{"title":"A Channel Management Scheme for Reducing Interference in Ubiquitous Wireless LANs Environment","authors":"Kibaek Yoo, Chong-kwon Kim","doi":"10.1109/MUE.2008.51","DOIUrl":"https://doi.org/10.1109/MUE.2008.51","url":null,"abstract":"For the successful ubiquitous environment, the channel management scheme for reducing the interference in wireless LANs environment is very important. And as the IEEE 802.11 family becomes popular, performance decline due to interference of network happens to be a brand new issue. In this paper, we introduce a channel management scheme for reducing the interference and maximizing the performance by channel assignment and load balancing. We present a distributed algorithm and the decision making basis for activating channel assignment and load balancing process under the current circumstances, which assumes network is managed by multiple individual manager and collects the channel information with the methods from IEEE 802.11k draft. The proposed scheme reduces the overhead and improves the performance of the network by reducing the number of times of unnecessary channel assignment and load balancing processes. And we test our algorithms with NS simulation and show that the proposed scheme outperforms than the previous schemes.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128903318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Implementation of Ray Tracing on Cell Broadband Engine","authors":"Bo Li, Hai Jin, Zhiyuan Shao, Yong Li, Xin Liu","doi":"10.1109/MUE.2008.83","DOIUrl":"https://doi.org/10.1109/MUE.2008.83","url":null,"abstract":"Ray tracing is a global illumination based on rendering method. It could produce very high-quality image. But rendering is also a very time-consuming procedure. In this paper, we map a Whitted-style recursive ray tracing on Cell Broadband Engine processor (Cell BE) with a number of optimization techniques according to the architecture characteristics of Cell BE processor, which include adaptive task scheduling, software managed cache, double buffering, packets of primary rays through SIMD unit. Through experiments, we show our implementation can harness the Cell BE processing power to up-limit.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133527397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware Environment-Role-Based Access Control Model for Web Services","authors":"Chundong Wang, Ting Li, Li-Chun Feng","doi":"10.1109/MUE.2008.77","DOIUrl":"https://doi.org/10.1109/MUE.2008.77","url":null,"abstract":"The paper presents a context-aware environment-role-based access control model (CERBAC). Unlike traditional systems where access control has been explored, access decisions may depend on the context in which requests are made. It illustrated how the well-developed notion of roles can be used to capture security relevant context of the environment in which access requests are made. By introducing environment roles, a novel access control framework that incorporates context-based access control it creates. Moreover a architecture is presented that supports security policies that make use of environment roles to control access to resources. Furthermore, it outlines the configuration mechanism needed to apply our model to the Web services environment, and describes the implementation architecture for the system.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123857425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reference Algorithm for 3D Mesh Model in Service Rendering Middleware","authors":"Hakran Kim, Yongik Yoon, Hwajin Park","doi":"10.1109/MUE.2008.41","DOIUrl":"https://doi.org/10.1109/MUE.2008.41","url":null,"abstract":"As needs arise for an adaptive service with a new concept according to 3D graphic contents restrictions in the user environments, this study proposes an adaptive service model for 3D graphic contents in ubiquitous environment. In advance, we proposed Service Rendering Middleware to reconstruct the elements of existing contents according to the changing user environments as a middle layer model. This study provides a reference algorithm that selects an appropriate mesh model in Service Rendering Middleware. The algorithm provides a service level adequate for the current environment, allowing accurate creation and management of new 3D graphic contents according to device capabilities. An increasing amount of 3D graphic contents is being serviced to a wide range of terminal devices, and the approaches suggested in this paper are expected to enable fast adaptive services that enhance user satisfaction.