual energy. For simulations, we used ns-3 and Optimized Link State Routing (OLSR). We compare the performance of the optimized network topologies by sending multiple constant bit rate flows in the network. The simulation results show that the throughput is almost the same for both WMN architectures. The delay, jitter and fairness index of 32 mesh routers is higher than other number of mesh routers for I/B WMN architecture. For 16 mesh router, the remaining energy is higher than 24 and 32 mesh routers.
无线网状网络(Wireless Mesh Networks, WMNs)正受到无线网络研究人员的广泛关注。由于在定位科学中的大量应用,节点放置问题在优化领域已经研究了很长时间。在这项工作中,我们评估了基于模拟退火(SA)的WMN-SA系统,以寻找网状路由器的最优位置分配。我们使用吞吐量、单向延迟、抖动、公平指数和剩余能量作为评价指标。为了模拟,我们使用ns-3和优化链路状态路由(OLSR)。我们通过在网络中发送多个恒定比特率流来比较优化后的网络拓扑的性能。仿真结果表明,两种WMN结构的吞吐量基本相同。在I/B WMN架构下,32 mesh路由器的时延、抖动和公平性指数均高于其他mesh路由器。对于16目路由器,剩余能量高于24目和32目路由器。
{"title":"Application of WMN-SA Web Interface and NS-3 for Optimization and Analysis in WMNs Considering Different Number of Mesh Routers and Architectures","authors":"Vladi Koliçi, Tetsuya Oda, Admir Barolli, Algenti Lala, L. Barolli, F. Xhafa","doi":"10.1109/INCoS.2015.12","DOIUrl":"https://doi.org/10.1109/INCoS.2015.12","url":null,"abstract":"Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers. Node placement problems have been investigated for a long time in the optimization field due to numerous applications in location science. In this work, we evaluated WMN-SA system which is based on Simulated Annealing (SA) to find an optimal location assignment for mesh routers. As evaluation metrics, we used throughput, one-way delay, jitter, fairness index and residual energy. For simulations, we used ns-3 and Optimized Link State Routing (OLSR). We compare the performance of the optimized network topologies by sending multiple constant bit rate flows in the network. The simulation results show that the throughput is almost the same for both WMN architectures. The delay, jitter and fairness index of 32 mesh routers is higher than other number of mesh routers for I/B WMN architecture. For 16 mesh router, the remaining energy is higher than 24 and 32 mesh routers.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Multi-modal Emotion-Awareness e-Learning System 面向多模态情绪感知电子学习系统
S. Caballé
This paper describes an innovative e-Learning project proposal, named MeToo, aiming to enhance existing e-learning platforms by developing tools and services which support the detection and representation of learners' emotions, as well as emotion-based learning adaptation and affective feedback. To this end, MeToo applies novel emotion detection models to rich multimodal data collected using state of the art channels, advanced sensors and novel adaptive interfaces. Via multiple small-scale pilots in formal, informal and workplace learning environments, MeToo system will intend to demonstrate a positive impact of emotion-aware e-learning on decreasing learners drop-out rates, increasing satisfaction and improving learning performance, thus making learning as a whole a better experience. MeToo's approach requires a multi discipline perspective with expertise in e-learning, software development, internet of things, educational psychology, affective sciences, social sciences and neuroscience. To this end, MeToo not only includes experts in the above domains but also specialists with access to primary and secondary schools, university students, corporate learners and open education users. The paper shows the most relevant aspects of the scientific approaches of this project proposal submitted to the Horizon 2020 ICT program of the European Commission.
