The integration of heterogeneous wireless networks allows the users to benefit simultaneously from these radio access technology (RAT) and they can also use an important number of applications. New applications constraints are more complex and may be change dynamically and rapidly under time. The handover mechanism is responsible to guarantee the required quality of service when users roam across different RAT in order to provide an ubiquitous environment. With the diversification of the context metrics allowed by these networks, the level of computationally and complexity has a direct impact on the perceived quality of service especially of the network selection process on application performance. The present work addresses the network selection process, which is probably the most important key of the vertical handover decision mechanism. It proposes a modification of the Simple Additive Weighting called Enhanced-Simple Additive Weighting (E-SAW) for ranking networks that avoid computational cheaper by eliminating network access which does not satisfy a minimum required context. After ranking, in order to avoid bad network selection which does not respond to user requirement, we define handover decision scheme that improves network performances perceived by end users and avoid the processing delay caused by unnecessary handover.
{"title":"Vertical Handover Decision Policy Based on the End User's Perceived Quality of Service","authors":"Sassi Maaloul, Mériem Afif, S. Tabbane","doi":"10.1109/WAINA.2013.127","DOIUrl":"https://doi.org/10.1109/WAINA.2013.127","url":null,"abstract":"The integration of heterogeneous wireless networks allows the users to benefit simultaneously from these radio access technology (RAT) and they can also use an important number of applications. New applications constraints are more complex and may be change dynamically and rapidly under time. The handover mechanism is responsible to guarantee the required quality of service when users roam across different RAT in order to provide an ubiquitous environment. With the diversification of the context metrics allowed by these networks, the level of computationally and complexity has a direct impact on the perceived quality of service especially of the network selection process on application performance. The present work addresses the network selection process, which is probably the most important key of the vertical handover decision mechanism. It proposes a modification of the Simple Additive Weighting called Enhanced-Simple Additive Weighting (E-SAW) for ranking networks that avoid computational cheaper by eliminating network access which does not satisfy a minimum required context. After ranking, in order to avoid bad network selection which does not respond to user requirement, we define handover decision scheme that improves network performances perceived by end users and avoid the processing delay caused by unnecessary handover.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A de-regulated supply chain network allows providers and requesters to freely engage with each other without having to go through the pre-agreed supply chain channels. This poses a potentially complex situation with a high degree of uncertainty in an e-business environment where the size of the marketplace can grow very rapidly. Inference is a way of discovering the best use of resources to reach a balance between supply and demand. It is a solution to help establish a designated relationship between supplier and requester. In this paper, we share the experience of developing concurrent inferences and reasoning on the supply chain network to ensure the efficient establishment of channels between suppliers and requester. The focus will be on the design and implementation of the concurrent inference process on the supply chain and comes with preliminary experimental results.
{"title":"Experience in Developing Concurrent Inferences on a De-regulated Supply Chain Network","authors":"P. Moynihan, W. Dai","doi":"10.1109/WAINA.2013.110","DOIUrl":"https://doi.org/10.1109/WAINA.2013.110","url":null,"abstract":"A de-regulated supply chain network allows providers and requesters to freely engage with each other without having to go through the pre-agreed supply chain channels. This poses a potentially complex situation with a high degree of uncertainty in an e-business environment where the size of the marketplace can grow very rapidly. Inference is a way of discovering the best use of resources to reach a balance between supply and demand. It is a solution to help establish a designated relationship between supplier and requester. In this paper, we share the experience of developing concurrent inferences and reasoning on the supply chain network to ensure the efficient establishment of channels between suppliers and requester. The focus will be on the design and implementation of the concurrent inference process on the supply chain and comes with preliminary experimental results.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129117239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Demongeot, O. Cohen, A. Doncescu, A. Henrion-Caude
MicroRNAs are parts of nuclear and mitochondrial genomes which pertain to the not coding genome. They have a partly unspecific role of inhibition, preventing the weakest part of the genetic regulatory networks to be expressed and preventing the appearance of a too large number of attractors in these networks, i.e., forcing the network to have only one or two possible dynamic behaviours for fulfilling a precise function. They have also a great influence on the chromatin clock, which ensures the real mode of updating of genetic regulatory networks. We analyze this influence as well as their impact on important functions like p53 network control.
