18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.最新文献

筛选
英文 中文
On agents' cooperative behavior based on potential field 基于势场的agent合作行为研究
T. Katoh, K. Hoshi, N. Shiratori
{"title":"On agents' cooperative behavior based on potential field","authors":"T. Katoh, K. Hoshi, N. Shiratori","doi":"10.1109/AINA.2004.1283775","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283775","url":null,"abstract":"In multiagent system, it is important for agents to assess the situation prevailing in the system, especially to anticipate other agents' intentions. We argue in favor of cooperation among agents and propose a new method to utilize potential field as a tool for estimation of the environment. In our method, potential of environment gives agents some criteria to assess environmental situations from their own perspective. The potential of each object represents its influence on the environment and the environmental potential, i.e., summation of each object's potential, represents global situation of the environment. Agents' decision of their behavior will be done by refining the policy obtained from potential. We use a trash collecting problem as an example to show the effectiveness of our method. Furthermore, we show the efficiency of our method by some sets of experiments of the trash collecting problem. We also discuss the applicability of our method to hybrid systems, environments where available information has a margin of error, or environments where agents' range of vision are limited.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115289469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An overlay network architecture for data placement strategies in a P2P streaming network 一种用于P2P流网络中数据放置策略的覆盖网络架构
K. Wan, C. Loeser
{"title":"An overlay network architecture for data placement strategies in a P2P streaming network","authors":"K. Wan, C. Loeser","doi":"10.1109/AINA.2004.1283898","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283898","url":null,"abstract":"Generic file sharing P2P applications have gained high popularity in the past few years. In particular P2P streaming architectures have attracted attention. Some of them consider many-to-one streaming or high level multicast techniques. In contrast to these models we propose techniques and algorithms for point-to-point streaming in autonomous systems as it might occur in large companies, a campus or even in large hotels. Therefore we introduce the architecture of an overlay network. Each subnetwork contains local active rendezvous server (LARS) which do not just act as directory server but also control availability of movie content in their subnetwork. Due to this we consider data placement strategies depending on restrictions of network bandwidth and peer capabilities as well as the movies's access frequency.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121228884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A secure steganography scheme based on (N,t) threshold 一种基于(N,t)阈值的安全隐写方案
K. Fan, W. Kou
{"title":"A secure steganography scheme based on (N,t) threshold","authors":"K. Fan, W. Kou","doi":"10.1109/AINA.2004.1283861","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283861","url":null,"abstract":"To solve the problems due to the restriction of the handheld devices and the improperness of traditional steganography schemes in m-commerce applications, a secure steganography scheme based on (N,t) threshold is proposed and its security is analyzed. This scheme can significantly reduce the computing complexity and the requirements for the communication devices. It also improves the security. This scheme enables clients to securely conduct m-commerce transactions and carry out steganographic communication using their handheld devices. The proposed scheme can resist various attack methods.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130673694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed pipelining processing for index updating method 分布式流水线处理索引更新方法
Minoru Udagawa, N. Sato, M. Uehara, Y. Sakai
{"title":"Distributed pipelining processing for index updating method","authors":"Minoru Udagawa, N. Sato, M. Uehara, Y. Sakai","doi":"10.1109/AINA.2004.1283850","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283850","url":null,"abstract":"Crawling and indexing have been considered regarding existing search engines, but whereas high speed crawling has been studied widely, improvements in the speed of indexing have seldom been discussed. Building a fresh information search engine should, however, unify these arguments concerning crawling and indexing. In this report, an index updating process based on a pipeline that unifies crawling and indexing was proposed. The techniques of a distributed index updating process are discussed with regards to a distributed cooperative search engine.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130879300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A GA-based multi-purpose optimization algorithm for QoS routing 基于遗传算法的QoS路由多目标优化算法
A. Koyama, L. Barolli, Kazunori Matsumoto, B. Apduhan
{"title":"A GA-based multi-purpose optimization algorithm for QoS routing","authors":"A. Koyama, L. Barolli, Kazunori Matsumoto, B. Apduhan","doi":"10.1109/AINA.2004.1283882","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283882","url":null,"abstract":"The routing algorithms for multimedia communication should use for routing more than one QoS parameter. This is because new services such as video on demand and remote meeting systems require better QoS. However, the problem of QoS routing is difficult and to find a feasible route with two independent path constraints is NP-complete. Also, QoS routing algorithms for broadband networks must be adaptive, flexible, and intelligent for efficient network management. In this paper, we propose a multipurpose optimization method for QoS routing based on genetic algorithm (GA). The simulation results show that proposed method has a good performance and is a promising method for QoS routing.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Performance analysis of IEEE 802.11 WLAN to support voice services 支持语音业务的IEEE 802.11 WLAN性能分析
Changle Li, Jiandong Li, Xuelian Cai
