2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

筛选
英文 中文
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage ET-DMD:分布式存储中检测恶意文件删除的容错方案
Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei
{"title":"ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage","authors":"Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei","doi":"10.1109/iNCoS.2012.67","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.67","url":null,"abstract":"Distributed storage is a scheme to store data in networked storage services, which is the basis of popular cloud storage solutions. Although this scheme has huge benefits in reducing maintenance and operation cost, it has several security concerns. Among them, malicious file deletion by the storage providers is a top concern. In this paper, we develop a novel error-tolerant solution, ET-DME, to effectively detect malicious file deletion behaviors in distributed storage services. Our approach prevents malicious servers from forging evidence to bypass data auditing test. In addition, our approach does not limit the number of challenges made by the client. Our approach also has low computation and communication overhead.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using a Conversational Agent for Promoting Collaborative Language Learning 使用会话代理促进协作语言学习
Stergios Tegos, S. Demetriadis, T. Tsiatsos
{"title":"Using a Conversational Agent for Promoting Collaborative Language Learning","authors":"Stergios Tegos, S. Demetriadis, T. Tsiatsos","doi":"10.1109/iNCoS.2012.105","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.105","url":null,"abstract":"Research in the field of Second Language Acquisition has repeatedly highlighted the importance of conversational interactions between students working together in small groups. Particularly, peer dialogue can play a vital role in intellectual development and language acquisition. Thus, we argue that the use of a conversational agent, designed to advance peer interaction and cognitive activity, would enhance learning outcomes related to language learning. In this work, we describe the design of a web-based collaborative system that utilizes a configurable conversational agent, which facilitates and triggers the learners' discussion. We also present an exploratory case study that was conducted in an English language school. Our analysis indicates a positive effect regarding the usability and user acceptance of the system.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130782244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data 垂直分区数据上保持隐私的亲和传播聚类
Xiao-yan Zhu, Mo-meng Liu, Min Xie
{"title":"Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data","authors":"Xiao-yan Zhu, Mo-meng Liu, Min Xie","doi":"10.1109/iNCoS.2012.71","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.71","url":null,"abstract":"Data mining has been well-studied in academia and widely applied to many fields. As a significant mining means, clustering algorithm has been successfully used in facility location, image categorization and bioinformatics. K-means and affinity propagation (AP) are two effective clustering algorithms, in which the former has involved in privacy preserving data mining, but the latter does not. Considering the unparalleled advantages of AP over k-means, we firstly propose a secure scheme for AP clustering in this paper. Our scheme runs over a partitioned database that different parties contain different attributes for a common set of entities. This scheme guarantees no disclosure of parties' private information by means of the cryptographic tools which have been successfully applied in privacy preserving k-means clustering. The final result for each party is the assignment of each entity, but gives nothing about the attributes held by other parties. In the end, we make a brief security discussion under the semi-honest model and analyze the communication cost to show that our scheme does have good performance.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Rule Based Expert Systems Running over the Cloud 基于规则的专家系统在云端运行
Traian-Lucian Militaru, G. Suciu, G. Todoran, A. Florescu, V. Poenaru, Laurentiu Nae, C. Cernat
{"title":"Rule Based Expert Systems Running over the Cloud","authors":"Traian-Lucian Militaru, G. Suciu, G. Todoran, A. Florescu, V. Poenaru, Laurentiu Nae, C. Cernat","doi":"10.1109/iNCoS.2012.93","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.93","url":null,"abstract":"This paper proposes a prototype of a rule based expert system running over cloud, showing the advantages compared with traditional expert systems and also how to avoid any problems that may arise in such an environment of use.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115557984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering 基于潜狄利克雷马尔可夫聚类的无监督人类行为分类
Xudong Zhu, Hui Li
