2009 International Conference for Internet Technology and Secured Transactions, (ICITST)最新文献

筛选
英文 中文
Transactions and service level agreements for online music distribution 在线音乐发行的交易和服务水平协议
Andreas Finger, Holger Meyer, Tim Rieger, A. Heuer
{"title":"Transactions and service level agreements for online music distribution","authors":"Andreas Finger, Holger Meyer, Tim Rieger, A. Heuer","doi":"10.1109/ICITST.2009.5402524","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402524","url":null,"abstract":"Online music distribution is currently experiencing a boom. While it is too early to proclaim the end of the audio CD format, agreement exists that in the future substantial amounts of music will be purchased online as digital files or audio streams. Furthermore, new applications like audio and video live streaming gain in importance. Regular download or streaming technologies, however, are not adequate for the demands of commercial online music distribution. In the course of this work the current practice in online music distribution is evaluated using a set of criteria called MAGICC criteria. It is found that current music streaming offerings do not fulfill all of these. Therefore, a new transaction concept using fuzzy transactions is introduced to solve this problem. It consists of fuzzy transactions, an architecture design to implement the fuzzy transaction concept, and a set of rules which form a simple commit protocol. Technical feasibility of the proposed concept is shown.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA IEEE 802.11 DCF与IEEE 802.11e EDCA的性能比较
Bilal Rauf, M. Amjad, Kabeer Ahmed
{"title":"Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA","authors":"Bilal Rauf, M. Amjad, Kabeer Ahmed","doi":"10.1109/ICITST.2009.5402597","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402597","url":null,"abstract":"IEEE 802.11 Wireless Local Area Network (WLAN) is one of the most widely deployed wireless network technologies in the world today. However, 802.11 MAC algorithm is unable to support modern multimedia applications which require certain level of quality of service (QoS) guarantees in terms of consistent, timely and reliable data transfer. The 802.11e MAC protocol provides extension for adjustment of MAC parameters that were previously fixed in the standard 802.11 CSMA/CA contention mechanism. In this paper we conduct the evaluation study of 802.11e Enhanced Distributed Channel Access (EDCA) mechanism which supports service differentiation by assigning data traffic with different priorities based on their QoS requirements. The evaluation also includes the study of the role of different parameters IEEE 802.11e EDCA utilizes to realize service differentiation as well as the performance comparison of 802.11 and 802.11e along with its capability to resolve downlink/uplink fairness problem.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132946034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intertextual distance for Arabic texts classification 阿拉伯语文本分类的互文距离
R. Ayadi, M. Maraoui, M. Zrigui
{"title":"Intertextual distance for Arabic texts classification","authors":"R. Ayadi, M. Maraoui, M. Zrigui","doi":"10.1109/ICITST.2009.5402564","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402564","url":null,"abstract":"Our researches works are interested on the application of the intertextual distance theory on the Arabic language as a tool for the classification of texts. This theory assumes the classification of texts according to criteria of lexical statistics, and it is based on the lexical connection approach. Our objective is to integrate this theory as a tool of classification of texts in Arabic language. It requires the integration of a metrics for the classification of texts using a database of lemmatized and identified corpus which can be considered as a literature reference for times, kinds, literary themes and authors and this in order to permit the classification of anonymous texts.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133239592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Multi-agent systems to build a computational middleware: A chatterbot case study 构建计算中间件的多代理系统:一个聊天机器人案例研究
A. F. M. Batista, M. Marietto, Gislene Cristina de O. Barbosa, R. S. França, G. Kobayashi
{"title":"Multi-agent systems to build a computational middleware: A chatterbot case study","authors":"A. F. M. Batista, M. Marietto, Gislene Cristina de O. Barbosa, R. S. França, G. Kobayashi","doi":"10.1109/ICITST.2009.5402586","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402586","url":null,"abstract":"In this work we argue that the shift from computer networks to agent networks is an important improvement of the network programming technology. Its due the fact that agents are well suited for modeling, designing and implementing scalable, flexible and secure distributed systems over a computing environment. Based on this agent-paradigm, our proposal is to make a case study of a chatterbot prototype. This chatterbot can be utilized in educational virtual environments to provide an interface to guide the student in the explanation of the FAQs.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking 一种利用变换技术和决策树算法对图像进行数字水印的新方法
Samir B. Patel, Tejas B. Mehta, S. N. Pradhan
{"title":"A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking","authors":"Samir B. Patel, Tejas B. Mehta, S. N. Pradhan","doi":"10.1109/ICITST.2009.5402565","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402565","url":null,"abstract":"Digital Watermarking is an emerging copyright protection technology. The paper presents a new robust watermarking technique based on combining the power of transform domain technique, the Discrete Cosine Transform (DCT) and the data mining technique such as Decision Tree Induction (ID3). The paper focuses on a technique through which the notion of decision tree can be applied on transformed vectors to build the decision tree. We train the image blocks for deriving the classification tree. The resulting decision tree provides decision making rules to identify good quality image blocks for insertion of watermark. The implementation results have shown that the algorithm has an acceptable robustness against the JPEG compression and addition of noise.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers 蜂鸟密码算法在4位微控制器上的轻量级实现
Xinxin Fan, Honggang Hu, G. Gong, Eric M. Smith, D. Engels
