首页 > 最新文献

2016 19th International Conference on Network-Based Information Systems (NBiS)最新文献

英文 中文
Fusion Visualization System as an Open Science Foundation 作为开放科学基金的融合可视化系统
H. Miyachi, K. Koyamada, D. Matsuoka, Isamu Kuroki
This is an introduction paper of a project named the same as the title which is supported by Japan Science and Technology Agency. We plan to develop an interactive visualization system with both volume and surface rendering and big data analysis functions. It is for two years project that started at April 1st in 2016. Integrating 1D, 2D and 3D visualization tools, we aim to provide a new post processing tool that assists to reveal a causal relationship between variables among big data. This paper introduces the basic concept and the fundamental visualization technologies implemented in the system.
这是一篇由日本科学技术振兴机构支持的与题目相同的项目的介绍论文。我们计划开发一个具有体面绘制和大数据分析功能的交互式可视化系统。该项目于2016年4月1日开始,为期两年。整合1D, 2D和3D可视化工具,我们的目标是提供一种新的后处理工具,帮助揭示大数据中变量之间的因果关系。本文介绍了系统的基本概念和实现的基本可视化技术。
{"title":"Fusion Visualization System as an Open Science Foundation","authors":"H. Miyachi, K. Koyamada, D. Matsuoka, Isamu Kuroki","doi":"10.1109/NBiS.2016.9","DOIUrl":"https://doi.org/10.1109/NBiS.2016.9","url":null,"abstract":"This is an introduction paper of a project named the same as the title which is supported by Japan Science and Technology Agency. We plan to develop an interactive visualization system with both volume and surface rendering and big data analysis functions. It is for two years project that started at April 1st in 2016. Integrating 1D, 2D and 3D visualization tools, we aim to provide a new post processing tool that assists to reveal a causal relationship between variables among big data. This paper introduces the basic concept and the fundamental visualization technologies implemented in the system.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116876521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social Media Mediation System for Elderly People: Message Exchange Learning Type Switching Method 老年人社交媒体调解系统:信息交换学习类型切换方法
Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai, T. Sakai, M. Fujimura
We proposed the Social Media Mediation Systemwhich can be used for the interactive communication betweenelderly people and younger generation via existed social media. In this system, we found out the problem that was the difficultyof inputting a message destination address by elderly people. Therefore, we propose a message exchange learning typeswitching method that enables elderly people not to input amessage destination address explicitly. This method is based onthe machine learning algorithm which performs the messagedestination decision according to message contents of elderlypeople. We developed a machine learning algorithm inferenceplatform to find out the suitable machine learning algorithm forthis purpose. Through inference experiments using this platform, we confirmed three machine learning algorithm candidateswhich could be suitable for the message exchange learning typeswitching method.
我们提出了社会媒体调解系统,可以通过现有的社会媒体进行老年人和年轻一代之间的互动交流。在这个系统中,我们发现了老年人在发送信息时难以输入目的地址的问题。因此,我们提出一种信息交换学习类型转换方法,使老年人不需要明确输入信息目的地址。该方法基于机器学习算法,根据老年人的消息内容进行消息目的地决策。我们开发了一个机器学习算法推理平台来寻找适合这一目的的机器学习算法。通过在该平台上的推理实验,我们确定了三种适合于消息交换学习类型转换方法的候选机器学习算法。
{"title":"Social Media Mediation System for Elderly People: Message Exchange Learning Type Switching Method","authors":"Toru Kobayashi, Kazushige Katsuragi, Taishi Miyazaki, Kenichi Arai, T. Sakai, M. Fujimura","doi":"10.1109/NBiS.2016.63","DOIUrl":"https://doi.org/10.1109/NBiS.2016.63","url":null,"abstract":"We proposed the Social Media Mediation Systemwhich can be used for the interactive communication betweenelderly people and younger generation via existed social media. In this system, we found out the problem that was the difficultyof inputting a message destination address by elderly people. Therefore, we propose a message exchange learning typeswitching method that enables elderly people not to input amessage destination address explicitly. This method is based onthe machine learning algorithm which performs the messagedestination decision according to message contents of elderlypeople. We developed a machine learning algorithm inferenceplatform to find out the suitable machine learning algorithm forthis purpose. Through inference experiments using this platform, we confirmed three machine learning algorithm candidateswhich could be suitable for the message exchange learning typeswitching method.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"48 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129978567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Topology Control Protocols for Underwater Sensor Networks 水下传感器网络的分布式拓扑控制协议
