Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa
{"title":"Experimentation of Group Communication Protocols","authors":"Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2013.79","DOIUrl":"https://doi.org/10.1109/NBiS.2013.79","url":null,"abstract":"In peer-to-peer (P2P) overlay networks, a group of n (= 2) peer processes have to cooperate with each other. Each peer directly sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Types of logical clocks like linear clock (LC) and vector clock (VC) are used to causally order messages. Some pair of messages not to be causally ordered are unnecessarily ordered since message length is O(1) in the LC protocol. On the other hand, no message is unnecessarily ordered in the VC protocol. However, the vector clock cannot be adopted in a scalable group due to the message length O(n). Recently, processes on each computer can read more precise physical clock which is synchronized with a time server in NTP. In this paper, we discuss how to causally deliver messages in a scalable group with hybrid clock (HC) which takes advantage of LC and PC in order to reduce the number of messages unnecessarily ordered. The HC protocol is implemented and some experimentations are presented in this paper. We show unnecessarily ordered messages can be reduced in the HC protocol compared with the LC protocol through the experimentations.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128177091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous Model","authors":"Bowonsak Seisungsittisunti, J. Natwichai","doi":"10.1109/NBiS.2013.18","DOIUrl":"https://doi.org/10.1109/NBiS.2013.18","url":null,"abstract":"Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn3) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location Estimation Considering Inside and Outside Wireless LAN Coverage Area","authors":"Akinori Suzuki, Hiroko Shindo, H. Shigeno","doi":"10.1109/NBiS.2013.36","DOIUrl":"https://doi.org/10.1109/NBiS.2013.36","url":null,"abstract":"In recent years, a lot of location estimation methods using wireless LAN signals have been proposed with the spread of wireless LANs. A location estimation by Fingerprint using Received Signal Strength Indicator (RSSI) is effective in terms of cost because it can be estimated by using existing infrastructures. However, it has a problem that the estimation accuracy is sensitive to environmental changes because RSSI values can be changed by doors opening/closing and a flow of people. For this problem, a location estimation method using coverage areas of APs was proposed. However, it does not make effective use of undetected APs. In this paper, we propose Location Estimation Considering Outside of Coverage Area (LECOCA). LECOCA intends to improve the location estimation accuracy by narrowing down the estimated location by using lists of undetected and detected APs. We implement and evaluate the LECOCA, and show its effectiveness.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132586982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Web-Based Interactive Interface as Software Execution Environment","authors":"H. Yanagisawa, Kayo Kondou","doi":"10.1109/NBiS.2013.61","DOIUrl":"https://doi.org/10.1109/NBiS.2013.61","url":null,"abstract":"Cloud computing has become very popular in recent years. Various PaaS systems for collaborative software development and DaaS systems for developing software have been proposed. We also have proposed a PaaS system that delivers both a server-side development and server-side execution environment for character user interface applications that can be executed on the server machine and a server-side development and client-side execution environment for graphical user interface applications that can be executed on the client machine. Our previous system adapted a traditional Web-based interactive interface method that is implemented as internal file access. Therefore, the response time depends on disk access and the system. To improve the response time, we implemented input data flow with instantiation of process management and multithread processing. As a result, the average response time was 4.5 times faster than that for the previous system.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption in Wireless Sensor Networks","authors":"Hitomi Date, Tetsuya Shigeyasu","doi":"10.1109/NBiS.2013.7","DOIUrl":"https://doi.org/10.1109/NBiS.2013.7","url":null,"abstract":"Wireless Sensor Networks (WSN) have been rapidly growning in the past few years in proportion to the improvement of Information and Communications Technologies (ICT). The WSN can realize effective environmental control on the basis of the data collected from WSN. However, in order for more widely deployment of WSN, further power-saving technologies are needed. In this paper, we discuss about the effects of power-saving characteristics of WSN in which wireless sensor devices employ receiver initiated MAC protocol, and clarify the receiver initiated MAC protocol can improve power consumption characteristics by both reducing packet collisions and reducing transmission power consumption.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Xhafa, Daniel Palou, L. Barolli, Evjola Spaho, M. Takizawa
