2012 Third International Conference on Emerging Intelligent Data and Web Technologies最新文献

筛选
英文 中文
Development of a Field Work Type Topographical Map Experiential Learning Support System 野外工作型地形图体验式学习支持系统的开发
Takaaki Fukuda, Hisaharu Tanaka, Kenzi Watanabe, Y. Okazaki
{"title":"Development of a Field Work Type Topographical Map Experiential Learning Support System","authors":"Takaaki Fukuda, Hisaharu Tanaka, Kenzi Watanabe, Y. Okazaki","doi":"10.1109/EIDWT.2012.39","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.39","url":null,"abstract":"We have developed a field work type topographical map learning support system using mobile terminals. Our system is a field work type system that learners move around a set up multiple check points. They enable to learn topographical map at each check point. Features are points which learners can answer characteristic quizzes according to check points about a topographical map on places. Moreover, learners can receive advices from teachers and find situations of other learners by server communication. We expect these motivate learners.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131322379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Collaborative Tools to Improve Accessibility in Public Spaces 开发协作工具以改善公共空间的可达性
Javier Canadillas, F. Xhafa, S. Caballé
{"title":"Development of Collaborative Tools to Improve Accessibility in Public Spaces","authors":"Javier Canadillas, F. Xhafa, S. Caballé","doi":"10.1109/EIDWT.2012.59","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.59","url":null,"abstract":"There are many factors that lower the level of accessibility in our environment, especially for citizens with special needs, examples are incorrect designs of public buildings or the lack of tools that show and generate the information in an accessible and user friendly way. These factors translate into physical and technological barriers both to citizens with disabilities and to the professionals responsible for providing solutions to these limitations. This study presents an approach on the development of collaborative tools for supporting professionals responsible for making accessibility plans. The aim is to provide support for their work on the improvement of accessibility in public spaces. Using the tool IMA (Integral Management of Accessibility) the completion and publication of the comprehensive plans of accessibility is greatly accelerated, thereby shortening the time needed to achieve more accessible towns and environments.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Reliable and QoS Aware Multi-path Routing Algorithm in WSNs 一种可靠且支持QoS的wsn多路径路由算法
Reza Sheyibani, Elham Sharififar, Mahsa Khosronejad, M. Mazaheri, B. Homayounfar
{"title":"A Reliable and QoS Aware Multi-path Routing Algorithm in WSNs","authors":"Reza Sheyibani, Elham Sharififar, Mahsa Khosronejad, M. Mazaheri, B. Homayounfar","doi":"10.1109/EIDWT.2012.51","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.51","url":null,"abstract":"Satisfying Quality of Service (QoS) requirements(e.g. bandwidth and delay constraints) for the different QoS based applications of WSNs raises significant challenges. Each algorithm that is used for packet routing in such applications should be able to establish tradeoffs between end to end delay parameter and energy consumption. Therefore, enabling QoS applications in sensor networks requires energy and QoS awareness in different layers of the protocol stack. In this paper, we propose a Reliable and QoS Aware Multipath routing algorithm in wireless sensor networks namely RQMP. This protocol uses control message together with a Forward Error Correction (FEC) technique to establish a reliable connection between source and destination. RQMP maximizes the network lifetime via data transmission across multiple paths as load balancing that causes energy consume uniformly throughout the network. RQMP uses the residual energy, available buffer size, Signal-to-Noise Ratio (SNR) and distance to sink to predict the best next hop through the paths construction phase. Also our proposed protocol employs a queuing model to handle both real time and non-real-time traffic. Simulation results show that our proposed protocol is more efficient than previous algorithms in providing QoS requirements and minimizing energy consumption.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparison of Opportunistic Connection Datasets 机会连接数据集的比较
Pedro Vieira, António D. Costa, Joaquim Macedo
