2011 Third International Conference on Intelligent Networking and Collaborative Systems最新文献

筛选
英文 中文
Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis 基于小波分析的共享卡流量表征与分类
Aniello Castiglione, A. D. Santis, F. Palmieri
{"title":"Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis","authors":"Aniello Castiglione, A. D. Santis, F. Palmieri","doi":"10.1109/INCOS.2011.62","DOIUrl":"https://doi.org/10.1109/INCOS.2011.62","url":null,"abstract":"In the last years the interest in methods and techniques for circumventing digital video broadcasting security is continuously increasing, and digital TV content providers are struggling to restrict usage only to authorized users through complex conditional access systems. Currently, the most significant weakness is the card-sharing activity which allows a subscriber to provide access to digital contents to a group of users connected through an IP network. This is usually realized employing ad hoc customized devices. Detecting the presence of these illegal systems on the network by recognizing their related traffic is an important issue of primary importance. To avoid the identification of such traffic are often used payload obfuscation strategies based on encryption, making it difficult the adoption of packet inspection techniques. This paper presents some ideas about a possible strategy for binary classification and detection of card-sharing traffic based on the natural capability of Wavelet Analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas are a first step for the implementation of a classification scheme that relies only on time regularities of the traffic and not on the packet content that may be affected by protocol and payload obfuscation techniques.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124791284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Design Method by Link Protection for Network Load Alleviation against Failures 基于链路保护的网络故障负荷缓解设计方法
Akira Noguchi, Takeshi Fujimura, H. Miwa
{"title":"Network Design Method by Link Protection for Network Load Alleviation against Failures","authors":"Akira Noguchi, Takeshi Fujimura, H. Miwa","doi":"10.1109/INCoS.2011.124","DOIUrl":"https://doi.org/10.1109/INCoS.2011.124","url":null,"abstract":"Network reliability is needed as the Internet becomes an important social infrastructure. However, we face risks of failure and congestion on many links or routers, therefore, a network should be robust enough to avoid failure and congestion. As the route of a path between two nodes is automatically determined by a routing protocol, many paths may be included in a same link and it may cause congestion. Especially, when a link fails, the routes of the paths included in the link are automatically changed, and eventually congestion may occur. If there are critical links whose failures cause congestion, they must be protected by the function that a failed link is rapidly switched to its backup link in the lower layer and the failure is not detected over the IP layer. However, such a link protection increases investment cost for facilities and operational cost. In this paper, we formulate the problem to find links to be protected so that no congestion occurs even if any non-protected links fails. We prove that this problem is NP-hard. In addition, we present a polynomial-time algorithm to solve the problem that the number of simultaneously failed links is restricted to one.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Efficiency of Optimization Method of Sign Sound Using Interactive Differential Evolution 基于交互差分进化的符号声音优化方法的有效性
M. Fukumoto, Shintarou Ogawa
{"title":"An Efficiency of Optimization Method of Sign Sound Using Interactive Differential Evolution","authors":"M. Fukumoto, Shintarou Ogawa","doi":"10.1109/INCoS.2011.48","DOIUrl":"https://doi.org/10.1109/INCoS.2011.48","url":null,"abstract":"Interactive Evolutionary Computation is well known as an effective method to create media contents suited to user's preference and objectives to use. As one of the methods, we have already presented a method that creates sign sounds with Interactive Differential Evolution (IDE). In the user's evaluation process, the user selects better one from two presented media contents. In this study, to fundamentally investigate the efficacy of the IDE method, three listening experiments were performed, experiment 1 as comparing experiment, experiment 2 as re-evaluation for subjects themselves, and experiment 3 as re-evaluation for other subjects. Target of the creation with the IDE method was warning sign sounds. Ten males participated as subjects in the experiments. In the result of the experiment 2, gradual increase of the subjective fitness value was observed. In the result of the experiment 3, increase of the subjective fitness value was not observed. These results suggested that the IDE method has a possibility to create sign sounds suited to user's preference.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Generation Network Architecture to Accommodate Virtual Network Application Services 适应虚拟网络应用服务的新一代网络架构
