M. Luther, B. Mrohs, M. Wagner, S. Steglich, W. Kellerer
{"title":"Situational reasoning - a practical OWL use case","authors":"M. Luther, B. Mrohs, M. Wagner, S. Steglich, W. Kellerer","doi":"10.1109/ISADS.2005.1452111","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452111","url":null,"abstract":"In this paper we study the case of situational reasoning on ontological descriptions in context-aware applications. We therefore discuss the logical foundations of W3C's standard ontology language OWL and examine how this modeling language can be used to express a user's situation. In a practical scenario and through the use of standard semantic Web components and toolkits, we exemplify how basic reasoning services can be utilized to build and maintain well-founded context models.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Certificateless group inside signature","authors":"Chunbo Ma, FaLiang Ao, Dake He","doi":"10.1109/ISADS.2005.1452051","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452051","url":null,"abstract":"In distributed networks, the signer wants his signature to be verified by anyone in the same group with him and the recipient wants to verify the signature independently. Motivated by this consideration, a certificateless group inside signature is presented in this paper. The signature scheme has the following properties: despite being without certificate, it can provide an assurance to the user about the relationship between a public key and the identity of the holder of the corresponding private key; a signature can be verified independently by any member in the same group with the signer; nobody outside the group can verify a signature. It is only the signer who knows his private key, even the PKG (private key generator) doesn't; any one in or outside the group can't forge a signature of others.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129458275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioral analysis of a fault-tolerant software system with rejuvenation","authors":"K. Rinsaka, T. Dohi","doi":"10.1093/ietisy/e88-d.12.2681","DOIUrl":"https://doi.org/10.1093/ietisy/e88-d.12.2681","url":null,"abstract":"In recent years, considerable attention has been devoted to continuously running software systems whose performance characteristics are smoothly degrading in time. Software aging often affects the performance of a software system and eventually causes it to fail. A novel approach to handle transient software failures due to software aging is called software rejuvenation, which can be regarded as a preventive and proactive solution that is particularly useful for counteracting the aging phenomenon. In this paper, we focus on a high assurance software system with fault-tolerance and preventive rejuvenation, and analyze the stochastic behavior of such a highly critical software system. More precisely, we consider a fault-tolerant software system with two-version redundant structure and random rejuvenation schedule, and evaluate quantitatively a dependability measure like the steady-state system availability based on the familiar Markovian analysis. In numerical examples, we examine the dependence of two system diversity techniques; design and environment diversity techniques, on the system dependability measure.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Re-integrating of architecture/component oriented general model of sub-domain","authors":"LiYu-cai, Wang Ling","doi":"10.1109/ISADS.2005.1452135","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452135","url":null,"abstract":"In the process of research and development of speech recognize interface for Z+Z intelligence education platform, there are too many component interfaces and their usage is too difficult. A strategy for designing software, named re-integrating of architecture/component oriented general model of sub-domain, is proposed on the basis of domain-specific application system, in order to simplify architectures and system integration. Feasibility and design method are demonstrated, and a general component for recognizing voice-controlled command is designed. The DMDSS (Development Model of Domain-Specific Software) based on component/architecture is improved by Yajie and Junqiao, (2003). This idea of software design can be complemented of DMDSS.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Tsai, Xiao Wei, Yinong Chen, B. Xiao, R. Paul, H. Huang
{"title":"Developing and assuring trustworthy Web services","authors":"W. Tsai, Xiao Wei, Yinong Chen, B. Xiao, R. Paul, H. Huang","doi":"10.1109/ISADS.2005.1452016","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452016","url":null,"abstract":"Web services are emerging technologies that are changing the way we develop and use computer systems and software. Current Web services testing techniques are unable to assure the desired level of trustworthiness, which presents a barrier to WS applications in mission and business critical environments. This paper presents a framework that assures the trustworthiness of Web services. New assurance techniques are developed within the framework, including specification verification via completeness and consistency checking, specification refinement, distributed Web services development, test case generation, and automated Web services testing. Traditional test case generation methods only generate positive test cases that verify the functionality of software. The Swiss cheese test case generation method proposed in this paper is designed to perform both positive and negative testing that also reveal the vulnerability of Web services. This integrated development process is implemented in a case study. The experimental evaluation demonstrates the effectiveness of this approach. It also reveals that the Swiss cheese negative testing detects even more faults than positive testing and thus significantly reduces the vulnerability of Web services.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AOA: an autonomous-oriented architecture","authors":"G. Pujolle, H. Chaouchi","doi":"10.1109/ISADS.2005.1452104","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452104","url":null,"abstract":"IP networks are now well established. However, control, management and optimization schemes are provided in a static and basic way. Network control and management could be provided in a dynamic way using an autonomous-based architecture. This architecture could be built through intelligent software agents that offer a new way to master reliability, plug-and-play schemes, quality of service, security, and mobility management. This new paradigm allows a dynamic and intelligent control of the equipment in a local manner. In this paper, we provide an illustration of such an architecture through the AOA (autonomous-oriented architecture) project developed by the LIP6. Finally, we discuss the pros and cons of this new architecture.