本文描述了一个名为MeToo的创新电子学习项目提案,旨在通过开发支持学习者情绪检测和表征以及基于情绪的学习适应和情感反馈的工具和服务来增强现有的电子学习平台。为此,MeToo将新颖的情感检测模型应用于使用最先进的通道、先进的传感器和新颖的自适应接口收集的丰富的多模态数据。通过在正式、非正式和工作场所学习环境中的多个小规模试点,MeToo系统将试图证明情绪感知电子学习对降低学习者辍学率、提高满意度和提高学习绩效的积极影响,从而使整体学习成为更好的体验。MeToo的方法需要多学科的视角,包括电子学习、软件开发、物联网、教育心理学、情感科学、社会科学和神经科学方面的专业知识。为此,MeToo不仅包括上述领域的专家,还包括能够接触到中小学、大学生、企业学习者和开放教育用户的专家。本文展示了提交给欧盟委员会地平线2020 ICT计划的该项目提案的科学方法的最相关方面。
{"title":"Towards a Multi-modal Emotion-Awareness e-Learning System","authors":"S. Caballé","doi":"10.1109/INCoS.2015.88","DOIUrl":"https://doi.org/10.1109/INCoS.2015.88","url":null,"abstract":"This paper describes an innovative e-Learning project proposal, named MeToo, aiming to enhance existing e-learning platforms by developing tools and services which support the detection and representation of learners' emotions, as well as emotion-based learning adaptation and affective feedback. To this end, MeToo applies novel emotion detection models to rich multimodal data collected using state of the art channels, advanced sensors and novel adaptive interfaces. Via multiple small-scale pilots in formal, informal and workplace learning environments, MeToo system will intend to demonstrate a positive impact of emotion-aware e-learning on decreasing learners drop-out rates, increasing satisfaction and improving learning performance, thus making learning as a whole a better experience. MeToo's approach requires a multi discipline perspective with expertise in e-learning, software development, internet of things, educational psychology, affective sciences, social sciences and neuroscience. To this end, MeToo not only includes experts in the above domains but also specialists with access to primary and secondary schools, university students, corporate learners and open education users. The paper shows the most relevant aspects of the scientific approaches of this project proposal submitted to the Horizon 2020 ICT program of the European Commission.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"539 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Process as a Service (PraaS) for Planning of Resources in Organizations 组织资源规划的过程即服务(PraaS)
P. Balco, M. Greguš
The decision to implement a new or modified process within the organization brings many uncertainties. Stakeholders encourage the discussions about the need for these changes. Some positives are identified but mostly negative aspects are presented in the case of such initiatives. Implemented changes mean for many people distortions of existing rules and relationships that need to be re-built and operationally stabilized. In addition, the implementation of change is not cost neutral, that is, the changes create additional demands on the budget. To implement required process as well as changes with minimum resistance it is necessary to present their added value for stakeholders. In this paper we demonstrate how it is possible to transform the process of resource planning based on the ITIL® best practices to the service with added value. The presented process includes a combination of operational and business variables that are appropriately evaluated and implemented into the mathematical model. The proposed process can be used to optimally manage resources within organizations of all sizes with a form of proactive services. Another positives of presented service are that it can be provided not only through internal solutions, but also as a cloud concept.
