首页 > 最新文献

2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications最新文献

英文 中文
The Design of a Web-Based Multimedia Sport Instructional System 基于web的多媒体体育教学系统的设计
Kosuke Takano, K. F. Li, M. G. Johnson
With the advances in computer technology, many systems have been developed for educational and instructional purposes. In particular, a computer-based system is very attractive in sports instruction and training as compared to the traditional human coaching approach, saving time, space, and cost. Among several important technical issues to be resolved in such sports instructional systems, motion or gesture capture and the organization of the database are the major ones. Of course, the most successful implementations are the systems from the gaming industry. In this work, we briefly discuss these commercial technologies and systems. A prototype system for learning tennis is introduced. Various techniques for motion capture are described and discussed. An event-based motion detecting and matching algorithm for capturing tennis swings from people of different size is presented. Finally, a framework for a Web-based generic sport system is presented.
随着计算机技术的进步,许多用于教育和教学目的的系统被开发出来。特别是,与传统的人工教练方法相比,基于计算机的系统在体育教学和训练中非常有吸引力,节省了时间、空间和成本。在这类体育教学系统中需要解决的几个重要技术问题中,动作或手势的捕捉和数据库的组织是主要的技术问题。当然,最成功的执行是来自游戏行业的系统。在这项工作中,我们简要地讨论了这些商业技术和系统。介绍了一个网球学习的原型系统。各种技术的运动捕捉描述和讨论。提出了一种基于事件的运动检测与匹配算法,用于捕捉不同体型人群的网球挥拍动作。最后,提出了一个基于web的通用体育系统框架。
{"title":"The Design of a Web-Based Multimedia Sport Instructional System","authors":"Kosuke Takano, K. F. Li, M. G. Johnson","doi":"10.1109/WAINA.2011.141","DOIUrl":"https://doi.org/10.1109/WAINA.2011.141","url":null,"abstract":"With the advances in computer technology, many systems have been developed for educational and instructional purposes. In particular, a computer-based system is very attractive in sports instruction and training as compared to the traditional human coaching approach, saving time, space, and cost. Among several important technical issues to be resolved in such sports instructional systems, motion or gesture capture and the organization of the database are the major ones. Of course, the most successful implementations are the systems from the gaming industry. In this work, we briefly discuss these commercial technologies and systems. A prototype system for learning tennis is introduced. Various techniques for motion capture are described and discussed. An event-based motion detecting and matching algorithm for capturing tennis swings from people of different size is presented. Finally, a framework for a Web-based generic sport system is presented.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131750521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Implementation of a Web 2.0 Service Platform for DPWS-Based Home-Appliances in the Cloud Environment 云环境下基于dpws的家用电器Web 2.0服务平台的设计与实现
Chung-Ming Huang, Hao-Hsiang Ku, Yen-Wen Chen
Cloud computing has been evolved as a key computing platform for sharing resources and services. People should have a relatively convenient environment and life for handling home-appliances. This study designs and develops a Web 2.0 Service Platform (WSP) for DPWS-based Home-appliances in the Cloud environment, which is composed of mobile users, home appliances and the cloud environment. WSP automatically records and observes user's behaviors to adapt related home-appliances based on the ontology technique. A mobile user can use a smart phone to control and handle home-appliances through Web2.0 Blog-based interfaces. Finally, WSP can be an inference model for researchers when developing home-appliance controllers in the future.
