8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)最新文献

筛选
英文 中文
Chatty things - Making the Internet of Things readily usable for the masses with XMPP 聊天的东西——通过XMPP使物联网易于为大众所用
R. Klauck, M. Kirsche
{"title":"Chatty things - Making the Internet of Things readily usable for the masses with XMPP","authors":"R. Klauck, M. Kirsche","doi":"10.4108/ICST.COLLABORATECOM.2012.250464","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250464","url":null,"abstract":"An important challenge for the Internet of Things is the gap between scientific environments and real life deployments. Smart objects need to be accessible and usable by ordinary users through familiar software and access technologies to facilitate any interaction and to increase their acceptance rate. This work deals with a seamless integration, discovery, and employment of smart objects into the Internet infrastructure under Human-to-Machine (H2M) communication aspects. We introduce an XMPP-based service provisioning sublayer for the IoT to integrate resource constrained devices seamlessly into the Internet by showing how XMPP can empower the collaboration between humans and smart objects. To meet the requirements of constrained devices, we propose to extend XMPP's publish-subscribe capabilities with a topic-based filter mechanism to effectively reduce the number of exchanged XMPP messages. We further present standardized bootstrapping and handling processes for smart objects that adapt automatically to infrastructure and ad hoc network environments and do not require predefined parameters or user interaction. The applicability of XMPP for constrained devices is further demonstrated with an XMPP client and mDNS/DNS-SD service for the Contiki operating system.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116346837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Modelling Bayesian attacker detection game in wireless networks with epistemic logic 基于认知逻辑的无线网络贝叶斯攻击者检测博弈建模
Oldooz Dianat, M. Orgun
{"title":"Modelling Bayesian attacker detection game in wireless networks with epistemic logic","authors":"Oldooz Dianat, M. Orgun","doi":"10.4108/ICST.COLLABORATECOM.2012.250693","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250693","url":null,"abstract":"In collaborative networks operating over a wireless medium, to maximize connectivity of the network, two nodes that are not directly connected may need to communicate with one another through other nodes in the network. However in such networks, not all nodes are reliable. Therefore it may be necessary for legitimate users to monitor the behavior of other nodes such that they can form a belief about whether those nodes are potential attackers or not. These beliefs can be studied precisely in game theoretic scenarios such as Bayesian attacker detection games. These games are strategic games with incomplete information for modeling the interaction between nodes in wireless networks with channel uncertainty. However these games do not normally consider the reasoning abilities of agents. One solution is to use formal logics which allow for modeling the reasoning abilities of agents as well as allowing formal reasoning about certain properties of games such as the Nash equilibrium. In this paper, we propose an epistemic logic to study strategic games with incomplete information. In this logic we can precisely describe what the requirements and consequences of informative actions are. We can reason what rational agents should do if they can choose between different available actions. In addition, this language can be used as a semantically well-defined query language for model checkers to automatically verify the game descriptions with respect to their intended specifications.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130927207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs 协同wsn的保密性与容错网络聚合
M. Iskander, Adam J. Lee, D. Mossé
{"title":"Confidentiality-preserving and fault-tolerant in-network aggregation for Collaborative WSNs","authors":"M. Iskander, Adam J. Lee, D. Mossé","doi":"10.4108/ICST.COLLABORATECOM.2012.250523","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250523","url":null,"abstract":"In Collaborative WSNs, sensing devices are owned and operated by different stakeholders with incentive to preserve the confidentiality of their individual sensors readings while contributing to statistics computed by the group. In such systems, in-network data processing presents high efficiency for energy and bandwidth, but unfortunately introduces several challenges related to data security and fault tolerance. In this paper, we present and analyze a new protocol that allows for confidentiality-preserving in-network aggregation for collaborative WSNs in the face of intermittent link-level failures. Our protocol makes use of a symmetric-key, homomorphic cryptosystem to maintain the confidentiality of individual sensor readings while still permitting a trusted sink node to recover the correct aggregate value. The encrypted sensor readings are then combined using a multipath aggregation protocol that is capable of detecting and recovering from a variety of failure scenarios while carefully handling duplicate sensitive aggregates. We prove the security and correctness of our protocol, and we conduct simulation studies to understand its data transmission and energy consumption overheads. Our results show that both confidentiality and fault tolerance can be achieved in representative network configurations, while incurring an increase of 7.1 % in the average message size and 3.6% in the average energy consumption. In the unlikely scenario that 100% of the sensor nodes participate in an aggregate query, the average energy consumption showed at most a 25% increase.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126184246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Method for two dimensional honeypot in a web application 方法二维蜜罐在一个web应用程序
