2013 16th International Conference on Network-Based Information Systems最新文献

筛选
英文 中文
Experimentation of Group Communication Protocols 组通信协议实验
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.79
Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa
{"title":"Experimentation of Group Communication Protocols","authors":"Dilawaer Duolikun, A. Aikebaier, T. Enokido, M. Takizawa","doi":"10.1109/NBiS.2013.79","DOIUrl":"https://doi.org/10.1109/NBiS.2013.79","url":null,"abstract":"In peer-to-peer (P2P) overlay networks, a group of n (= 2) peer processes have to cooperate with each other. Each peer directly sends messages to every peer and receives messages from every peer in a group. In group communications, each message sent by a peer is required to be causally delivered to every peer. Types of logical clocks like linear clock (LC) and vector clock (VC) are used to causally order messages. Some pair of messages not to be causally ordered are unnecessarily ordered since message length is O(1) in the LC protocol. On the other hand, no message is unnecessarily ordered in the VC protocol. However, the vector clock cannot be adopted in a scalable group due to the message length O(n). Recently, processes on each computer can read more precise physical clock which is synchronized with a time server in NTP. In this paper, we discuss how to causally deliver messages in a scalable group with hybrid clock (HC) which takes advantage of LC and PC in order to reduce the number of messages unnecessarily ordered. The HC protocol is implemented and some experimentations are presented in this paper. We show unnecessarily ordered messages can be reduced in the HC protocol compared with the LC protocol through the experimentations.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128177091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous Model (k, e)-匿名模型上一种有效的增量隐私泄露算法
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.18
Bowonsak Seisungsittisunti, J. Natwichai
{"title":"An Efficient Algorithm for Incremental Privacy Breach on (k, e)-Anonymous Model","authors":"Bowonsak Seisungsittisunti, J. Natwichai","doi":"10.1109/NBiS.2013.18","DOIUrl":"https://doi.org/10.1109/NBiS.2013.18","url":null,"abstract":"Collaboration between business partners have become crucial these days. An important issue to be addressed is data privacy. In this paper, we address a problem of data privacy based on a prominent privacy model, (k, e)-Anonymous, when a new dataset is to be released, meanwhile there might be existing datasets released elsewhere. Since some attackers might obtain multiple versions of the datasets and compare them with the newly released dataset. Though, the privacy of all the datasets have been well-preserved individually, such comparison can lead to an privacy breach. We study the characteristics of the effects of multiple dataset releasing theoretically. It has been found that the privacy breach subjected to the increment occurs when there exists overlapping between any partition of the new dataset with any partition of any existing dataset. Based on our proposed studies, a polynomial time algorithm is proposed. Not only it needs only considering one previous version of the dataset, it also can skip computing the overlapping partitions. Thus, the computational complexity of the proposed algorithm is only O(pn3) where p is the number of partitions and n is the number of tuples, meanwhile the privacy of all released datasets as well as the optimal solution can be always guaranteed. In addition, the experiments results, which can illustrate the efficiency of our algorithm, on the real-world dataset is presented.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Location Estimation Considering Inside and Outside Wireless LAN Coverage Area 考虑内外无线局域网覆盖区域的位置估计
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.36
Akinori Suzuki, Hiroko Shindo, H. Shigeno
{"title":"Location Estimation Considering Inside and Outside Wireless LAN Coverage Area","authors":"Akinori Suzuki, Hiroko Shindo, H. Shigeno","doi":"10.1109/NBiS.2013.36","DOIUrl":"https://doi.org/10.1109/NBiS.2013.36","url":null,"abstract":"In recent years, a lot of location estimation methods using wireless LAN signals have been proposed with the spread of wireless LANs. A location estimation by Fingerprint using Received Signal Strength Indicator (RSSI) is effective in terms of cost because it can be estimated by using existing infrastructures. However, it has a problem that the estimation accuracy is sensitive to environmental changes because RSSI values can be changed by doors opening/closing and a flow of people. For this problem, a location estimation method using coverage areas of APs was proposed. However, it does not make effective use of undetected APs. In this paper, we propose Location Estimation Considering Outside of Coverage Area (LECOCA). LECOCA intends to improve the location estimation accuracy by narrowing down the estimated location by using lists of undetected and detected APs. We implement and evaluate the LECOCA, and show its effectiveness.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132586982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Web-Based Interactive Interface as Software Execution Environment 基于web的交互界面作为软件执行环境的实现
