首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Guaranteed QoS Resource Scheduling Scheme Based on Improved Electromagnetism-Like Mechanism Algorithm in Cloud Environment 云环境下基于改进类电磁机制算法的保证QoS资源调度方案
S. Yun
Faced with a huge user base, cloud computing need to be addressed with the amount of tasks and data. The resource scheduling scheme for cloud computing environment, that provides QoS(Quality of Service) guarantees, is presented in this paper based on improved Electromagnetism-like Mechanism algorithm(EM). To update force equation and the introduction of tabu search ideas, so as to control the global and local search as far as possible to avoid falling into local optimum. The experimental results in CloudSim platform show that the algorithm is efficient.
面对庞大的用户群,云计算需要处理大量的任务和数据。提出了一种基于改进的类电磁机制算法(EM)的云计算环境下提供QoS(Quality of Service)保证的资源调度方案。更新力方程,引入禁忌搜索思想,尽可能控制全局和局部搜索,避免陷入局部最优。在CloudSim平台上的实验结果表明,该算法是有效的。
{"title":"Guaranteed QoS Resource Scheduling Scheme Based on Improved Electromagnetism-Like Mechanism Algorithm in Cloud Environment","authors":"S. Yun","doi":"10.1109/INCoS.2013.66","DOIUrl":"https://doi.org/10.1109/INCoS.2013.66","url":null,"abstract":"Faced with a huge user base, cloud computing need to be addressed with the amount of tasks and data. The resource scheduling scheme for cloud computing environment, that provides QoS(Quality of Service) guarantees, is presented in this paper based on improved Electromagnetism-like Mechanism algorithm(EM). To update force equation and the introduction of tabu search ideas, so as to control the global and local search as far as possible to avoid falling into local optimum. The experimental results in CloudSim platform show that the algorithm is efficient.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"39 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features BaitAlarm:基于基本视觉特征相似性检测钓鱼网站
Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang
In this paper, we present a new solution, BaitAlarm, to detect phishing attack using features that are hard to evade. The intuition of our approach is that phishing pages need to preserve the visual appearance the target pages. We present an algorithm to quantify the suspicious ratings of web pages based on similarity of visual appearance between the web pages. Since CSS is the standard technique to specify page layout, our solution uses the CSS as the basis for detecting visual similarities among web pages. We prototyped our approach as a Google Chrome extension and used it to rate the suspiciousness of web pages. The prototype shows the correctness and accuracy of our approach with a relatively low performance overhead.
在本文中,我们提出了一个新的解决方案,BaitAlarm,利用难以逃避的特征来检测网络钓鱼攻击。我们的方法的直觉是,网络钓鱼页面需要保持目标页面的视觉外观。我们提出了一种基于网页之间的视觉外观相似性来量化网页可疑评级的算法。由于CSS是指定页面布局的标准技术,我们的解决方案使用CSS作为检测网页之间视觉相似性的基础。我们将我们的方法原型化为Google Chrome扩展,并用它来评估网页的可疑性。该原型以相对较低的性能开销显示了我们的方法的正确性和准确性。
{"title":"BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features","authors":"Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang","doi":"10.1109/INCoS.2013.151","DOIUrl":"https://doi.org/10.1109/INCoS.2013.151","url":null,"abstract":"In this paper, we present a new solution, BaitAlarm, to detect phishing attack using features that are hard to evade. The intuition of our approach is that phishing pages need to preserve the visual appearance the target pages. We present an algorithm to quantify the suspicious ratings of web pages based on similarity of visual appearance between the web pages. Since CSS is the standard technique to specify page layout, our solution uses the CSS as the basis for detecting visual similarities among web pages. We prototyped our approach as a Google Chrome extension and used it to rate the suspiciousness of web pages. The prototype shows the correctness and accuracy of our approach with a relatively low performance overhead.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126221177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Towards Software Infrastructure for the Systematic Virtualization of Collaborative Learning Sessions 面向协作学习会议系统虚拟化的软件基础设施
D. Gañán, S. Caballé, J. Conesa
This paper proposes the provision of software infrastructure to support new types of pedagogically augmented collaborative learning resources by means of an innovative software platform called Virtualized Collaborative Sessions (VCS). The VCS approach helps meet challenging pedagogical requirements in online collaborative learning, such as increasing student's engagement and learning performance during the collaboration. In turn, the systematic application of the VCS platform enriched with semantic technologies enables e-learning developers to embed successful collaborative learning experiences from external learning tools in a software reuse fashion. The platform is prototyped and successfully tested in real environments, thus showing the software reuse capability and the pedagogical benefits of the VCS approach.