Hina Nasir, N. Javaid, Shaharyar Mahmood, U. Qasim, Z. Khan, F. Ahmed
Impairments of the acoustic channel impose the requirement of improvement in throughput efficiency of the network. Therefore, efficient mechanisms must be proposed to increase throughput while conserving energy at the same time. In this paper, we propose two energy efficient geographic opportunistic routing protocols for underwater wireless sensor networks called improved Distributed Topology Control (iDTC) and Power Adjustment Distributed Topology Control (PADTC). These protocols guarantee the delivery of data by dealing with communication void problem of geographic opportunistic routing. The recovery from void region is performed via depth adjustment and power adjustment of a void node. The protocols are validated via simulations. We compare the protocols with Distributed Topology Control (DTC) and results show that iDTC and PADTC consume less energy and perform minimum displacement in case of void node while maintaining the same throughput.
声信道的缺陷对网络的吞吐效率提出了更高的要求。因此,必须提出有效的机制,在提高吞吐量的同时节约能源。本文提出了两种用于水下无线传感器网络的高能效地理机会路由协议,即改进型分布式拓扑控制(iDTC)和功率调整分布式拓扑控制(PADTC)。这些协议通过解决地理机会路由的通信空白问题来保证数据的传输。空洞区域的恢复是通过空洞节点的深度调整和功率调整来实现的。通过仿真验证了协议的有效性。将其与分布式拓扑控制(DTC)进行了比较,结果表明,在保持相同吞吐量的情况下,iDTC和PADTC消耗的能量更少,在空隙节点情况下执行的位移最小。
{"title":"Distributed Topology Control Protocols for Underwater Sensor Networks","authors":"Hina Nasir, N. Javaid, Shaharyar Mahmood, U. Qasim, Z. Khan, F. Ahmed","doi":"10.1109/NBiS.2016.75","DOIUrl":"https://doi.org/10.1109/NBiS.2016.75","url":null,"abstract":"Impairments of the acoustic channel impose the requirement of improvement in throughput efficiency of the network. Therefore, efficient mechanisms must be proposed to increase throughput while conserving energy at the same time. In this paper, we propose two energy efficient geographic opportunistic routing protocols for underwater wireless sensor networks called improved Distributed Topology Control (iDTC) and Power Adjustment Distributed Topology Control (PADTC). These protocols guarantee the delivery of data by dealing with communication void problem of geographic opportunistic routing. The recovery from void region is performed via depth adjustment and power adjustment of a void node. The protocols are validated via simulations. We compare the protocols with Distributed Topology Control (DTC) and results show that iDTC and PADTC consume less energy and perform minimum displacement in case of void node while maintaining the same throughput.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Challenge of Deep Learning against CAPTCHA with Amodal Completion and Aftereffects by Colors 深度学习对抗CAPTCHA模态补全和颜色后效的挑战
Tomoka Azakami, Chihiro Shibata, R. Uda
We make experiments of machine learning for our CAPTCHA proposed as an effective CAPTCHA with amodal completion and aftereffects by colors. CAPTCHA is a method that distinguishes human beings from artificial intelligence in order to prohibit malicious programs from acquiring accounts on Internet. The most popular CAPTCHA is text-based CAPTCHA with distorted alphabets and numbers. However, it is known that all of text-based CAPTCHA algorithms can be analyzed by computers. In addition, too much distortion or noise prevents human beings from recognizing alphabets or numbers. As a solution of the problems, an effective text-based CAPTCHA algorithm with amodal completion was proposed by our team. Our CAPTCHA causes computers a large amount of calculation costs while amodal completion helps human beings to recognize characters momentarily. Our CAPTCHA has evolved with aftereffects and combinations of complementary colors. In this paper, we evaluate our CAPTCHA by machine learning since machine learning is faster and more accurate than existing calculations by a computer. We confirm the limitations of machine learning. Especially, we focus on whether a computer can recognize characters without knowledge of amodal completion.