在组织内实施新过程或修改过程的决定会带来许多不确定因素。利益相关者鼓励讨论这些变化的必要性。确定了一些积极的方面,但在这些倡议的情况下,提出的大多是消极的方面。对许多人来说,实施的变更意味着对现有规则和关系的扭曲,需要重新构建并在操作上稳定下来。此外,变更的实施不是成本中立的,也就是说,变更会对预算产生额外的需求。为了以最小的阻力实现所需的过程和变更,有必要向涉众展示它们的附加价值。在本文中,我们演示了如何将基于ITIL®最佳实践的资源规划过程转化为具有附加价值的服务。所呈现的流程包括操作变量和业务变量的组合,这些变量被适当地评估并实现到数学模型中。所建议的流程可用于以一种主动服务的形式对各种规模的组织中的资源进行优化管理。所提供服务的另一个优点是,它不仅可以通过内部解决方案提供,还可以作为云概念提供。
{"title":"Process as a Service (PraaS) for Planning of Resources in Organizations","authors":"P. Balco, M. Greguš","doi":"10.1109/INCoS.2015.38","DOIUrl":"https://doi.org/10.1109/INCoS.2015.38","url":null,"abstract":"The decision to implement a new or modified process within the organization brings many uncertainties. Stakeholders encourage the discussions about the need for these changes. Some positives are identified but mostly negative aspects are presented in the case of such initiatives. Implemented changes mean for many people distortions of existing rules and relationships that need to be re-built and operationally stabilized. In addition, the implementation of change is not cost neutral, that is, the changes create additional demands on the budget. To implement required process as well as changes with minimum resistance it is necessary to present their added value for stakeholders. In this paper we demonstrate how it is possible to transform the process of resource planning based on the ITIL® best practices to the service with added value. The presented process includes a combination of operational and business variables that are appropriately evaluated and implemented into the mathematical model. The proposed process can be used to optimally manage resources within organizations of all sizes with a form of proactive services. Another positives of presented service are that it can be provided not only through internal solutions, but also as a cloud concept.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126502059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved DCI_Closed Algorithm 改进的DCI_Closed算法
Y. Miao, Hong Wang
Frequent itemsets mining will not conducive to data analysis. Because of frequent itemsets mining produce very large amount of frequent itemsets in the case large data. Frequent closed itemsets provides a lossless frequent item sets, the smallest representation. This paper aims at the problem of shortage of the DCI_Closed algorithm in the process of mining efficiency, puts forward a kind of improved DCI_Closed algorithm to improve the efficiency of mining, the algorithm references the concept of co-occurrence itemsets and use the nature of the co-occurrence itemsets to prune operation on the 1-itemsets. And improve the efficiency of the algorithm. The experimental results show that the improved DCI_Closed algorithm is better than DCI_Closed algorithm on running time.
频繁的项集挖掘不利于数据分析。由于频繁项集挖掘在案例大数据中产生了非常大量的频繁项集。频繁闭项集提供了一种无损频繁项集的最小表示形式。本文针对DCI_Closed算法在挖掘效率过程中存在的不足问题,提出了一种改进的DCI_Closed算法来提高挖掘效率,该算法参考了共现项集的概念,利用共现项集的性质对1项集进行剪剪操作。并提高了算法的效率。实验结果表明,改进的DCI_Closed算法在运行时间上优于DCI_Closed算法。
{"title":"An Improved DCI_Closed Algorithm","authors":"Y. Miao, Hong Wang","doi":"10.1109/INCoS.2015.11","DOIUrl":"https://doi.org/10.1109/INCoS.2015.11","url":null,"abstract":"Frequent itemsets mining will not conducive to data analysis. Because of frequent itemsets mining produce very large amount of frequent itemsets in the case large data. Frequent closed itemsets provides a lossless frequent item sets, the smallest representation. This paper aims at the problem of shortage of the DCI_Closed algorithm in the process of mining efficiency, puts forward a kind of improved DCI_Closed algorithm to improve the efficiency of mining, the algorithm references the concept of co-occurrence itemsets and use the nature of the co-occurrence itemsets to prune operation on the 1-itemsets. And improve the efficiency of the algorithm. The experimental results show that the improved DCI_Closed algorithm is better than DCI_Closed algorithm on running time.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Cognitive Information Systems Supporting Management Tasks 支持管理任务的认知信息系统的比较
L. Ogiela, M. Ogiela
Cognitive systems may support different tasks for intelligent company management. Such systems play an important role in evaluation of different enterprise conditions, and allow predicting future company developments. Such systems are able to forecast future company states thanks evaluation of different local and global parameters connected with particular company. This paper presents a comparative evaluation of different classes of cognitive information systems, useful for supporting various decision making tasks. In particular the efficiency of such systems will be presented and compared, as well as some new areas of application will be described.
