18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.最新文献

筛选
英文 中文
Development and evaluation of a minutes system focusing on importance in a meeting 开发和评估会议记录系统,重点关注会议的重要性
Daishiro Hirashima, Michiru Tanaka, Y. Teshigawara
{"title":"Development and evaluation of a minutes system focusing on importance in a meeting","authors":"Daishiro Hirashima, Michiru Tanaka, Y. Teshigawara","doi":"10.1109/AINA.2004.1283806","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283806","url":null,"abstract":"At meetings, a variety of outputs such as presentation materials, text minutes, video/audio data are generated. Both meeting participants and absentees can easily understand meeting minutes easily if these data are mutually referred and extracted important points. Therefore, focusing on participants' importance, we have proposed and developed the system that automatically produces Web pages by collecting and editing meeting data with much labor saving so as to easily understand a sequence of meeting. The importances submitted by participants are automatically collected and showed their status to participants in this system. We developed, first, prototype version 1 and then enhanced to version 2 by taking into consideration of evaluation results obtained from user feedbacks. Finally, we state evaluation results of new version, and show the validity of our developed system.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123054120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Public-device resource management preventing danger of exposure 公共设备资源管理,防止暴露危险
Ken'ichiro Kanehana, H. Saito, Y. Tobe
{"title":"Public-device resource management preventing danger of exposure","authors":"Ken'ichiro Kanehana, H. Saito, Y. Tobe","doi":"10.1109/AINA.2004.1283856","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283856","url":null,"abstract":"In this paper we propose a new scheme of managing resources on public devices used by private devices. Due to the advancement of wireless LAN technologies, wireless hot spots are becoming popular in the cities. In such hot spots, we can expect that public devices such as large displays and printers be available in the future as well. Assuming that these public devices are used by anonymous group of users, there are several threats of group-secret information being exposed or unintentionally left on public devices. To overcome the problems, secure management of personalization association (SAPEA) is introduced. SAPEA has two fundamental mechanisms: accessible-zone based and soft-state management of public devices. In particular, files which are the fundamental resources in SAPEA can be extinguished even when they are being used to avoid exposure to illegitimate users. In this paper we describe the design and implementation of SAPEA on Linux PCs with Bluetooth.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131581578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure m-commerce model based on wireless local area network 基于无线局域网的安全移动商务模型
Xiaohui Li, W. Kou
{"title":"A secure m-commerce model based on wireless local area network","authors":"Xiaohui Li, W. Kou","doi":"10.1109/AINA.2004.1283857","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283857","url":null,"abstract":"The focus of this paper is on a secure mobile commerce model based on wireless local area network (WLAN). The model is investigated through the accessing procedure, the roaming management procedure, and the electronic trade procedure. To solve the security problem in the WLAN, a novel authentication method is proposed, in which the mobile node (MN) is validated twice by an access point (AP) and a mobile agent (MA), and all the devices are authenticated in a register procedure with the PKI/CA mechanism. Finally, the advantages of the model are analyzed.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A small IP forwarding table using hashing 一个使用哈希的小IP转发表
Yeim-Kuan Chang, Wen-Hsin Cheng
{"title":"A small IP forwarding table using hashing","authors":"Yeim-Kuan Chang, Wen-Hsin Cheng","doi":"10.1109/AINA.2004.1283956","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283956","url":null,"abstract":"As the demand for high bandwidth on the Internet increases, it is required to build next generation routers with the capability of forwarding multiple millions of packets per second. Reducing the required memory size of the forwarding table is a possible solution since small forward table can be integrated into the application specific integrated circuit (ASIC). In this paper a hash technique is developed to make the IP forwarding table as small as possible. The experiments show that the required memory size of the proposed scheme is smaller than other existing schemes for a large routing table.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed replication and caching: a mechanism for architecting responsive Web services 分布式复制和缓存:用于构建响应式Web服务的机制
V. Wietrzyk, R. Lawson, R. Schmid, Vijay K. Khandelwal, M. Takizawa, T. Enokido
{"title":"Distributed replication and caching: a mechanism for architecting responsive Web services","authors":"V. Wietrzyk, R. Lawson, R. Schmid, Vijay K. Khandelwal, M. Takizawa, T. Enokido","doi":"10.1109/AINA.2004.1283805","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283805","url":null,"abstract":"The focus is on the mechanism that supports the provision of the adequate service level by relying on Web system architecture with multinode clustering. Replication of Web documents can improve both performance and reliability of the Web service. Server selection algorithms allow Web clients to select one of the replicated servers which is \"close \" to them and thereby minimize the response time of the Web service.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bandwidth efficiency of an image compression method for information hiding 一种用于信息隐藏的图像压缩方法的带宽效率
