20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)最新文献

筛选
英文 中文
Methods to Forge ElGamal Signatures and Determine Secret Key 伪造电子签名及确定密钥的方法
Jingmei Liu, Xiangguo Cheng, Xinmei Wang
{"title":"Methods to Forge ElGamal Signatures and Determine Secret Key","authors":"Jingmei Liu, Xiangguo Cheng, Xinmei Wang","doi":"10.1109/AINA.2006.227","DOIUrl":"https://doi.org/10.1109/AINA.2006.227","url":null,"abstract":"We present a new method to forge ElGamal signatures with the cases that the secret key parameters of the system are not known under the chosen signature messages. The attacker can forge the signature substituting the right signature, and also attack the right secret key without depending on the computation of discrete logarithm. With the attacking probability cryptanalysis, it is found that the cryptosystem can be attacked successfully in some conditions","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dangerous Location Aware System for Assisting Kids Safety Care 帮助儿童安全护理的危险位置感知系统
K. Takata, Jianhua Ma, B. Apduhan
{"title":"A Dangerous Location Aware System for Assisting Kids Safety Care","authors":"K. Takata, Jianhua Ma, B. Apduhan","doi":"10.1109/AINA.2006.18","DOIUrl":"https://doi.org/10.1109/AINA.2006.18","url":null,"abstract":"This system focuses on a location-aware computing application and environment which provide preemptive information on dangerous locations in the kid's surroundings; i.e., the system alerts a kid on the move of the possible dangers whenever he/she is near accident prone areas. Using satellite-based GPS position sensing, this system can gradually learn and remember about the different locations that a kid routinely visits and/or passes by in his daily life, based on space-oriented contexts. The full set of system functionalities, including the map display, requires a graphical user interface. This location based services (LBSs) can compute the serious situations and alert kids to avoid dangerous situations. Our research can simulate the virtual environment as hyperspaces for kids safety care","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A multilayer topic-group based P2P network 基于多层主题组的P2P网络
Syu-Huan Chen, W. Tseng, Hsing Mei
{"title":"A multilayer topic-group based P2P network","authors":"Syu-Huan Chen, W. Tseng, Hsing Mei","doi":"10.1109/AINA.2006.38","DOIUrl":"https://doi.org/10.1109/AINA.2006.38","url":null,"abstract":"Considering that large and various contents are shared over thousands of peers across a P2P network, one challenging problem is to locate the target content in such a large and unorganized environment. Hence, a P2P system designed with the content classification and managed distribution is more efficient and reliable than the mass and unclassified ones. We propose a MLTG (multilayer topic-group) based P2P network. Two core concepts are integrated into the system structure: topic-group and hierarchic layer. Peers act as local peers, delegate peers and super-peers. These peers spread on different hierarchic layers and the system distributes the correlative resources among the same groups. Compared with the traditional P2P schemes, the MLTG is out-performed significantly. From the experiments, it saves up to 90% of query cost for the case of a single keyword query. When the query consists of topic and keywords, it saves up to 93% of cost. MLTG guarantees the enhancement of successful search and lower consumption of bandwidth. It also makes the system more available, reliable and efficient.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":" 35","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120834708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of a MidO2PL database replication protocol in the MADIS middleware architecture MADIS中间件体系结构中MidO2PL数据库复制协议的设计
J. E. Armendáriz-Iñigo, J. R. Garitagoitia, J. R. G. D. Mendívil, F. D. Muñoz-Escoí
{"title":"Design of a MidO2PL database replication protocol in the MADIS middleware architecture","authors":"J. E. Armendáriz-Iñigo, J. R. Garitagoitia, J. R. G. D. Mendívil, F. D. Muñoz-Escoí","doi":"10.1109/AINA.2006.140","DOIUrl":"https://doi.org/10.1109/AINA.2006.140","url":null,"abstract":"Middleware database replication techniques is a way to increase performance and fault tolerance without modifying the database management system (DBMS) internals. However, it introduces an additional overhead that may lead to poor response times. In this paper we present a modification of the optimistic two phase locking (O2PL) M.J. Carey et al. (1991) protocol that orders transactions by way of a deadlock prevention schema, instead of using the total order transaction delivery obtained by group communication systems (GCSs) G. Chockler et al. (2001) techniques, and do not need the 2 phase commit (2PC) rule P.A. Bernstein et al. (1987). We formalize its definition as a state transition system and show that it is 1-copy-serializable (1CS) P.A. Bernstein et al. (1987).","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Semi-blind Joint Data Equalization and Channel Estimation for Meteor Burst Communication 流星突发通信半盲联合数据均衡与信道估计
Zan Li, Jian Shen, Jueting Cai, Jueping Cai
{"title":"Semi-blind Joint Data Equalization and Channel Estimation for Meteor Burst Communication","authors":"Zan Li, Jian Shen, Jueting Cai, Jueping Cai","doi":"10.1109/AINA.2006.302","DOIUrl":"https://doi.org/10.1109/AINA.2006.302","url":null,"abstract":"According to the analysis of MBC (meteor burst communication) mechanism, a model of signal processing based on the structure of data frame is suggested for adaptive modulation and coding (AMC) of MBC system in this paper. There are two distinct modes of operation for signal processing: acquisition and tracking. The acquisition mode is a training period to initialize the channel estimation by frame header. The tracking mode is jointly to equalize payload data and to trace channel, where the principle of per-survivor processing (PSP) for maximum likelihood sequence detection (MLSD) is performed. A suboptimal method called D-PSP is adopted to save the computational time and memory size, which agrees with the slow-fading characteristic of meteor channel and makes the MLSD possible for adaptive modulation and coding of MBC system. Computer simulation results are included to support our development","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MEMOSEN: multi-radio enabled mobile wireless sensor network MEMOSEN:支持多无线电的移动无线传感器网络
