2009 Fourth International Conference on Computer Sciences and Convergence Information Technology最新文献

筛选
英文 中文
PageRank vs. Katz Status Index, a Theoretical Approach PageRank vs. Katz状态指数,一种理论方法
N. Q. Phuoc, Sung-Ryul Kim, Hanku Lee, Hyungseok Kim
{"title":"PageRank vs. Katz Status Index, a Theoretical Approach","authors":"N. Q. Phuoc, Sung-Ryul Kim, Hanku Lee, Hyungseok Kim","doi":"10.1109/ICCIT.2009.272","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.272","url":null,"abstract":"In World Wide Web search engines, it is important to have a good ranking system. One of the most famous ranking components is the PageRank system by Google. However, PageRank is protected by patents and it is impossible for other companies to use it in their search engines. There is an old model, called Katz status index, that is reported to work very similar to PageRank. If the quality of Katz status index turns out to be similar to or better than that of PageRank, it could become a patent-free alternative to PageRank. We consider the problem of comparing Katz status index to PageRank in this paper with some preliminary results on the theoretical comparison and give a proposal for practical comparison of the two models.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123781142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Design and Implementation of a Sensitive Information System 敏感信息系统的设计与实现
Xiaoli Wang, Xianping Wu, Yiling Wang, P. D. Le
{"title":"The Design and Implementation of a Sensitive Information System","authors":"Xiaoli Wang, Xianping Wu, Yiling Wang, P. D. Le","doi":"10.1109/ICCIT.2009.154","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.154","url":null,"abstract":"Protecting sensitive information systems from security threats such as unauthorized access, information eavesdropping and information interfering, is significant. Most of the natural approaches employ strong authentication or cryptography systems to protect critical data. But those approaches do not stress on the potential amount of risks associated with sensitive information, especially the vulnerability from compromising of long term cryptographic keys and the lack of fine-grained access control for group sharing. Therefore, in this paper, we use dynamic key and group key theories to propose a new security architecture for sensitive information protection. The architecture categorizes sensitive information based on classified information. We implement the architecture by adopting elliptic curve cryptography (ECC) and dynamic key approaches to generate symmetric key to secure unicast and multicast communication among users. A formal analysis is provided to verify the security of the proposed work. It shows that the proposed system guarantees critical information data security and access control flexibility.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125351052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviews of Cross-Cultural Studies Impact on Japanese MNEs' Business Strategy Decision-Making in China 跨文化研究对日本跨国公司在华经营战略决策的影响
Hong Zhou, D. Xu, Ying Guo
{"title":"Reviews of Cross-Cultural Studies Impact on Japanese MNEs' Business Strategy Decision-Making in China","authors":"Hong Zhou, D. Xu, Ying Guo","doi":"10.1109/ICCIT.2009.176","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.176","url":null,"abstract":"There is a common phenomenon of globalization which asks us to think about it is necessary to explore the relationship between managing global business and realizing the special nature of culture. In other words, we should recognize the concepts of cross-cultural boundaries are related to global management. Globalization is an integrated process of standardization and localization. Multinational Enterprises have to be concerned about how to do business strategies by crossing cultures. Therefore, the research will focus on cross-cultural studies play an effective influence on the quality of business strategic decision especially Japanese Multinational Enterprises have invested in China. Through two case studies of Japanese MNEs in China, the research will induct how cross-culture studies as a factor has been impacting on Japanese Multinational Enterprises to do business strategies decision-making in China.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125389033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Non-cooperative Approach for Load Balancing in Heterogeneous Distributed Computing Platform 异构分布式计算平台中一种非合作负载均衡方法
S. Nouri, Saeed Parsa
{"title":"A Non-cooperative Approach for Load Balancing in Heterogeneous Distributed Computing Platform","authors":"S. Nouri, Saeed Parsa","doi":"10.1109/ICCIT.2009.240","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.240","url":null,"abstract":"Load balancing has been a key concern for distributed systems. In this paper, our distributed system consists of heterogeneous resources with multiple selfish consumers that receive computationally intensive tasks from users and decide for assigning them to resources. The consumers in the system work independently, of which attempts to assign the received tasks to resources with the objective of optimizing the expected completion time of it's tasks. In order to have a balanced system there should be equilibrium between these selfish consumers. Here we formulate the problem as a non-cooperative game with the objective of minimizing mean time in the system. We show the existence of a potential function, which allows us to transform the non-cooperative game into a standard convex optimization problem. Our load balancing scheme is implemented by GridSim simulation toolkit. To verify the optimality of our scheme, we present the results compared with that of other existing schemes.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116167742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Authenticity Verification Scheme Based on Hidden Messages for Current Civilian GPS Signals 一种基于隐藏信息的民用GPS信号真实性验证方案
Xi-jun Cheng, Jiang-ning Xu, Ke-jin Cao, Jie Wang
{"title":"An Authenticity Verification Scheme Based on Hidden Messages for Current Civilian GPS Signals","authors":"Xi-jun Cheng, Jiang-ning Xu, Ke-jin Cao, Jie Wang","doi":"10.1109/ICCIT.2009.91","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.91","url":null,"abstract":"Aiming at the authentication of civilian signals broadcasted by currently orbiting GPS satellites, this paper proposes a new technique, which carries GPS authentication information by the messages hidden in the navigation message and, without affecting the position fixing of GPS receivers in use all over the world, appends the capability of authenticity verification to current civilian GPS signals. Hidden messages are transmitted to receivers through reserved bits in the Nav navigation message or newly-added CNav message types. The civilian GPS signal authentication information is obtained by using the Hash function to convert the navigation message and (or) C/A code into Hash code and then digitally signing the Hash code with public key encryption algorithm. This paper also analyzes the feasibility, covertness and channel capacity of the hidden message transmission, puts forward several design samples of navigation message formats and explores the issues of the use patterns of hidden messages and the number of public/private key pairs.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116239427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The Analysis of China's Engineering Construction Standards' Impact on the Enterprise 中国工程建设标准对企业的影响分析
