Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.31
M. Bouhorma, F. Elouaai, A. Mamouni
This paper is a comparative study of several antennas commonly used in cellular telephones. These include a monopole and a patch antenna. Each one of these structures is modeled and numerically tested using HFSS code. The testing procedure involves antenna simulation in the proximity of the human head. The behaviour of each antenna is evaluated for variable distances from the head geometry. Continuous waveform, representative of the sources used in mobile telephones, (250 mW) is used as the form of the antenna excitation. The SAR levels for the head tissues are calculated for and with accordance to the two currently accepted standards: Federal Communications Commission (FCC) and International Commission on Non-Ionizing Radiation Protection (ICNIRP). The computed SAR levels within each of the considered tissues vary for the two antennas under investigation.
{"title":"Computation of SAR for Two Antennas Used in Mobile Communication Systems: Monopole and Patch","authors":"M. Bouhorma, F. Elouaai, A. Mamouni","doi":"10.1109/NTMS.2008.ECP.31","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.31","url":null,"abstract":"This paper is a comparative study of several antennas commonly used in cellular telephones. These include a monopole and a patch antenna. Each one of these structures is modeled and numerically tested using HFSS code. The testing procedure involves antenna simulation in the proximity of the human head. The behaviour of each antenna is evaluated for variable distances from the head geometry. Continuous waveform, representative of the sources used in mobile telephones, (250 mW) is used as the form of the antenna excitation. The SAR levels for the head tissues are calculated for and with accordance to the two currently accepted standards: Federal Communications Commission (FCC) and International Commission on Non-Ionizing Radiation Protection (ICNIRP). The computed SAR levels within each of the considered tissues vary for the two antennas under investigation.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124761788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.45
F. Khelil, Mohamed Hamdi, S. Guilley, J. Danger, Nidhal Selmane
Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable to side channel attacks. Particularly, fault attacks have proved their efficiency in cracking hardware implementation of some robust symmetric and asymmetric encryption algorithms. In this paper, we develop an FPGA version of the attack proposed by Piret and Quisquater against the AES (Advanced Encryption Standard) algorithm. Through temporal and spatial analyses of the rounds that have been affected by the fault injection process, we adapt the aforementioned attack to our context. The results obtained in this paper can serve to design a more secure FPGA implementation of AES.
{"title":"Fault Analysis Attack on an FPGA AES Implementation","authors":"F. Khelil, Mohamed Hamdi, S. Guilley, J. Danger, Nidhal Selmane","doi":"10.1109/NTMS.2008.ECP.45","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.45","url":null,"abstract":"Hardware implementation of cryptographic algorithms are widely used to secure wireless networks. They guarantee good security performance at low processing and energy costs. However, unlike traditional implementations, they are vulnerable to side channel attacks. Particularly, fault attacks have proved their efficiency in cracking hardware implementation of some robust symmetric and asymmetric encryption algorithms. In this paper, we develop an FPGA version of the attack proposed by Piret and Quisquater against the AES (Advanced Encryption Standard) algorithm. Through temporal and spatial analyses of the rounds that have been affected by the fault injection process, we adapt the aforementioned attack to our context. The results obtained in this paper can serve to design a more secure FPGA implementation of AES.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129124081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.83
Rashid Jayousi, Yasmin Bali
Selecting appropriate learning services for a learner from a large number of heterogeneous knowledge sources is a complex and challenging task. This research will illustrate and discuss how semantic Web technologies and ontology can be applied to e-learning systems to help the learner in selecting an appropriate learning course or retrieving relevant information. It will present the main features of an e-learning scenario and the ontology on which it is based, and then illustrates the scenario ontology with the training domain and the application domain. Finally, it will present semantic querying and semantic mapping approaches as one process to solve the problem of the semantic resolution in an e-learning system.