Hiroaki Yamanaka, M. Shimamura, S. Ishii, Eiji Kawai, K. Iida, M. Tsuru
{"title":"A New Generation Network Architecture to Accommodate Virtual Network Application Services","authors":"Hiroaki Yamanaka, M. Shimamura, S. Ishii, Eiji Kawai, K. Iida, M. Tsuru","doi":"10.1109/INCoS.2011.26","DOIUrl":"https://doi.org/10.1109/INCoS.2011.26","url":null,"abstract":"The Internet architecture has been reconsidered along with newly emerging diverse Internet applications, and cooperation between applications and networks becomes desired. Inherently, an application service provider concentrates on serving its own application with the high performance while an infrastructure service provider needs to consider an efficient and fair use of its physical resources to simultaneously support different applications. We propose an architecture that coordinates requirements of both types of providers based on network virtualization technologies in general and Open Flow framework in particular. In our architecture, an application service provider can easily construct a virtual network for its application service, while an infrastructure provider can achieve an efficient use of physical resource adaptively within the restriction to maintain a required performance of supporting virtual networks.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131641993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Model for Storytelling Complex Learning Objects 讲述复杂学习对象的新模型
G. Mangione, F. Orciuoli, A. Pierri, Pierluigi Ritrovato, M. Rosciano
{"title":"A New Model for Storytelling Complex Learning Objects","authors":"G. Mangione, F. Orciuoli, A. Pierri, Pierluigi Ritrovato, M. Rosciano","doi":"10.1109/INCoS.2011.27","DOIUrl":"https://doi.org/10.1109/INCoS.2011.27","url":null,"abstract":"This paper focuses the attention on a particular complex learning resource, namely storytelling that is characterized by its capability to support high-level learning processes thanks to a remediation of languages, strategies and roles. In the traditional forms of storytelling, a story is told to learners in a predefined way (also known as plot). This approach is called plot-based. An alternative approach is known as character-based. The plot-based approach fails to model the dynamic behaviors of virtual characters. On the other hand, the character-based approach focuses on designing the specific behaviors or actions of the virtual characters. In this work a Storytelling Design Model is defined in order to provide pedagogy-based guidelines to the design of Storytelling Complex Learning Objects taking care of both the plot-based and character-based approaches.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130664496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System 基于游戏的混合学习环境:将严肃游戏扩展到学习内容管理系统
I. Dunwell, Panagiotis Petridis, S. Arnab, A. Protopsaltis, M. Hendrix, S. Freitas
{"title":"Blended Game-Based Learning Environments: Extending a Serious Game into a Learning Content Management System","authors":"I. Dunwell, Panagiotis Petridis, S. Arnab, A. Protopsaltis, M. Hendrix, S. Freitas","doi":"10.1109/INCoS.2011.58","DOIUrl":"https://doi.org/10.1109/INCoS.2011.58","url":null,"abstract":"Serious games have recognized potential as a means to tackle many challenges in education, ranging from stimulating increased learner motivation, to transferring challenging concepts in a novel and engaging form. They are commonly shown to work most effectively in blended approaches to learning, whereby the game plays a core role in a wider pedagogic approach, often based around an experiential or exploratory model. In this paper, we explore how the integration of a serious game, and more generally gaming paradigms, can be extended to a learning content management system (LCMS) to support a blended and holistic approach to their use in education. Through a case study within the EU-Funded Adaptive Learning via Intuitive/Interactive, Collaborative and Emotional Systems (ALICE) project, we demonstrate a technical integration of a gaming engine with a proprietary LCMS, and discuss the broader pedagogic benefits of such an approach. In particular, we note how this method can support an 'intuitive guided' or scaffolded approach to learning, where the learner is given the potential to explore a non-linear learning environment, whilst scaffolding and blending provides the guidance towards ensuring targeted learning objectives are met.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Knowledge Constructive Jigsaw as an Adaptive Learning Framework: Its Design Principles and Network Supports 知识建构拼图作为自适应学习框架:设计原则与网络支持