我们对我们的CAPTCHA进行了机器学习实验,我们提出了一个有效的CAPTCHA,具有模态补全和颜色后遗症。CAPTCHA是一种区分人类和人工智能的方法,目的是阻止恶意程序在互联网上获取账户。最流行的验证码是基于文本的扭曲字母和数字的验证码。然而,众所周知,所有基于文本的验证码算法都可以通过计算机进行分析。此外,过多的失真或噪音使人们无法识别字母或数字。为了解决这些问题,我们团队提出了一种有效的基于文本的模式补全CAPTCHA算法。我们的CAPTCHA给计算机带来了大量的计算成本,而情态补全帮助人类瞬间识别字符。我们的验证码随着后续效果和互补色的组合而演变。在本文中,我们通过机器学习来评估我们的CAPTCHA,因为机器学习比现有的计算机计算更快、更准确。我们确认了机器学习的局限性。特别是,我们关注的是计算机是否可以在不知道模态补全的情况下识别字符。
{"title":"Challenge of Deep Learning against CAPTCHA with Amodal Completion and Aftereffects by Colors","authors":"Tomoka Azakami, Chihiro Shibata, R. Uda","doi":"10.1109/NBiS.2016.59","DOIUrl":"https://doi.org/10.1109/NBiS.2016.59","url":null,"abstract":"We make experiments of machine learning for our CAPTCHA proposed as an effective CAPTCHA with amodal completion and aftereffects by colors. CAPTCHA is a method that distinguishes human beings from artificial intelligence in order to prohibit malicious programs from acquiring accounts on Internet. The most popular CAPTCHA is text-based CAPTCHA with distorted alphabets and numbers. However, it is known that all of text-based CAPTCHA algorithms can be analyzed by computers. In addition, too much distortion or noise prevents human beings from recognizing alphabets or numbers. As a solution of the problems, an effective text-based CAPTCHA algorithm with amodal completion was proposed by our team. Our CAPTCHA causes computers a large amount of calculation costs while amodal completion helps human beings to recognize characters momentarily. Our CAPTCHA has evolved with aftereffects and combinations of complementary colors. In this paper, we evaluate our CAPTCHA by machine learning since machine learning is faster and more accurate than existing calculations by a computer. We confirm the limitations of machine learning. Especially, we focus on whether a computer can recognize characters without knowledge of amodal completion.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Intensive Analysis on the Usage Situation of the Mobile Services in Japanese High Schools: Why and How are They Used? 日本高中移动服务使用现状分析:为什么使用?如何使用?
T. Okada, J. Iio, Yoshihiko Kubota, T. Yonekura
In the arrest situation of the cybercrime in Japan, over half of crime is related to minors who is using network device. Therefore the actual situation of the applications and the services on the Internet that connect high school student to the cybercrime was investigated. And the environment of the cybercrime by minors was discussed.
在日本网络犯罪的逮捕情况中,超过一半的犯罪与使用网络设备的未成年人有关。因此,本文对中学生网络犯罪与网络应用和网络服务的实际情况进行了调查。并对未成年人网络犯罪的环境进行了探讨。
{"title":"An Intensive Analysis on the Usage Situation of the Mobile Services in Japanese High Schools: Why and How are They Used?","authors":"T. Okada, J. Iio, Yoshihiko Kubota, T. Yonekura","doi":"10.1109/NBiS.2016.8","DOIUrl":"https://doi.org/10.1109/NBiS.2016.8","url":null,"abstract":"In the arrest situation of the cybercrime in Japan, over half of crime is related to minors who is using network device. Therefore the actual situation of the applications and the services on the Internet that connect high school student to the cybercrime was investigated. And the environment of the cybercrime by minors was discussed.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of a Fuzzy-Based Connection Admission Control System for Wireless Cellular Networks Considering Security and Priority Parameters 考虑安全和优先级参数的基于模糊的无线蜂窝网络接入控制系统性能评价
Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum and multimedia traffic characteristics. In this paper, we implement a Fuzzy Call Admission Control Sysytem considering Security and Priority parameters. We call this system FCACS-SP. We present the quantitative simulation results and show that the implemented system has a good behavior.
