Augusto Mendes Gomes Junior, Fernando Kakugawa, Calebe P. Bianchini, F. I. Massetto
{"title":"A thread-safe communication mechanism for message-passing interface based on MPI Standard","authors":"Augusto Mendes Gomes Junior, Fernando Kakugawa, Calebe P. Bianchini, F. I. Massetto","doi":"10.1109/JCPC.2009.5420193","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420193","url":null,"abstract":"Current high-performance applications development is increasing due to breakthrough advances in microprocessor and power management technologies, network speed and reliability. By this way, distributed parallel applications make use of message-passing interface and multithreaded programming libraries. Nevertheless, drawbacks in Message-Passing implementations limit the use of thread-safe network communication. This paper presents a thread-safe message-passing interface based on MPI Standard assuring correct message ordering and sender/receiver synchronization.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130398603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced ultralightweight RFID authentication protocol","authors":"Tzu-Chang Yeh, Chia-Sheng Wu","doi":"10.1109/JCPC.2009.5420075","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420075","url":null,"abstract":"RFID is a kind of contactless automatic identification system. As its cost declines and function extends, RFID is gradually replacing the traditional barcode systems. Low-cost RFID tags are anticipated to be widely used in our daily life. However, owing to the radio transmission nature of RFID, the information transmitted in the air could easily be eavesdropped on, intercepted, or modified. Because low-cost RFID tags are with extremely limited resources, traditional security primitives can not be incorporated well. In 2007, Chien proposed the ultralightweight strong authentication and strong integrity (SASI) protocol for low-cost and very low-cost tags. The protocol is a highly efficient RFID authentication protocol using only simple bitwise operations on tags. However, the scheme is found suffering from tracking and denial of service attacks. This paper will give demonstrations on what have caused these weaknesses, and more of that, an improved protocol is also proposed which is free from worries of those possible attacks. The improved protocol could thus be applied in environments demanding high security.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123944750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile device adaptation based on business rules","authors":"Haitao Pu, Jinjiao Lin, Fasheng Liu","doi":"10.1109/JCPC.2009.5420098","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420098","url":null,"abstract":"In the pervasive system, it is important for its application to adapt to mobile devices. But most of pervasive systems are not quickly suitable for mobile device. In order to provide adaptive mobile services, the approach for self-adaptation is proposed in this paper. Firstly, context of mobile devices and its influence on pervasive application are analyzed and business rules based on this analysis are presented. Then, using the approach, the pervasive system is constructed. The example implies this approach can detect the contextual environment of mobile computing and adapt the mobile service to the mobile devices flexibly.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"48 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124389132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust video watermarking scheme of H.264","authors":"Shwu-Huey Yen, Mei-Chueh Chang, Chia-Jen Wang","doi":"10.1109/JCPC.2009.5420198","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420198","url":null,"abstract":"We present a video watermarking scheme which is robust to video coding standards H.264. The proposed scheme embeds watermark on all AC coefficients of 4×4 DCT blocks of I-frames. It integrates Watson's human visual system and the contents of 4×4 DCT blocks to determine the embedding strength. Since the high correlation of the video content within one scene, producing similar embedding strength, the scheme has the property of same watermarks for same scenes and different watermarks for different scenes. Thus, it can successfully resist the collusion attacks. Experiments validate that the proposed scheme has advantage of the invisibility, and it is robust to collusion attacks as well as H.264 compression.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vocational professional certification learning cognitive assessment evaluation based on rule-space model and relevance feedback","authors":"Yung-Hui Chen, L. Deng, Chun-Hong Huang, N. Yen","doi":"10.1109/JCPC.2009.5420219","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420219","url":null,"abstract":"The more professional licenses, the more jobs for student can easily get in Taiwan. It is very important to promote some professional certification for students in vocational education. In this paper, we used the rule-space model to diagnose the cognitive skills for assessment evaluation and also considered the user's relevance feedback to improve the learner's learning achievement in ITE (Information Technology Expert) course. The rule-space model approach supports cognitive analysis of student's network technologies skill. And then to comprehensive what learning tops are weaknesses or strengths by individuals. The learner's relevance feedback provided user's evaluation that contained the item difficulty. We implemented a web testing application for ITE testing simulation. In our experiences, this approach can provide to understand the learning characteristic for e-learning achievement and to explore better educational application. The learner can fit Self-Regulation processing of the Scaffolding Theory and achieving social learning effectiveness, simultaneously.