Su Yikun, Dong Shenghua
{"title":"The Analysis of China's Engineering Construction Standards' Impact on the Enterprise","authors":"Su Yikun, Dong Shenghua","doi":"10.1109/ICCIT.2009.225","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.225","url":null,"abstract":"Combined with the practice of China’s Engineering Construction standards, propose the framework of Engineering Construction standards’ impact on the enterprise, including three index systems: enterprise employee, the objective conditions and the behavior types; study Engineering Construction standards’ impacts on the above index systems by a questionnaire analysis. On the base of setting comparative base point value for evaluation, give a method of calculating the improvement of enterprises’ comprehensive behavior ability due to construction standards and get the improved index values of different construction enterprise’s comprehensive behavior ability.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Test Generation Based on Notated Net 基于符号网络的测试生成
Wei Han, N. Zhang, Zuohua Ding
{"title":"Test Generation Based on Notated Net","authors":"Wei Han, N. Zhang, Zuohua Ding","doi":"10.1109/ICCIT.2009.107","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.107","url":null,"abstract":"This paper presents a new method to generate test cased based on the Object Oriented Net(OON) model, notated with Z schemas. We can be benefited from this method in that (1) Picturing the whole system while generating the test by the algorithm at the same time. (2) Instructing coding by the extended model.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of Shadow Cluster on Predictive User Mobility Behavior Scheme in Cellular Networks 阴影聚类对蜂窝网络中预测用户移动行为方案的影响
S. Intarasothonchun, S. Thipchaksurat, R. Varakulsiripunth
{"title":"Effect of Shadow Cluster on Predictive User Mobility Behavior Scheme in Cellular Networks","authors":"S. Intarasothonchun, S. Thipchaksurat, R. Varakulsiripunth","doi":"10.1109/ICCIT.2009.199","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.199","url":null,"abstract":"In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called Predictive User Mobility Behavior (PUMB) scheme. This algorithm is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide Quality of Service (QoS) guarantees for transferring traffic. The cell visiting probability (CVP) is used to form the shadow cluster cell, where a mobile unit is likely to visit, by comparing with shadow cluster probability threshold. We are interested in the effect of the shadow cluster probability threshold in PUMB because when shadow cluster probability threshold increases, the MU’s shadow cluster size decreases so that the suitable shadow cluster probability threshold can define the suitable shadow cluster size for increasing network performance. The performance of the PUMB is demonstrated by simulation results in terms of new call blocking probability and handoff call dropping probability when new call arrival rate and the shadow cluster threshold are varied. Our results show that when shadow cluster probability threshold increases, CBP of MSODB and PUMB decrease while CDP of both schemes increases in all arrival rates. However, PUMB is better than MSODB under different traffic conditions.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116839562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building a Service Oriented Cloud Computing Infrastructure Using Microsoft CCR/DSS System 利用微软CCR/DSS系统构建面向服务的云计算基础设施
R. Kaewpuang, J. Pichitlamken
{"title":"Building a Service Oriented Cloud Computing Infrastructure Using Microsoft CCR/DSS System","authors":"R. Kaewpuang, J. Pichitlamken","doi":"10.1109/ICCIT.2009.121","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.121","url":null,"abstract":"Cloud computing is new paradigm for provision of a computing infrastructure and services the over network using a pool of abstracted, virtualized, and scalable, computing resources. One of the challenges is the lack of standard in configuration, management, and programming. Thus, we propose that a service oriented cloud can be built and program using Microsoft Windows Server and program using Microsoft CCR/DSS. The architecture of this service oriented cloud is presented in this paper. In addition, a practical logistic application called Pickup and Delivery Problem with Time Window (PDPTW) is developed to demonstrate the concept. The experiments show that a very high speed up of more than 50 times on 16 quad core node and 80-90% efficiency can be obtained using a cloud computing system based on our concept.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128211145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Artificial Emotion Model of Game Character through Analysis of Cognitive Situation 基于认知情境分析的游戏角色人工情感模型
Mijin Kim
{"title":"The Artificial Emotion Model of Game Character through Analysis of Cognitive Situation","authors":"Mijin Kim","doi":"10.1109/ICCIT.2009.165","DOIUrl":"https://doi.org/10.1109/ICCIT.2009.165","url":null,"abstract":"This study is proposing the possibility of utilization for the game contents that have the most noticeable interaction with users based on the artificial emotion study model of cognitive psychological perspective. For designing the artificial emotion model of the game character, which is virtual being the medium for direct communication with users, the representative emotion model in the cognitive psychology field, OCC emotion model, is applied to the situations in the game in order to design the CROSS (Character Reaction On Specific Situation) artificial emotion system and to make it a pre- visualization tool that can be utilized for the stage of planning a game. Such study is expected to extend the diversification of the existing game play system through the specific utilization of emotional response of different game users.","PeriodicalId":112416,"journal":{"name":"2009 Fourth International Conference on Computer Sciences and Convergence Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128214412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信