{"title":"A Multi-channel End System Multicasting Scheme on P2P Cluster Overlay","authors":"Yinghua Ma, R. Chbeir, K. Yétongnon, Guiyang Su","doi":"10.1109/SITIS.2007.21","DOIUrl":"https://doi.org/10.1109/SITIS.2007.21","url":null,"abstract":"In the last decade, more and more media data are produced and shared over Internet. To send data on Internet, casting techniques are commonly used. Attempting to provide scalable applications, many approaches of end system multicast (ESM) have been recently designed over peer-to-peer (P2P) overlays. Cluster overlay is one of scalable P2P overlays in which peers are organized into groups and are not aware of the whole system. In this paper, we address a multi-channel end system multicasting scheme based on cluster overlay. Each multicast group is called a channel. Peers can switch from one channel to another. Super peers in cluster overlay manage peers and channels transferring in its cluster. Data duplicating and forwarding are carried out by peers. Heads of the cluster overlay help peers to find nearby peers who have joined in the channel in-demand to speed up channel switching.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-channel Support Framework for Mobile Workers","authors":"Shang Gao, J. Krogstie","doi":"10.1109/SITIS.2007.43","DOIUrl":"https://doi.org/10.1109/SITIS.2007.43","url":null,"abstract":"Along with the development and utilization of wireless applications, multi-channel mobile work is becoming more and more common in the business world. Based on the dynamically changing context of mobile workers, they can choose different channels to interact with relevant information systems. Thus, the mobile workers have huge demands for better multi-channel support model on a variety of mobile computing devices. This paper presents a multi-channel support framework for supporting mobile workers in mobile working settings. The primary characteristic of this framework is that the user can interact with the server during execution. The core component, the multi-channel decision maker, in the framework can be conceived as a medium to understand the relevant input parameters with the objective of generating best output solution on the computing device of mobile workers. Furthermore, in order to demonstrate the applicability of the multi-channel support framework, we use an exemplar case in the field of scientific conference management.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Contrast Enhancement Scheme Integrating Global and Local Contrast Equalization Approaches","authors":"Kwang-Sub Kim, Youngjoon Han, H. Hahn","doi":"10.1109/SITIS.2007.147","DOIUrl":"https://doi.org/10.1109/SITIS.2007.147","url":null,"abstract":"This paper proposes a new contrast enhancement scheme which integrates a global and a local contrast enhancement schemes to reduce the blocking and the washed-out effects at the same time. The proposed method executes a block-based histogram equalization on the temporary images which are obtained by dividing an input image into sub-blocks so that the sub-block of each temporary image may have a block size different from each other. In the next step, it calculates the contrast factors of all equalized temporary images and the temporary image having the largest contrast factor is selected to apply a global contrast enhancement algorithm. The global equalization function is extracted from the selected equalized temporary image and it is applied to the original image. The experiments have shown that the proposed algorithm produces a visually comfortable result image where the blocking and the washed-out effects cannot be detected.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Methodology for Web Services Discovery in Gnutella-Like Networks","authors":"Fuyong Yuan, Jian Liu, Chunxia Yin, Yulian Zhang","doi":"10.1109/SITIS.2007.68","DOIUrl":"https://doi.org/10.1109/SITIS.2007.68","url":null,"abstract":"The Web services technology has been initiated by industry, and lots of large companies are working on Web services technology and apply it in real world applications. However, the existing Web service registration and discovery are processed in a centralized approach, which cannot easily scale to a growing number of users. With the advantages of scalability and fault-tolerance, P2P technology is suitable for enhance the scalability of Web services in nature and can also make it possible to discover them easily. Because the P2P networks can provide the framework for discovery, publication, and registration for Web Services, the central registry is not required when integrating Web Services. So, in this paper, we proposed a methodology, which consist of two parts, to integrate distributed Web Services in Gnutella-like networks, and it makes those services collaborative. One is publishing the information of Web services to high degree nodes, and then many information chains of Web service are formed in Gnutella. Another is combining high degree walk and random walk methods to discover the target Web service. Finally we analyze the performance of the proposed methodology with simulation. The results show that the methodology can achieve high success rate, low traffic and load balance, so that it acquires the integration of Web Services scalable.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123155221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tuyen Nguyen, Young-Koo Lee, Byeong-Soo Jeong, Sungyoung Lee