{"title":"Performance analysis of IEEE 802.11 WLAN to support voice services","authors":"Changle Li, Jiandong Li, Xuelian Cai","doi":"10.1109/AINA.2004.1283818","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283818","url":null,"abstract":"This paper studies the performance of the IEEE 802.11 standard MAC protocol for integrated data and voice transmission with the DCF (distributed coordination function) and the PCF (point coordination function). By simulation, we evaluate the network performance for various protocol parameters, especially, the delay jitter for voice traffic. The main factor to influence delay jitter is given. Numerical results show that it is important to choose appropriate parameters and compromise the number of voice stations and the data traffic throughput to get the enhanced performance of IEEE 802.11. The performance of protocol in theory is derived and is verified by the simulation results.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129831762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The study of handoff prediction schemes for resource reservation in mobile multimedia wireless networks 移动多媒体无线网络中资源预留切换预测方案研究
Li-Liann Lu, Jean-Lien C. Wu, Wei-Yeh Chen
{"title":"The study of handoff prediction schemes for resource reservation in mobile multimedia wireless networks","authors":"Li-Liann Lu, Jean-Lien C. Wu, Wei-Yeh Chen","doi":"10.1002/dac.667","DOIUrl":"https://doi.org/10.1002/dac.667","url":null,"abstract":"In this paper, the mobility-dependent predictive resource reservation (MDPRR) scheme is proposed to provide flexible usage of limited resource in mobile multimedia wireless networks. An admission control scheme is also considered to further guarantee the QoS of real-time traffic. The area of a cell is divided into non-handoff, pre-handoff, and handoff zones so that bandwidth is reserved in the target/sub-target cell as mobile stations move into the pre-handoff zone and leave the serving base station. The amount of bandwidth to be reserved is dynamically adjusted according to the location, the instantaneous variation of velocity and direction of mobile stations. Two scenarios of the MDPRR scheme are compared by considering the velocity threshold in the calculation of the weight of direction. The results show that employing the velocity threshold in the MDPRR scheme can indeed reduce connection dropping probability, and make better usage of the reserved bandwidth.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125643861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A proposal of a streaming video system in best-effort networks using adaptive QoS control rules 提出了一种基于自适应QoS控制规则的最佳努力网络流视频系统
Y. Kato, Dongmei Jiang, K. Hakozaki
{"title":"A proposal of a streaming video system in best-effort networks using adaptive QoS control rules","authors":"Y. Kato, Dongmei Jiang, K. Hakozaki","doi":"10.1109/AINA.2004.1283755","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283755","url":null,"abstract":"We propose a streaming video system, which can be used in various system environments. This system has three features for providing real-time video delivery services in the Internet. The first is to use QoS (quality of service) control rules adapting to the system environments. The second is to improve estimation accuracy of the network conditions while a user is watching a stream. The third is to notify QoS degradation factors to the user actively. These features make it possible to provide streaming services with a high level of user satisfaction. We show an experimental system in our laboratory as an implementation example.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126257907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
KEITAI-Space: photo-based shared virtual space on cellular phones KEITAI-Space:基于照片的手机共享虚拟空间
T. Nakao, M. Tsukamoto, T. Ogawa, S. Nishio
{"title":"KEITAI-Space: photo-based shared virtual space on cellular phones","authors":"T. Nakao, M. Tsukamoto, T. Ogawa, S. Nishio","doi":"10.1109/AINA.2004.1283937","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283937","url":null,"abstract":"Virtual space, which models the real world, brings lots of benefits when it covers a considerably wide area and can be used in a mobile computing environment. However, there are some difficulties in implementing virtual space on the mobile computing environment, mainly due to hardware limitations such as computation power, communication capability, and memory size. In this paper, we ease the difficulties of using large-scale virtual space based on the real world (LVBR) in the mobile environment. We have established a scalable and efficient method of constructing and managing LVBR on cellular phones, and have implemented a system named KEITAI-Space. KEITAI-Space is designed to provide the scalable photo-based virtual space to cellular phones that takes into account the hardware limitations. The virtual space is made of a collection of photos and can be edited and expanded by people with cellular phones on hand.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127087643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-agent system for security service 安全服务的多代理系统
E. Shakshuki, Zhonghai Luo, Jing Gong, Qian Chen
{"title":"Multi-agent system for security service","authors":"E. Shakshuki, Zhonghai Luo, Jing Gong, Qian Chen","doi":"10.1109/AINA.2004.1283928","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283928","url":null,"abstract":"This paper presents a multi-agent security service system architecture. This system consists of four types of agents: interface, authentication, authorization, and service provider agents. The interface agents interact with the users to fulfill their interests. The authentication agents investigate the validity of using keystroke dynamics to strengthen security. The authorization agents decide who can access which resources and for what purposes. The service provider agents offer different encryption services to different users. A prototype of the system is implemented using the Java agent development framework (JADE).","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"51 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信