{"title":"A Comparison of Opportunistic Connection Datasets","authors":"Pedro Vieira, António D. Costa, Joaquim Macedo","doi":"10.4018/jdst.2013070103","DOIUrl":"https://doi.org/10.4018/jdst.2013070103","url":null,"abstract":"Opportunistic networking differs from more conventional architectures by the lack of existing network infrastructure, which can cause intermittent connectivity or increased communication delay between nodes. From a message routing perspective, solving these problems require a different set of techniques than those used in more traditional network schemes. Forwarding algorithms in these scenarios aim to improve performance metrics such as message delivery ratio and message delay time, while trying to keep the number of message copies small. A common approach used for testing the performance of opportunistic protocols relies on existing opportunistic contact traces. These datasets are widely available on the Internet, and provide a convenient way of simulating realistic usage scenarios. As such, studying the contact patterns between nodes can lead to useful observations to take into account on future experiments. This paper presents the results of a study on four different datasets. First, we describe the main characteristics of each trace. Then, we propose a graphical representation of the contact behavior for each pair of nodes. The next step was to perform an analysis in terms of the distribution of connectivity among nodes, having found that the contacts follow a roughly lognormal distribution and noting that a small group of nodes is usually much more popular than the rest. We have also made a temporal analysis over the duration of each collection experiment. It was noticeable that individual nodes have very similar contact patterns over time, as well as revealing some cyclic variation over time (namely over weekends). Using dataset derived time-varying graph models, a significant performance decrease was achieved with simple remotion of few critical nodes.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic 减少流量的云环境下小网络的安全认证和可信迁移
John Panneerselvam, Stelios Sotiriadis, N. Bessis, N. Antonopoulos
{"title":"Securing Authentication and Trusted Migration of Weblets in the Cloud with Reduced Traffic","authors":"John Panneerselvam, Stelios Sotiriadis, N. Bessis, N. Antonopoulos","doi":"10.1109/EIDWT.2012.20","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.20","url":null,"abstract":"Cloud computing is making a new revolution in the computing world. Elasticity is one of the key features of the cloud which makes cloud computing further fashionable. Cloud is still in its infant stages and it faces a wide range of security threats. The security downtime of cloud is relatively slowing down the spreading up of cloud computing. This paper focuses on the security threats faced by the web lets during their migration between the cloud and the mobile devices. Web let migration is an important task during the implementation of elasticity in the cloud. As a primary step, a secure communication channel is designed for the web let migration by deploying secure shell protocol. Herein, the vulnerabilities in some authentication mechanisms are highlighted and a better way of authenticating the web lets with SFTP (Secure File Transfer Protocol) is suggested. Finally, managing the traffic effectively in the designed channel with the aid of back pressure technique is also covered in this paper.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems 多租户云系统安全漏洞主动检测框架研究
J. Flood, Anthony Keane
{"title":"A Proposed Framework for the Active Detection of Security Vulnerabilities in Multi-tenancy Cloud Systems","authors":"J. Flood, Anthony Keane","doi":"10.1109/EIDWT.2012.43","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.43","url":null,"abstract":"The detection of cyber attacks before they are successful represents an essential stage in the evolution of an attack vector centric security framework. Anti-virus, Malware and Firewalls detection & protection ideologies are proving to be ineffective and they were never designed with multi-tenant cloud environments in mind. The current security solution development is driven by the complexity of the gap analysis performed by hacker groups and multi-tenant cloud solutions represent a significant target to hacker groups so it is important for Cloud providers to take pre-emptive steps to ensure the total security of their services. A multi-tenant environment irrespective of the number of users is still an individual system and multi-tenant cloud solutions require active protection as the individual system components can still be compromised with a previously unknown attack vector. One possible solution to this growing security concern is an approach that continuously validates user interactions within a system and takes automated preemptive steps to promote the protection of the system users. By gathering information on the attack vector and the attacker themselves it is possible to predict the aim of the attack, gauging the risk and making assumptions. The ultimate goal is to identify and close the attack vector during the attackers gap analysis while ensuring at all time that the information gathered can be isolated to a legal forensic standard. With the ultimate goal being the ability to share malicious user activity information with authorities without the risk of accidental data leakage of other tenants data. This paper describes a possible system and methodology that would prevent the gap analysis phase of a cyber-attack.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Failure Resilient Criteria for Mobile Web Services Transactions 移动Web服务事务的故障恢复标准