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123520616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Put context-aware in Virtual Assembly: a study of ontology-based architecture and an arithmetic","authors":"Tiemeng Li, Wen-jun Hou, Hao Pan","doi":"10.1109/JCPC.2009.5420134","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420134","url":null,"abstract":"VA (Virtual Assembly) provided a numerical platform for assembly design. However, lacking of intelligent guide is a critical problem in assembly design with VA technology. This paper proposes a novel concept of context-aware in VA, and discusses the connotation and extension of it. Such context should be a small world context that provided intelligent for virtual environment, while an ontology-based working model and architecture are presented to realize it. A decision-making arithmetic is also composed based on Quotient Space Theory, which supports the VA system to compute assembly context real-time in condition of different assembly granularity. By deploying this method, VA need no longer to be viewed only as an interactive tool or environment for judging feasibility of assembly, but rather as an virtual intelligent task processor that can offer decision service to assembly task based on application needs.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128298858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinhui Li, Xiangdong Wang, Yueliang Qian, Shouxun Lin
{"title":"Candidate generation for interactive Chinese speech recognition","authors":"Xinhui Li, Xiangdong Wang, Yueliang Qian, Shouxun Lin","doi":"10.1109/JCPC.2009.5420115","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420115","url":null,"abstract":"Despite progress in automatic speech recognition, user involvement and assistance are still needed to achieve performance similar to human in real-world tasks. Though many interactive speech recognition systems using candidate selection are developed for English and Japanese, similar systems for Chinese face particular difficulties due to characteristics of the Chinese language, especially at the candidate generation stage. In this paper, a method is proposed for candidate generation in interactive Chinese speech recognition, which lists all competitive candidates in forms of Chinese characters in stead of words. The main idea is to align time-overlapped links in Chinese word lattice into clusters based on their phonetic similarity, and then obtain candidates by splitting words attached to links into Chinese characters. Experimental results demonstrated that the candidates generated by the proposed method can lead to high performance in interactive Chinese speech recognition.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128343698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Tzeng, I-Ching Hsu, Y. J. Cheng, Der-Chen Huang
{"title":"A Semantic Web approach for military scenario development","authors":"Y. Tzeng, I-Ching Hsu, Y. J. Cheng, Der-Chen Huang","doi":"10.1109/JCPC.2009.5420167","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420167","url":null,"abstract":"The initial conditions of a military scenario have to combine various military resources, including planned missions, task organizations, equipment items, and command relationship. Intelligently discovering how these military resources are related in order to enable effective war-fighting simulation is a significant challenge in military scenario development. This study proposes an Ontology-based Military Scenario Resources Management (OMSRM) platform which is based on ontology technologies to facilitate discovery, matchmaking, and reuse of military resources through their semantic description. To demonstrate the feasibility of OMSRM platform, an application of military scenario is implemented to generate an MSDL document for simulators.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration and orchestration of heterogeneous services","authors":"Kejing He","doi":"10.1109/JCPC.2009.5420139","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420139","url":null,"abstract":"Service integration and orchestration are important ways to make use of existing services and to build larger systems. In the real world, services are heterogeneous. The most popular services are SOAP/WSDL services and Web applications. The heterogeneous services bring challenges to service integration and orchestration. Prior attempts use adapters or converters to mask the heterogeneity and host alien services, which potentially lead to inefficiency. This paper reviews the current techniques for heterogeneous services integration and orchestration. Comparing different techniques' strengths and weaknesses, this paper presents a hybrid orchestration approach that make use of the heterogeneous nature of the services for efficient orchestration. The proposed approach can be used for large scale efficient integration of numerous disparate services (e.g. SOAP/WSDL services and RESTful services).","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Wiki technology in literature retrieval of digital library","authors":"Chengli Wang, Lizhen Liu, Du Chao, Lei Chen","doi":"10.1109/JCPC.2009.5420100","DOIUrl":"https://doi.org/10.1109/JCPC.2009.5420100","url":null,"abstract":"Aiming at the problem of low retrieval quality in digital library, a novel literature retrieval model based on Wiki technology was studied. Using Wiki technology in the traditional literature retrieval system, the retrieval model also adopts data mining algorithms to extract literature retrieval parameters and user interest characteristics from retrieval history to improve the quality of literature retrieval. The results show that the recall and precision of the new retrieval model based on Wiki technology are better than those of traditional retrieval system.","PeriodicalId":284323,"journal":{"name":"2009 Joint Conferences on Pervasive Computing (JCPC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}