{"title":"MitomiRs and Energetic Regulation","authors":"J. Demongeot, O. Cohen, A. Doncescu, A. Henrion-Caude","doi":"10.1109/WAINA.2013.89","DOIUrl":"https://doi.org/10.1109/WAINA.2013.89","url":null,"abstract":"MicroRNAs are parts of nuclear and mitochondrial genomes which pertain to the not coding genome. They have a partly unspecific role of inhibition, preventing the weakest part of the genetic regulatory networks to be expressed and preventing the appearance of a too large number of attractors in these networks, i.e., forcing the network to have only one or two possible dynamic behaviours for fulfilling a precise function. They have also a great influence on the chromatin clock, which ensures the real mode of updating of genetic regulatory networks. We analyze this influence as well as their impact on important functions like p53 network control.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114520757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.
{"title":"A Protocol for Authentication with Multiple Levels of Anonymity (AMLA) in VANETs","authors":"N. S. Bhavesh, Soumyadev Maity, R. Hansdah","doi":"10.1109/WAINA.2013.4","DOIUrl":"https://doi.org/10.1109/WAINA.2013.4","url":null,"abstract":"The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116211397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The issue of multi-item queries in wireless broadcasting systems has received considerable interest recently. Two problems, namely query starvation and bandwidth utilization, have been identified as key issues that need to be solved. In this paper, we examine this problem in the context of VANETs with multiple cooperating Road Side Units (RSUs). We characterize a query with two deadlines: query total deadline (QTD) which is the actual deadline of a query and query local deadline (QLD) which is the duration a vehicle dwells in an RSU range after submitting that query. By careful consideration of these deadlines, vehicle speed, RSU range and inter-RSU distance, we propose a Cooperative Query Serving (CQS)approach which allows multiple RSUs to share residual bandwidth, deal effectively with both the query starvation and the bandwidth utilization problem and hence maximize the chance of serving multiple items queries. Simulation results show CQS outperforms other scheduling algorithms.
{"title":"On Scheduling Real-Time Multi-item Queries in Multi-RSU Vehicular Ad Hoc Networks (VANETs)","authors":"G. Ali, E. Chan, Wenzhong Li","doi":"10.1109/WAINA.2013.25","DOIUrl":"https://doi.org/10.1109/WAINA.2013.25","url":null,"abstract":"The issue of multi-item queries in wireless broadcasting systems has received considerable interest recently. Two problems, namely query starvation and bandwidth utilization, have been identified as key issues that need to be solved. In this paper, we examine this problem in the context of VANETs with multiple cooperating Road Side Units (RSUs). We characterize a query with two deadlines: query total deadline (QTD) which is the actual deadline of a query and query local deadline (QLD) which is the duration a vehicle dwells in an RSU range after submitting that query. By careful consideration of these deadlines, vehicle speed, RSU range and inter-RSU distance, we propose a Cooperative Query Serving (CQS)approach which allows multiple RSUs to share residual bandwidth, deal effectively with both the query starvation and the bandwidth utilization problem and hence maximize the chance of serving multiple items queries. Simulation results show CQS outperforms other scheduling algorithms.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114164982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The changing demographic profile of the population has potentially challenging social, geopolitical, and financial consequences for individuals, families, the wider society, and governments globally. The demographic change will result in a rapidly growing elderly population with healthcare implications including Alzheimer type conditions (a leading cause of dementia). Dementia requires long term care to manage the negative behavioral symptoms which are primarily exhibited in terms of agitation and aggression. This paper considers the issues and challenges implicit in the management of Alzheimer type conditions and dementia with a discussion around independent assisted living. Context is introduced with consideration of contextual information and the nature of knowledge. Context processing is discussed. We postulate that the challenges lie in the effective realization of independent assisted living, achieving this remains an open research question.
