{"title":"Study on social culturology of the “Internet sharer”","authors":"Hongyan Zhao, Ming He","doi":"10.1109/SWS.2009.5271802","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271802","url":null,"abstract":"“Sharing” is another new phenomenon in the Cyberworld, which is exposing everying of oneself to the light of the day in the net, including the Chinese people has always been closely-guarded secret of personal privacy. The emergence of Internet sharer has thoroughly subverted the introverted subtle inner of Oriental cultural traditions. Their typical “low context” behavior shows the Chinese people's individuality and courage in E times. “sharing” behavior of the network in a rapidly changing times may be short-lived, but it contains a profound cultural connotation of the social transformation period, that is, the East-West culture clashes and integration triggered by the realization of the “global village”. The emergence and prosperity of the “sharing” on the Internet Age originated from the change of a range of social factors, which initially embodied the main body of the lost self and attribution to the groups desire in the main impact of the information. As a new thing, the “sharing” could lead to a series of social problems in its early stage, while it is the integration and transformation of culture in the era of globalization, which is bound to the history. Therefore, it is necessary to actively guide and standardize the Special phenomenon.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117278471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A policy framework for mobile web service customization","authors":"Xinhuai Tang, Xiaoming Zhou, Hai Jiang","doi":"10.1109/SWS.2009.5271730","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271730","url":null,"abstract":"A web service in ubiquitous computing environments usually serves many consumers, with specific functional or nonfunctional requirements. Thus, web service should be customized and easy to be separated into semantic logic. In this paper, we present our research on mobile web service customization based on our previous work — SPBCA (Semantic Pattern-Based Context-Aware) Middleware. We exploit the tuple space technology to simplify the service lookup and locating. An approach is proposed to facilitate web service customization in ubiquitous computing environments. It uses a programmable way for the collaboration between service provider and consumer.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121126516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of human factors on email worm propagation","authors":"Xin Sun, Yanheng Liu, Jian Wang","doi":"10.1109/SWS.2009.5271794","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271794","url":null,"abstract":"One of the most prevalent security problems in network is the rampant propagation of email worms. Unlike active worms, the email worm has to be activated by user action in order to spread further. This paper deals with modeling email worm propagation by analyzing and combining human factors. Impact of human factors on email worm propagation is investigated and discussed. Results of email worm propagation under a practical simulation environment show that the presented model well describes the email worm behavior. Conclusions are also drawn that infection probability decreases during evolution of worm infection due to the security consciousness rising, and highly connected nodes are more susceptible.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126133793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The principle of ID-less communication in the BLACS","authors":"Yuqing Xiong, Yu Lei","doi":"10.1109/SWS.2009.5271801","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271801","url":null,"abstract":"The BLACS is a communication library for linear algebra computing on distributed memory parallel computing systems. ID-less communication is one of features of the BLACS. ID-less communication means that the no message ID is carried during communication. ID-less communication is important to strengthen programmability of the BLACS and improve quality of parallel applications. The point to point communication, broadcast, and combine in the BLACS based on MPI are taken as examples to analyze the principle of ID-less communication in this paper.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116007109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The types and development of adolescents' prosocial behaviors online","authors":"Lei Li, M. XiaoHui","doi":"10.1109/SWS.2009.5271805","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271805","url":null,"abstract":"The present study was designed to examine the characteristics and development of prosocial behaviors online of adolescents. Four hundred forty-seven adolescents were assessed 6 types of prosocial behaviors online through questionnaire. The results indicated that (1) adolescents' conducted lots of prosocial behaviors on the Internet; (2) adolescents reported dire prosocial behaviors online the most, followed by altruistic, emotional, anonymous, compliant, and public prosocial behaviors; (3) there was a significant main effect of gender on altruistic prosocial behaviors online, which girls scored higher than adolescent boys; (4) finally, prosocial behaviors online reduced with grade except dire.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security transmission of FTP data based on IPSec","authors":"Wanbo Zheng, Shufen Liu, Zongwei Liu, Qingxing Fu","doi":"10.1109/SWS.2009.5271783","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271783","url":null,"abstract":"With the analysis of IPv6's IPSec protocol and principles, the paper designs various modules of IPSec, and achieves IPSec function. By the analysis of the FTP under IPv4 and IPv6 environment, the paper realizes the function of FTP in data transmission of IPv6. The test results of FTP data transmission based on IPSec show that the data transmission is successful and secure, the design and realization are feasible.