M. Younas, L. Barolli, Makoto Ikeda
{"title":"Failure Resilient Criteria for Mobile Web Services Transactions","authors":"M. Younas, L. Barolli, Makoto Ikeda","doi":"10.1109/EIDWT.2012.54","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.54","url":null,"abstract":"This paper investigates into the transaction management of mobile web services, which is crucial to maintaining execution correctness of services and consistency of their underlying data. We propose a relaxed set of transaction correctness criteria, called Sacred (Semantic Atomicity, Consistency, Resiliency, Durability) and design protocols for enforcing these criteria in the execution of transactions. We evaluate the proposed criteria and present results in order to show that these criteria enhance the failure resilience of mobile web services transactions.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114666703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metamodeling for Assigning Specific Roles in the Migration to Service-Oriented Architecture 在迁移到面向服务的体系结构中分配特定角色的元建模
A. Ionita, S. Radulescu
{"title":"Metamodeling for Assigning Specific Roles in the Migration to Service-Oriented Architecture","authors":"A. Ionita, S. Radulescu","doi":"10.1109/EIDWT.2012.33","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.33","url":null,"abstract":"Many organizations have to align their software systems to new technologies and paradigms, for facing the challenges of interoperation and flexibility. Migration to Service-Oriented Architectures (SOA) represents one of the most important approaches of modernization. The state-of-the-art strategies usually take into account technical issues and implications regarding the business costs and efficiency. Still, these changes also involve challenges at the level of human resources, or even of the organizational structures, because new roles have to be defined and assigned to new or existing job positions. For supporting this management task, the paper proposes a meta modeling paradigm that adds SOA-based roles to traditional organizational structures, and supports the definition of mappings specific for migration.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131910714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Potential Integration of an Ontology-Based Data Access Approach in NoSQL Stores 基于本体的数据访问方法在NoSQL存储中的潜在集成
Olivier Curé, Fadhela Kerdjoudj, David C. Faye, C. L. Duc, M. Lamolle
{"title":"On the Potential Integration of an Ontology-Based Data Access Approach in NoSQL Stores","authors":"Olivier Curé, Fadhela Kerdjoudj, David C. Faye, C. L. Duc, M. Lamolle","doi":"10.4018/jdst.2013070102","DOIUrl":"https://doi.org/10.4018/jdst.2013070102","url":null,"abstract":"No SQL stores are emerging as an efficient alternative to relational database management systems in the context of big data. Many actors in this domain consider that to gain a wider adoption, several extensions have to be integrated. Some of them focus on the ways of proposing more schema, supporting adapted declarative query languages and providing integrity constraints in order to control data consistency and enhance data quality. We consider that these issues can be dealt with in the context of Ontology Based Data Access (OBDA). OBDA is a new data management paradigm that exploits the semantic knowledge represented in ontologies when querying data stored in a database. We provide a proof of concept of OBDA's ability to tackle these three issues in a social application related to the medical domain.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Automatic Test Data Generation for Software Path Testing Using Evolutionary Algorithms 基于进化算法的软件路径测试自动测试数据生成
G. Latiu, O. Creţ, L. Văcariu
{"title":"Automatic Test Data Generation for Software Path Testing Using Evolutionary Algorithms","authors":"G. Latiu, O. Creţ, L. Văcariu","doi":"10.1109/EIDWT.2012.25","DOIUrl":"https://doi.org/10.1109/EIDWT.2012.25","url":null,"abstract":"Software testing is a very expensive and time consuming process. Test methods which generate test data based on the program's internal structure are intensively used. This paper presents a comparison between three important Evolutionary Algorithms used for automatic test data generation, a technique that forces the execution of a desired path of the program called target path. Two new approaches, based on Particle Swarm Optimization and Simulated Annealing algorithms, used in conjunction with the approximation level and branch distance metrics, are compared with Genetic Algorithms for generating test data. The results obtained based on the proposed approaches suggest that evolutionary testing strategies are very well suited to generate test data which cover a target path inside a software program.","PeriodicalId":222292,"journal":{"name":"2012 Third International Conference on Emerging Intelligent Data and Web Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121817839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信