{"title":"Towards Independent Assisted Living: The Application of Intelligent Context-Aware Systems","authors":"P. Moore, Cain Evans, G. Tadros","doi":"10.1109/WAINA.2013.49","DOIUrl":"https://doi.org/10.1109/WAINA.2013.49","url":null,"abstract":"The changing demographic profile of the population has potentially challenging social, geopolitical, and financial consequences for individuals, families, the wider society, and governments globally. The demographic change will result in a rapidly growing elderly population with healthcare implications including Alzheimer type conditions (a leading cause of dementia). Dementia requires long term care to manage the negative behavioral symptoms which are primarily exhibited in terms of agitation and aggression. This paper considers the issues and challenges implicit in the management of Alzheimer type conditions and dementia with a discussion around independent assisted living. Context is introduced with consideration of contextual information and the nature of knowledge. Context processing is discussed. We postulate that the challenges lie in the effective realization of independent assisted living, achieving this remains an open research question.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127384570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The present paper is aimed at developing a multi-variable traffic model of a Wi-Fi data network that allows estimating throughput mean values. In order to construct the model, data corresponding to an 8-host wireless ad-hoc network were collected using a software package called Wire Shark, the network was specially designed for modeling purposes. Subsequently, the most convenient multi-variable models were estimated according to the traffic features extracted from the collected data. Results were the evaluated using a software package called STATA, leading to the establishment of significant explanatory variables for the model and its performance levels. For our Wi-Fi network, results show that the analyzed traffic exhibits self-similarity features. Additionally, model coefficients and their corresponding significance levels are shown in various tables. Finally, an explanatory multivariable model consisting of four variables was produced on the basis of ordinary least-squares methodologies (with a per-cent error of 22, 16). The findings suggest that the multi-variable traffic model produced in this study allows a reliable analysis of throughput mean values, however, the model is limited when predicting traffic values for data outside the selected estimation set.
{"title":"A Proposal of Traffic Model That Allows Estimating Throughput Mean Values","authors":"C. A. H. Suarez, L.F. Pedraza, C. Salgado","doi":"10.1109/WAINA.2013.216","DOIUrl":"https://doi.org/10.1109/WAINA.2013.216","url":null,"abstract":"The present paper is aimed at developing a multi-variable traffic model of a Wi-Fi data network that allows estimating throughput mean values. In order to construct the model, data corresponding to an 8-host wireless ad-hoc network were collected using a software package called Wire Shark, the network was specially designed for modeling purposes. Subsequently, the most convenient multi-variable models were estimated according to the traffic features extracted from the collected data. Results were the evaluated using a software package called STATA, leading to the establishment of significant explanatory variables for the model and its performance levels. For our Wi-Fi network, results show that the analyzed traffic exhibits self-similarity features. Additionally, model coefficients and their corresponding significance levels are shown in various tables. Finally, an explanatory multivariable model consisting of four variables was produced on the basis of ordinary least-squares methodologies (with a per-cent error of 22, 16). The findings suggest that the multi-variable traffic model produced in this study allows a reliable analysis of throughput mean values, however, the model is limited when predicting traffic values for data outside the selected estimation set.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125421835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article describes the conceptual design of a mobile enterprise application prototype that supports mobile knowledge workers, especially IT-Consultants in the exercise of their activities. The demands on flexibility and accessibility of employees as well as cost pressure in the company are growing. Furthermore, the line between professional and private activities is blurring. Major goals by providing mobile apps within the enterprise are to reduce problems of information retrieval and notification and to increase the efficiency of workers as well. As part of a joint project with Microsoft and Dissert, a company focused on the distribution of CRM software, specific requirements for the mobile workforce were identified and implemented as a prototype. This paper describes the requirements engineering and the implementation of an application, which is based on the information behavior of IT-Consultants.
{"title":"Specification of mCRM Enterprise Applications to Support IT-Consultants","authors":"Tobias Brockmann, Stefan Stieglitz","doi":"10.1109/WAINA.2013.211","DOIUrl":"https://doi.org/10.1109/WAINA.2013.211","url":null,"abstract":"This article describes the conceptual design of a mobile enterprise application prototype that supports mobile knowledge workers, especially IT-Consultants in the exercise of their activities. The demands on flexibility and accessibility of employees as well as cost pressure in the company are growing. Furthermore, the line between professional and private activities is blurring. Major goals by providing mobile apps within the enterprise are to reduce problems of information retrieval and notification and to increase the efficiency of workers as well. As part of a joint project with Microsoft and Dissert, a company focused on the distribution of CRM software, specific requirements for the mobile workforce were identified and implemented as a prototype. This paper describes the requirements engineering and the implementation of an application, which is based on the information behavior of IT-Consultants.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125808735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuto Sekin, Noriki Uchida, Y. Shibata, N. Shiratori
In this paper, we introduce Software Defined Network framework based on dynamic network reconfiguration method to improve the connectivity. Our network system is consisted of multiple mobile routers based on currently available wireless LANs including IEEE802.11b, g, j, n, IEEE802.16 (WiMAX), cellular networks, satellite IP network and green energy. Those wireless networks are interconnected by OpenFlow Switch and their links and routes are managed by OpenFlow Controller. The proper communication links and routes can be selected based on the required network characteristic, such as electro-magnetic field strength, throughput, latency, packet loss rate and communication distance. User can continue to transmit/receive the disaster information in disaster area even though a part of the network infrastructure is damaged due to the disaster using OpenFlow framework as software defined architecture and green based energy. In this paper, we designed and implemented a disaster information wireless network with currently available different wireless LANs and constructed a prototype system to evaluate the performance of the mobile router.
