20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)最新文献

筛选
英文 中文
Software Agents for Meeting Scheduler 软件代理会议调度
E. Shakshuki, Hsiang-Hwa Koo
{"title":"Software Agents for Meeting Scheduler","authors":"E. Shakshuki, Hsiang-Hwa Koo","doi":"10.1109/AINA.2006.315","DOIUrl":"https://doi.org/10.1109/AINA.2006.315","url":null,"abstract":"Scheduling a meeting that involves persons with different commitments and preferences is a difficult task. This paper presents a multi-agent system in which each person is represented by an agent. Each agent has its own capabilities to manage, negotiate and schedule tasks, meetings, events, appointments for its assigned user. In this multi-agent system, the agents coordinate their activities and negotiate on behalf of their associated users to find a solution that satisfies the users' desires. A prototype is implemented and evaluation of preliminarily results is demonstrated","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DoS packet filter using DNS information 使用DNS信息进行DoS包过滤
Tsuyoshi Chiba, T. Katoh, B. B. Bista, T. Takata
{"title":"DoS packet filter using DNS information","authors":"Tsuyoshi Chiba, T. Katoh, B. B. Bista, T. Takata","doi":"10.1109/AINA.2006.155","DOIUrl":"https://doi.org/10.1109/AINA.2006.155","url":null,"abstract":"A DoS (denial of service) attack is one of the most serious threats in the Internet. It is important to protect the resources and services from the DoS attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS attackers generally hide their true identities/origins. In this paper, we propose a technique to reduce the influence of the DoS attack without disturbing the demand of the regular users by allocating the information, when DoS attack occurs, to the filtering rules. This can be done by using DNS request replies.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121416395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An enhanced zone-based routing protocol for mobile ad-hoc networks based on route reliability 一种基于路由可靠性的增强移动自组网区域路由协议
A. Koyama, Yoshitaka Honma, J. Arai, L. Barolli
{"title":"An enhanced zone-based routing protocol for mobile ad-hoc networks based on route reliability","authors":"A. Koyama, Yoshitaka Honma, J. Arai, L. Barolli","doi":"10.1109/AINA.2006.88","DOIUrl":"https://doi.org/10.1109/AINA.2006.88","url":null,"abstract":"In mobile ad-hoc networks (MANET), the nodes intercommunicate through single-hop and multi-hop paths in a peer-to-peer fashion. Intermediate nodes between two pairs of communication nodes act as routers. Thus the nodes operate both as hosts and routers. The nodes are mobile, so the topology of the network may change rapidly and unexpectedly. One of well-known routing protocol for ad-hoc networks is zone routing protocol (ZRP). However when the protocol searches for a new route, it sends many useless control packets, which increase the network load and decrease the network performance. In this paper, we propose an enhanced zone routing protocol (EZRP). In EZRP, each node calculates the reliability of the route. In the case of reliable route, the source node sends the data packet directly to the destination node using that route without route searching. While, in the case of unreliable route, the source node searches for a new route again. We show that the network performance can be improved by using EZRP.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A novel power control multiple access protocol for ad hoc networks with directional antennas 一种新的定向天线自组网功率控制多址协议
Z. Xiaodong, Liang Jiandong, Zhao Dongfang
{"title":"A novel power control multiple access protocol for ad hoc networks with directional antennas","authors":"Z. Xiaodong, Liang Jiandong, Zhao Dongfang","doi":"10.1109/AINA.2006.46","DOIUrl":"https://doi.org/10.1109/AINA.2006.46","url":null,"abstract":"A multiple access protocol with busy tone (BT) for mobile ad hoc network (MANET) using directional antennas, named as BT-DMACP, is proposed with consideration of the hidden terminal problems and side lobe interference caused by directional antennas. The RTS/CTS (request-to-send/clear-to-send) handshake, directional busy tones and power control algorithm are integrated in BT-DMACP to accurately control the transmission power and minimize the side lobe interference. An adaptive algorithm is designed to estimate the interference power at the receiver. Simulation results show that BT-DMACP protocol effectively supports the application of directional antennas and provides higher channel utilization and lower energy consumption.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Unpuzzling Puzzle (analysis of a video encryption algorithm) 解谜题(视频加密算法分析)
M. Stanek, Lubica Staneková
{"title":"Unpuzzling Puzzle (analysis of a video encryption algorithm)","authors":"M. Stanek, Lubica Staneková","doi":"10.1109/AINA.2006.339","DOIUrl":"https://doi.org/10.1109/AINA.2006.339","url":null,"abstract":"We analyze recently proposed encryption algorithm Puzzle, aimed at efficient (real time) encryption of video streams. We show some weaknesses in the generation of components used for encryption. Moreover, we present a known plaintext attack on Puzzle. Some ideas on design of video encryption algorithms are discussed as well","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"51 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward role-based agent coordination for mobile and ubiquitous services 面向移动和无处不在服务的基于角色的代理协调
A. Sashima, Noriaki Izumi, K. Kurumatani, Y. Kotani
