2008 Third International Conference on Internet and Web Applications and Services最新文献

筛选
英文 中文
Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments 动态分布式计算环境下高效服务供给的信任管理框架
M. Louta, A. Michalas
{"title":"Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments","authors":"M. Louta, A. Michalas","doi":"10.1109/ICIW.2008.44","DOIUrl":"https://doi.org/10.1109/ICIW.2008.44","url":null,"abstract":"In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally), thus, leading to a significant deterioration of system's performance. In this study, a reputation mechanism is proposed which helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in consistently satisfying SRRs' expectations. The reputation mechanism is distributed, considers both first-hand information (acquired from the SRR's direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs' past experiences with the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers U-Training。为高等教育教师创建无处不在的培训门户的框架
Oscar Díaz-Alcántara
{"title":"U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers","authors":"Oscar Díaz-Alcántara","doi":"10.1109/ICIW.2008.27","DOIUrl":"https://doi.org/10.1109/ICIW.2008.27","url":null,"abstract":"This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teachers in ICTs. The first approach consisted of training teachers in the collaborative learning strategy using the technology tools of a learning management system. The second approach consisted of personalised training in a controlled space and with specific tools for teachers courses. This second approach was concluded with the creation of a laboratory called CEIC lab, which has an ergonomic-didactic layout. The third approach is described in this project and unites the experiences and results of the previous two approaches. This third approach called u-training combines instructional design, e-commerce, marketing, ICTs, a metric control programme and a reward management programme to create a ubiquitous training portal so that teacher training can be available anywhere and anytime.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices 移动设备P2P激励机制的安全性分析
Jani Suomalainen, Anssi Pehrsson, J. Nurminen
{"title":"A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices","authors":"Jani Suomalainen, Anssi Pehrsson, J. Nurminen","doi":"10.1109/ICIW.2008.116","DOIUrl":"https://doi.org/10.1109/ICIW.2008.116","url":null,"abstract":"Peer-to-peer applications are emerging into mobile devices. However, resource limitations of these devices introduce new challenges for P2P technologies. For instance, there is a need for incentive mechanisms, which address the free riding problem but do not waste devices' battery or communication resources. A centralized and user-identity based incentive mechanism enables mobile users to contribute with any device and receive P2P services with mobile devices. We explore security issues related to a centralized incentive mechanism by analyzing and classifying threats and potential security mechanisms. We propose a privacy preserving security architecture. The architecture is based on authentication, software tamper protection, and misbehavior detection mechanisms. Further, we provide a discussion on potential security compromises, not jeopardizing sufficient security level, and describe a prototype implementation for mobile BitTorrent file sharing peers.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Web Application to Generate Route Bus Timetables 生成路线巴士时刻表的Web应用程序
K. Toshioka, T. Kawamura, K. Sugahara
{"title":"Web Application to Generate Route Bus Timetables","authors":"K. Toshioka, T. Kawamura, K. Sugahara","doi":"10.1109/ICIW.2008.75","DOIUrl":"https://doi.org/10.1109/ICIW.2008.75","url":null,"abstract":"Bus route system is the fundamental transportation device for aged people and students, and has an important role in every province. However, passengers decreases year by year, therefore the authors have developed the shortest path searching system called \"BUS-NET\" as a web application to sustain the public transport. Here, we take up generation of timetables. In general, timetable generation is considered as a very simple problem. However, there are some difficult problems. Firstly, bus stops of the same name are managed as one bus stop in the database of our system on grounds that error and cost decrease. Therefore, when timetables are generated, such bus stops must be distinguished. Secondly, there are so many bus stops in the timetables of bus route. However, all of them are not needed for an individual user in most cases. Thus, some bus stops may be excluded when a user intends to obtain a timetable of a bus route. In this paper, the authors report on the algorithms to solve those problems and the implementations, experiments of the functions.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing Web Service Performance by Replication at the Operating System Level 在操作系统级别通过复制处理Web服务性能
V. Stantchev, M. Malek