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130595811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The revolution of train control system in Japan","authors":"Masayuki Matsumo","doi":"10.1109/ISADS.2005.1452145","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452145","url":null,"abstract":"The following report introduces train control systems applied in railway lines in Japan. The report also shows that train control systems have been developed and these are classified four levels from \"Level 0\" to \"Level 3\". We call these train control systems \"East Japan Train Control system\" (EJTC). \"Level 0\" system, the Automatic Train Stop device (ATS-S), was introduced into Japanese National Railways (JNR) to prevent train collision. This system has been replacing with Pattern type ATS (ATS-P); \"Level 1\" system. ATS-P was developed to eliminate the weaknesses of the ATS-S. Recent remarkable progress in the field of information technology makes possible a new train control system where train itself detects its location and communicates with other trains through radio transmission. Therefore, we have been developing the \"Level 3\" train control system called ATACS (Advanced Train Administration and Communications System). ATACS is the new train control system using information technology and ADS technology. ATACS prototype system is testing at Senseki Line in Tohoku district for practical use.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129367024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. P. Leguízamo, Minoru Takaishi, S. Kimura, K. Mori
{"title":"Assurance reconfiguration technology in decentralized database systems by an autonomous restructure mobile agent","authors":"C. P. Leguízamo, Minoru Takaishi, S. Kimura, K. Mori","doi":"10.1109/ISADS.2005.1452036","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452036","url":null,"abstract":"In the recent years, the society has suffered several changes in its ways and methods of consuming. The companies are providing services through the Internet to large number and uncertain customers. The customers require one-click service and their preferences changes dynamically. Autonomous decentralized database system (ADDS) is proposed as a system architecture in order to realize assurance in distributed database systems that support e-business. A background coordination technology, performed by an autonomous mobile agent, is devised to adapt the system to evolving situations. The system can achieve timeliness by allocating the information in advance among the sites that has different time constraints for updating. Further, the system is provided with an autonomous reconstruction technology to coordinate the heterogeneous requirements when the size of the system increases. Based on a autonomous restructure mobile agent (RMA), which autonomously determines how many sites and which sites should be restructured to improve the response time, this technique can adapt the system to the evolving situation dynamically. Thus, the assurance of the system can be maintained. A simulation shows the effectiveness of the proposed technology.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130131605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-based color image retrieval via lifting scheme","authors":"Huihui Huang, Wei Huang, Zhigang Liu, Wei-rong Chen, Q. Qian","doi":"10.1109/ISADS.2005.1452091","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452091","url":null,"abstract":"Content-based image retrieval (CBIR) aims at querying targets by using visual contents of image itself. Although classical wavelet transform is effective in representing image feature and thus is suitable in CBIR, it still encounters problems especially in implementation, e.g. floating-point operation and decomposition speed, which may nicely be solved by lifting scheme, a novel spatial approach for constructing biorthogonal wavelet filters. Lifting scheme has such intriguing properties as convenient construction, simple structure, integer-to-integer transform, low computational complexity as well as flexible adaptivity, revealing its potentials in CBIR. In this paper, by using general lifting and its adaptive version, we decompose HSI color images into multilevel scale and wavelet coefficients, with which, we can perform image feature extraction and similarity match by means of F-norm theory. Meanwhile, we provide a progressive image filtering strategy to achieve flexible CBIR. Eventually, the retrieval performances of lifting scheme are compared with those of its classical counterpart in retrieval accuracy and speed.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-agent system for security auditing and worm containment in metropolitan area networks","authors":"Xiantai Gou, Wei-dong Jin","doi":"10.1109/ISADS.2005.1452052","DOIUrl":"https://doi.org/10.1109/ISADS.2005.1452052","url":null,"abstract":"Security auditing and worm containment is used to guarantee the network security in metropolitan area networks. Multi-agent system for security auditing and worm containment in MAN (MSAWCM) is presented to audit user's accesses and provide a first-class automatic reaction mechanism that automatically applies containment strategies to prevent clean host from being infected by blocking the propagation of the worms MSAWCM uses broadband access server as information gathering agent that uses hardware packet filter (HPF) to get packet from MAN. It adaptively studies and audits the accessing in the whole network and dynamically changes the working parameters to detect the unknown worms. MSAWCM integrates worm detection system (WDS) and network management system (NMS). Reaction measures can be taken by using SNMP interface to control BAS as soon as the WDS detect the active worm. MSAWCM is very effective in blocking random scanning worms that are very noisy and tend to waste a lot of network bandwidth and crash routers. Simulation results indicate that high worm infection rate of epidemics can be avoided to a degree by MSAWCM blocking the propagation of the worms.","PeriodicalId":120577,"journal":{"name":"Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121524661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}