{"title":"Querying and Semantic Mapping Approaches for Semantic Resolution in E-Learning System","authors":"Rashid Jayousi, Yasmin Bali","doi":"10.1109/NTMS.2008.ECP.83","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.83","url":null,"abstract":"Selecting appropriate learning services for a learner from a large number of heterogeneous knowledge sources is a complex and challenging task. This research will illustrate and discuss how semantic Web technologies and ontology can be applied to e-learning systems to help the learner in selecting an appropriate learning course or retrieving relevant information. It will present the main features of an e-learning scenario and the ontology on which it is based, and then illustrates the scenario ontology with the training domain and the application domain. Finally, it will present semantic querying and semantic mapping approaches as one process to solve the problem of the semantic resolution in an e-learning system.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128735745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.50
L. Cherrat, M. Ezziyyani, M. Essaaidi, M. Bennouna, M. Ezziyyani
The goal of this research is to promote the establishment of an information system to provide to the Internet users the quality information on health and medicine related to the Patient Medial Documents (PMD). This information are extracted from several certified heterogeneous sources of the health localized dynamically. In addition, all the data of the patients and the information relating to any medical activity (operation, consultation, analysis, radiology, etc..) are stored in Data warehouse. These Data warehouse are distributed over several regions according to the geographical distribution location of the patients. Such a functional architecture will take us to deal with two integration methodologies of the heterogeneous information systems most recommended. The Data warehouse method used to store the information related to the PDM and the virtual integration method used to retrieve the health and medicine scientific information. In this article, we propose a new hybrid approach of integrating the heterogeneous information systems between Data warehouse and the virtual mediation. We develop a mechanism rewriting request and an algorithm adapted for updates of Data warehouse based on the mobile agents.
本研究旨在促进资讯系统的建立,为网际网路使用者提供与病患医疗档案(Patient medical Documents, PMD)相关的高品质健康与医药资讯。此信息是从动态本地化的几个经过认证的异构健康源中提取的。此外,患者的所有数据以及与任何医疗活动(手术、会诊、分析、放射等)有关的信息都存储在数据仓库中。这些数据仓库根据患者的地理分布位置分布在多个区域。这样的功能体系结构将带我们处理最推荐的异构信息系统的两种集成方法。数据仓库方法用于存储与PDM相关的信息,虚拟集成方法用于检索卫生和医学科学信息。在本文中,我们提出了一种在数据仓库和虚拟中介之间集成异构信息系统的新混合方法。我们开发了一种基于移动代理的请求重写机制和一种适用于数据仓库更新的算法。
{"title":"Hybrid Integration Approach for Heteregenous Information Sources: Applied to Medical Resources and Patients Medical Documents","authors":"L. Cherrat, M. Ezziyyani, M. Essaaidi, M. Bennouna, M. Ezziyyani","doi":"10.1109/NTMS.2008.ECP.50","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.50","url":null,"abstract":"The goal of this research is to promote the establishment of an information system to provide to the Internet users the quality information on health and medicine related to the Patient Medial Documents (PMD). This information are extracted from several certified heterogeneous sources of the health localized dynamically. In addition, all the data of the patients and the information relating to any medical activity (operation, consultation, analysis, radiology, etc..) are stored in Data warehouse. These Data warehouse are distributed over several regions according to the geographical distribution location of the patients. Such a functional architecture will take us to deal with two integration methodologies of the heterogeneous information systems most recommended. The Data warehouse method used to store the information related to the PDM and the virtual integration method used to retrieve the health and medicine scientific information. In this article, we propose a new hybrid approach of integrating the heterogeneous information systems between Data warehouse and the virtual mediation. We develop a mechanism rewriting request and an algorithm adapted for updates of Data warehouse based on the mobile agents.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121062129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.88
J. Munilla, A. Peinado
RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary security protocols that operate in the high layers of the protocol stack. Distance bounding protocols, which are tightly integrated into the physical layer, are the main countermeasure against them. Hancke and Kuhn's protocol was the first distance bounding protocol for RFID. Tu and Piramuthu have recently proposed another protocol which outperform it. More precisely, the authors claim that their protocol reduces the false acceptance ratio and is resistant to terrorist attack. In this paper, however, we analyse this protocol and, discuss some aspects that could question its effectiveness.
