2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)最新文献

筛选
英文 中文
An Awareness-Based Methodology for Collaborative Business Processes under Various Organizational Cultures 不同组织文化下基于意识的协同业务流程方法
Farhad Daneshgar
{"title":"An Awareness-Based Methodology for Collaborative Business Processes under Various Organizational Cultures","authors":"Farhad Daneshgar","doi":"10.1109/SAINTW.2005.29","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.29","url":null,"abstract":"This paper introduces a graphical method for representation of awareness knowledge in collaborative business processes under various organisational cultures. Such representation method is a precursor to development of a measure for awareness and collaboration that in turn can be used for designing appropriate groupware systems for specific organisational cultures.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121690873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic IPSec Security Association Negotiation in Mobile-Oriented IPv6 Networks 面向移动的IPv6网络中IPSec安全自动关联协商
Nicola Bonelli, S. Giordano, S. Lucetti, G. Risi, A. Tomasi
{"title":"Automatic IPSec Security Association Negotiation in Mobile-Oriented IPv6 Networks","authors":"Nicola Bonelli, S. Giordano, S. Lucetti, G. Risi, A. Tomasi","doi":"10.1109/SAINTW.2005.41","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.41","url":null,"abstract":"Integrated mobility and security support is one of the most desirable feature for a network. Although IPv6 offers protocol which satisfies both these requirements, practical issues still exist which do not allow for a really integrated environment. Our contribution towards such integration is the development of a solution to automate the task of setting up the appropriate IPSec Security Associations each time a node connects to an IPv6 subnet. The result is mipsd, a user-space daemon which interacts with the IKE daemon running at the mobile host to allow the completely automated setup of SA towards the corresponding Security Gateway.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Platform-Independent Domain Management Using Super Distributed Objects (SDO) in Context-Aware Service Systems 上下文感知服务系统中使用超级分布式对象(SDO)的平台无关域管理
Hidenori Yamamoto, S. Sameshima
{"title":"Platform-Independent Domain Management Using Super Distributed Objects (SDO) in Context-Aware Service Systems","authors":"Hidenori Yamamoto, S. Sameshima","doi":"10.1109/SAINTW.2005.97","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.97","url":null,"abstract":"In ubiquitous computing, it is said that services are provided anytime, anywhere, and for anyone. Moreover, context-aware services are expected. One issue in providing a context-aware service is the connection of heterogeneous resources (hardware devices and software components) that are embedded or distributed in the surrounding environment and networked with each other. Another issue is deciding from where or from which scopes to detect and select suitable resources. An object model named Super Distributed Objects (SDO)is proposed for a uniform description of resources and a technique of platform-independent management of domainsfor resources based on the SDO model.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mining Workflow Patterns through Event-Data Analysis 通过事件数据分析挖掘工作流模式
Walid Gaaloul, S. Alaoui, Karim Baïna, C. Godart
{"title":"Mining Workflow Patterns through Event-Data Analysis","authors":"Walid Gaaloul, S. Alaoui, Karim Baïna, C. Godart","doi":"10.1109/SAINTW.2005.81","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.81","url":null,"abstract":"It is obvious to notice that in collaborative applications, considerable processes are either implicit, or integrate existing processes. The discovery, and the explanation of these processes are a hot research topic. The work described in this paper is a contribution to these problems. Generally, workflow mining proposes techniques to acquire a workflow model from a workflow log. In this paper, we present a new workflow mining technique to discover workflow patterns. This technique combines complementarily an algorithmic technique and a statistical analysis technique. This combination can deal with some ambiguities that the single use of the statistical analysis technique cannot resolve.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Distributed Intrusion Detection for Mobile Ad Hoc Networks 移动Ad Hoc网络的分布式入侵检测
P. Yi, Yichuan Jiang, Yiping Zhong, Shiyong Zhang
{"title":"Distributed Intrusion Detection for Mobile Ad Hoc Networks","authors":"P. Yi, Yichuan Jiang, Yiping Zhong, Shiyong Zhang","doi":"10.1109/SAINTW.2005.58","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.58","url":null,"abstract":"Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we propose a distributed intrusion detection approach based on finish state machine (FSM).A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we construct the finite state machine (FSM) by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node’s behaviour by the FSM, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Performance Modelling of a Wireless 4G Cell under GPS Scheme GPS方案下无线4G小区的性能建模
D. Kouvatsos, Yue Li, I. Awan