云计算已经发展成为共享资源和服务的关键计算平台。人们应该有一个相对方便的环境和生活来处理家电。本研究设计并开发了一个基于dpws的云环境下的家用电器Web 2.0服务平台(WSP),该平台由移动用户、家用电器和云环境组成。WSP基于本体技术,自动记录和观察用户的行为,以适应相关的家电产品。移动用户可以使用智能手机通过基于Web2.0 blog的界面来控制和操作家用电器。最后,WSP可以成为未来研究人员开发家电控制器时的一个推理模型。
{"title":"Design and Implementation of a Web 2.0 Service Platform for DPWS-Based Home-Appliances in the Cloud Environment","authors":"Chung-Ming Huang, Hao-Hsiang Ku, Yen-Wen Chen","doi":"10.1109/WAINA.2011.32","DOIUrl":"https://doi.org/10.1109/WAINA.2011.32","url":null,"abstract":"Cloud computing has been evolved as a key computing platform for sharing resources and services. People should have a relatively convenient environment and life for handling home-appliances. This study designs and develops a Web 2.0 Service Platform (WSP) for DPWS-based Home-appliances in the Cloud environment, which is composed of mobile users, home appliances and the cloud environment. WSP automatically records and observes user's behaviors to adapt related home-appliances based on the ontology technique. A mobile user can use a smart phone to control and handle home-appliances through Web2.0 Blog-based interfaces. Finally, WSP can be an inference model for researchers when developing home-appliance controllers in the future.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Novel Mechanism to Improve Handover Efficiency Considering the Duplicate Address Occurs in HMIPv6 一种考虑重复地址的HMIPv6中提高切换效率的机制
Yuhan Chen, T. Wu, Wei-Tsong Lee
Numerous researches about Mobile IPv6 (MIPv6) have been proposed recently and the handover delay of the Mobile Nodes (MNs) among different networks is surely a worthy noticing issue. There are three major reasons for the MIPv6 handover delay: Movement Detection, Duplicate Address Detection (DAD), and Binding Update (BU), in, which DAD occupies most of the MIPv6 handover delay and influences real-time services greatly. No previous paper mentions how to reconfigure another unique Care of Address (CoA) when the generated CoA is used by other nodes during the DAD, and how to generate a unique CoA to accelerate the handover, reduce the handover delay and avoid the packet loss during the handover. To avert the problems that worsen the handover latency and the packet loss, this paper presents a Fast-Reconfigure Address Mechanism (F-RAM) to generate a unique CoA rapidly when duplicate address occurs, to evade the occurrence of the second duplication, and to reconfigure a unique address quickly. Our experiment results prove that our proposed scheme indeed reduces the handover delay and the packet loss when the CoA is duplicated.
近年来,人们对移动IPv6 (MIPv6)进行了大量的研究,其中移动节点(MNs)在不同网络之间的切换延迟是一个值得关注的问题。造成MIPv6切换延迟的原因主要有三个:运动检测、重复地址检测和绑定更新。其中,绑定更新占据了MIPv6切换延迟的大部分,对实时业务影响较大。之前没有论文提到如何在DAD过程中,当生成的CoA被其他节点使用时,重新配置另一个唯一的CoA (Care of Address),以及如何生成唯一的CoA来加速切换,减少切换延迟,避免切换过程中的丢包。为了避免切换延迟和丢包问题,本文提出了一种快速重配置地址机制(F-RAM),在出现重复地址时快速生成唯一CoA,避免第二次重复的发生,并快速重新配置唯一地址。实验结果表明,该方案确实降低了重复CoA时的切换延迟和丢包。
{"title":"A Novel Mechanism to Improve Handover Efficiency Considering the Duplicate Address Occurs in HMIPv6","authors":"Yuhan Chen, T. Wu, Wei-Tsong Lee","doi":"10.1109/WAINA.2011.65","DOIUrl":"https://doi.org/10.1109/WAINA.2011.65","url":null,"abstract":"Numerous researches about Mobile IPv6 (MIPv6) have been proposed recently and the handover delay of the Mobile Nodes (MNs) among different networks is surely a worthy noticing issue. There are three major reasons for the MIPv6 handover delay: Movement Detection, Duplicate Address Detection (DAD), and Binding Update (BU), in, which DAD occupies most of the MIPv6 handover delay and influences real-time services greatly. No previous paper mentions how to reconfigure another unique Care of Address (CoA) when the generated CoA is used by other nodes during the DAD, and how to generate a unique CoA to accelerate the handover, reduce the handover delay and avoid the packet loss during the handover. To avert the problems that worsen the handover latency and the packet loss, this paper presents a Fast-Reconfigure Address Mechanism (F-RAM) to generate a unique CoA rapidly when duplicate address occurs, to evade the occurrence of the second duplication, and to reconfigure a unique address quickly. Our experiment results prove that our proposed scheme indeed reduces the handover delay and the packet loss when the CoA is duplicated.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131963953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID 网格高速协议数据传输的实验与实现
D. Bernardo, D. Hoang
Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based DataTransport Protocol). UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, including wide area optical networks. It is considered a state-of-the-art protocol, which promptly addresses various infrastructure requirements for transmitting data in high-speed networks. Its development, however, creates new vulnerabilities because like many other protocols, it is designed to rely solely on existing security mechanisms for existing protocols such as the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of these security mechanisms cannot be used to absolutely protect UDT, just as security mechanisms devised for wired networks cannot be used to protect unwired ones. Both the recently developed UDT and the decades-old TCP/UDP lack a well-thought-out security architecture that addresses problems in today’snetworks. In this paper, we extend our previous work and implement our developed security methodology that can assist network and security investigators, designers, and users who consider and incorporate security when implementing UDT across wide area networks. These can support security architectural designs of UDP-based protocols as well as assist in the future development of other state-of-the-art fast data transfer protocols.