N. Nassar, G. Miller
{"title":"Method for two dimensional honeypot in a web application","authors":"N. Nassar, G. Miller","doi":"10.4108/ICST.COLLABORATECOM.2012.250743","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250743","url":null,"abstract":"Web applications Security is an ongoing dilemma as hackers and bots are getting more and more innovative bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the check-out process, could be in a position of not providing a fair chance to all consumers. This is especially true when a commerce site offers hot inventory items where many traders are competing to get a limited supply item. What happens is the e-Commerce sites security is compromised when some of the traders utilize preformatted scripts/ spiders to place orders, thus giving them an unfair advantage The problem is: how to eliminate scripts/spiders in a given web application flow by using a solution that is non-practical to crack with no additional actions taken by the end user. Our paper introduces an innovative multilayer approach to honeypots cashing or bypassing it is technically impractical, resulting in well secured web forms.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robust Decision Engineering: Collaborative Big Data and its application to international development/aid 稳健决策工程:协同大数据及其在国际发展/援助中的应用
Steve Chan, W. Rhodes, Charles Atencio, C. Kuo, Brent Ranalli, Anna Miao, S. Sala, Stephen Serene, R. Helbling, Sarah Rumbley, Marc Clement, L. Sokol, L. Gary
{"title":"Robust Decision Engineering: Collaborative Big Data and its application to international development/aid","authors":"Steve Chan, W. Rhodes, Charles Atencio, C. Kuo, Brent Ranalli, Anna Miao, S. Sala, Stephen Serene, R. Helbling, Sarah Rumbley, Marc Clement, L. Sokol, L. Gary","doi":"10.4108/ICST.COLLABORATECOM.2012.250715","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250715","url":null,"abstract":"Much of the research that goes into Big Data, and specifically on Collaborative Big Data, is focused upon questions, such as: how to get more of it? (e.g., · participatory mechanisms, social media, geo-coded data from personal electronic devices) and · how to handle it? (e.g., how to ingest, sort, store, and link up disparate data sets). A question that receives far less attention is that of Collaborative analysis of Big Data; how can a multi-disciplinary layered analysis of Big Data be used to support robust decisions, especially in a collaborative setting, and especially under time pressure? The robust Decision Engineering required can be achieved by employing an approach related to Network Science, that we call Relationship Science. In Relationship Science, our methodological framework, karassian netchain analysis (KNA), is utilized to ascertain islands of stability or positive influence dominating sets (PIDS), so that a form of annealed resiliency or latent stability is achieved, thereby mitigating against unintended consequences, elements of instability, and “perfect storm” crises lurking within the network.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data-aware interaction in distributed and collaborative workflows: Modeling, semantics, correctness 分布式和协作工作流中的数据感知交互:建模、语义、正确性
David Knuplesch, R. Pryss, M. Reichert
{"title":"Data-aware interaction in distributed and collaborative workflows: Modeling, semantics, correctness","authors":"David Knuplesch, R. Pryss, M. Reichert","doi":"10.4108/ICST.COLLABORATECOM.2012.250443","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250443","url":null,"abstract":"IT support for distributed and collaborative workflows as well as related interactions between business partners are becoming increasingly important. For modeling such partner interactions as flow of message exchanges, different top-down approaches, covered under the term interaction modeling, are provided. Like for workflow models, correctness constitutes a fundamental challenge for interaction models; e.g., to ensure the boundedness and absence of deadlocks and lifelocks. Due to their distributed execution, in addition, interaction models should be message-deterministic and realizable, i.e., the same conversation (i.e. sequence of messages) should always lead to the same result, and it should be ensured that partners always have enough information about the messages they must or may send in a given context. So far, most existing approaches have addressed correctness of interaction models without explicitly considering the data exchanged through messages and used for routing decisions. However, data support is crucial for collaborative workflows and interaction models respectively. This paper enriches interaction models with the data perspective. In particular, it defines the behavior of data-aware interaction models based on Data-Aware Interaction Nets, which use elements of both Interaction Petri Nets and Workflow Nets with Data. Finally, formal correctness criteria for Data-Aware Interaction Nets are derived, guaranteeing the boundedness and absence of deadlocks and lifelocks, and ensuring message-determinism as well as realizability.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Reputation objects for interoperable reputation exchange: Implementation and design decisions 用于互操作声誉交换的声誉对象:实现和设计决策
R. Alnemr, C. Meinel