本文提出提供软件基础设施,以支持新型的教学增强型协作学习资源,通过一个称为虚拟协作会话(VCS)的创新软件平台。VCS方法有助于满足在线协作学习中具有挑战性的教学要求,例如在协作过程中提高学生的参与度和学习表现。反过来,丰富了语义技术的VCS平台的系统应用使电子学习开发人员能够以软件重用的方式嵌入来自外部学习工具的成功的协作学习经验。该平台原型化并在真实环境中成功测试,从而显示了软件重用能力和VCS方法的教学优势。
{"title":"Towards Software Infrastructure for the Systematic Virtualization of Collaborative Learning Sessions","authors":"D. Gañán, S. Caballé, J. Conesa","doi":"10.1109/INCOS.2013.79","DOIUrl":"https://doi.org/10.1109/INCOS.2013.79","url":null,"abstract":"This paper proposes the provision of software infrastructure to support new types of pedagogically augmented collaborative learning resources by means of an innovative software platform called Virtualized Collaborative Sessions (VCS). The VCS approach helps meet challenging pedagogical requirements in online collaborative learning, such as increasing student's engagement and learning performance during the collaboration. In turn, the systematic application of the VCS platform enriched with semantic technologies enables e-learning developers to embed successful collaborative learning experiences from external learning tools in a software reuse fashion. The platform is prototyped and successfully tested in real environments, thus showing the software reuse capability and the pedagogical benefits of the VCS approach.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Secure Document Self-Destruction Scheme with Identity Based Encryption 基于身份加密的安全文档自毁方案
Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li
With the rapid emerging of the novelty Web services and cloud services, it becomes more and more easily to expose a user's sensitive documents into the cloud. In this paper, we combine identity-based encryption (IBE) algorithm with distributed hash table (DHT) network and propose an IBE-based secure document self-destruction (ISDS) scheme to protect the privacy security of past, archived sensitive documents, and make sure that all copies of those documents become unreadable by making them utomatically destructed after a predefined time without any human intervention. Comprehensive analysis shows that the ISDS scheme is able to resist not only traditional cryptanalysis and brute-force attack, but also Sybil attacks (e.g., hopping attack and sniffer attack) in the DHT network. More significantly, our ISDS scheme can also provide fine-grained access control during the lifetime of the sensitive documents, which is not guaranteed in other existing schemes.
随着新型Web服务和云服务的迅速兴起,将用户的敏感文档公开到云中变得越来越容易。本文将基于身份的加密(IBE)算法与分布式哈希表(DHT)网络相结合,提出了一种基于身份的安全文档自毁(ISDS)方案,以保护过去归档的敏感文档的隐私安全,并通过在预先设定的时间后自动销毁这些文档的所有副本而无需任何人为干预,从而确保这些文档的所有副本变得不可读。综合分析表明,ISDS方案不仅能够抵御传统的密码分析和暴力破解攻击,而且能够抵御DHT网络中的Sybil攻击(如跳码攻击和嗅探攻击)。更重要的是,我们的ISDS方案还可以在敏感文档的生命周期内提供细粒度的访问控制,这是其他现有方案无法保证的。
{"title":"A Secure Document Self-Destruction Scheme with Identity Based Encryption","authors":"Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li","doi":"10.1109/INCoS.2013.42","DOIUrl":"https://doi.org/10.1109/INCoS.2013.42","url":null,"abstract":"With the rapid emerging of the novelty Web services and cloud services, it becomes more and more easily to expose a user's sensitive documents into the cloud. In this paper, we combine identity-based encryption (IBE) algorithm with distributed hash table (DHT) network and propose an IBE-based secure document self-destruction (ISDS) scheme to protect the privacy security of past, archived sensitive documents, and make sure that all copies of those documents become unreadable by making them utomatically destructed after a predefined time without any human intervention. Comprehensive analysis shows that the ISDS scheme is able to resist not only traditional cryptanalysis and brute-force attack, but also Sybil attacks (e.g., hopping attack and sniffer attack) in the DHT network. More significantly, our ISDS scheme can also provide fine-grained access control during the lifetime of the sensitive documents, which is not guaranteed in other existing schemes.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114901432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analysis of P2P Communications in Online Collaborative Teamwork Settings 在线协同团队环境下的P2P通信分析
Vladi Koliçi, F. Xhafa, L. Barolli