{"title":"Coordination in Android Mobile Teams","authors":"F. Xhafa, Daniel Palou, L. Barolli, Evjola Spaho, M. Takizawa","doi":"10.1109/NBiS.2013.80","DOIUrl":"https://doi.org/10.1109/NBiS.2013.80","url":null,"abstract":"With the ever increasing number of mobile devices and their computational capacity in terms of processing, storage and software, the use of smart devices is being employed each time more not only for basic use and entertainment and social networking but also for work. Besides this added value to use smart devices for work at individual level, the interest is of course to explore the use of such devices at teamwork level to enable collaboration of workforce both geographically distributed and on the move. Indeed, endowing teams of people that are geographically distributed to work together is very important nowadays in many fields such as field work, journalism, online collaborative learning, disaster management scenarios, businesses-especially Small and Medium size Enterprises-etc. Unlike web-based applications, there are many issues and challenges in mobile setting such as coordination, synchronization, awareness services, etc. In this paper, we propose an application that support members of a group using their mobile devices (under Android system) to coordinate and develop together a common project. The application is based on a super-peer architecture, with a super peer implemented at Sugar CRM server and members of the group as peers.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"53 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli
{"title":"MANET Approaches for Airborne Networks: A Survey","authors":"Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli","doi":"10.1109/NBiS.2013.13","DOIUrl":"https://doi.org/10.1109/NBiS.2013.13","url":null,"abstract":"An Airborne Network (AN) is defined as a form of MANET, containing at least one airborne node. But, the characteristics of the AN differ from the MANET significantly. The nodes of the AN are connected by much higher bandwidth links. The airborne nodes also have much greater line-of-sight distance that increases their possible connections. In this work, we present a survey on some aspects of ANs. We show the differences between the two network types and summarize some of the main works on AN research.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133256540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Side-Channel Communication: Text-Based Analyses of Chat Transcripts from a Case of Remote Education Using a Tele-conference System and a Social Networking System","authors":"Jun Lio","doi":"10.1109/NBIS.2013.67","DOIUrl":"https://doi.org/10.1109/NBIS.2013.67","url":null,"abstract":"The academia-industry cooperative lectures on project management was begun starting from the fiscal year 2012 at Hiroshima City University and Hiroshima Shudo University. In the lecture, two campuses and the office of the Japan chapter of the Project Management Institute (PMIJ) at Tokyo are connected via a teleconference system. Teachers give their talk sometimes from one campus and sometimes from the office of the PMIJ. For this case of distance learning, a web service providing teleconference facility was adopted and, in order to compensate for the thin communication bandwidth, a messaging service of a social networking system (SNS) was used concurrently. This paper reports several results of analyses of the effects of messaging via a sub-channel, based on an investigation of the chat transcripts.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127282133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of LPNs on Positioning Technology in LTE-A Systems","authors":"Yuanfeng Du, Dongkai Yang, Dengkun Xiao","doi":"10.1109/NBiS.2013.93","DOIUrl":"https://doi.org/10.1109/NBiS.2013.93","url":null,"abstract":"As the positioning technology in mobile networks develops, more and more research is focused on the algorithms. However, the accuracy of key parameters are also crucial, such as reference signal time difference(RSTD) in observed time difference of arrival (OTDOA) method and UE Rx-Tx in the enhanced cell identity (E-CID) method, which are both studied in this paper especially in the heterogeneous networking environments with the interference of low power nodes (LPNs). Two approaches, furthermore, are proposed to improve the accuracy of these parameters in order to access the positioning requirement of LTE-A system with excellent simulation performance.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal for BYOD Based Virtual PC Room","authors":"M. Uehara","doi":"10.1109/NBiS.2013.60","DOIUrl":"https://doi.org/10.1109/NBiS.2013.60","url":null,"abstract":"Currently, smart devices such as smart phones and tablets are becoming more popular than PCs. In the future, almost all users except developers will be using smart devices for business instead of PCs. Students will also use their own smart devices in school. Using such a Bring Your Own Device (BYOD) method, the costs of computing devices will be drastically reduced relative to conventional rooms filled with PCs. However, current smart devices do not have enough functions to match the power of PCs. Thus, we propose a BYOD based virtual PC classroom using the cloud. In the proposed method, the cloud provides the PC functions currently lacking in non-cloud smart devices, allowing the realization of all functions needed in practice. In other words, we have developed an educational cloud based on a supersaturated private cloud, which is defined as a cloud in which a much greater amount of logical resources than physical resources are allotted. Supersaturated clouds can run up to 10 times more instances than conventional clouds. Therefore, the cost is reduced to only one-tenth of conventional costs. Furthermore, we have developed several menu based tools to reduce required key strokes.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}