{"title":"Addressing Web Service Performance by Replication at the Operating System Level","authors":"V. Stantchev, M. Malek","doi":"10.1109/ICIW.2008.113","DOIUrl":"https://doi.org/10.1109/ICIW.2008.113","url":null,"abstract":"This paper evaluates replication possibilities for Web services at the operating system level and how they affect Web service performance. This is done in the context of architectural translucency - an approach that defines layers in a service-oriented architecture and states that similar measures have different implications on nonfunctional properties when applied at different layers in different ways. The observed layer here is the operating system. The work presents current request processing techniques and how they are implemented in a typical platform for Web services (Windows Server 2003, IIS and .NET). It then proposes two ways to replicate Web services - per-process replication and per-thread replication and techniques to configure them on the selected platform. The case study demonstrates the feasibility of the concept with performance advantages of up to 50%.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Dynamic Voice Portal for Delivery of Cultural Content 提供文化内容的动态语音门户
Evangelia Boufardea, J. Garofalakis, A. Plessas
{"title":"A Dynamic Voice Portal for Delivery of Cultural Content","authors":"Evangelia Boufardea, J. Garofalakis, A. Plessas","doi":"10.1109/ICIW.2008.90","DOIUrl":"https://doi.org/10.1109/ICIW.2008.90","url":null,"abstract":"Many companies today are providing customer services via the Web and the telephone. Demand for providing Web data in audio form is increasing every day. Voice response facilities are used for various kinds of information over the phone: time, weather, horoscopes, lottery results, sports events, news, etc. VoiceXML is an enabling technology for creating a streamlined speech-based interface for web-based information services. Speech technology, as it improves, will become a very natural and powerful interface for ubiquitous access to information. Moreover, VoiceXML applications are available through computers or through the telephone, which is a universal means of communication. In this paper, we describe a dynamic speech-enabled system powered by VoiceXML in which the available information is dynamically generated by PHP.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Repository and Data Layer in Hyperbook System Using XML RDBS 基于XML RDBS的Hyperbook系统中的数据存储库和数据层
Abdoulmajid Hakki, A. Kaarna
{"title":"Data Repository and Data Layer in Hyperbook System Using XML RDBS","authors":"Abdoulmajid Hakki, A. Kaarna","doi":"10.1109/ICIW.2008.92","DOIUrl":"https://doi.org/10.1109/ICIW.2008.92","url":null,"abstract":"In this paper we consider the use of XML technology for the data repository and data layer in the Hyperbook system. We propose the Hyperbook data layer (HBDL) for Hyperbook data repository using RDBMS. In HBDL the transformation technique from XML to relational data is the schema independent. The approach observes an XML file as consisting of terms of hierarchical data structure. Each node of data is made up of label and data fields. Each node is converted to a record in a relational table.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Episodes and Workflow Integration: A Use Case in LD-CAST 业务片断和工作流集成:LD-CAST中的一个用例
D. Karagiannis, R. Woitsch, W. Utz, Vedran Hrgovcic, H. Eichner
{"title":"Business Episodes and Workflow Integration: A Use Case in LD-CAST","authors":"D. Karagiannis, R. Woitsch, W. Utz, Vedran Hrgovcic, H. Eichner","doi":"10.1109/ICIW.2008.88","DOIUrl":"https://doi.org/10.1109/ICIW.2008.88","url":null,"abstract":"The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. This approach is evaluated and presented through the use case example from the LD-CAST project (FP6-ICT-26919).","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On Secure and Anonymous Buyer-Seller Watermarking Protocol 安全匿名买卖水印协议研究
Mina Deng, B. Preneel
{"title":"On Secure and Anonymous Buyer-Seller Watermarking Protocol","authors":"Mina Deng, B. Preneel","doi":"10.1109/ICIW.2008.28","DOIUrl":"https://doi.org/10.1109/ICIW.2008.28","url":null,"abstract":"Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we analyze the security of some previously proposed protocols, and propose a secure and anonymous buyer-seller watermarking protocol. In contrast to early work, our improvement on the protocol's security properties ensures that the design requirements are fulfilled. The proposed protocol is able to simultaneously solve the piracy tracing problem, the customer's rights problem, the unbinding problem, the anonymity problem, the conspiracy problem, and the dispute problem. In the proposed protocol, a buyer can purchase digital contents anonymously but his anonymity can be revoked as soon as he is adjudicated to be guilty by a legal institute, such as civil court.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Checkable Domain Management with Ontology and Rules 带有本体和规则的可检查域管理
Atif Alvi, D. Greaves
{"title":"Checkable Domain Management with Ontology and Rules","authors":"Atif Alvi, D. Greaves","doi":"10.1109/ICIW.2008.65","DOIUrl":"https://doi.org/10.1109/ICIW.2008.65","url":null,"abstract":"Control of pervasive computing environments is a well- known problem. Such management has to tackle issues of heterogeneity, dynamic binding, interoperability, security, and scalability, among others. The approach used in our AutoHAN home automation system is presented here. It employs a high-level rule-based control atop an ontological substrate, interacting with an application-level layer of rules. This design allows formalised representation of a domain, which lends itself to checkability, along with its reliable control. We discuss the implementation and characteristics of our approach.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信