2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

筛选
英文 中文
Grasping contextual awareness inside aworkspace at the entrance to support group interaction 在入口的工作空间中把握上下文意识,以支持团队互动
Hironori Egi, H. Shigeno, Ken-ichi Okada
{"title":"Grasping contextual awareness inside aworkspace at the entrance to support group interaction","authors":"Hironori Egi, H. Shigeno, Ken-ichi Okada","doi":"10.1109/ICITST.2009.5435099","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5435099","url":null,"abstract":"This research focuses on the entrance of a workspace, where two or more rooms are connected. We propose ASGate (AtmoSphericGate), which conveys change of the state inside the workspace to the members who approach the entrance. This system gathers and stores awareness information from various sensors, and displays the information on the screen integrated into the door. AS-Gate expresses change of the state inside the workspace using colors and animation, and enables members to perform effective works and to facilitate communication. We implemented this system and evaluated effects on the group interaction.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Usability driven website design — An equine sports case study 可用性驱动的网站设计-马术运动案例研究
R. Wilkins, A. Nyamapfene
{"title":"Usability driven website design — An equine sports case study","authors":"R. Wilkins, A. Nyamapfene","doi":"10.1109/ICITST.2009.5402571","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402571","url":null,"abstract":"There is considerable anecdotal evidence that equine sports enthusiasts in Devon and Cornwall still shun equine event search websites in preference to traditional information sources such as newspapers, magazines and word of mouth. On this basis, we have carried out a usability analysis of key equine event search websites serving Devon and Cornwall. This analysis suggests that these websites are designed in ways that make them unfriendly and unwelcoming to prospective users. As a follow-up to this analysis, we have used Shneiderman's eight golden rules for interface design to develop a prototype search website. Tests carried out with participants drawn from the target user group suggest that this prototype website outperforms the currently leading equine event search website in Devon and Cornwall. This leads us to conclude that website design and development should be guided at all times by usability principles.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of question classification systems using differing features 用不同的特征评价问题分类系统
A. Harb, M. Beigbeder, J. Girardot
{"title":"Evaluation of question classification systems using differing features","authors":"A. Harb, M. Beigbeder, J. Girardot","doi":"10.1109/ICITST.2009.5402567","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402567","url":null,"abstract":"Most question and answer systems”Q&A” are based on three research themes: question classification and analysis, document retrieval and answer extraction. The performance in every stage affects the final result. The classification of questions appears as an important task because it deduces the type of expected answers. A method of improving the performance of question classification is presented, based on linguistic analysis (semantic, syntactic and morphological) as well as statistical approaches guided by a layered semantic hierarchy of fine grained question types. Actually, methods of question expansion are studied. This method adds for each word a higher representation. Various features of questions, diverse term weightings and several machine learning algorithms are compared. Experiments were conducted on real data are presented. They demonstrate an improvement in precision for question classification.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134480021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cloud Computing: The impact on digital forensic investigations 云计算:对数字取证调查的影响
S. Biggs, S. Vidalis
{"title":"Cloud Computing: The impact on digital forensic investigations","authors":"S. Biggs, S. Vidalis","doi":"10.1109/ICITST.2009.5402561","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402561","url":null,"abstract":"Cloud Computing (CC) as a concept and business opportunity is likely to see many organisations experiencing the 'credit crunch', embrace the relatively low cost option of CC to ensure continued business viability and sustainability. The pay-as-you-go structure of the CC business model is typically suited to SME's who do not have the resources to completely fulfil their IT requirements. Private end users will also look to utilise the colossal pool of resources that CC offers in an attempt to provide mobile freedom of information. However, as with many opportunities that offer legitimate users enormous benefits, unscrupulous and criminal users will also look to use CC to exploit the loopholes that may exist within this new concept, design and business model. This paper will outline the tasks that the authors undertook for the CLOIDIFIN project and highlight where the Impact of CC will diversely effect digital forensic investigations.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125826453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 143
Towards security goals in summative e-assessment security 迈向总结性电子评估安全的安全目标
Kikelomo Maria Apampa, G. Wills, David Argles