CAC (Call Admission Control)是一种资源管理功能,通过对网络访问进行调节,保证QoS的发放。然而,由于用户的移动性、有限的无线电频谱和多媒体业务的特点,CAC的决策是一个非常具有挑战性的问题。在本文中,我们实现了一个考虑安全和优先级参数的模糊呼叫接纳控制系统。我们称这个系统为faccs - sp。给出了定量仿真结果,表明所实现的系统具有良好的性能。
{"title":"Performance Evaluation of a Fuzzy-Based Connection Admission Control System for Wireless Cellular Networks Considering Security and Priority Parameters","authors":"Takaaki Inaba, Donald Elmazi, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/NBiS.2016.39","DOIUrl":"https://doi.org/10.1109/NBiS.2016.39","url":null,"abstract":"Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum and multimedia traffic characteristics. In this paper, we implement a Fuzzy Call Admission Control Sysytem considering Security and Priority parameters. We call this system FCACS-SP. We present the quantitative simulation results and show that the implemented system has a good behavior.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JsFlow: Integration of Massive Streams and Batches via JSON-based Dataflow Algebra JsFlow:通过基于json的数据流代数集成海量流和批处理
Hirotoshi Cho, Hiroaki Shiokawa, H. Kitagawa
Data processing frameworks including Hadoop and Spark have been essential tools for processing massive data in recent BigData Era. In many analyzing scenarios, it is a natural choice to combine multiple data processing frameworks (i.e. stream and batch processings) to meet various data processing requirements. However, these scenarios require us to solve two major problems: (1) we need to choose an appropriate combination of frameworks for the performance requirements, and (2) we have to build and maintain codes written in different programming models that bind to the frameworks. In this paper, we address the problems of combining multiple data processing frameworks. We present a novel framework JsFlow that integrates stream and batch processings in a single system. JsFlow provides a uniformed programming model for stream and batch processings by using JSON-based dataflow algebra. JsFlow accepts processing dataflows and deploys them over appropriate processing frameworks (e.g. Spark and Spark Streaming) according to the performance requirements. We experimentally confirmed the effectiveness of JsFlow compared with the state-of-the-art frameworks for processing real-world BigData.
在最近的大数据时代,包括Hadoop和Spark在内的数据处理框架已经成为处理海量数据的必备工具。在许多分析场景中,结合多个数据处理框架(即流处理和批处理)来满足各种数据处理需求是一种自然的选择。然而,这些场景要求我们解决两个主要问题:(1)我们需要为性能需求选择适当的框架组合,(2)我们必须构建和维护用绑定到框架的不同编程模型编写的代码。在本文中,我们解决了多个数据处理框架的组合问题。我们提出了一个新的框架JsFlow,它将流和批处理集成在一个系统中。JsFlow通过使用基于json的数据流代数,为流和批处理提供了统一的编程模型。JsFlow接受处理数据流,并根据性能需求将它们部署在适当的处理框架(例如Spark和Spark Streaming)上。我们通过实验证实了JsFlow与处理现实世界大数据的最先进框架的有效性。
{"title":"JsFlow: Integration of Massive Streams and Batches via JSON-based Dataflow Algebra","authors":"Hirotoshi Cho, Hiroaki Shiokawa, H. Kitagawa","doi":"10.1109/NBiS.2016.1","DOIUrl":"https://doi.org/10.1109/NBiS.2016.1","url":null,"abstract":"Data processing frameworks including Hadoop and Spark have been essential tools for processing massive data in recent BigData Era. In many analyzing scenarios, it is a natural choice to combine multiple data processing frameworks (i.e. stream and batch processings) to meet various data processing requirements. However, these scenarios require us to solve two major problems: (1) we need to choose an appropriate combination of frameworks for the performance requirements, and (2) we have to build and maintain codes written in different programming models that bind to the frameworks. In this paper, we address the problems of combining multiple data processing frameworks. We present a novel framework JsFlow that integrates stream and batch processings in a single system. JsFlow provides a uniformed programming model for stream and batch processings by using JSON-based dataflow algebra. JsFlow accepts processing dataflows and deploys them over appropriate processing frameworks (e.g. Spark and Spark Streaming) according to the performance requirements. We experimentally confirmed the effectiveness of JsFlow compared with the state-of-the-art frameworks for processing real-world BigData.