2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)最新文献

筛选
英文 中文
A Channel Management Scheme for Reducing Interference in Ubiquitous Wireless LANs Environment 一种减少泛在无线局域网环境干扰的信道管理方案
Kibaek Yoo, Chong-kwon Kim
{"title":"A Channel Management Scheme for Reducing Interference in Ubiquitous Wireless LANs Environment","authors":"Kibaek Yoo, Chong-kwon Kim","doi":"10.1109/MUE.2008.51","DOIUrl":"https://doi.org/10.1109/MUE.2008.51","url":null,"abstract":"For the successful ubiquitous environment, the channel management scheme for reducing the interference in wireless LANs environment is very important. And as the IEEE 802.11 family becomes popular, performance decline due to interference of network happens to be a brand new issue. In this paper, we introduce a channel management scheme for reducing the interference and maximizing the performance by channel assignment and load balancing. We present a distributed algorithm and the decision making basis for activating channel assignment and load balancing process under the current circumstances, which assumes network is managed by multiple individual manager and collects the channel information with the methods from IEEE 802.11k draft. The proposed scheme reduces the overhead and improves the performance of the network by reducing the number of times of unnecessary channel assignment and load balancing processes. And we test our algorithms with NS simulation and show that the proposed scheme outperforms than the previous schemes.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128903318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimized Implementation of Ray Tracing on Cell Broadband Engine 光线追踪在蜂窝宽带引擎上的优化实现
Bo Li, Hai Jin, Zhiyuan Shao, Yong Li, Xin Liu
{"title":"Optimized Implementation of Ray Tracing on Cell Broadband Engine","authors":"Bo Li, Hai Jin, Zhiyuan Shao, Yong Li, Xin Liu","doi":"10.1109/MUE.2008.83","DOIUrl":"https://doi.org/10.1109/MUE.2008.83","url":null,"abstract":"Ray tracing is a global illumination based on rendering method. It could produce very high-quality image. But rendering is also a very time-consuming procedure. In this paper, we map a Whitted-style recursive ray tracing on Cell Broadband Engine processor (Cell BE) with a number of optimization techniques according to the architecture characteristics of Cell BE processor, which include adaptive task scheduling, software managed cache, double buffering, packets of primary rays through SIMD unit. Through experiments, we show our implementation can harness the Cell BE processing power to up-limit.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133527397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Context-Aware Environment-Role-Based Access Control Model for Web Services Web服务的上下文感知环境-基于角色的访问控制模型
Chundong Wang, Ting Li, Li-Chun Feng
{"title":"Context-Aware Environment-Role-Based Access Control Model for Web Services","authors":"Chundong Wang, Ting Li, Li-Chun Feng","doi":"10.1109/MUE.2008.77","DOIUrl":"https://doi.org/10.1109/MUE.2008.77","url":null,"abstract":"The paper presents a context-aware environment-role-based access control model (CERBAC). Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. It illustrated how the well-developed notion of roles can be used to capture security relevant context of the environment in which access requests are made. By introducing environment roles, a novel access control framework that incorporates context-based access control it creates. Moreover a architecture is presented that supports security policies that make use of environment roles to control access to resources. Furthermore, it outlines the configuration mechanism needed to apply our model to the Web services environment, and describes the implementation architecture for the system.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Reference Algorithm for 3D Mesh Model in Service Rendering Middleware 服务渲染中间件中三维网格模型的参考算法
Hakran Kim, Yongik Yoon, Hwajin Park
{"title":"Reference Algorithm for 3D Mesh Model in Service Rendering Middleware","authors":"Hakran Kim, Yongik Yoon, Hwajin Park","doi":"10.1109/MUE.2008.41","DOIUrl":"https://doi.org/10.1109/MUE.2008.41","url":null,"abstract":"As needs arise for an adaptive service with a new concept according to 3D graphic contents restrictions in the user environments, this study proposes an adaptive service model for 3D graphic contents in ubiquitous environment. In advance, we proposed Service Rendering Middleware to reconstruct the elements of existing contents according to the changing user environments as a middle layer model. This study provides a reference algorithm that selects an appropriate mesh model in Service Rendering Middleware. The algorithm provides a service level adequate for the current environment, allowing accurate creation and management of new 3D graphic contents according to device capabilities. An increasing amount of 3D graphic contents is being serviced to a wide range of terminal devices, and the approaches suggested in this paper are expected to enable fast adaptive services that enhance user satisfaction.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications 一种基于SIP和SCTP的多媒体网络移动方案
Fang-Yie Leu, Zhen-Jia Ko