本文引入了基于动态网络重构方法的软件定义网络框架,以提高网络的连通性。我们的网络系统由多个移动路由器组成,基于现有的无线局域网,包括IEEE802.11b, g, j, n, IEEE802.16 (WiMAX),蜂窝网络,卫星IP网络和绿色能源。这些无线网络通过OpenFlow Switch互联,其链路和路由由OpenFlow Controller管理。根据需要的网络特性,如电磁场强度、吞吐量、时延、丢包率、通信距离等,选择合适的通信链路和路由。使用OpenFlow框架作为软件定义架构和绿色能源,即使部分网络基础设施因灾害而受损,用户也可以继续在灾区发送/接收灾害信息。本文利用现有的不同无线局域网设计并实现了一个灾害信息无线网络,并构建了一个原型系统来评估移动路由器的性能。
{"title":"Disaster Information Network Based on Software Defined Network Framework","authors":"Yuto Sekin, Noriki Uchida, Y. Shibata, N. Shiratori","doi":"10.1109/WAINA.2013.226","DOIUrl":"https://doi.org/10.1109/WAINA.2013.226","url":null,"abstract":"In this paper, we introduce Software Defined Network framework based on dynamic network reconfiguration method to improve the connectivity. Our network system is consisted of multiple mobile routers based on currently available wireless LANs including IEEE802.11b, g, j, n, IEEE802.16 (WiMAX), cellular networks, satellite IP network and green energy. Those wireless networks are interconnected by OpenFlow Switch and their links and routes are managed by OpenFlow Controller. The proper communication links and routes can be selected based on the required network characteristic, such as electro-magnetic field strength, throughput, latency, packet loss rate and communication distance. User can continue to transmit/receive the disaster information in disaster area even though a part of the network infrastructure is damaged due to the disaster using OpenFlow framework as software defined architecture and green based energy. In this paper, we designed and implemented a disaster information wireless network with currently available different wireless LANs and constructed a prototype system to evaluate the performance of the mobile router.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126563787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Users employ various communication services such as browser-based remote assistance to support voice communication in a call center. However, there is an issue with web services regarding smooth communication due to out-of-synchronization of output time on browsers in an environment where network delay and rendering time fluctuates among devices. This status is perceived as being somewhat strange, or even irritating. Several methods have been studied to prevent out-of-synchronization for real-time services such as voice and video. We also target synchronization of browser operations (e.g. page movement) for web services. We propose a novel web synchronization method (WSM). WSM continues to synchronize the output time of web content among browsers. Synchronized output is realized by controlling the time to notify each browser of browser operations, and by controlling the time to send web content according to network delay and rendering performance. For usability, WSM is unnecessary for installing new software on a browser. We implemented a prototype system and measured the difference in the output time among browsers. The results show that WSM achieves web synchronization within about 300 ms (target time: 400 ms).
{"title":"A Novel Web Synchronization Method for Supporting Smooth Web Communication","authors":"K. Tasaka, Takashi Ozu, A. Idoue","doi":"10.1109/WAINA.2013.122","DOIUrl":"https://doi.org/10.1109/WAINA.2013.122","url":null,"abstract":"Users employ various communication services such as browser-based remote assistance to support voice communication in a call center. However, there is an issue with web services regarding smooth communication due to out-of-synchronization of output time on browsers in an environment where network delay and rendering time fluctuates among devices. This status is perceived as being somewhat strange, or even irritating. Several methods have been studied to prevent out-of-synchronization for real-time services such as voice and video. We also target synchronization of browser operations (e.g. page movement) for web services. We propose a novel web synchronization method (WSM). WSM continues to synchronize the output time of web content among browsers. Synchronized output is realized by controlling the time to notify each browser of browser operations, and by controlling the time to send web content according to network delay and rendering performance. For usability, WSM is unnecessary for installing new software on a browser. We implemented a prototype system and measured the difference in the output time among browsers. The results show that WSM achieves web synchronization within about 300 ms (target time: 400 ms).","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}