P2P technologies have been considered as one of the most disruptive Internet technologies in achieving fully decentralized and efficient communication in distributed systems. Indeed, the nature of the direct communication among peers in the system, being these machines or people, makes possible to overcome the limitations of the flat communications through email, newsgroups and other forum-based communication forms. In fact, the usefulness of P2P paradigm has been shown not only in the development of stand alone P2P applications, but also in using its features in other Internet-based systems and paradigms such as Mobile Adhoc Networks (MANETs), Groupware systems, Mobile teamwork and in a broader sense in distributed systems that need coordination, replication, awareness and synchronization. In this paper we analyse the use of the P2P technologies in collaborative teamwork with a special emphasis on the mobile collaborative teams. A mobile team is a group of people that are geographically distributed and collaborate together work for the accomplishment of a project. Mobile teamwork has become an important paradigm of the today workforce especially in Small and Medium size Enterprises to cover many fields such as field work, journalism, online collaborative learning, disaster management scenarios and businesses. As a result of our analysis, we show how P2P technology as well as the core P2P functions and protocols can enhance the collaborative teamwork of various forms, including mobile teamwork.
P2P技术被认为是在分布式系统中实现完全分散和高效通信的最具颠覆性的互联网技术之一。事实上,系统中对等体之间的直接通信的本质,无论是这些机器还是人,使得通过电子邮件、新闻组和其他基于论坛的通信形式克服平面通信的局限性成为可能。事实上,P2P范例的有用性不仅体现在独立P2P应用程序的开发中,也体现在其他基于互联网的系统和范例中,如移动自组织网络(manet)、群件系统、移动团队合作,以及更广泛意义上需要协调、复制、感知和同步的分布式系统中。在本文中,我们分析了P2P技术在协作团队中的应用,并特别强调了移动协作团队。移动团队是一组地理上分散的人,他们为了完成一个项目而共同协作。移动团队合作已经成为当今劳动力的一个重要范例,特别是在中小型企业中,它涵盖了许多领域,如实地工作、新闻、在线协作学习、灾难管理场景和商业。通过分析,我们展示了P2P技术以及P2P核心功能和协议如何增强各种形式的协作团队,包括移动团队。
{"title":"Analysis of P2P Communications in Online Collaborative Teamwork Settings","authors":"Vladi Koliçi, F. Xhafa, L. Barolli","doi":"10.1109/INCOS.2013.163","DOIUrl":"https://doi.org/10.1109/INCOS.2013.163","url":null,"abstract":"P2P technologies have been considered as one of the most disruptive Internet technologies in achieving fully decentralized and efficient communication in distributed systems. Indeed, the nature of the direct communication among peers in the system, being these machines or people, makes possible to overcome the limitations of the flat communications through email, newsgroups and other forum-based communication forms. In fact, the usefulness of P2P paradigm has been shown not only in the development of stand alone P2P applications, but also in using its features in other Internet-based systems and paradigms such as Mobile Adhoc Networks (MANETs), Groupware systems, Mobile teamwork and in a broader sense in distributed systems that need coordination, replication, awareness and synchronization. In this paper we analyse the use of the P2P technologies in collaborative teamwork with a special emphasis on the mobile collaborative teams. A mobile team is a group of people that are geographically distributed and collaborate together work for the accomplishment of a project. Mobile teamwork has become an important paradigm of the today workforce especially in Small and Medium size Enterprises to cover many fields such as field work, journalism, online collaborative learning, disaster management scenarios and businesses. As a result of our analysis, we show how P2P technology as well as the core P2P functions and protocols can enhance the collaborative teamwork of various forms, including mobile teamwork.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121552832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RLWE-Based Homomorphic Encryption and Private Information Retrieval 基于rlwe的同态加密与私有信息检索
Wei Zhang, Shuguang Liu, Xiaoyuan Yang
A multi-bit somewhat homomorphic encryption scheme based on Learning With Errors over Rings (RLWE) assumption is provided, which use canonical embedding to transform elements over a ring into vectors, thus the operation of polynomial multiplication can be performed within O(nlog n) scalar operations, and cipher text size is reduced as well. CPA security of this scheme can be reduced into RLWE assumption. Moreover, an efficient private information retrieval protocol that employs this scheme is presented.