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.61
H. Yanagisawa, Kayo Kondou
{"title":"Implementation of Web-Based Interactive Interface as Software Execution Environment","authors":"H. Yanagisawa, Kayo Kondou","doi":"10.1109/NBiS.2013.61","DOIUrl":"https://doi.org/10.1109/NBiS.2013.61","url":null,"abstract":"Cloud computing has become very popular in recent years. Various PaaS systems for collaborative software development and DaaS systems for developing software have been proposed. We also have proposed a PaaS system that delivers both a server-side development and server-side execution environment for character user interface applications that can be executed on the server machine and a server-side development and client-side execution environment for graphical user interface applications that can be executed on the client machine. Our previous system adapted a traditional Web-based interactive interface method that is implemented as internal file access. Therefore, the response time depends on disk access and the system. To improve the response time, we implemented input data flow with instantiation of process management and multithread processing. As a result, the average response time was 4.5 times faster than that for the previous system.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption in Wireless Sensor Networks 无线传感器网络中接收机发起的MAC协议对降低功耗的影响
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.7
Hitomi Date, Tetsuya Shigeyasu
{"title":"Effects of Receiver Initiated MAC Protocol for Reducing Power Consumption in Wireless Sensor Networks","authors":"Hitomi Date, Tetsuya Shigeyasu","doi":"10.1109/NBiS.2013.7","DOIUrl":"https://doi.org/10.1109/NBiS.2013.7","url":null,"abstract":"Wireless Sensor Networks (WSN) have been rapidly growning in the past few years in proportion to the improvement of Information and Communications Technologies (ICT). The WSN can realize effective environmental control on the basis of the data collected from WSN. However, in order for more widely deployment of WSN, further power-saving technologies are needed. In this paper, we discuss about the effects of power-saving characteristics of WSN in which wireless sensor devices employ receiver initiated MAC protocol, and clarify the receiver initiated MAC protocol can improve power consumption characteristics by both reducing packet collisions and reducing transmission power consumption.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coordination in Android Mobile Teams 协调Android移动团队
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.80
F. Xhafa, Daniel Palou, L. Barolli, Evjola Spaho, M. Takizawa
{"title":"Coordination in Android Mobile Teams","authors":"F. Xhafa, Daniel Palou, L. Barolli, Evjola Spaho, M. Takizawa","doi":"10.1109/NBiS.2013.80","DOIUrl":"https://doi.org/10.1109/NBiS.2013.80","url":null,"abstract":"With the ever increasing number of mobile devices and their computational capacity in terms of processing, storage and software, the use of smart devices is being employed each time more not only for basic use and entertainment and social networking but also for work. Besides this added value to use smart devices for work at individual level, the interest is of course to explore the use of such devices at teamwork level to enable collaboration of workforce both geographically distributed and on the move. Indeed, endowing teams of people that are geographically distributed to work together is very important nowadays in many fields such as field work, journalism, online collaborative learning, disaster management scenarios, businesses-especially Small and Medium size Enterprises-etc. Unlike web-based applications, there are many issues and challenges in mobile setting such as coordination, synchronization, awareness services, etc. In this paper, we propose an application that support members of a group using their mobile devices (under Android system) to coordinate and develop together a common project. The application is based on a super-peer architecture, with a super peer implemented at Sugar CRM server and members of the group as peers.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"53 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123553835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MANET Approaches for Airborne Networks: A Survey 机载网络的MANET方法:综述
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.13
Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli
