Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.最新文献

筛选
英文 中文
Intrusion detection and security policy framework for distributed environments 分布式环境的入侵检测和安全策略框架
A. A. E. Kalam, Jérémy Briffaut, C. Toinard, M. Blanc
{"title":"Intrusion detection and security policy framework for distributed environments","authors":"A. A. E. Kalam, Jérémy Briffaut, C. Toinard, M. Blanc","doi":"10.1109/ISCST.2005.1553300","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553300","url":null,"abstract":"This paper presents a novel intrusion detection approach and a new infrastructure to enforce the security policy within a distributed system. The solution guarantees the consistency of the security policy and prevents any accidental or malicious update (of the local policies). The control is carried out locally (in each host) in accordance with a meta-policy that enables a distributed control to update a global security policy while satisfying global security properties. The solution is more robust in terms of fault-tolerance and resists to denial of service attacks since the solutions carries out all the control locally. Two levels of intrusion detection are proposed to guaranty the integrity and the consistency of the distributed policy. The first level (meta-level, or administration level) guarantees that each local policy evolves according to the global security properties. This level detects attacks trying inadequate alterations of the local security policies. The second level corresponds to a classical intrusion detection system. But, it can take advantages of the local policy to detect attacks that violate the security objectives. That second level enables to integrate and to adjust various classical IDS. Our approach enforces the security of large scale systems","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123185212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Path planning for altruistically negotiating processes 利他主义谈判过程的路径规划
Deepthi Devalarazu, D. Watson
{"title":"Path planning for altruistically negotiating processes","authors":"Deepthi Devalarazu, D. Watson","doi":"10.1109/ISCST.2005.1553313","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553313","url":null,"abstract":"Autonomous negotiating systems are composed of logically (even geographically) separated software agents that control logical or physical resources that altruistically seek to perform useful work in a cooperative manner. These systems are multi-agent systems that consist of a population of autonomous agents collaborating to work for a common goal while simultaneously performing their individual tasks (i.e., computational resources are distributed amongst interconnected agents). With the increasing capabilities of the collaborative agents, the need for faster and more efficient methods of utilizing the distributed resources has also increased. This paper focuses on improving the performance of one such multi-agent system that deals with the path planning for autonomous robots. This is achieved by exploiting parallelism among processing resources embedded in the autonomous vehicles, using a distributed memory, message-passing execution model","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ontology-based virtual assembly model for collaborative virtual prototyping and simulation 基于本体的协同虚拟样机与仿真虚拟装配模型
Kyoung-Yun Kim, D. G. Manley, Hyung-Jeong Yang, B. Nnaji
{"title":"Ontology-based virtual assembly model for collaborative virtual prototyping and simulation","authors":"Kyoung-Yun Kim, D. G. Manley, Hyung-Jeong Yang, B. Nnaji","doi":"10.1109/ISCST.2005.1553320","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553320","url":null,"abstract":"Today's virtual prototyping systems for assembly provide a single instance of simulation and analysis solutions from models that are often generated from scratch. Virtual assembly models (VAM) are not fully integrated with other design activities, such as conceptual and detailed design, and design intent is not fully propagated to all product development activities. An assembly design (AsD) ontology can capture assembly and joining intents and can be efficiently reused in collaborative assembly development activities. Through the use of ontologies, computer systems can reason with data and information rather than just explicitly capture it. This paper presents an AsD ontology that plays as a formal, explicit specification of a shared conceptualization of assembly design and serves as a basis for a VAM for collaborative virtual prototyping and simulation (VP&S). The ontology-based VAM makes clear the relations among assembly components and form features in an AsD and provides systematized knowledge, which can be reasoned by collaboration tools. The VAM also captures design rationale including joining intent and spatial relationships. This paper discusses the role of VAM in collaborative VP&S and presents an AsD browser for virtual assembly analysis","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimized communication using the SOAP infoset for mobile multimedia collaboration applications 为移动多媒体协作应用程序优化了使用SOAP信息集的通信
Sangyoon Oh, Hasan Bulut, A. Uyar, Wenjun Wu, G. Fox
{"title":"Optimized communication using the SOAP infoset for mobile multimedia collaboration applications","authors":"Sangyoon Oh, Hasan Bulut, A. Uyar, Wenjun Wu, G. Fox","doi":"10.1109/ISCST.2005.1553291","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553291","url":null,"abstract":"Mobile computing is growing in popularity due to continuing improvements in mobile devices and their connectivity. Collaboration systems enable users at geographically distributed locations to collaborate each other. Community Grids Lab's GlobalMMCS is a Web services based, integrated videoconferencing system that allows heterogeneous clients to join the same session. Integration of mobile devices into the Web services based collaboration system will give mobility to users and heterogeneity to the system. However, there are performance limitations if we use the current SOAP approaches to integrate mobile applications with Web services based collaboration systems, especially for multimedia applications. In this paper, we propose a SOAP infoset preserving flexible representation and its specialization for mobile computing environment - handheld flexible representation (HHFR). We provide a flexible representation of binary encoding with a description file for message format and include a QoS framework in the architecture, such as reliability and security","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130904982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Job-centric security model for open collaborative environment 面向开放协作环境的以工作为中心的安全模型
Y. Demchenko, C. D. Laat, L. Gommans, B. V. Oudenaarde, A. Tokmakoff, M. Snijders