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk perception of individual suppliers in e-commerce transactions","authors":"Yinping Kong, Yiwen Chen, Shuai Wu, X. Jiao","doi":"10.1109/SWS.2009.5271785","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271785","url":null,"abstract":"This study aimed to explore the relationship between three kinds of risk characteristics, anxiety, controllability and predictability respectively, and their effects on total risk perception, and their relationship with risk-coping behaviors in e-commerce transactions. 174 individual suppliers participated in the survey. Results indicated that: a) the correlation between controllability and predictability was high, while anxiety remained independently; b) the risk source factors of two risk characteristics were different; c) the anxiety influenced the total risk most; d) individual suppliers tended to take coping risk behaviors as much as possible. Also, part of the risk coping behaviors has significant correlation with risk characteristics.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131003512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiazao Lin, Zhili Zhao, Lei Liu, Huarong Sun, Shoubo Li, Caihong Li, Li Liu, Lian Li
{"title":"MDMF: A comprehensive framework for managing large-scale heterogeneous data in eSoC collaborative environment","authors":"Jiazao Lin, Zhili Zhao, Lei Liu, Huarong Sun, Shoubo Li, Caihong Li, Li Liu, Lian Li","doi":"10.1109/SWS.2009.5271772","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271772","url":null,"abstract":"Computational Chemistry as a data-intensive application involves the geographically dispersed extraction of complex data information from very large collections of measured or computed data. And many chemists from different domains have to work together to explore, query, analyze, visualize and process large-scale heterogeneous data sets. Therefore, in order to address these challenges, we present and design a comprehensive framework Massive Data Management Framework (MDMF), which comprises three critical modules. It integrates the data management of CGSP and GOS, and even implements the interoperation to handle large scale data in distributed environment. And it also provides an easy-to-use graphical Chemical Data Visual Management Tool, which affords not only common database functions but also the functions of displaying and editing many types of chemical elements. Furthermore, it even offers a user-friendly Data Management Client Tool which is a uniform data viewer to access and manage the underlying data management in grid environment. Finally, we demonstrate several applications in eSoC system and the results indicate that the framework is an effective data management way to research on computational chemistry.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adverse selection and moral hazard on network platform of science and technology papers published based on principal-agent theory","authors":"Guo-liang Liu, Dong Wang, Jiu-long Qu, Li-hua Zhang","doi":"10.1109/SWS.2009.5271725","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271725","url":null,"abstract":"Under the environment of service-driven property of network technology development, scientific papers published via network platform has become reality. With the development of platform, the academic quality of the papers on the platform become bottleneck, and “adverse selection” and “moral hazard” are the main reason which affect the academic quality of scientific papers in the platform. As a result, this article start from the “adverse selection” and “moral hazard” problem during the process of scientific papers published via network platform, and explored and analysed the causes and mechanism of academic quality. In this paper, we also set up a theoretic model of incentive cost and analyze the condition of effectiveness of incentive. Based on the theory of principal-agent, the sum of the agent cost and supervisor cost is equated to incentive cost in the platform with asymmetric information is hold.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129496142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating dynamic performance of VMM in server consolidation","authors":"Pingpeng Yuan, Yuhua Huang, Hai Jin, Wenzhi Cao","doi":"10.1109/SWS.2009.5271777","DOIUrl":"https://doi.org/10.1109/SWS.2009.5271777","url":null,"abstract":"With the IT development, computer is more powerful and can accommodate more virtual servers than ever. Due to users' random requests, it is not economical to start all virtual servers beforehand. One reasonable approach is to start virtual servers dynamically. It will lead to varied performance in server consolidation. Thus, one of the key problems is how to evaluate dynamic performance of VMM in server consolidation. However, no evaluation approach for dynamic performance of VMM in server consolidation is available now. We present an approach to evaluate dynamic performance of VMM in server consolidation. The approach adopts popular application servers, such as Web and database server as workload. We firstly give the problem definition. Then we define performance metrics for evaluating dynamic performance of VMM in server consolidation. Finally, we use the approach to evaluate dynamic performance of VMM in server consolidation.","PeriodicalId":241658,"journal":{"name":"2009 1st IEEE Symposium on Web Society","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}