认知系统可以支持智能公司管理的不同任务。这些系统在评估不同的企业状况方面发挥着重要作用,并允许预测未来的公司发展。这种系统能够通过评估与特定公司相关的不同局部和全局参数来预测未来的公司状态。本文介绍了不同类别的认知信息系统的比较评估,有助于支持各种决策任务。特别是这些系统的效率将被提出和比较,以及一些新的应用领域将被描述。
{"title":"Comparison of Cognitive Information Systems Supporting Management Tasks","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/INCoS.2015.63","DOIUrl":"https://doi.org/10.1109/INCoS.2015.63","url":null,"abstract":"Cognitive systems may support different tasks for intelligent company management. Such systems play an important role in evaluation of different enterprise conditions, and allow predicting future company developments. Such systems are able to forecast future company states thanks evaluation of different local and global parameters connected with particular company. This paper presents a comparative evaluation of different classes of cognitive information systems, useful for supporting various decision making tasks. In particular the efficiency of such systems will be presented and compared, as well as some new areas of application will be described.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130720586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Preliminary Investigation of a Semi-Automatic Criminology Intelligence Extraction Method: A Big Data Approach 基于大数据的半自动犯罪学情报提取方法初探
M. Trovati, P. Hodgson, C. Hargreaves
The aim of any science is to advance the state-of-the-art knowledge via a rigorous investigation and analysis of empirical observations, as well as the development of new theoretical frameworks. Data acquisition and ultimately the extraction of novel knowledge, is therefore the foundation of any scientific advance. However, with the increasing creation of data in various forms and shapes, identifying relevant information from structured and unstructured data sets raises several challenges, as well as opportunities. In this paper, we discuss a semi-automatic method to identify, analyse and generate knowledge specifically focusing on Criminology. The main motivation is to provide a toolbox to help criminology experts, which would potentially lead to a better understanding and prediction of the properties to facilitate the decision making process. Our initial validation shows the potential of our method providing relevant and accurate results.
任何科学的目标都是通过严格的调查和实证观察的分析,以及新的理论框架的发展来推进最先进的知识。因此,数据的获取以及最终的新知识的提取是任何科学进步的基础。然而,随着各种形式和形状的数据的不断增加,从结构化和非结构化数据集中识别相关信息提出了一些挑战,同时也带来了机遇。在本文中,我们讨论了一种半自动的方法来识别,分析和产生知识,特别是专注于犯罪学。主要的动机是提供一个工具箱来帮助犯罪学专家,这可能会导致更好地理解和预测属性,以促进决策过程。我们的初步验证显示了我们的方法提供相关和准确结果的潜力。
{"title":"A Preliminary Investigation of a Semi-Automatic Criminology Intelligence Extraction Method: A Big Data Approach","authors":"M. Trovati, P. Hodgson, C. Hargreaves","doi":"10.1109/INCoS.2015.37","DOIUrl":"https://doi.org/10.1109/INCoS.2015.37","url":null,"abstract":"The aim of any science is to advance the state-of-the-art knowledge via a rigorous investigation and analysis of empirical observations, as well as the development of new theoretical frameworks. Data acquisition and ultimately the extraction of novel knowledge, is therefore the foundation of any scientific advance. However, with the increasing creation of data in various forms and shapes, identifying relevant information from structured and unstructured data sets raises several challenges, as well as opportunities. In this paper, we discuss a semi-automatic method to identify, analyse and generate knowledge specifically focusing on Criminology. The main motivation is to provide a toolbox to help criminology experts, which would potentially lead to a better understanding and prediction of the properties to facilitate the decision making process. Our initial validation shows the potential of our method providing relevant and accurate results.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114204400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimum Background Fairness for Quality Video Delivery over the LTE Downlink LTE下行链路上高质量视频传输的最小背景公平性
Wen-Ping Lai, Ching-Hsiang Lin, En-Cheng Liou
High quality video delivery over LTE is a challenging issue due to limited radio resources of the LTE base station. This paper presents a study on the dilemma problem for allocating radio resource blocks between video and background flows in the LTE downlink. We propose a new concept called minimum background fairness (MBF) and combine it with our earlier idea called generalized largest weighted delay first (GLWDF) to avoid resource starvation of background traffic while achieving high-quality prioritized services of differentiated video packet types. Our preliminary results show that MBF cannot only guarantee a better minimum level of fairness in resource allocation to background traffic than FLS (a lately new design based on a so-called two-level scheduling), but also achieve video transmission quality gains over all the conventional single-level schedulers as well as FLS. In particular, such performance gains are amplified during medium to heavy congestions.