{"title":"Job-centric security model for open collaborative environment","authors":"Y. Demchenko, C. D. Laat, L. Gommans, B. V. Oudenaarde, A. Tokmakoff, M. Snijders","doi":"10.1109/ISCST.2005.1553296","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553296","url":null,"abstract":"This paper describes the design and development of a flexible, customer driven, security infrastructure for open collaborative environments. The experiences were gained within the framework of the collaboratory.nl project. The work is based on extended use of emerging Web services and grid security technologies, combined with concepts from the generic authentication authorization and accounting (AAA) authorisation framework. Basic CNL use cases and functional security requirements are analysed to provide motivation for the proposed job-centric security model. This model describes access control and user- and resource management. The proposed job-centric approach uses a job description as a semantic document that is created on the basis of the signed order (or business agreement). It contains all the information required to run the experiment and also to create/manage the virtual job-based associations of users and resources. The proposed trust relations analysis explains the use of trust anchors in the job-centric security model. In addition, the paper provides implementation details of using XACML and SAML for authorisation assertions and messaging, based on the current CNL implementation","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Collaborative knowledge management in e-meetings 电子会议中的协同知识管理
C. Han, J. E. Luczaj
{"title":"Collaborative knowledge management in e-meetings","authors":"C. Han, J. E. Luczaj","doi":"10.1109/ISCST.2005.1553307","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553307","url":null,"abstract":"This paper addresses the issue of knowledge management for collaborative tasks, such as meetings. A knowledge-based and Web-based framework is developed to capture and manage the knowledge from the interaction between human and human, human and computer-based autonomous agent, or agent and agent in collaborative sessions. In addition to the established business process flows, other valuable factors of business process, such as the human factors, the problem contexts, and the strategies for problem solving and decision making are taken into consideration","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An extended time horizon search technique for cooperative unmanned vehicles to locate mobile RF targets 协同无人车移动射频目标定位的扩展时间范围搜索技术
D. Pack, G. York
{"title":"An extended time horizon search technique for cooperative unmanned vehicles to locate mobile RF targets","authors":"D. Pack, G. York","doi":"10.1109/ISCST.2005.1553331","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553331","url":null,"abstract":"In this paper, we present a behavior-based, distributed, cooperative search algorithm for multiple unmanned aerial vehicles (UAVs) to cooperatively find sub-optimal search patterns to detect moving radio frequency (RF) signal emitting targets. The overall goal of the search algorithm is to compute sub-optimal flight trajectories for participating UAVs to minimize the combined search cost: search coverage, time, fuel usage, and communication overhead. The focus for this paper is to extend our existing search algorithm 's ability to incorporate evaluations of flight path options beyond the immediate time horizon. The paper explores the trade-offs over the additional computation cost and the reduction of the total search time. In addition to finding a set of sub-optimal UAV search paths, the search algorithm also generates a priority list of possible, search paths. The list is then used by an individual UAV to adjust its path selection to minimize a global search cost. Collectively, the selected UAV paths produce sub-optimal search patterns for a group of UAVs. The validity of the search algorithm is demonstrated using computer simulation","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125563260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Visualizing handheld-based classroom activity 可视化手持课堂活动
D. Tatar, Sirong Lin, Margaret Dickey-Kurdziolek
{"title":"Visualizing handheld-based classroom activity","authors":"D. Tatar, Sirong Lin, Margaret Dickey-Kurdziolek","doi":"10.1109/ISCST.2005.1553328","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553328","url":null,"abstract":"Classroom interactions involving handheld wireless connectivity can produce great learning gains. However, characterizing interactions as they happen can be difficult. Based on the log files from two months of use in math classrooms, we have built a visualization tool for examining collaborative and individual use. The tool can be used to aid in qualitative analyses such as frequently conducted to understand learning processes or to conduct interaction or grounded theory analyses. It also has the potential to be an interface to support quantitative queries. However, in order to have utility, design problems have to be solved, including how to display shifting work partnerships for a large number of actors without confusing overlaps. The current paper presents five designs with discussions of their pros and cons","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On a collaborative commerce framework and architecture for next generation commerce 关于下一代商业的协作式商业框架和体系结构
Seung-yun Kim, W. Smari
{"title":"On a collaborative commerce framework and architecture for next generation commerce","authors":"Seung-yun Kim, W. Smari","doi":"10.1109/ISCST.2005.1553324","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553324","url":null,"abstract":"Collaborative commerce (or c-commerce) can be regarded as the next evolutionary step beyond the more basic process of electronic commerce (or e-commerce). It is an emerging area that is based on interactions enabled by Internet technology. It offers many levels of coordination, collaborative interactions and cooperation among or within organizations, and between individuals. C-commerce requires the establishment of dynamic collaborative environments over the Internet. In a collaborative environment, organizations and individuals can work together, share sensitive information, protect their privacy, and collaborate on activities and projects efficiently and effectively. This paper presents an overview of some principal concepts and definitions of c-commerce, and proposes an intelligent collaborative commerce (ICC) system architecture. The core component of the ICC architecture is a collaborative Web portal which can be used with existing e-commerce systems. We then describe each block in the collaborative Web portal component as well as the layers of Web services envisioned and their functions. The architecture can be implemented in a variety of network-centric scenarios, which form the basis for future work and further development","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Constrained search for a moving target 受限搜索移动目标
D. Grundel
{"title":"Constrained search for a moving target","authors":"D. Grundel","doi":"10.1109/ISCST.2005.1553330","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553330","url":null,"abstract":"We consider the problem of constrained path planning for one or two agents in search of a single randomly moving target such that we maximize the probability of intercepting the target at some time in its trajectory. We assume the agents operate in a receding-horizon optimization framework with some finite planning horizon. We present and compare two search path planning methods. This problem is particularly applicable in the case of wide area search munitions searching and engaging moving ground targets","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信