{"title":"Towards security goals in summative e-assessment security","authors":"Kikelomo Maria Apampa, G. Wills, David Argles","doi":"10.1109/ICITST.2009.5402505","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402505","url":null,"abstract":"The general security goals of computer a system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats. The C-I-A security goals are well researched areas; however they may be insufficient to address all the needs of the summative e-assessment. In this paper, we do not discard the fundamental C-I-A security goals; rather we define security goals which are specific to summative e-assessment security.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121656604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A framework for online counter terrorism 网络反恐框架
K. Zolfaghar, Arash Barfar, S. Mohammadi
{"title":"A framework for online counter terrorism","authors":"K. Zolfaghar, Arash Barfar, S. Mohammadi","doi":"10.1109/ICITST.2009.5402641","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402641","url":null,"abstract":"Nowadays, most of the countries have come to this conclusion that their plan for counter terrorism should be changed from “passive” to “active”. Consistently, this should be reflected on the Internet as an important channel of communication and doing business in many countries. However, there are different barriers to achieve an effective online counter terrorism such as lack of “cooperation” and “universal legislation”. Accordingly, the first step of moving toward an effective online counter terrorism is to relieve these barriers. In this paper, a framework is proposed that aims at relieving these problems, using “honeypots” and “web mining” techniques.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The website census 网站普查
A. Qadeer, Waqar Mahmood, A. Waheed
{"title":"The website census","authors":"A. Qadeer, Waqar Mahmood, A. Waheed","doi":"10.1109/ICITST.2009.5402623","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402623","url":null,"abstract":"The website census is an effort to enumerate all the websites on the World Wide Web (WWW) without using crawling. Crawling is a traditional way of website discovery. It is conceptually simple but the very size of the WWW makes the implementation complex and resource demanding. The enormous amount of bandwidth, a huge persistent storage pool, a sufficiently large cluster of machines for data processing and a complex set of software systems are just a few examples of the needed resources. In this work, we use exhaustive IP range probing to detect the presence of a web server on TCP port 80. Although this probing is exhaustive in nature, it is lightweight in terms of resource demands. This enumeration of websites has many applications. The most obvious is to use it as a seed to the conventional crawling. It can be refined to be used as a top level domain (TLD) specific seed for targeted crawling.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117150628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the fractal characteristics of Internet network traffic and its utilization in covert communications 互联网网络流量的分形特征及其在隐蔽通信中的应用
R. Marie, J. Blackledge, H. Bez
{"title":"On the fractal characteristics of Internet network traffic and its utilization in covert communications","authors":"R. Marie, J. Blackledge, H. Bez","doi":"10.1109/ICITST.2009.5402542","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402542","url":null,"abstract":"There are many models in the literature that consider the main characteristics of Internet traffic either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet traffic. In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet traffic. We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architectural model for a high performance content management system 高性能内容管理系统的体系结构模型
R. Vasilescu
{"title":"Architectural model for a high performance content management system","authors":"R. Vasilescu","doi":"10.1109/ICITST.2009.5402570","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402570","url":null,"abstract":"Usually content management systems are based on core technologies such as database management systems and file systems. Content management is now being regarded as a base technology for other more complex applications which offer a wide range of functionality for accessing and transforming large data volumes. While content management tasks can be easily implemented using the existing database systems, we believe that high performance implementations require specialized processing and architectures. This paper will describe the proposed architecture of a high performance content management system and will present some experimental conclusions from a model implementation. The proposed architecture focuses on the content management specific characteristics identification and describes a new implementation model, aiming at supplying greater performance than conventional ones.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115028830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-platform Bluetooth remote control 多平台蓝牙遥控器
Jarle Hansen, G. Ghinea
{"title":"Multi-platform Bluetooth remote control","authors":"Jarle Hansen, G. Ghinea","doi":"10.1109/ICITST.2009.5402609","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402609","url":null,"abstract":"Traditionally, mobile devices have come with a set number of functionalities. Even when these have been augmented, this has rarely involved taking advantage of their complementary wireless capabilities (such as Bluetooth and GPS). The main focus of the research described in this paper was to create an application that takes advantage of the capabilities of Bluetooth to remote control any computer with Bluetooth connectivity. The proposed solution received positive feedback in the user evaluation.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信