Chinchen Chang, T. Lu, Yi-Long Liu
{"title":"Bandwidth efficiency of an image compression method for information hiding","authors":"Chinchen Chang, T. Lu, Yi-Long Liu","doi":"10.1109/AINA.2004.1283947","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283947","url":null,"abstract":"In order to improve the compression rate of vector quantization (VQ) during compression, a re-encoding scheme, called spiral scan re-encoding (SSR), was designed to compact the indices in VQ. Based on the SSR scheme, we propose a novel lossless hiding scheme, called IHSSR. When the scheme is used, information is hidden in the compression code for increasing the bandwidth efficiency of the compressed code. The IHSSR system was developed to test the performance of the IHSSR scheme. According to the experimental results, the IHSSR system can efficiently hide secret information in the compression code of indices without modifying its content. The decoding process can obtain the hidden secret information and the indices. Only a small number of extra bits are needed to record the corresponding information.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A graph-based methodology for analyzing IP spoofing attack 基于图的IP欺骗攻击分析方法
Voravud Santiraveewan, Y. Permpoontanalarp
{"title":"A graph-based methodology for analyzing IP spoofing attack","authors":"Voravud Santiraveewan, Y. Permpoontanalarp","doi":"10.1109/AINA.2004.1283792","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283792","url":null,"abstract":"Firewalls offer a protection for private networks against both internal and external attacks. However, configuring firewalls to ensure the protections is a difficult task. The main reason is the lack of methodology to analyze the security of firewall configurations. IP spoofing attack is an attack in which an attacker can impersonate another person towards a victim. We propose a new methodology for verifying the vulnerability of firewall configurations to IP spoofing attack and for synthesizing IP spoofing-free configurations. Our methodology is based on graph theory, which provides a simple and intuitive approach to the vulnerability analysis of the attack.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Delay-differentiable fair queueing (D/sup 2/FQ): a low complexity scheduling algorithm for packet-switched networks 延迟可微公平排队(D/sup 2/FQ):一种用于分组交换网络的低复杂度调度算法
M. Yan, C. K. Li
{"title":"Delay-differentiable fair queueing (D/sup 2/FQ): a low complexity scheduling algorithm for packet-switched networks","authors":"M. Yan, C. K. Li","doi":"10.1109/AINA.2004.1283896","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283896","url":null,"abstract":"In a packet-switched network, latency is unavoidable and its characteristic always depends on the type of traffic flows and operating conditions. These affect the kind of services that the network can support as well as the quality of service (QoS) that the system can provide. Providing a fair service for users is always the main concern for operators as well as service providers. A fair delay-differentiable queueing algorithm with QoS support called Delay-Differentiable Fair Queueing (D/sup 2/FQ) is proposed. In the proposed algorithm, an additional delay-slot is used to re-order the departure order of flows according to its delay weight. D/sup 2/FQ can also protect the honest flows in delay and throughput when a node is attacked by defense of service (DoS) and the overall computation of the proposed D/sup 2/FQ is shown to be O(1). Algorithm analysis and simulation results are presented and the performance of D/sup 2/FQ is evaluated.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128493939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PrecePt: a privacy-enhancing license management protocol for digital rights management 规则:用于数字版权管理的增强隐私的许可管理协议
Bok-Nyong Park, Jae-Won Kim, Wonjun Lee
{"title":"PrecePt: a privacy-enhancing license management protocol for digital rights management","authors":"Bok-Nyong Park, Jae-Won Kim, Wonjun Lee","doi":"10.1109/AINA.2004.1283971","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283971","url":null,"abstract":"One of the major issues raised by digital rights management (DRM) systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each user's personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
RED with optimized dynamic threshold deployment on shared buffer RED在共享缓冲区上优化了动态阈值部署
Chengchen Hu, B. Liu
{"title":"RED with optimized dynamic threshold deployment on shared buffer","authors":"Chengchen Hu, B. Liu","doi":"10.1109/AINA.2004.1283842","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283842","url":null,"abstract":"Prior survey of RED algorithm deployment on multiqueue system with shared buffer was unfair and sensitive to congestion level by statically setting the parameters. In this paper, our goal is to deploy the Random Early Detection (RED) algorithm in routers on shared buffer and solve these problems. A novel buffer management scheme that dynamically adjusts the parameters of RED named RED-ODT is proposed. Simulations under uniform traffic load and nonuniform traffic load are given, the results of which ascertain and demonstrate the superiority of the proposed scheme in terms of low packet drop ratio, satisfying buffer utilization and fairness. Simulation also shows that RED-ODT is insensitive to congestion level.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115693266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信