由于LTE基站的无线资源有限,高质量的视频传输是一个具有挑战性的问题。本文研究了LTE下行链路中视频流和背景流之间无线电资源块分配的两难问题。我们提出了一个新的概念,称为最小背景公平性(MBF),并将其与我们之前的思想称为广义最大加权延迟优先(GLWDF)相结合,以避免后台流量的资源饥饿,同时实现差异化视频数据包类型的高质量优先服务。我们的初步结果表明,MBF不仅比FLS(一种基于所谓的两级调度的新设计)保证了后台流量资源分配的最低公平水平,而且比所有传统的单级调度程序和FLS都获得了视频传输质量的提高。特别是,在中度到重度拥塞期间,这种性能增益会被放大。
{"title":"Minimum Background Fairness for Quality Video Delivery over the LTE Downlink","authors":"Wen-Ping Lai, Ching-Hsiang Lin, En-Cheng Liou","doi":"10.1109/INCoS.2015.68","DOIUrl":"https://doi.org/10.1109/INCoS.2015.68","url":null,"abstract":"High quality video delivery over LTE is a challenging issue due to limited radio resources of the LTE base station. This paper presents a study on the dilemma problem for allocating radio resource blocks between video and background flows in the LTE downlink. We propose a new concept called minimum background fairness (MBF) and combine it with our earlier idea called generalized largest weighted delay first (GLWDF) to avoid resource starvation of background traffic while achieving high-quality prioritized services of differentiated video packet types. Our preliminary results show that MBF cannot only guarantee a better minimum level of fairness in resource allocation to background traffic than FLS (a lately new design based on a so-called two-level scheduling), but also achieve video transmission quality gains over all the conventional single-level schedulers as well as FLS. In particular, such performance gains are amplified during medium to heavy congestions.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Trends and Some Lessons for Serious Network Failures in Japan 日本严重网络故障的最新趋势和一些教训
M. Uchida
Due to significant environmental changes in the telecommunications market, network failures affect socioeconomic activities more than ever before. In this paper, we investigate the statistical characteristics of interval, duration, and number of users affected for serious network failures, which are defined as network failures that last for more than two hours and affect more than 30,000 users, that occurred in Japan during Japanese fiscal years 2008-2013 (April 2008 to March 2014). The results show that (i) the interval follows a Poisson process, (ii) the duration follows a Pareto distribution, (iii) the number of users affected follows a piecewise Pareto distribution, (iv) the product of duration and number of users affected roughly follows a distribution that can be derived from a convolution of two distributions of duration and number of users affected, (v) the relationship between duration and number of users affected differs from service to service, and (vi) the impact of recent serious network failures is getting more severe.