{"title":"Security Analysis of Tu and Piramuthu's Protocol","authors":"J. Munilla, A. Peinado","doi":"10.1109/NTMS.2008.ECP.88","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.88","url":null,"abstract":"RFID (radio frequency identification) devices are usually vulnerable to attacks related to proximity verification: distance fraud attacks, relay attacks and terrorist attacks. These attacks require simpler technical resources than tampering or cryptanalysis and, they cannot be prevented by ordinary security protocols that operate in the high layers of the protocol stack. Distance bounding protocols, which are tightly integrated into the physical layer, are the main countermeasure against them. Hancke and Kuhn's protocol was the first distance bounding protocol for RFID. Tu and Piramuthu have recently proposed another protocol which outperform it. More precisely, the authors claim that their protocol reduces the false acceptance ratio and is resistant to terrorist attack. In this paper, however, we analyse this protocol and, discuss some aspects that could question its effectiveness.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126859366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.85
M. Saad, Elfriede Fehr, Nicolai Kamenzky, J. Schiller
ScatterFactory2 is a model-driven eclipse-based framework for the new generation of our WSN platform ScatterWeb The already deployed Modular Sensor Boards (MSBs) can be configured, programmed and tested at the same time. This is made possible by the combination of plug-ins for ScatterFactory2. Apart from the high grade of automation, the focus of ScatterFactory2 lies with the aspect of human-computer interfaces for WSN. ScatterFactory2 provides the opportunity to examine different characteristics and properties of WSN-applications illustratively and interactively. The plug-in oriented architecture encourages the enhancement of the tool, when new questions concerning WSN arise. ScatterFactory2 is based wholly on open source components, which are available at no extra cost.
{"title":"ScatterFactory2: An Architecture Centric Framework for New Generation ScatterWeb","authors":"M. Saad, Elfriede Fehr, Nicolai Kamenzky, J. Schiller","doi":"10.1109/NTMS.2008.ECP.85","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.85","url":null,"abstract":"ScatterFactory2 is a model-driven eclipse-based framework for the new generation of our WSN platform ScatterWeb The already deployed Modular Sensor Boards (MSBs) can be configured, programmed and tested at the same time. This is made possible by the combination of plug-ins for ScatterFactory2. Apart from the high grade of automation, the focus of ScatterFactory2 lies with the aspect of human-computer interfaces for WSN. ScatterFactory2 provides the opportunity to examine different characteristics and properties of WSN-applications illustratively and interactively. The plug-in oriented architecture encourages the enhancement of the tool, when new questions concerning WSN arise. ScatterFactory2 is based wholly on open source components, which are available at no extra cost.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125713858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.66
H. Oka, H. Higaki
In wireless multihop data message transmission by multiple mobile computers in ITS systems, even though in an area with sparsely distributed mobile computers, mobility of a computer with transmitting data messages helps to achieve high data message transmission ratio. This paper proposes data message transmission along a sequence of roads detected by a GPS satellite navigation system. Due to combination of dynamic determination of intermediate mobile computers and a store-carry-forward approach, higher transmission ratio and shorter end-to-end delay are achieved even with high mobility and sparse distribution.
{"title":"Multihop Data Message Transmission with Inter-Vehicle Communication and Store-Carry-Forward in Sparse Vehicle Ad-Hoc Networks (VANET)","authors":"H. Oka, H. Higaki","doi":"10.1109/NTMS.2008.ECP.66","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.66","url":null,"abstract":"In wireless multihop data message transmission by multiple mobile computers in ITS systems, even though in an area with sparsely distributed mobile computers, mobility of a computer with transmitting data messages helps to achieve high data message transmission ratio. This paper proposes data message transmission along a sequence of roads detected by a GPS satellite navigation system. Due to combination of dynamic determination of intermediate mobile computers and a store-carry-forward approach, higher transmission ratio and shorter end-to-end delay are achieved even with high mobility and sparse distribution.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125799205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.72
Dimitrios Alexios Karras, V. Zorkadis
While interconnected systems proliferate in nowadays computing and communications technology there are few reports investigating their security. In this paper, new efficient models are developed and evaluated for analyzing the security-related behavior of computing architectures and networks comprising complex interconnected communication systems adapted towards a generalized analysis. These models, based on Markov processes, allow calculation of critical security factors, related to intrusion detection, of such interconnected systems components and the evaluation of the associated security mechanisms. Although, at this step two interconnected systems are analyzed, the systematic model introduced allows for a generalized model of N interconnected systems. We herein show the principles of such an analysis. Security parameters calculation and Security mechanisms evaluation may support the risk analysis and the decision making process in resolving the trade-offs between security and quality of service characteristics corresponding to the complex interconnected computing and communication systems.