{"title":"Performance Modelling of a Wireless 4G Cell under GPS Scheme","authors":"D. Kouvatsos, Yue Li, I. Awan","doi":"10.1109/SAINTW.2005.96","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.96","url":null,"abstract":"A novel analytic framework is devised for the performance modelling of a wireless 4G cell with bursty multiple class traffic flows consisting of Internet protocol (IP) voice calls, streaming media and data packets subject to an efficient medium access control (MAC) protocol with a buffer threshold-based traffic handling generalized partial sharing (GPS) scheme. In this context, an open queueing network model (QNM) is proposed consisting of three interacting multiple class GE-type queueing and delay systems and maximum entropy (ME) joint state probabilities are characterized, subject to appropriate GE-type mean value constraints. Moreover, closed form expressions for the aggregate state and blocking (per class) probabilities are determined. Typical numerical examples are included to validate theME performance metrics against Java-based simulation results and also to study the effect of bursty multiple class traffic flow upon the performance of the wireless 4G cell.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121667560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web Services as a Tool for Information Systems Effectiveness Web服务作为信息系统有效性的工具
R. Faiz, Sami Mahfoudhi, K. Mellouli
{"title":"Web Services as a Tool for Information Systems Effectiveness","authors":"R. Faiz, Sami Mahfoudhi, K. Mellouli","doi":"10.1109/SAINTW.2005.118","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.118","url":null,"abstract":"Web Services provide a platform for application integration across the net. It’s an important set of standards for application integration. Thus integrating different applications help aligning different component of information systems in organizations, Web services are then an important tool to improve the Information Technology effectiveness and payback in organizations by adapting the new application implemented to current information system instead of rebuilding a new one.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cooperation Policies for Inter-organizational Workflows 组织间工作流程的合作政策
2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops) Pub Date : 2005-01-31 DOI: 10.1109/SAINTW.2005.1620016
Issam Chebbi, S. Tata, S. Dustdar
{"title":"Cooperation Policies for Inter-organizational Workflows","authors":"Issam Chebbi, S. Tata, S. Dustdar","doi":"10.1109/SAINTW.2005.1620016","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.1620016","url":null,"abstract":"In the context of inter-organizational workflows, interactions between partners should be constructive, complementary, and guide the work toward the objective of organizations involved in the workflow. Within our approach, inter-organizational workflow cooperation, which consists of workflow advertisement, workflow interconnection and workflow cooperation, this paper focuses on these cooperation policies one has to define in order to enforce and control interactions between partners’ workflows. The cooperation policies integrate the partners’ roles as well as their coordination, the dataflows allowed to pass from one partner’s workflow to another, and their intervisibility levels. The level of the visibility is used to preserve the partner privacy and know-how and is reduced as tiny as cooperation needs.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Scalable Multi-Replication Framework for Data Grid 面向数据网格的可伸缩多复制框架
Shin'ichiro Takizawa, Y. Takamiya, H. Nakada, S. Matsuoka
{"title":"A Scalable Multi-Replication Framework for Data Grid","authors":"Shin'ichiro Takizawa, Y. Takamiya, H. Nakada, S. Matsuoka","doi":"10.1109/SAINTW.2005.20","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.20","url":null,"abstract":"Existing replica services on the Grid we know to date assumes point-to-point communication and file transfer protocol. As such, when hundreds to thousands of hosts on the Grid access a single dataset simultaneously, bottlenecks in networks and/or the data servers will hinder performance significantly. Instead, our replication framework couples efficient, multicast techniques with a replica catalog that automatically detects simultaneous access to the replica by multiple nodes. As a prototype, we have designed and built a portable, XML-based replica location service accounting for such parallel transfer requests, and coupled it with a O(1) bulk file transfer system Dolly+[6]. The benchmarks show that the system is scalable and effective in reducing replication costs significantly in cluster-based replication scenarios.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A General Framework for Food Traceability 食品可追溯性的一般框架
A. Bechini, M. Cimino, B. Lazzerini, F. Marcelloni, A. Tomasi
{"title":"A General Framework for Food Traceability","authors":"A. Bechini, M. Cimino, B. Lazzerini, F. Marcelloni, A. Tomasi","doi":"10.1109/SAINTW.2005.10","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.10","url":null,"abstract":"In this paper, we propose a generic data model for food traceability. We discuss the characteristics of our model with respect both to tracing and tracking requirements, and to quality control. Since traceability is based on reliable and faithful exchange of documents among the units of the supply chain, we also consider how electronic business-to-business standards, such as ebXML, can help support data homogeneity as well as system interoperability. Finally, we highlight how the implementation effort can be accordingly reduced.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信