N. Miyake
{"title":"Knowledge Constructive Jigsaw as an Adaptive Learning Framework: Its Design Principles and Network Supports","authors":"N. Miyake","doi":"10.1109/INCoS.2011.109","DOIUrl":"https://doi.org/10.1109/INCoS.2011.109","url":null,"abstract":"I will report our current endeavor to create a learning community aiming for better quality education, by changing classroom practices from teacher-centric to learner-centric. Our efforts are focused on creating intellectually challenging collaborative learning based on a framework called \"constructive interaction, \" which has been identified as a basic skill of human beings to learn from social interaction. The design is called the \"Knowledge Constructive Jigsaw, \" which encourages the learners engage in actively explaining what each learner knows to integrate them and create an answer to the shared problem. In this presentation, I will explain the basic framework and how it can be implemented in regular classroom activities, with some outcomes. I will then touch upon how this renovation effort opens new research fields, including the formation of a networked, sustainable learning community.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126589212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abuse-freeness Electronic Payment Protocol 防止滥用电子支付协议
K. Fan, Yue Wang, Hui Li
{"title":"Abuse-freeness Electronic Payment Protocol","authors":"K. Fan, Yue Wang, Hui Li","doi":"10.1109/INCoS.2011.45","DOIUrl":"https://doi.org/10.1109/INCoS.2011.45","url":null,"abstract":"Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party and using the concurrent signature and it has prevented both sides in payment to originate and terminate protocol maliciously. At the same time fairness and security are also achieved in the proposed protocol.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130711325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Seamless Connection for Authentication Required Web Sites by Shibboleth Shibboleth为需要认证的网站提供无缝连接
Kenzi Watanabe, M. Otani
{"title":"A Seamless Connection for Authentication Required Web Sites by Shibboleth","authors":"Kenzi Watanabe, M. Otani","doi":"10.1109/INCoS.2011.36","DOIUrl":"https://doi.org/10.1109/INCoS.2011.36","url":null,"abstract":"Shibboleth enables a seamless connection for authentication required Web sites. In this paper, we describe an implementation and a practice for such connection in e-Learning between a Moodle, a video streaming site and providing results of examinations site.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of MANET Testbed in a Mixed Indoor and Outdoor Environment 室内外混合环境下MANET试验台性能评价
M. Hiyama, Elis Kulla, Makoto Ikeda, L. Barolli, Jiro Iwashige
{"title":"Performance Evaluation of MANET Testbed in a Mixed Indoor and Outdoor Environment","authors":"M. Hiyama, Elis Kulla, Makoto Ikeda, L. Barolli, Jiro Iwashige","doi":"10.1109/INCoS.2011.133","DOIUrl":"https://doi.org/10.1109/INCoS.2011.133","url":null,"abstract":"A Mobile Ad hoc Network (MANETs) is a group of wireless mobile terminals, which cooperate together by routing packets to each other on a temporary network. MANETs are attracting attention for their potential use in several fields such as collaborative computing and communications in indoor and outdoor environments. Considering mobility of the terminals, routing is a key process for operation of MANETs. In this paper, we analyze the performance of Optimized Link State Routing (OLSR) protocol in a mixed indoor and outdoor environment considering different scenarios (STA1, STA2, MOV) for horizontal topology. We evaluate the scenarios based on throughput and delay metrics. From the experimental results, we found that for STA1 scenario, there is a decrease in performance in the case of rightarrow-4 flow, for both metrics, because of the hop distance. For STA2 scenario, the presence of node 5 improves route quality for rightarrow-4 flow. When destination node is moving (MOV scenario), the delay and throughput decreased because it becomes difficult to keep the route to the destination.","PeriodicalId":235301,"journal":{"name":"2011 Third International Conference on Intelligent Networking and Collaborative Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信