{"title":"On Efficient Security Modelling of Complex Interconnected Communication Systems based on Markov Processes","authors":"Dimitrios Alexios Karras, V. Zorkadis","doi":"10.1109/NTMS.2008.ECP.72","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.72","url":null,"abstract":"While interconnected systems proliferate in nowadays computing and communications technology there are few reports investigating their security. In this paper, new efficient models are developed and evaluated for analyzing the security-related behavior of computing architectures and networks comprising complex interconnected communication systems adapted towards a generalized analysis. These models, based on Markov processes, allow calculation of critical security factors, related to intrusion detection, of such interconnected systems components and the evaluation of the associated security mechanisms. Although, at this step two interconnected systems are analyzed, the systematic model introduced allows for a generalized model of N interconnected systems. We herein show the principles of such an analysis. Security parameters calculation and Security mechanisms evaluation may support the risk analysis and the decision making process in resolving the trade-offs between security and quality of service characteristics corresponding to the complex interconnected computing and communication systems.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.48
Rizwana Irfan, M. U. Shaikh
Globalization has brought with it acute need of knowledge availability, due to which e-learning has been expressing dramatic growth day by day. Using this technology one can create opportunities for the learner to get knowledge whenever and wherever it is required. For better and accurate delivery of knowledge, it is very important to enhance quality, availability and processing of current training systems. E-learning should be adaptive and in accord with the requirement of the learner. A course should be designed on the basis of student's background, interests and aptitude. Much has been written on the contents' management of e-learning based on theoretical knowledge. Likewise, much has been written on the contents' delivery issues in e-learning but less effort has been made regarding e-learning, based on experimental knowledge. In this paper the authors have tried to emphasize the need of tacit learning and have designed a framework which helps to incorporate the tacit knowledge, hence trying to attain true essence of knowledge.
{"title":"Framework for Embedding Tacit Knowledge in Pedagogical Model to Enhance E-Learning","authors":"Rizwana Irfan, M. U. Shaikh","doi":"10.1109/NTMS.2008.ECP.48","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.48","url":null,"abstract":"Globalization has brought with it acute need of knowledge availability, due to which e-learning has been expressing dramatic growth day by day. Using this technology one can create opportunities for the learner to get knowledge whenever and wherever it is required. For better and accurate delivery of knowledge, it is very important to enhance quality, availability and processing of current training systems. E-learning should be adaptive and in accord with the requirement of the learner. A course should be designed on the basis of student's background, interests and aptitude. Much has been written on the contents' management of e-learning based on theoretical knowledge. Likewise, much has been written on the contents' delivery issues in e-learning but less effort has been made regarding e-learning, based on experimental knowledge. In this paper the authors have tried to emphasize the need of tacit learning and have designed a framework which helps to incorporate the tacit knowledge, hence trying to attain true essence of knowledge.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-11-25DOI: 10.1109/NTMS.2008.ECP.15
F. M. Bouyakoub, Abdelkader Belkhir
This paper presents a new adaptation platform for composite multimedia documents in SMIL (synchronized multimedia integration language) format. Our adaptation system, named AdaMS, allows users of heterogeneous terminals to reach the same multimedia content. The platform assumes the management of user's profiles (user preferences, device characteristics...) for the adaptation process, as well as the management of the new presentations versions, created according to the user profile. The adaptation process is a combination of on stock and on demand adaptation. The aim is to have a balance between the two methods to optimize the adaptation process. Unlike other existing platforms, our system gives the possibility to the user to begin the visualisation of the multimedia presentation before the end of the adaptation process, thus reducing user waiting time.
{"title":"AdaMS: An Adaptation Multimedia System for Heterogeneous Environments","authors":"F. M. Bouyakoub, Abdelkader Belkhir","doi":"10.1109/NTMS.2008.ECP.15","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.15","url":null,"abstract":"This paper presents a new adaptation platform for composite multimedia documents in SMIL (synchronized multimedia integration language) format. Our adaptation system, named AdaMS, allows users of heterogeneous terminals to reach the same multimedia content. The platform assumes the management of user's profiles (user preferences, device characteristics...) for the adaptation process, as well as the management of the new presentations versions, created according to the user profile. The adaptation process is a combination of on stock and on demand adaptation. The aim is to have a balance between the two methods to optimize the adaptation process. Unlike other existing platforms, our system gives the possibility to the user to begin the visualisation of the multimedia presentation before the end of the adaptation process, thus reducing user waiting time.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}