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"103 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Engineering Education Support System Using Projection-Based AR 基于投影增强现实的工程教育支持系统
Toshiyuki Haramaki, Hiroaki Nishino
We propose a method for effectively supporting engineering education in computer science (CS) based on Augmented Reality (AR). We have an assumption that the proposed method can be used in an experimental exercise class for training CS students targeted at mastering embedded software development skills. We focus on some technical issues confusing the students in an initial stage of the experiment and present a way for efficiently advising them by showing support information in accordance with the progress of an experimental task. The proposed method also supports multiple students cooperating to solve a single task by spatially projecting appropriate information in a working environment (a visualization technique called projection-based AR). We describe a prototype system designed and implemented based on the proposed method and discuss how the system can guide the students in some specific experimental exercises.
本文提出了一种基于增强现实(AR)的有效支持计算机科学(CS)工程教育的方法。我们假设所提出的方法可以用于训练CS学生掌握嵌入式软件开发技能的实验练习课。我们关注一些在实验初期让学生困惑的技术问题,并根据实验任务的进展提供一种有效的建议方法,即显示支持信息。该方法还支持多名学生通过在工作环境中空间投影适当的信息来合作解决单个任务(一种称为基于投影的AR的可视化技术)。我们描述了一个基于该方法设计和实现的原型系统,并讨论了该系统如何指导学生进行一些具体的实验练习。
{"title":"An Engineering Education Support System Using Projection-Based AR","authors":"Toshiyuki Haramaki, Hiroaki Nishino","doi":"10.1109/NBiS.2016.67","DOIUrl":"https://doi.org/10.1109/NBiS.2016.67","url":null,"abstract":"We propose a method for effectively supporting engineering education in computer science (CS) based on Augmented Reality (AR). We have an assumption that the proposed method can be used in an experimental exercise class for training CS students targeted at mastering embedded software development skills. We focus on some technical issues confusing the students in an initial stage of the experiment and present a way for efficiently advising them by showing support information in accordance with the progress of an experimental task. The proposed method also supports multiple students cooperating to solve a single task by spatially projecting appropriate information in a working environment (a visualization technique called projection-based AR). We describe a prototype system designed and implemented based on the proposed method and discuss how the system can guide the students in some specific experimental exercises.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Browser Scanner: Collecting Intranet Information 浏览器扫描器:收集内网信息
Rio Hosoi, Takamichi Saito, Takayuki Ishikawa, D. Miyata, Yongyan Chen
At present, using with HTML5 and new browser technologies, many information, such as a hostname or a server application name, can be collected by a Web server. Even if the visitors are protected by a firewall, their intranet information can be collected. Then, currently people should also focus on the intranet information where he or she belongs to. In this paper, we propose a network scanning tool that allows a Web browser to collect information about active hosts or the existence of a proxy over a channel to the Web server.