许多TCP协议变体在仿真和一些有限的网络实验中显示出更好的性能。然而,由于实现和安装困难,这些协议在实际应用中的实际使用仍然非常有限。另一方面,需要传输大量数据(例如,英格丽/云计算)的用户通常会转向应用级解决方案,而这些变体并不能很好地发挥作用。应用层解决方案中考虑的协议包括基于udp的协议,如UDT(基于udp的数据传输协议)。UDT被认为是最近开发的具有拥塞控制算法的新传输协议之一。它的开发是为了支持下一代高速网络,包括广域光网络。它被认为是最先进的协议,可以迅速解决高速网络中传输数据的各种基础设施要求。然而,它的开发产生了新的漏洞,因为像许多其他协议一样,它被设计为仅依赖于现有协议的现有安全机制,如传输控制协议(TCP)和用户数据报协议(UDP)。其中一些安全机制不能用于绝对保护UDT,正如为有线网络设计的安全机制不能用于保护非有线网络一样。最近开发的UDT和几十年前的TCP/UDP都缺乏一个经过深思熟虑的安全架构来解决当今网络中的问题。在本文中,我们扩展了我们以前的工作并实现了我们开发的安全方法,可以帮助网络和安全调查人员、设计人员和在跨广域网实施UDT时考虑并纳入安全性的用户。它们可以支持基于udp的协议的安全体系结构设计,并有助于未来开发其他最先进的快速数据传输协议。
{"title":"Empirical Survey: Experimentation and Implementations of High Speed Protocol Data Transfer for GRID","authors":"D. Bernardo, D. Hoang","doi":"10.1109/WAINA.2011.42","DOIUrl":"https://doi.org/10.1109/WAINA.2011.42","url":null,"abstract":"Many TCP protocol variants have demonstrated better performance in simulation and several limited network experiments. However, practical use in real applications of these protocols is still very limited because of the implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., ingrid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based DataTransport Protocol). UDT is considered one of the most recently developed new transport protocols with congestion control algorithms. It was developed to support next generation high-speed networks, including wide area optical networks. It is considered a state-of-the-art protocol, which promptly addresses various infrastructure requirements for transmitting data in high-speed networks. Its development, however, creates new vulnerabilities because like many other protocols, it is designed to rely solely on existing security mechanisms for existing protocols such as the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Some of these security mechanisms cannot be used to absolutely protect UDT, just as security mechanisms devised for wired networks cannot be used to protect unwired ones. Both the recently developed UDT and the decades-old TCP/UDP lack a well-thought-out security architecture that addresses problems in today’snetworks. In this paper, we extend our previous work and implement our developed security methodology that can assist network and security investigators, designers, and users who consider and incorporate security when implementing UDT across wide area networks. These can support security architectural designs of UDP-based protocols as well as assist in the future development of other state-of-the-art fast data transfer protocols.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132183594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Proposal and Evaluation of an Extraction Method for Inaccurate Example Sentences Using a Web Search Engine for Multilingual Parallel Texts 基于Web搜索引擎的多语言平行文本不准确例句提取方法的提出与评价
T. Fukushima, T. Yoshino, Aguri Shigeno
In this study, we have proposed an extraction method for inaccurate example sentences using a Web search engine for multilingual parallel texts. We developed a multilingual parallel-text sharing system named Tack Pad for multilingual communication in the medical field. However, it should be noted that parallel texts created by people can be inaccurate. Hence, we cannot use these parallel texts in fields where high levels of accuracy are required. Moreover, it is difficult for people to evaluate the parallel texts enough because these are large in number. Therefore, we proposed and evaluated an extraction method for inaccurate example sentences. This method uses the contents on the Web as wisdom of crowds. It splits an example sentence into n-grams and uses the Web search engine to locate the split words. Moreover, this method uses two thresholds to detect several mistakes which are typographical errors, grammatical errors, and so on. The contributions of this paper are the following results: (1) We proposed an extraction method that improves the accuracy of the example sentences using the Web search engine and (2) We showed an improvement in the accuracy of the example sentences using two thresholds.