{"title":"MANET Approaches for Airborne Networks: A Survey","authors":"Elis Kulla, Shinji Sakamoto, Makoto Ikeda, L. Barolli","doi":"10.1109/NBiS.2013.13","DOIUrl":"https://doi.org/10.1109/NBiS.2013.13","url":null,"abstract":"An Airborne Network (AN) is defined as a form of MANET, containing at least one airborne node. But, the characteristics of the AN differ from the MANET significantly. The nodes of the AN are connected by much higher bandwidth links. The airborne nodes also have much greater line-of-sight distance that increases their possible connections. In this work, we present a survey on some aspects of ANs. We show the differences between the two network types and summarize some of the main works on AN research.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133256540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effects of Side-Channel Communication: Text-Based Analyses of Chat Transcripts from a Case of Remote Education Using a Tele-conference System and a Social Networking System 侧通道沟通的影响:基于文本的远程教育案例聊天记录分析——基于远程会议系统和社交网络系统的案例
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBIS.2013.67
Jun Lio
{"title":"Effects of Side-Channel Communication: Text-Based Analyses of Chat Transcripts from a Case of Remote Education Using a Tele-conference System and a Social Networking System","authors":"Jun Lio","doi":"10.1109/NBIS.2013.67","DOIUrl":"https://doi.org/10.1109/NBIS.2013.67","url":null,"abstract":"The academia-industry cooperative lectures on project management was begun starting from the fiscal year 2012 at Hiroshima City University and Hiroshima Shudo University. In the lecture, two campuses and the office of the Japan chapter of the Project Management Institute (PMIJ) at Tokyo are connected via a teleconference system. Teachers give their talk sometimes from one campus and sometimes from the office of the PMIJ. For this case of distance learning, a web service providing teleconference facility was adopted and, in order to compensate for the thin communication bandwidth, a messaging service of a social networking system (SNS) was used concurrently. This paper reports several results of analyses of the effects of messaging via a sub-channel, based on an investigation of the chat transcripts.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127282133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of LPNs on Positioning Technology in LTE-A Systems lpn对LTE-A系统定位技术的影响
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.93
Yuanfeng Du, Dongkai Yang, Dengkun Xiao
{"title":"The Impact of LPNs on Positioning Technology in LTE-A Systems","authors":"Yuanfeng Du, Dongkai Yang, Dengkun Xiao","doi":"10.1109/NBiS.2013.93","DOIUrl":"https://doi.org/10.1109/NBiS.2013.93","url":null,"abstract":"As the positioning technology in mobile networks develops, more and more research is focused on the algorithms. However, the accuracy of key parameters are also crucial, such as reference signal time difference(RSTD) in observed time difference of arrival (OTDOA) method and UE Rx-Tx in the enhanced cell identity (E-CID) method, which are both studied in this paper especially in the heterogeneous networking environments with the interference of low power nodes (LPNs). Two approaches, furthermore, are proposed to improve the accuracy of these parameters in order to access the positioning requirement of LTE-A system with excellent simulation performance.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124798149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proposal for BYOD Based Virtual PC Room 基于BYOD的虚拟机房方案
2013 16th International Conference on Network-Based Information Systems Pub Date : 2013-09-04 DOI: 10.1109/NBiS.2013.60
M. Uehara
{"title":"Proposal for BYOD Based Virtual PC Room","authors":"M. Uehara","doi":"10.1109/NBiS.2013.60","DOIUrl":"https://doi.org/10.1109/NBiS.2013.60","url":null,"abstract":"Currently, smart devices such as smart phones and tablets are becoming more popular than PCs. In the future, almost all users except developers will be using smart devices for business instead of PCs. Students will also use their own smart devices in school. Using such a Bring Your Own Device (BYOD) method, the costs of computing devices will be drastically reduced relative to conventional rooms filled with PCs. However, current smart devices do not have enough functions to match the power of PCs. Thus, we propose a BYOD based virtual PC classroom using the cloud. In the proposed method, the cloud provides the PC functions currently lacking in non-cloud smart devices, allowing the realization of all functions needed in practice. In other words, we have developed an educational cloud based on a supersaturated private cloud, which is defined as a cloud in which a much greater amount of logical resources than physical resources are allotted. Supersaturated clouds can run up to 10 times more instances than conventional clouds. Therefore, the cost is reduced to only one-tenth of conventional costs. Furthermore, we have developed several menu based tools to reduce required key strokes.","PeriodicalId":261268,"journal":{"name":"2013 16th International Conference on Network-Based Information Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信