提出了一种基于环上错误学习(RLWE)假设的多比特半同态加密方案,该方案利用正则嵌入将环上的元素转换为向量,从而可以在O(nlog n)个标量运算内完成多项式乘法运算,并且减小了密文的大小。该方案的CPA安全性可以简化为RLWE假设。在此基础上,提出了一种高效的私有信息检索协议。
{"title":"RLWE-Based Homomorphic Encryption and Private Information Retrieval","authors":"Wei Zhang, Shuguang Liu, Xiaoyuan Yang","doi":"10.1109/INCoS.2013.100","DOIUrl":"https://doi.org/10.1109/INCoS.2013.100","url":null,"abstract":"A multi-bit somewhat homomorphic encryption scheme based on Learning With Errors over Rings (RLWE) assumption is provided, which use canonical embedding to transform elements over a ring into vectors, thus the operation of polynomial multiplication can be performed within O(nlog n) scalar operations, and cipher text size is reduced as well. CPA security of this scheme can be reduced into RLWE assumption. Moreover, an efficient private information retrieval protocol that employs this scheme is presented.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114275323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Delay Sensitive Time Slots Scheduling in Vehicular Sensor Networks 基于时延敏感的车载传感器网络时隙调度
Chen Chen, Xiaolu Wei, Yanan Jin, Shengjin Ge
In Vehicular communication networks, a robust access mechanism is essential for the successful information exchange between vehicles and roadside unit, which keeps the vehicles being aware of surroundings thus improving driving safety and reduce traffic jam. In this paper, we first analyze the drawbacks of explicit GTS (Guaranteed Time Slots) allocation suggested by IEEE 802.15.4 draft and show the importance of a wise assignment scheme and efficient scheduler especially for high dynamic vehicular environment. Then, for a given number of vehicles requesting to access the roadside unit, we propose a Time-Sensitive Weighted Round Robin scheduler (TS-WRR) considering different service delay requirements, packets arrival rates and vehicles' mobility levels. We also show the elaborate implementation procedure of TS-WRR by pseudocode. Numerical results show that our TS-WRR scheduler outperforms FCFS and WRR on the performance of transactions delay requirements guarantee and GTS utilization ratio in Vehicular Sensor Networks.
在车载通信网络中,一个强大的接入机制是车辆与路边单元之间成功交换信息的关键,使车辆保持对周围环境的感知,从而提高驾驶安全性,减少交通堵塞。本文首先分析了IEEE 802.15.4草案中明确的GTS(保证时隙)分配方法的缺陷,指出了在高动态环境下,合理的分配方案和高效的调度程序的重要性。然后,对于给定数量的请求访问路边单元的车辆,我们提出了一个考虑不同服务延迟要求、数据包到达率和车辆移动性水平的时间敏感加权轮循调度程序(TS-WRR)。本文还详细介绍了TS-WRR的伪代码实现过程。数值结果表明,TS-WRR调度程序在事务延迟需求保证和GTS利用率方面优于FCFS和WRR调度程序。
{"title":"A Delay Sensitive Time Slots Scheduling in Vehicular Sensor Networks","authors":"Chen Chen, Xiaolu Wei, Yanan Jin, Shengjin Ge","doi":"10.1109/INCoS.2013.84","DOIUrl":"https://doi.org/10.1109/INCoS.2013.84","url":null,"abstract":"In Vehicular communication networks, a robust access mechanism is essential for the successful information exchange between vehicles and roadside unit, which keeps the vehicles being aware of surroundings thus improving driving safety and reduce traffic jam. In this paper, we first analyze the drawbacks of explicit GTS (Guaranteed Time Slots) allocation suggested by IEEE 802.15.4 draft and show the importance of a wise assignment scheme and efficient scheduler especially for high dynamic vehicular environment. Then, for a given number of vehicles requesting to access the roadside unit, we propose a Time-Sensitive Weighted Round Robin scheduler (TS-WRR) considering different service delay requirements, packets arrival rates and vehicles' mobility levels. We also show the elaborate implementation procedure of TS-WRR by pseudocode. Numerical results show that our TS-WRR scheduler outperforms FCFS and WRR on the performance of transactions delay requirements guarantee and GTS utilization ratio in Vehicular Sensor Networks.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"41 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129880666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deceptive Detection and Security Reinforcement in Grid Computing 网格计算中的欺骗检测与安全增强