{"title":"Reputation objects for interoperable reputation exchange: Implementation and design decisions","authors":"R. Alnemr, C. Meinel","doi":"10.4108/ICST.COLLABORATECOM.2012.250519","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250519","url":null,"abstract":"Reputation systems aim to provide a mechanism for establishing trust for online interactions attempting to mimic their real-world counterparts. Reputation-based approaches depend on the users local experiences and feedback to create a soft measure for trust decision. They use various clues and past experience to decide on taking the risk of dealing with an entity. Reputation communities cannot exchange reputation or reputation information following an isolated-silos approach. The reasons for this varies from missing contexts in the reputation representations and heterogeneity in these representations, to technical reasons such as not being represented in an interoperable knowledge representation method. Developing interoperable reputation ontologies requires a technology that can provide means of integrating data sources and methods to relate the data to its explicit semantics. In this paper, we describe our design decisions in developing our reputation object (RO) ontology using semantic web technologies. The main motivation that leads these decision is to facilitate reputation information exchange or reputation interoperability along with model expressivity. Therefore, choosing the ontology language and specific APIs is explained in relation to this motivation.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A real-time collaboration-enabled Mobile Augmented Reality system with semantic multimedia 具有语义多媒体的实时协作移动增强现实系统
Dejan Kovachev, Goekhan Aksakali, R. Klamma
{"title":"A real-time collaboration-enabled Mobile Augmented Reality system with semantic multimedia","authors":"Dejan Kovachev, Goekhan Aksakali, R. Klamma","doi":"10.4108/ICST.COLLABORATECOM.2012.250436","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250436","url":null,"abstract":"Mobile Augmented Reality (MAR) enables overlays of semantically-enriched multimedia on video streams of smart phone cameras. These new ways to interact with digital objects via position and 3D movement can be helpful for on-site professional communities. However, current MAR applications lack real-time collaborative features. Moreover, blending multimedia semantics in collaborative MAR is still challenging. In this paper, we present a mobile real-time semantic multimedia-based collaborative system with augmented reality features based on open standards like XMPP and MPEG-7. The prototype system is evaluated in the digital documentation of historical sites for cultural heritage management. The evaluation results indicate increased productivity and awareness within on-site professional communities.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using a distributed search engine to identify optimal product sets for use in an outbreak detection system 使用分布式搜索引擎确定爆发检测系统中使用的最佳产品集
Ruhsary Rexit, F. Tsui, J. Espino, Sahawut Wesaratchakit, Ye Ye, Panos K. Chrysanthis
{"title":"Using a distributed search engine to identify optimal product sets for use in an outbreak detection system","authors":"Ruhsary Rexit, F. Tsui, J. Espino, Sahawut Wesaratchakit, Ye Ye, Panos K. Chrysanthis","doi":"10.4108/ICST.COLLABORATECOM.2012.250728","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250728","url":null,"abstract":"This study tests an approach for identifying sets of over-the-counter (OTC) thermometer products whose aggregate sales correlate optimally with aggregate counts of emergency department (ED) visits where patients have symptoms consistent with Constitutional syndrome such as fever and chills. We show that by using a distributed search engine alongside search algorithms (Brute-force), we can quickly identify a minimum set of OTC thermometer products whose sales are optimally correlated to the ED data. We used the Pearson correlation coefficient function to measure the degree of correlation between OTC and ED time series. The optimal OTC product set-comprising 9 thermometer products found by the Brute-force algorithm-has a correlation coefficient value of 0.96. We believe the approach used in this study can be used to efficiently identify different optimal OTC sets for detection of different types of disease outbreaks.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An asynchronous based approach to improve concurrency control in mobile web servers 一种基于异步的方法来改进移动web服务器的并发控制
S. Mishra, S. Sarasvati, Shashank Srivastava, Xumin Liu
{"title":"An asynchronous based approach to improve concurrency control in mobile web servers","authors":"S. Mishra, S. Sarasvati, Shashank Srivastava, Xumin Liu","doi":"10.4108/ICST.COLLABORATECOM.2012.250427","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250427","url":null,"abstract":"The recent boom in mobile computing has created a juncture where it is now possible to host web services on a mobile web server. However, there remain challenges due to limitations in available mobile hardware and software capable of managing resource intensive applications. This paper addresses the issues related specifically to concurrency control improvement in mobile web servers. We propose a Dynamic Resource Management Strategy (DRMS), which uses an asynchronous based approach to reduce the number of discarded incoming client requests by a mobile web server. The DRMS strategy includes identifying the incoming heavy requests from the clients, which require relatively heavy system resources on the mobile server to generate a response, and adding those requests to a heap for them to be processed asynchronously. Based on I-Jetty we designed and developed Dynamo, an implementation of DRMS, for Android-based mobile devices. We conducted an experimental study on Dynamo. Our results demonstrated the effectiveness of DRMS with the improvement in Dynamo's concurrency control management as compared to the same in I-Jetty.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信