{"title":"Toward role-based agent coordination for mobile and ubiquitous services","authors":"A. Sashima, Noriaki Izumi, K. Kurumatani, Y. Kotani","doi":"10.1109/AINA.2006.328","DOIUrl":"https://doi.org/10.1109/AINA.2006.328","url":null,"abstract":"Typically, studies of ubiquitous computing environments focus on context-aware assistance for activities in a closed domain, such as guide systems in museums, and ignore ways of coordinating services between two different service environments. However, it is important to provide them with personalized assistance services that seamlessly coordinate two service environments for the users who move from an open ubiquitous computing environment to other. This study specifically examines seamless personalized services for mobile users and presents a framework of role-based agent coordination to provide services for them. In that framework, personal agents, which are always with the users, play roles assigned by a role manager agent when they participate in new environments. We show a new agent coordination protocol, which is an extension of the contract-net protocol, to perform context-aware role assignments to realize those services.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114792827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
QoS routing in a multi-robot network system for urban search and rescue 城市搜救多机器人网络系统中的QoS路由
Hisayoshi Sugiyama, T. Tsujioka, M. Murata
{"title":"QoS routing in a multi-robot network system for urban search and rescue","authors":"Hisayoshi Sugiyama, T. Tsujioka, M. Murata","doi":"10.1109/AINA.2006.279","DOIUrl":"https://doi.org/10.1109/AINA.2006.279","url":null,"abstract":"This paper investigates QoS routing in an ad hoc network applied to a multi-robot network system named the \"victim detection system\" proposed for detecting victims in urban disaster areas. For the purpose to secure the survivability of victims, a modified frame structure is examined in this paper based on the already proposed method: synchronized QoS routing. This modified scheme improves the network performance of victim detection system including rate of successful communication, call setup time and transmission breakage interval. These improvements are confirmed by computer simulations.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124083375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Bridging the e-gaps: towards post-ubiquitous computing 弥合电子鸿沟:走向后无处不在的计算
T. Suganuma, Takahiro Uchiya, N. Shiratori, S. Konno, G. Kitagata, Tetsuo Kinoshita, H. Hara, S. Fujita, K. Sugawara
{"title":"Bridging the e-gaps: towards post-ubiquitous computing","authors":"T. Suganuma, Takahiro Uchiya, N. Shiratori, S. Konno, G. Kitagata, Tetsuo Kinoshita, H. Hara, S. Fujita, K. Sugawara","doi":"10.1109/AINA.2006.119","DOIUrl":"https://doi.org/10.1109/AINA.2006.119","url":null,"abstract":"We have been working on research and development of advanced network and applications called \"flexible computing\". We are now in the next stage of this research, strongly pressing forward the concept of flexible computing, namely, \"symbiotic computing\", towards next generation computing model based on co-existence of real space and digital space. In this paper, we explain basic concepts, architecture and enabling technologies of symbiotic computing that we are aiming to develop.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127880117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Design and implementation for a bimanual input system on virtual environments 虚拟环境下双人工输入系统的设计与实现
T. Yoshihisa, K. Koyamada, Yukio Yasuhara, M. Tsukamoto
{"title":"Design and implementation for a bimanual input system on virtual environments","authors":"T. Yoshihisa, K. Koyamada, Yukio Yasuhara, M. Tsukamoto","doi":"10.1109/AINA.2006.139","DOIUrl":"https://doi.org/10.1109/AINA.2006.139","url":null,"abstract":"Recently, immersive projection technology (IPT) systems such as CAVE and CABIN have attracted great attention. In IPT systems, since we can experience virtual environments with whole body, these can provide high immersive virtual environments. To interact with virtual environments easily, IPT systems often adopt one-handed input systems. However, by using bimanual input systems, their operationality, e.g., walking-through and pointing, can be improved. Although there are several bimanual input systems for virtual environments, these have not been used for IPT systems. In this paper, we propose a bimanual input system for IPT systems. In our proposed system, users wear compact joysticks on both hands and their hands' positions are detected by magnetic sensors. By using the system, users can interact with the virtual environment in the IPT system. From our evaluations, we confirmed that our proposed system provides fast and easy operations in virtual environments.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On optimization and parallelization of fuzzy connected segmentation for medical imaging 医学影像模糊连通分割的优化与并行化
Christopher Gammage, V. Chaudhary
{"title":"On optimization and parallelization of fuzzy connected segmentation for medical imaging","authors":"Christopher Gammage, V. Chaudhary","doi":"10.1109/AINA.2006.245","DOIUrl":"https://doi.org/10.1109/AINA.2006.245","url":null,"abstract":"Fuzzy Connectedness is an important image segmentation routine for image processing of medical images. It is often used in preparation for surgery and sometimes during surgery. It is important to have an algorithm which can execute very fast, especially in the intra-operative environment. We have taken code from a popular image processing toolkit called ITK and ported it to a C environment. We optimized the implementation to give maximal performance (giving speedup of 23 times). We attempted three different levels of parallelization. We found that MPI was not an efficient method of parallelization as the algorithm is data dependant and large amounts of communication must be done. This communication overshadows the speed increase from doing computation on multiple processors, or nodes in a cluster. However, some limited speedup over the optimizations was obtained using OpenMP on an SMP system leading to a speedup of fifty using four processors over the original ITK implementation.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信