Jianhua Yu, Y. Luo, Xueli Wang
Grid computing is an interesting kind of distributed computing. It has been applied to biological science, medical science, Military science, and many other fields. The participant cheating problem has been a hot topic in grid computing. However, in the existing deceptive detection schemes, the computing power of the supervisor has not been classified and discussed based on the characteristics of the computational task. Hence, these deception schemes are not very suitable for the practical applications. According to the task publisher's computing power, we will classify the deceptive detection schemes into two categories, and then analyze the security of deceptive detection schemes based on the characteristics of computational task function. On the basis of double check, we proposed an improved scheme at the cost of time sacrifice called the secondary allocation scheme of double check. In our scheme, the security of double check has been greatly strengthened. Finally, we analyzed the common problem of High-value rare Events, improved the deceptive detection scheme due to Du et al. [1], and then put forward a new deceptive detection scheme with better security and efficiency.
网格计算是一种有趣的分布式计算。它已被应用于生物科学、医学、军事科学等许多领域。参与者作弊问题一直是网格计算中的一个热点问题。然而,在现有的欺骗检测方案中,并没有根据计算任务的特点对监督者的计算能力进行分类和讨论。因此,这些欺骗方案不太适合实际应用。根据任务发布者的计算能力,我们将欺骗检测方案分为两类,然后根据计算任务函数的特点分析欺骗检测方案的安全性。在双重核查的基础上,以牺牲时间为代价,提出了一种改进方案——双重核查二次分配方案。在我们的方案中,双重检查的安全性得到了极大的加强。最后,我们分析了高价值稀有事件的常见问题,并对Du等人[1]的欺骗检测方案进行了改进,提出了一种安全性和效率更高的欺骗检测新方案。
{"title":"Deceptive Detection and Security Reinforcement in Grid Computing","authors":"Jianhua Yu, Y. Luo, Xueli Wang","doi":"10.1109/INCoS.2013.30","DOIUrl":"https://doi.org/10.1109/INCoS.2013.30","url":null,"abstract":"Grid computing is an interesting kind of distributed computing. It has been applied to biological science, medical science, Military science, and many other fields. The participant cheating problem has been a hot topic in grid computing. However, in the existing deceptive detection schemes, the computing power of the supervisor has not been classified and discussed based on the characteristics of the computational task. Hence, these deception schemes are not very suitable for the practical applications. According to the task publisher's computing power, we will classify the deceptive detection schemes into two categories, and then analyze the security of deceptive detection schemes based on the characteristics of computational task function. On the basis of double check, we proposed an improved scheme at the cost of time sacrifice called the secondary allocation scheme of double check. In our scheme, the security of double check has been greatly strengthened. Finally, we analyzed the common problem of High-value rare Events, improved the deceptive detection scheme due to Du et al. [1], and then put forward a new deceptive detection scheme with better security and efficiency.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attribute-Based Signatures with Efficient Revocation 有效撤销的基于属性的签名
Yanling Lian, Li Xu, Xinyi Huang
Based signatures (ABS for short) allow an entity to sign messages with a fine-grained control over identity information. The signature attests not to the identity of the individual who endorsed a message, but instead to a claim regarding the attributes he/she holds. ABS has been well investigated since its introduction but little has been done on the revocation in ABS. In this paper, we divide ABS revocation as fine-grained attribute-revocation and coarse-grained user-revocation. The latter is the focus of this paper, and we present a concrete design-to address the issue of coarse-grained user-revocation in ABS without the need of any other third parties.