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia Applications","authors":"Fang-Yie Leu, Zhen-Jia Ko","doi":"10.1109/MUE.2008.35","DOIUrl":"https://doi.org/10.1109/MUE.2008.35","url":null,"abstract":"Wireless networks of future generation are envisioned to be a combination of diverse but complementary access technologies that can give us a convenient wireless environment to access abundance of network resources so as to facilitate and enrich our everyday life. In such environment, seamless mobility support is the basis of providing uninterrupted wireless services to mobile users who roam between or among various wireless access networks. When users are now in a moving transportation carriage, e.g. a train that provides network service, the carriage can be regarded as a network which comprises a set of users and moves from one location to another. Network mobility protocol based on mobile IPv6 has some fundamental problems, such as header overhead and pinball problem. In this paper, we propose a novel method based on SIP and SCTP for network mobility to solve the MIPv6-NEMO problems. Experimental validation and performance evaluation are also performed.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"753 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography","authors":"Eunjun Yoon, K. Yoo","doi":"10.1109/MUE.2008.98","DOIUrl":"https://doi.org/10.1109/MUE.2008.98","url":null,"abstract":"In 2005, Laih et al. proposed a password-only authenticated key establishment protocol without public key cryptography. The current paper, however, demonstrates that Laih et al.'s protocol does not provide perfect forward secrecy, then an improved protocol, based on the elliptic curve discrete logarithm problem, will be presented in order to isolate such a problem.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130529818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Information Retrieval by Dispatching Mobile Agents in Parallel","authors":"W. Qu, Keqiu Li, Chao Zhang","doi":"10.1109/MUE.2008.113","DOIUrl":"https://doi.org/10.1109/MUE.2008.113","url":null,"abstract":"Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model based on mobile agent technology. Theoretical analysis on the time complexity is also provided. Experiments are conducted on the performance of the proposed approach comparing with two existing approaches. Our approach well utilize mobile agents' inherent merits and provide useful tools for efficient information retrieval.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chaokun Wang, Jianmin Wang, M. Zhou, Guisheng Chen, Deyi Li
{"title":"ATBaM: An Arnold Transform Based Method on Watermarking Relational Data","authors":"Chaokun Wang, Jianmin Wang, M. Zhou, Guisheng Chen, Deyi Li","doi":"10.1109/MUE.2008.45","DOIUrl":"https://doi.org/10.1109/MUE.2008.45","url":null,"abstract":"ATBaM, A novel numeric relational data watermarking method, is presented in this paper. ATBaM substantially improves watermark security by using image scrambling technology which could confuse the well-regulated watermarking information and diffuse errors. Theoretical analysis proves the correctness and security of ATBaM. Also, experimental results show the strong robustness of ATBaM.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting Appropriate Communication Media Selection in Ubiquitous Environment","authors":"S. S. Aye, K. Kawagoe","doi":"10.1109/MUE.2008.29","DOIUrl":"https://doi.org/10.1109/MUE.2008.29","url":null,"abstract":"Communicating with someone via the right communication media seems to be difficult nowadays as people use various mode of communication and senders do not have any knowledge about receivers' current communication media, especially in ubiquitous environment. Thus, we propose the method how the most appropriate media to reach the receiver can be selected based on the effective measures. In the paper, a preliminary evaluation of the proposed method is also described to show its effectiveness. We are developing a research prototype system to support the sender with the information of the best reachable media to the receiver.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123550657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee
{"title":"A Robust Watermark Scheme for Copyright Protection","authors":"Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee","doi":"10.1109/MUE.2008.17","DOIUrl":"https://doi.org/10.1109/MUE.2008.17","url":null,"abstract":"In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intellectual property even after serious attacks on the watermarked image. In the proposed watermarking, it embeds watermarks by Singular Value Decomposition and Distributed Discrete Wavelet Transformation techniques. Regarding our method, Singular Value Decomposition provides the robustness to protect the image from most attacks except cropping. Distributed Discrete Wavelet Transformation disperses watermarks within an image to resist cropping attacks. The robustness of our proposed watermark scheme has been verified experimentally against main watermark attack families such as geometric and signal processing attacks.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132028708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}