{"title":"Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers","authors":"Xinxin Fan, Honggang Hu, G. Gong, Eric M. Smith, D. Engels","doi":"10.1109/ICITST.2009.5402515","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402515","url":null,"abstract":"The Radio Frequency IDentification (RFID) technology provides an extensible, flexible and secure measure against product counterfeiting. However, due to the harsh cost and power constraints of RFID tags only dedicated cryptographic engines or low-power consumption microcontrollers can be integrated into tags to implement various security mechanisms. In this contribution, we investigate efficient implementation of an ultra-lightweight cryptographic algorithm Hummingbird[5] on a zero-power 4-bit MARC4 microcontroller from Atmel and compare the performance of Hummingbird to another ultra-lightweight block cipher PRESENT [4] on the same platform. Our experimental results show that after a system initialization phase Hummingbird can achieve about 58% faster throughput than the block cipher PRESENT on a 4-bit ATAM893-D microcontroller running at 16KHz, 500KHz and 2MHz, respectively. In particular, Hummingbird can process one data block with less than 12 ms under a typical low power configuration of 4-bit microcontrollers such as an 1.8V supply voltage and a 500KHz clock frequency.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"45 29","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120811369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Email classification: Solution with back propagation technique 电子邮件分类:解决方案与反向传播技术
T. Ayodele, Shikun Zhou, R. Khusainov
{"title":"Email classification: Solution with back propagation technique","authors":"T. Ayodele, Shikun Zhou, R. Khusainov","doi":"10.1109/ICITST.2009.5402583","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402583","url":null,"abstract":"To acquire knowledge by learning automatically from the data, through a process of inference, model fitting, or learning from example is one of the rare field of email management. And when an artificial system can perform \"intelligent\", tasks similar to those performed by the human brain and such is implemented in email classification, such a system will be is extremely intelligent. Using neural network for email content classification with back propagation is where our technique becomes distinct and effective. This paper proposes a new email classification model using a teaching process of multi-layer neural network to implement back propagation algorithm. Our contributions are: the use of empirical analysis to select an optimum, novel collection of features of a user's email message content that enables the rapid detection of most important words, phrases in emails and a demonstration of the effectiveness of two equal sets of emails (training and testing data).","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128284736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of authentication of anycast communication 改进了任播通信的认证
Chenglian Liu
{"title":"Improvement of authentication of anycast communication","authors":"Chenglian Liu","doi":"10.1109/ICITST.2009.5402618","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402618","url":null,"abstract":"In the above paper a conception has been proposed which is a variant of the ElGamal-type digital signature. It considers the problem of authentication in the anycast communication model. This paper emphasises on the error in related work and scheme section of Al-Ibrahim and Anton Cerny. The authors state signature scenario scheme as follows.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"36 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identity management in a mobile service orientated grid 面向移动服务网格中的身份管理
T. Kirkham, Kleopatra G. Konstanteli, Julian Robert Gallop, C. Lalos, I. Johnson
{"title":"Identity management in a mobile service orientated grid","authors":"T. Kirkham, Kleopatra G. Konstanteli, Julian Robert Gallop, C. Lalos, I. Johnson","doi":"10.1109/ICITST.2009.5402547","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402547","url":null,"abstract":"Composite applications consisting of multiple mobile services require intricate service management and security infrastructures. Grid based approaches to service management can be applied to provide such infrastructures to both support and secure users and services in these composite mobile applications. The Akogrimo project has applied WSRF based Service Oriented toolkits as the core element of a mobile Service Oriented Infrastructure (SOI). Security is described in relation to the domains into which the SOI is split — Network Provider, Service Provider and two types of Virtual Organization. This paper describes how the Akogrimo SOI has been secured by an approach based on the management of identities within it. The results of this have been demonstrated initially in an E-Health scenario that is one of the first examples of a truly mobile Service Orientated Architecture.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114503175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure e-learning using a holistic and immune security framework 使用全面和免疫的安全框架保护电子学习
Jeffy Mwakalinga, S. Kowalski, L. Yngström
{"title":"Secure e-learning using a holistic and immune security framework","authors":"Jeffy Mwakalinga, S. Kowalski, L. Yngström","doi":"10.1109/ICITST.2009.5402508","DOIUrl":"https://doi.org/10.1109/ICITST.2009.5402508","url":null,"abstract":"This paper describes how to secure e-learning systems by applying the Holistic and Immune Security Framework. E-learning has great potential for developing communities but security of e-learning systems has not been fully addressed. We have developed a security framework that considers culture of users and environments where information systems operate. The holistic and immune security framework is a function of the deterrence, prevention, detection, response, and recovery system. The security framework makes an E-learning system learn to adapt to environments and to culture of users. We apply the principles of immune system to secure E-learning systems. We describe how to secure the weak links that are created by culture of users in E-leaning systems.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114388738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信