由于电信市场环境的重大变化,网络故障对社会经济活动的影响比以往任何时候都大。在本文中,我们研究了严重网络故障的间隔、持续时间和受影响用户数量的统计特征。严重网络故障的定义是日本2008-2013财年(2008年4月至2014年3月)期间发生的持续时间超过2小时、影响超过3万用户的网络故障。结果表明:(i)区间服从泊松过程,(ii)持续时间服从帕累托分布,(iii)受影响的用户数量服从分段帕累托分布,(iv)持续时间与受影响用户数量的乘积大致服从由持续时间与受影响用户数量两个分布的卷积得出的分布,(v)持续时间与受影响用户数量之间的关系因服务而异。(六)近期发生的严重网络故障影响日益严重。
{"title":"Recent Trends and Some Lessons for Serious Network Failures in Japan","authors":"M. Uchida","doi":"10.1109/INCoS.2015.31","DOIUrl":"https://doi.org/10.1109/INCoS.2015.31","url":null,"abstract":"Due to significant environmental changes in the telecommunications market, network failures affect socioeconomic activities more than ever before. In this paper, we investigate the statistical characteristics of interval, duration, and number of users affected for serious network failures, which are defined as network failures that last for more than two hours and affect more than 30,000 users, that occurred in Japan during Japanese fiscal years 2008-2013 (April 2008 to March 2014). The results show that (i) the interval follows a Poisson process, (ii) the duration follows a Pareto distribution, (iii) the number of users affected follows a piecewise Pareto distribution, (iv) the product of duration and number of users affected roughly follows a distribution that can be derived from a convolution of two distributions of duration and number of users affected, (v) the relationship between duration and number of users affected differs from service to service, and (vi) the impact of recent serious network failures is getting more severe.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaboration and Locality in Crowdsourcing 众包中的协作与局部性
Andreas Mladenow, Christine Bauer, C. Strauss, M. Greguš
As novel forms of crowdsourcing emerge on the market, we emphasize that the important aspect of location-dependency is more complex than assumed and, thus, suggest a typology along two dimensions of locality: the first dimension refers to whether or not the crowdsourcees interact while being collocated or dispersed, the second dimension refers to the locality of the crowdsourcees in relation to the crowdsourcer's locality (local vs. remote crowd). The resulting four types of crowdsourcing are underpinned by real-world examples. Potential advantages and challenges of the four types are discussed, particularly with respect to motivation and value. The suggested categorization shall provide the necessary basis for future research, as a systematic approach is essential to enable, yield and foster sustainability in a novel interdisciplinary research field like location-based crowdsourcing.
随着新形式的众包在市场上出现,我们强调位置依赖的重要方面比假设的更复杂,因此,我们提出了一种沿两个局部性维度的类型学:第一个维度是指众包在配置或分散时是否相互作用,第二个维度是指众包的局部性与众包者的局部性(本地与远程人群)的关系。由此产生的四种类型的众包以现实世界的例子为基础。讨论了这四种类型的潜在优势和挑战,特别是在动机和价值方面。建议的分类将为未来的研究提供必要的基础,因为在一个新的跨学科研究领域,如基于位置的众包,系统的方法对于实现、产生和促进可持续性至关重要。
{"title":"Collaboration and Locality in Crowdsourcing","authors":"Andreas Mladenow, Christine Bauer, C. Strauss, M. Greguš","doi":"10.1109/INCoS.2015.74","DOIUrl":"https://doi.org/10.1109/INCoS.2015.74","url":null,"abstract":"As novel forms of crowdsourcing emerge on the market, we emphasize that the important aspect of location-dependency is more complex than assumed and, thus, suggest a typology along two dimensions of locality: the first dimension refers to whether or not the crowdsourcees interact while being collocated or dispersed, the second dimension refers to the locality of the crowdsourcees in relation to the crowdsourcer's locality (local vs. remote crowd). The resulting four types of crowdsourcing are underpinned by real-world examples. Potential advantages and challenges of the four types are discussed, particularly with respect to motivation and value. The suggested categorization shall provide the necessary basis for future research, as a systematic approach is essential to enable, yield and foster sustainability in a novel interdisciplinary research field like location-based crowdsourcing.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Data Owner Based Attribute Based Encryption 基于数据所有者的属性加密
Jindan Zhang, Xu An Wang, Jianfeng Ma
These years attribute based encryption (ABE) is a very hot research topic for its very flexible control on the encrypted content. Typically, there are three parties in an attribute based encryption system: PKG, User (Decrypter), Encrypter. The PKG (Private Key Generator) is responsible to generate secret keys for the User (Decrypter) according to the attributes (CP-ABE) or the policy (KP-ABE), then the Encrypter encrypts his content according to the policy (KP-ABE) or the attributes (CP-ABE), the User then decrypts the encrypted content using his secret keys. However, all the ABE schemes until now require the exist of PKG to generate secret keys for the User(Decrypter). We observe this i snot the only way to generate the secret keys, the encrypter also has the ability to generate "secret keys" for the User (Decrypter) by using the randomness which used in the encryption. We introduce a new variant of ABE: DO-ABE, which is almost the same as the traditional ABE except the secret keys generated by the encrypter. Compared with ABE, DO-ABE can easily achieve message-level based fine-grained control on the encrypted content, the key-escrow free property, easily message recoverable for the encrypter, while these properties are desirable in practical applications like cloud storage. We give two concrete KP-DO-ABE and CP-DO-ABE schemes, discuss its features compared with the traditional ABE and roughly analysis its security. Finally we conclude our paper with many interesting open problems.