在这项研究中,我们提出了一种基于Web搜索引擎的多语言平行文本不准确例句提取方法。针对医学领域的多语种交流,我们开发了多语种并行文本共享系统Tack Pad。然而,应该注意的是,人们创造的平行文本可能是不准确的。因此,我们不能在要求高准确度的字段中使用这些平行文本。此外,由于数量众多,人们很难对平行文本进行充分的评价。因此,我们提出并评估了一种不准确例句的提取方法。这种方法利用网络上的内容作为群体的智慧。它将一个示例句子分成n个图,并使用Web搜索引擎来定位被分割的单词。此外,该方法使用两个阈值来检测印刷错误、语法错误等几种错误。本文的贡献如下:(1)我们提出了一种使用Web搜索引擎提高例句提取精度的方法;(2)我们展示了使用两个阈值提高例句提取精度的方法。
{"title":"Proposal and Evaluation of an Extraction Method for Inaccurate Example Sentences Using a Web Search Engine for Multilingual Parallel Texts","authors":"T. Fukushima, T. Yoshino, Aguri Shigeno","doi":"10.1109/WAINA.2011.97","DOIUrl":"https://doi.org/10.1109/WAINA.2011.97","url":null,"abstract":"In this study, we have proposed an extraction method for inaccurate example sentences using a Web search engine for multilingual parallel texts. We developed a multilingual parallel-text sharing system named Tack Pad for multilingual communication in the medical field. However, it should be noted that parallel texts created by people can be inaccurate. Hence, we cannot use these parallel texts in fields where high levels of accuracy are required. Moreover, it is difficult for people to evaluate the parallel texts enough because these are large in number. Therefore, we proposed and evaluated an extraction method for inaccurate example sentences. This method uses the contents on the Web as wisdom of crowds. It splits an example sentence into n-grams and uses the Web search engine to locate the split words. Moreover, this method uses two thresholds to detect several mistakes which are typographical errors, grammatical errors, and so on. The contributions of this paper are the following results: (1) We proposed an extraction method that improves the accuracy of the example sentences using the Web search engine and (2) We showed an improvement in the accuracy of the example sentences using two thresholds.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Analysis of Transactional-, Capacity-Driven Web Services 事务性、容量驱动的Web服务的概念分析
Z. Maamar, Sami Bhiri, S. Tata, Khouloud Boukadi, W. Mansoor
This paper examines capacity-driven Web services from a transactional perspective. Such services are empowered with different sets of operations that are selectively triggered in response to requirements posed on them and hence, need to be satisfied. Each set of operations forms a capacity that either fails or succeeds at run-time. In case of failure and for the sake of business continuity, a capacity driven Web service binds to some transactional properties such as pivot, retriable, and compensatable, and behaves in accordance with the guidelines that each transactional property sets. This paper, also, shows that the particular nature of capacity-driven Web services calls for reviewing these transactional properties’ guidelines.
本文从事务的角度考察了容量驱动的Web服务。这些服务被赋予不同的操作集,这些操作集被选择性地触发,以响应对它们提出的需求,因此需要得到满足。每组操作形成一个在运行时失败或成功的容量。在发生故障的情况下,出于业务连续性的考虑,容量驱动的Web服务绑定到一些事务属性,如pivot、retriable和compensatable,并按照每个事务属性设置的指导方针行事。本文还表明,容量驱动的Web服务的特殊性质要求审查这些事务性属性的指导方针。
{"title":"Conceptual Analysis of Transactional-, Capacity-Driven Web Services","authors":"Z. Maamar, Sami Bhiri, S. Tata, Khouloud Boukadi, W. Mansoor","doi":"10.1109/WAINA.2011.54","DOIUrl":"https://doi.org/10.1109/WAINA.2011.54","url":null,"abstract":"This paper examines capacity-driven Web services from a transactional perspective. Such services are empowered with different sets of operations that are selectively triggered in response to requirements posed on them and hence, need to be satisfied. Each set of operations forms a capacity that either fails or succeeds at run-time. In case of failure and for the sake of business continuity, a capacity driven Web service binds to some transactional properties such as pivot, retriable, and compensatable, and behaves in accordance with the guidelines that each transactional property sets. This paper, also, shows that the particular nature of capacity-driven Web services calls for reviewing these transactional properties’ guidelines.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description 利用自然语言工具辅助VPRG自动提取文本漏洞描述
H. Le, P. Loh
This paper presents an application of Natural Language Tool (NLT) to support the VPRG extraction of text based vulnerability description. The NLT is used to analyze the text-based vulnerability descriptions to retrieve vulnerability properties and evaluate their relationships. Then, a graph based VPRG model that describes the vulnerability can be established. Finally, with fine-tuning from domain expertise, the VPRG model can be useful for analyzing and evaluating web-based vulnerabilities. This approach is proposed to support automatic VPRG extraction from several online database resources as well as vulnerability analysis.