Canfeng Chen, Jian Ma
{"title":"MEMOSEN: multi-radio enabled mobile wireless sensor network","authors":"Canfeng Chen, Jian Ma","doi":"10.1109/AINA.2006.213","DOIUrl":"https://doi.org/10.1109/AINA.2006.213","url":null,"abstract":"The combined and separated research advancement in the fields of sensing, communication, and computing have driven the research efforts in wireless sensor networks (WSN) in recent years. According to the traditional definition of WSNs, a dense, static, and prohibitively expensive sensor deployment is implicitly required, which has limited the feasibility of WSNs in non-military approaches. Aside from stationary sensor and sink deployment, the introduction of mobility of mobile terminals into WSNs can be leveraged to alleviate the burden of certain static sinks in order for efficient information repository, dissemination and sharing. In this paper, an architecture of multi-radio enabled mobile wireless sensor network (MEMOSEN) has been introduced, which has taken the heterogeneity and mobility of sensors and sinks into account. The capacity gain due to mobility in MEMOSEN has been addressed, and the design challenges and potential applications of MEMOSEN have been analyzed as well.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A reputation-chain trust model for the semantic Web 语义Web的声誉链信任模型
Yu Zhang, Huajun Chen, Zhaohui Wu, Xiaoqing Zheng
{"title":"A reputation-chain trust model for the semantic Web","authors":"Yu Zhang, Huajun Chen, Zhaohui Wu, Xiaoqing Zheng","doi":"10.1109/AINA.2006.53","DOIUrl":"https://doi.org/10.1109/AINA.2006.53","url":null,"abstract":"Trust plays a central role for efficient and secure interactions on the semantic Web. Nowadays, more and more research has focused on this topic. In this paper, we introduce RCSW, a reputation-chain trust model for the semantic Web. We illustrate the basic definitions and mechanisms of RCSW and present the algorithm to calculate trust ratings through the chain of the trust network. RCSW incorporates pairwise trust values and reliable factors of acquaintances and constructs an edge-weighted graph to calculate trust ratings. We also define classes of trust functions to allow users to individualize their trust calculation. Our proposed model can deal with trust management effectively and can quickly adapt to the changing environment.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126766581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment 移动环境下有效远程监测的批量检索技术
G. Keeni, Kazuhide Koide, Takeo Saitoh, N. Shiratori
{"title":"A Bulk-retrieval Technique for Effective Remote Monitoring in a Mobile Environment","authors":"G. Keeni, Kazuhide Koide, Takeo Saitoh, N. Shiratori","doi":"10.1109/AINA.2006.12","DOIUrl":"https://doi.org/10.1109/AINA.2006.12","url":null,"abstract":"For effective management it is necessary to have methods by which management applications can periodically retrieve large volumes of information from network devices. In this work we examine the issues related to standards-based bulk-information retrieval and then propose a technique that extends the limits of periodic bulk-retrieval. The impact of the technique is demonstrated using a prototype implementation with special emphasis on network monitoring, traffic management and security management by comparing with the widely used RMON technology. We then discuss the problems of monitoring in a mobile environment in the context of the newly defined IETF standards track mobile IPv6 management information base (MIPv6MIB) and show how the bulk retrieval technique can be used to provide a mechanism for reliable monitoring in a mobile environment","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116074537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An ontological approach for personalized services 个性化服务的本体论方法
C. Ribeiro, N. Rosa, P. Cunha
{"title":"An ontological approach for personalized services","authors":"C. Ribeiro, N. Rosa, P. Cunha","doi":"10.1109/AINA.2006.97","DOIUrl":"https://doi.org/10.1109/AINA.2006.97","url":null,"abstract":"The adoption of service-oriented approach and the increasing of business-to-consumer applications have produced impacts over software development. Traditional tasks, such as discovery of appropriate Web services, are becoming more and more an individual experience. This paper presents an ontological approach for personalized services that is based on the perception concept. The proposed model considers user preferences, priorities and constraints, the natural starting point for service configuration.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure and continuous management of heterogeneous ad hoc networks 异构自组织网络的安全和持续管理
A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli
{"title":"Secure and continuous management of heterogeneous ad hoc networks","authors":"A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli","doi":"10.1109/AINA.2006.298","DOIUrl":"https://doi.org/10.1109/AINA.2006.298","url":null,"abstract":"Addition of new nodes to a sensor network is a fundamental requirement for their continuity operation over time. We analyze the weakening of security due to node capture when adding sensor nodes using key predistribution schemes with \"fixed\" key pools. We have also developed an approach, which provides a significant improvement in security after multiple deployments through the use of multiple key pools, strong nodes and actors. These strong nodes are used as bridges between nodes of various deployments. To achieve better connectivity we use nodes of varying capabilities with the connectivity being a function of the quality of nodes available. We also explore the role that can be played by actors in enhancing connectivity.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122914845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信