基于属性的加密以其对加密内容的灵活控制成为近年来研究的热点。通常,在基于属性的加密系统中有三方:PKG、用户(解密者)、加密者。PKG(私钥生成器)负责根据属性(CP-ABE)或策略(KP-ABE)为用户(解密者)生成密钥,然后加密者根据策略(KP-ABE)或属性(CP-ABE)对其内容进行加密,然后用户使用其密钥对加密的内容进行解密。然而,到目前为止,所有的ABE方案都需要PKG的存在来为用户(解密者)生成密钥。我们观察到这不是生成密钥的唯一方法,加密者也有能力通过使用加密中使用的随机性为用户(解密者)生成“密钥”。我们引入了ABE的一种新变体:DO-ABE,除了加密器生成的密钥外,它与传统ABE几乎相同。与ABE相比,DO-ABE可以很容易地实现基于消息级别的对加密内容的细粒度控制,无密钥托管属性,加密器可以轻松地恢复消息,而这些属性在云存储等实际应用中是理想的。给出了KP-DO-ABE和CP-DO-ABE两种具体方案,讨论了其与传统ABE的特点,并对其安全性进行了粗略分析。最后,我们用许多有趣的开放问题来结束我们的论文。
{"title":"Data Owner Based Attribute Based Encryption","authors":"Jindan Zhang, Xu An Wang, Jianfeng Ma","doi":"10.1109/INCoS.2015.42","DOIUrl":"https://doi.org/10.1109/INCoS.2015.42","url":null,"abstract":"These years attribute based encryption (ABE) is a very hot research topic for its very flexible control on the encrypted content. Typically, there are three parties in an attribute based encryption system: PKG, User (Decrypter), Encrypter. The PKG (Private Key Generator) is responsible to generate secret keys for the User (Decrypter) according to the attributes (CP-ABE) or the policy (KP-ABE), then the Encrypter encrypts his content according to the policy (KP-ABE) or the attributes (CP-ABE), the User then decrypts the encrypted content using his secret keys. However, all the ABE schemes until now require the exist of PKG to generate secret keys for the User(Decrypter). We observe this i snot the only way to generate the secret keys, the encrypter also has the ability to generate \"secret keys\" for the User (Decrypter) by using the randomness which used in the encryption. We introduce a new variant of ABE: DO-ABE, which is almost the same as the traditional ABE except the secret keys generated by the encrypter. Compared with ABE, DO-ABE can easily achieve message-level based fine-grained control on the encrypted content, the key-escrow free property, easily message recoverable for the encrypter, while these properties are desirable in practical applications like cloud storage. We give two concrete KP-DO-ABE and CP-DO-ABE schemes, discuss its features compared with the traditional ABE and roughly analysis its security. Finally we conclude our paper with many interesting open problems.","PeriodicalId":345650,"journal":{"name":"2015 International Conference on Intelligent Networking and Collaborative Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128880837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2015 International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1