提出了一种应用自然语言工具(NLT)支持基于文本的漏洞描述VPRG提取的方法。NLT用于分析基于文本的漏洞描述,检索漏洞属性并评估它们之间的关系。然后,建立基于图的VPRG模型来描述该漏洞。最后,通过领域专家的微调,VPRG模型可以用于分析和评估基于web的漏洞。该方法支持从多个在线数据库资源中自动提取VPRG并进行漏洞分析。
{"title":"Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description","authors":"H. Le, P. Loh","doi":"10.1109/WAINA.2011.56","DOIUrl":"https://doi.org/10.1109/WAINA.2011.56","url":null,"abstract":"This paper presents an application of Natural Language Tool (NLT) to support the VPRG extraction of text based vulnerability description. The NLT is used to analyze the text-based vulnerability descriptions to retrieve vulnerability properties and evaluate their relationships. Then, a graph based VPRG model that describes the vulnerability can be established. Finally, with fine-tuning from domain expertise, the VPRG model can be useful for analyzing and evaluating web-based vulnerabilities. This approach is proposed to support automatic VPRG extraction from several online database resources as well as vulnerability analysis.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121260052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Yet Another Sanitizable and Deletable Signatures 又一个可消毒和可删除的签名
T. Izu, Masami Izumi, N. Kunihiro, K. Ohta
In 2008, Izu et al. introduced a concept of the sanitizable and deletable signature as a combination of the sanitizable signature and the deletable signature in which the partial information (e.g. privacy information) can be sanitized or deleted with keeping the integrity of disclosed parts. They also constructed two concrete sanitizable and deletable signature schemes SDS1 and SDS2. based on the deletable signature by Miyazaki et al. One of the distinguishing property of their schemes is that each subdocument has a status such as `SADP' (Sanitization is Allowed, but Deletion is Prohibited). Among 7 possible status, SDS1 supports only 4, while SDS2 does 6. This paper proposes a new sanitizable and deletable signature which supports all possible status with keeping the security and efficiency. In addition, we construct another sanitizable and deletable signature which supports 5 status.
2008年,Izu等人引入了可消毒和可删除签名的概念,作为可消毒签名和可删除签名的组合,其中可以对部分信息(例如隐私信息)进行消毒或删除,同时保持公开部分的完整性。他们还构建了两个具体的可消毒和可删除签名方案SDS1和SDS2。基于Miyazaki等人的可删除签名。他们的方案的一个显著特性是每个子文件都有一个状态,如“SADP”(允许消毒,但禁止删除)。在7种可能的状态中,SDS1只支持4种,而SDS2支持6种。本文提出了一种支持所有可能状态的可清理可删除签名,同时保证了签名的安全性和有效性。此外,我们构造了另一个支持5状态的可清理和可删除签名。
{"title":"Yet Another Sanitizable and Deletable Signatures","authors":"T. Izu, Masami Izumi, N. Kunihiro, K. Ohta","doi":"10.1109/WAINA.2011.117","DOIUrl":"https://doi.org/10.1109/WAINA.2011.117","url":null,"abstract":"In 2008, Izu et al. introduced a concept of the sanitizable and deletable signature as a combination of the sanitizable signature and the deletable signature in which the partial information (e.g. privacy information) can be sanitized or deleted with keeping the integrity of disclosed parts. They also constructed two concrete sanitizable and deletable signature schemes SDS1 and SDS2. based on the deletable signature by Miyazaki et al. One of the distinguishing property of their schemes is that each subdocument has a status such as `SADP' (Sanitization is Allowed, but Deletion is Prohibited). Among 7 possible status, SDS1 supports only 4, while SDS2 does 6. This paper proposes a new sanitizable and deletable signature which supports all possible status with keeping the security and efficiency. In addition, we construct another sanitizable and deletable signature which supports 5 status.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of Cloud Computing Delivery Architecture Models 云计算交付架构模型分析
Irena Bojanova, Augustine Samba
Cloud computing is one of the emerging technologies that will lead to the next generation of Internet. It provides optimized and efficient computing through enhanced collaboration, agility, scalability, and availability. In this paper, the evolution of the Cloud is discussed, the cloud computing model is explained, a set of cloud computing infrastructure metrics is listed, the cloud service model architectures are described, exemplary implementations of cloud service models are analyzed, and intriguing facts about cloud computing status and future are shared.