目前,使用HTML5和新的浏览器技术,Web服务器可以收集许多信息,如主机名或服务器应用程序名称。即使有防火墙保护,访问者的内网信息也可以被收集。那么,目前人们也应该关注自己所在的内网信息。在本文中,我们提出了一种网络扫描工具,它允许Web浏览器收集有关活动主机或通过通道到Web服务器的代理存在的信息。
{"title":"A Browser Scanner: Collecting Intranet Information","authors":"Rio Hosoi, Takamichi Saito, Takayuki Ishikawa, D. Miyata, Yongyan Chen","doi":"10.1109/NBiS.2016.10","DOIUrl":"https://doi.org/10.1109/NBiS.2016.10","url":null,"abstract":"At present, using with HTML5 and new browser technologies, many information, such as a hostname or a server application name, can be collected by a Web server. Even if the visitors are protected by a firewall, their intranet information can be collected. Then, currently people should also focus on the intranet information where he or she belongs to. In this paper, we propose a network scanning tool that allows a Web browser to collect information about active hosts or the existence of a proxy over a channel to the Web server.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133155160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Subscription Initialization (SI) Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems 防止点对点发布/订阅系统中非法信息流的订阅初始化协议
Shigenari Nakamura, T. Enokido, M. Takizawa
In a peer-to-peer (P2P) type of topic-based publish/subscribe (P2PPS) model, each peer (process) caP2P) typen be a publisher and subscriber. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event message. Publications and subscriptions are specified in terms of topics. In the topic-based access control (TBAC) model proposed in our previous studies, only a peer granted publication and subscription access rights is allowed to publish event messages with publication topics and subscribe events, respectively. In our previous studies, the illegal information flow relation among peers is defined and the subscription-based synchronization (SBS) protocol is proposed to prevent illegal information flow. Here, topics carried by event messages are just accumulated in the target peers and notification of event messages which may cause illegal information flow are banned in each target peer. The more number of event messages are published, the more number of event messages are not notified in the system. In this paper, we newly propose a subscription initialization (SI) protocol where topics accumulated in peers are removed to reduce the number of notifications banned. We show the number of notifications banned is reduced in the SI protocol compared with the SBS protocol in the evaluation.
在点对点(P2P)类型的基于主题的发布/订阅(P2PPS)模型中,每个对等(进程)caP2P类型是发布者和订阅者。在这里,对等体发布事件消息,然后将事件消息通知给对该事件消息感兴趣的目标对等体。出版物和订阅按主题指定。在我们之前的研究中提出的基于主题的访问控制(TBAC)模型中,只有被授予发布和订阅访问权限的对等体才能分别发布具有发布主题和订阅事件的事件消息。在以往的研究中,我们定义了对等体之间的非法信息流关系,并提出了基于订阅的同步(SBS)协议来防止非法信息流。在这种情况下,事件消息所携带的主题只是在目标对等体中积累,并且在每个目标对等体中禁止可能导致非法信息流的事件消息通知。发布的事件消息数量越多,系统中未通知的事件消息数量就越多。在本文中,我们提出了一种订阅初始化(SI)协议,该协议删除在对等体中积累的主题,以减少被禁止的通知数量。我们在评估中表明,与SBS协议相比,SI协议中禁止的通知数量减少了。
{"title":"Subscription Initialization (SI) Protocol to Prevent Illegal Information Flow in Peer-to-Peer Publish/Subscribe Systems","authors":"Shigenari Nakamura, T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2016.73","DOIUrl":"https://doi.org/10.1109/NBiS.2016.73","url":null,"abstract":"In a peer-to-peer (P2P) type of topic-based publish/subscribe (P2PPS) model, each peer (process) caP2P) typen be a publisher and subscriber. Here, a peer publishes an event message and then the event message is notified to a target peer which is interested in the event message. Publications and subscriptions are specified in terms of topics. In the topic-based access control (TBAC) model proposed in our previous studies, only a peer granted publication and subscription access rights is allowed to publish event messages with publication topics and subscribe events, respectively. In our previous studies, the illegal information flow relation among peers is defined and the subscription-based synchronization (SBS) protocol is proposed to prevent illegal information flow. Here, topics carried by event messages are just accumulated in the target peers and notification of event messages which may cause illegal information flow are banned in each target peer. The more number of event messages are published, the more number of event messages are not notified in the system. In this paper, we newly propose a subscription initialization (SI) protocol where topics accumulated in peers are removed to reduce the number of notifications banned. We show the number of notifications banned is reduced in the SI protocol compared with the SBS protocol in the evaluation.","PeriodicalId":390397,"journal":{"name":"2016 19th International Conference on Network-Based Information Systems (NBiS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133532954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 19th International Conference on Network-Based Information Systems (NBiS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1