{"title":"Event Query Processing in EPC Information Services","authors":"Tuyen Nguyen, Young-Koo Lee, Byeong-Soo Jeong, Sungyoung Lee","doi":"10.1109/SITIS.2007.50","DOIUrl":"https://doi.org/10.1109/SITIS.2007.50","url":null,"abstract":"Radio frequency identification (RFID) technology is an excellent substitute for barcodes in industry. However, the management of a large amount of RFID data, together with complicated relationships between data, in the context of responding to different kinds of queries is not well supported by traditional databases. Therefore, (1) an event-based model for managing data and (2) an algorithm for responding to event queries are proposed for RFID repositories in this paper. Our approach is based on the specification of the EPC information services (EPCIS) to meet the overall data requirements of the RFID community. Specifically, the object-oriented model is built on the top of relational databases so as to make the proposed combined data model highly flexible and semantic comprehensive. Based on this data model, various complicated predicates implied in different parameters of the predefined event query are interpreted into one single request to the database.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123401526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishing Trust Beliefs Based on a Uniform Disposition to Trust","authors":"Rachid Saadi, Omar Hasan, J. Pierson, L. Brunie","doi":"10.1109/SITIS.2007.54","DOIUrl":"https://doi.org/10.1109/SITIS.2007.54","url":null,"abstract":"Trust based access control models have recently attracted significant interest in the area of pervasive computing. In several trust based models, organizations are required to establish a set of trust beliefs regarding their neighboring nodes. In an organization there may be multiple administrators or the administrators may change with time. When multiple administrators contribute to the creation of the set of trust beliefs of an organization, inconsistencies may occur due to variations in their disposition to trust.In this paper we introduce a novel method for establishing the set of trust beliefs, which is likely to be more consistent. The proposed solution attempts to tie the quantification of trust not to the multiple dispositions to trust of the administrators but to a uniform disposition to trust of the organization. Having administrators evaluate the trustworthiness of neighboring nodes in relation to other nodes and using a mapping function for assigning quantitative values are the highlights of the method.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Architecture of Sensitive File Management Based on Dual-Core and EFI","authors":"Zijian Deng, Xuejia Lai","doi":"10.1109/SITIS.2007.38","DOIUrl":"https://doi.org/10.1109/SITIS.2007.38","url":null,"abstract":"How to protect the sensitive information from unauthorized disclosure is one of the problems in computer security. In this paper we present a new method for preventing the sensitive file from unauthorized disclosure, security file management (SFM). SFM relies on dual-core technology, extensible firmware interface and trusted computing to provide a much high level of security than current solutions. All operations of sensitive files are run in trusted boundary. In this paper, we present the architecture of SFM, the initial designer and the security analysis.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Computerized Method Based on Support Vector Machine for Tongue Diagnosis","authors":"Zhong Gao, L. Po, Wu Jiang, Xin Zhao, Hao Dong","doi":"10.1109/SITIS.2007.115","DOIUrl":"https://doi.org/10.1109/SITIS.2007.115","url":null,"abstract":"The tongue diagnosis is an important diagnostic method in traditional chinese medicine (TCM). In this paper, we present a novel computerized tongue inspection method based on support vector machine (SVM). First, two kinds of quantitative features, chromatic and textural measures, are extracted from tongue images by using popular image processing techniques. Then, support vector machine and Bayesian network are employed to build the mapping relationships between these features and diseases, respectively. Finally, we present a comparison between SVM and BN classification. The experiment results show that we can use SVM to classify the tongue images more excellently and get a relative reliable prediction of diseases based on these features.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Anisetti, V. Bellandi, E. Damiani, Gwanggil Jeon, Jechang Jeong
{"title":"Full Controllable Face Detection System Architecture for Robotic Vision","authors":"M. Anisetti, V. Bellandi, E. Damiani, Gwanggil Jeon, Jechang Jeong","doi":"10.1109/SITIS.2007.89","DOIUrl":"https://doi.org/10.1109/SITIS.2007.89","url":null,"abstract":"Face detection nowadays is one of the most promising applications of image analysis and processing. One emerging application field is human-robot interaction. For many applications in this field (including face identification and expression recognition) the precision of facial feature detection and the computational burden are both critical issues. This paper presents a completely tunable hybrid method for accurate face localization based on a quick-and-dirty preliminary detection followed by a 3D refinement. Our technique guarantees complete control over the cost/quality ratio and permits to achieve the precision required for interactive applications. We use our approach to design a robotic vision architecture capable of selecting from a set of strategies to obtain the best results.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing and Contrasting Micro-payment Models for Content Sharing in P2P Networks","authors":"Xiaoling Dai, K. Chaudhary, J. Grundy","doi":"10.1109/SITIS.2007.63","DOIUrl":"https://doi.org/10.1109/SITIS.2007.63","url":null,"abstract":"Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We proposed a new model, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network service charging. P2P micro-payment systems must provide a secure, highly efficient, flexible, usable and reliable environment, the key issues in P2P micro-payment systems development. Therefore, in order to assist in the design of an efficient micro-payment model suitable for P2P networks, we compare and contrast several existing P2P micro-payment models in this paper and outline a new P2P micro-payment scheme we have been developing that addresses the disadvantages in current schemes.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}