云计算是新兴技术之一,它将引领下一代互联网。它通过增强协作、敏捷性、可伸缩性和可用性来提供优化和高效的计算。在本文中,讨论了云的发展,解释了云计算模型,列出了一组云计算基础设施指标,描述了云服务模型架构,分析了云服务模型的示例实现,并分享了有关云计算现状和未来的有趣事实。
{"title":"Analysis of Cloud Computing Delivery Architecture Models","authors":"Irena Bojanova, Augustine Samba","doi":"10.1109/WAINA.2011.74","DOIUrl":"https://doi.org/10.1109/WAINA.2011.74","url":null,"abstract":"Cloud computing is one of the emerging technologies that will lead to the next generation of Internet. It provides optimized and efficient computing through enhanced collaboration, agility, scalability, and availability. In this paper, the evolution of the Cloud is discussed, the cloud computing model is explained, a set of cloud computing infrastructure metrics is listed, the cloud service model architectures are described, exemplary implementations of cloud service models are analyzed, and intriguing facts about cloud computing status and future are shared.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
QoS-Aware Middleware for Scalable Replication 可扩展复制的qos感知中间件
Raihan Al-Ekram, R. Holt
When using replication as a technique for achieving high performance and scalability, optimistic replication is the natural choice. But optimistic replication introduces uncertainty that may lead to confusion in the clients. For example consecutive requests from the same client may be processed out of order, or the answer from a query might be too old to be useful to the client, or an operation may cause unwanted side-effect in the system when the client times out due to long response time. In such situations the clients can benefit from being allowed to specify their tolerable levels of uncertainty, in other words their desired quality-of-service (QoS) from the system. This paper introduces a novel optimistic replication protocol QRep with its QoS-aware middleware that allows the clients' to specify the following three QoS parameters: (1) session guarantee, (2) freshness and (3) deadline. QRep attempts to fulfill the specified QoS while processing the requests. QRep supports both synchronous and asynchronous clients. We carried out experiments to demonstrate the effectiveness of the protocol in terms of both QoS fulfillment and scalability. We also demonstrated that there is no significant performance penalty for providing the QoS.
当使用复制作为实现高性能和可伸缩性的技术时,乐观复制是自然的选择。但是乐观复制引入了不确定性,这可能会导致客户的困惑。例如,来自同一客户机的连续请求可能被乱序处理,或者来自查询的答案可能太旧而对客户机无用,或者当客户机由于响应时间过长而超时时,操作可能会在系统中造成不必要的副作用。在这种情况下,允许客户端指定其可容忍的不确定性级别(换句话说,他们期望的系统服务质量(QoS))可以使客户端受益。本文介绍了一种新的乐观复制协议QRep及其QoS感知中间件,该中间件允许客户端指定以下三个QoS参数:(1)会话保证,(2)新鲜度和(3)截止日期。QRep在处理请求时尝试实现指定的QoS。QRep支持同步和异步客户机。我们进行了实验来证明该协议在QoS实现和可扩展性方面的有效性。我们还证明了提供QoS不会带来显著的性能损失。
{"title":"QoS-Aware Middleware for Scalable Replication","authors":"Raihan Al-Ekram, R. Holt","doi":"10.1109/WAINA.2011.33","DOIUrl":"https://doi.org/10.1109/WAINA.2011.33","url":null,"abstract":"When using replication as a technique for achieving high performance and scalability, optimistic replication is the natural choice. But optimistic replication introduces uncertainty that may lead to confusion in the clients. For example consecutive requests from the same client may be processed out of order, or the answer from a query might be too old to be useful to the client, or an operation may cause unwanted side-effect in the system when the client times out due to long response time. In such situations the clients can benefit from being allowed to specify their tolerable levels of uncertainty, in other words their desired quality-of-service (QoS) from the system. This paper introduces a novel optimistic replication protocol QRep with its QoS-aware middleware that allows the clients' to specify the following three QoS parameters: (1) session guarantee, (2) freshness and (3) deadline. QRep attempts to fulfill the specified QoS while processing the requests. QRep supports both synchronous and asynchronous clients. We carried out experiments to demonstrate the effectiveness of the protocol in terms of both QoS fulfillment and scalability. We also demonstrated that there is no significant performance penalty for providing the QoS.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1