基于签名(简称ABS)允许实体通过对身份信息的细粒度控制对消息进行签名。签名不是证明为消息背书的个人的身份,而是证明他/她所拥有的属性。本文将ABS的撤销分为细粒度的属性撤销和粗粒度的用户撤销。后者是本文的重点,我们提出了一个具体的设计来解决ABS中粗粒度的用户撤销问题,而不需要任何其他第三方。
{"title":"Attribute-Based Signatures with Efficient Revocation","authors":"Yanling Lian, Li Xu, Xinyi Huang","doi":"10.1109/INCoS.2013.106","DOIUrl":"https://doi.org/10.1109/INCoS.2013.106","url":null,"abstract":"Based signatures (ABS for short) allow an entity to sign messages with a fine-grained control over identity information. The signature attests not to the identity of the individual who endorsed a message, but instead to a claim regarding the attributes he/she holds. ABS has been well investigated since its introduction but little has been done on the revocation in ABS. In this paper, we divide ABS revocation as fine-grained attribute-revocation and coarse-grained user-revocation. The latter is the focus of this paper, and we present a concrete design-to address the issue of coarse-grained user-revocation in ABS without the need of any other third parties.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Simulation of the Adaptive Multivariate Exploration for Routes Guidance 路径引导的自适应多元探索仿真
W. Romsaiyud
Nowadays, Navigation systems have become very popular and necessary for travelers from all around the world. Navigation systems give travelers all the information they need and guide them quickly and comfortably to get to the destination. Pre-trip planning regarding road and traffic conditions can enhance driver's knowledge of the situation in road networks and can assist in drivers' decisions concerning routes and departure times. Many factors such as the route density, traffic volume, departure time, destination, workday, working time, holiday period, tournaments and events are important to find the best route under the criterion. In this paper presented two new models with the purpose of recommending travelers the best route to destination. These two models are the multivariate class exploration and route guidance models. The multivariate class exploration model analyzes the network-flow patterns in order to investigate some important factors such as demand conditions, compliance with information, speed and variance of travel-time and calculate a travel-time reduction. A route guidance model was used to find efficient routes (minimizing travel time) for traveling. This paper conducted experiments on a real-world dataset collected from the OpenStreetMap. The accuracy of the proposed model's predictions was determined. The results show that the predictions given by the models are accurate and can be used in real-life situations.
如今,导航系统已经变得非常流行,对于来自世界各地的旅行者来说是必不可少的。导航系统为旅行者提供他们需要的所有信息,并引导他们快速舒适地到达目的地。出行前对道路和交通状况的规划可以增强驾驶员对道路网络情况的了解,并有助于驾驶员决定路线和出发时间。路线密度、交通量、出发时间、目的地、工作日、工作时间、节假日、赛事、赛事等因素都是在该准则下寻找最佳路线的重要因素。本文提出了两个新的模型,目的是为出行者推荐到达目的地的最佳路线。这两个模型分别是多变量类探索和路径引导模型。多变量类探索模型对网络流模式进行分析,考察需求条件、信息遵从性、速度和行程时间方差等重要因素,并计算行程时间缩减量。利用路径引导模型寻找出行最有效的路径(出行时间最小)。本文在OpenStreetMap收集的真实数据集上进行了实验。该模型预测的准确性得到了验证。结果表明,模型预测结果准确,可以应用于实际情况。
{"title":"Simulation of the Adaptive Multivariate Exploration for Routes Guidance","authors":"W. Romsaiyud","doi":"10.1109/INCoS.2013.19","DOIUrl":"https://doi.org/10.1109/INCoS.2013.19","url":null,"abstract":"Nowadays, Navigation systems have become very popular and necessary for travelers from all around the world. Navigation systems give travelers all the information they need and guide them quickly and comfortably to get to the destination. Pre-trip planning regarding road and traffic conditions can enhance driver's knowledge of the situation in road networks and can assist in drivers' decisions concerning routes and departure times. Many factors such as the route density, traffic volume, departure time, destination, workday, working time, holiday period, tournaments and events are important to find the best route under the criterion. In this paper presented two new models with the purpose of recommending travelers the best route to destination. These two models are the multivariate class exploration and route guidance models. The multivariate class exploration model analyzes the network-flow patterns in order to investigate some important factors such as demand conditions, compliance with information, speed and variance of travel-time and calculate a travel-time reduction. A route guidance model was used to find efficient routes (minimizing travel time) for traveling. This paper conducted experiments on a real-world dataset collected from the OpenStreetMap. The accuracy of the proposed model's predictions was determined. The results show that the predictions given by the models are accurate and can be used in real-life situations.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117242277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1