{"title":"A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications","authors":"Fang-Yie Leu, Zhen-Jia Ko","doi":"10.1109/MUE.2008.35","DOIUrl":"https://doi.org/10.1109/MUE.2008.35","url":null,"abstract":"Wireless networks of future generation are envisioned to be a combination of diverse but complementary access technologies that can give us a convenient wireless environment to access abundance of network resources so as to facilitate and enrich our everyday life. In such environment, seamless mobility support is the basis of providing uninterrupted wireless services to mobile users who roam between or among various wireless access networks. When users are now in a moving transportation carriage, e.g. a train that provides network service, the carriage can be regarded as a network which comprises a set of users and moves from one location to another. Network mobility protocol based on mobile IPv6 has some fundamental problems, such as header overhead and pinball problem. In this paper, we propose a novel method based on SIP and SCTP for network mobility to solve the MIPv6-NEMO problems. Experimental validation and performance evaluation are also performed.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"753 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography 无公钥加密的纯密码认证密钥建立协议的改进
Eunjun Yoon, K. Yoo
{"title":"An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography","authors":"Eunjun Yoon, K. Yoo","doi":"10.1109/MUE.2008.98","DOIUrl":"https://doi.org/10.1109/MUE.2008.98","url":null,"abstract":"In 2005, Laih et al. proposed a password-only authenticated key establishment protocol without public key cryptography. The current paper, however, demonstrates that Laih et al.'s protocol does not provide perfect forward secrecy, then an improved protocol, based on the elliptic curve discrete logarithm problem, will be presented in order to isolate such a problem.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130529818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Information Retrieval by Dispatching Mobile Agents in Parallel 并行调度移动agent的高效信息检索
W. Qu, Keqiu Li, Chao Zhang
{"title":"Efficient Information Retrieval by Dispatching Mobile Agents in Parallel","authors":"W. Qu, Keqiu Li, Chao Zhang","doi":"10.1109/MUE.2008.113","DOIUrl":"https://doi.org/10.1109/MUE.2008.113","url":null,"abstract":"Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model based on mobile agent technology. Theoretical analysis on the time complexity is also provided. Experiments are conducted on the performance of the proposed approach comparing with two existing approaches. Our approach well utilize mobile agents' inherent merits and provide useful tools for efficient information retrieval.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ATBaM: An Arnold Transform Based Method on Watermarking Relational Data 一种基于Arnold变换的关系数据水印方法
Chaokun Wang, Jianmin Wang, M. Zhou, Guisheng Chen, Deyi Li
{"title":"ATBaM: An Arnold Transform Based Method on Watermarking Relational Data","authors":"Chaokun Wang, Jianmin Wang, M. Zhou, Guisheng Chen, Deyi Li","doi":"10.1109/MUE.2008.45","DOIUrl":"https://doi.org/10.1109/MUE.2008.45","url":null,"abstract":"ATBaM, A novel numeric relational data watermarking method, is presented in this paper. ATBaM substantially improves watermark security by using image scrambling technology which could confuse the well-regulated watermarking information and diffuse errors. Theoretical analysis proves the correctness and security of ATBaM. Also, experimental results show the strong robustness of ATBaM.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Supporting Appropriate Communication Media Selection in Ubiquitous Environment 在泛在环境下支持适当的传播媒介选择
S. S. Aye, K. Kawagoe
{"title":"Supporting Appropriate Communication Media Selection in Ubiquitous Environment","authors":"S. S. Aye, K. Kawagoe","doi":"10.1109/MUE.2008.29","DOIUrl":"https://doi.org/10.1109/MUE.2008.29","url":null,"abstract":"Communicating with someone via the right communication media seems to be difficult nowadays as people use various mode of communication and senders do not have any knowledge about receivers' current communication media, especially in ubiquitous environment. Thus, we propose the method how the most appropriate media to reach the receiver can be selected based on the effective measures. In the paper, a preliminary evaluation of the proposed method is also described to show its effectiveness. We are developing a research prototype system to support the sender with the information of the best reachable media to the receiver.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123550657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Watermark Scheme for Copyright Protection 一种鲁棒的版权保护水印方案
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee
{"title":"A Robust Watermark Scheme for Copyright Protection","authors":"Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee","doi":"10.1109/MUE.2008.17","DOIUrl":"https://doi.org/10.1109/MUE.2008.17","url":null,"abstract":"In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intellectual property even after serious attacks on the watermarked image. In the proposed watermarking, it embeds watermarks by Singular Value Decomposition and Distributed Discrete Wavelet Transformation techniques. Regarding our method, Singular Value Decomposition provides the robustness to protect the image from most attacks except cropping. Distributed Discrete Wavelet Transformation disperses watermarks within an image to resist cropping attacks. The robustness of our proposed watermark scheme has been verified experimentally against main watermark attack families such as geometric and signal processing attacks.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132028708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信