{"title":"Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering","authors":"Xudong Zhu, Hui Li","doi":"10.1109/iNCoS.2012.114","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.114","url":null,"abstract":"We present a novel unsupervised learning method for human action categories from video sequences using Latent Dirichlet Markov Clustering (LDMC). Video sequences are represented by a novel \"bag-of-words\" representation, where each frame corresponds to a \"word\". The algorithm automatically learns the probability distributions of the words and the intermediate topics corresponding to human action categories, and correlates actions over time. This is achieved by using Latent Dirichlet Markov Clustering (LDMC). Our approach builds on Hidden Markov Models (HMMs) and Latent Dirichlet Allocation (LDA), and overcomes their drawbacks on accuracy, robustness and computational efficiency. A collapsed Gibbs sampler is derived for offline learning with unlabeled training data, and significantly, a new approximation to online Bayesian inference is formulated to enable human action classification in new video data online in real-time. The strength of this mothod is demonstrated by unsupervised learning of human action categories and detecting irregular actions in different datasets.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114440478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Non-delegatable Strong Designated Verifier Signature without Random Oracles 无随机预言机的不可委派强指定验证者签名
Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei
{"title":"A Non-delegatable Strong Designated Verifier Signature without Random Oracles","authors":"Haibo Tian, Zhengtao Jiang, Yi Liu, Baodian Wei","doi":"10.1109/iNCoS.2012.85","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.85","url":null,"abstract":"We propose a scheme for non-delegatable strong designated verifier signature. The scheme is based on pairings, and utilizes an OR proof technique and a method of ensuring the integrity of a signature. In a standard model, the unforgeability property of the scheme is reducible to a computational Co-Diffie-Hellman problem. The scheme is perfect non-transferable, and its properties of privacy of signer's identity and non-delegatability are reducible to the correctness of two variants of a knowledge of exponent assumption.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network 无线多跳网络中物理层网络编码和基于连通支配集的路由协议
Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu
{"title":"Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network","authors":"Li Xu, Penggui Pan, Xiaoding Wang, Wei Wu","doi":"10.1109/iNCoS.2012.38","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.38","url":null,"abstract":"Physical-layer network coding (PNC) employs interactive communication among neighbor nodes by using a proper modulation-and-demodulation technique to improve the communication ability. Most traditional routing protocols in wireless network are designed to reduce or avoid signal interference but do not have the merit of the physical-layer network coding. As a result, the throughout of network can hardly be improved. In this paper we propose a routing protocol based on physical-layer network coding by introducing cross layer coordinated strategy for clustered wireless multi-hop network. Our approach can achieve better improvement of network throughput by comparing with non-coding and other existing network coding strategies.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Drums Based on Natural Interaction 基于自然交互的虚拟鼓
Jacob Wilschrey, Cristian Rusu, Iván Mercado, R. Inostroza, Cristhy Jiménez Granizo
{"title":"Virtual Drums Based on Natural Interaction","authors":"Jacob Wilschrey, Cristian Rusu, Iván Mercado, R. Inostroza, Cristhy Jiménez Granizo","doi":"10.1109/iNCoS.2012.78","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.78","url":null,"abstract":"The paper presents the development of a virtual drums prototype, based on natural interaction, trough a Kinect device. Results of early tests are encouraging, but the prototype can definitively be improved. The project aims to serve as basis for future developments, and several projects are already undergoing at the School of Informatics Engineering of the Pontifical Catholic University of Valparaiso -- Chile.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer Patients 在线电子健康运动和干预研究的网络策略:癌症患者营养支持案例研究的初步结果
D. Akoumianakis, Giannis Milolidakis, P. Gnagnarella, A. Misotti, N. Bessis
{"title":"Networking Tactics for Online eHealth Campaigns and Intervention Studies: Preliminary Results from a Case Study on Nutritional Support for Cancer Patients","authors":"D. Akoumianakis, Giannis Milolidakis, P. Gnagnarella, A. Misotti, N. Bessis","doi":"10.1109/iNCoS.2012.23","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.23","url":null,"abstract":"The present work is concerned with a particular type of online collaborative engagements, namely the management of e-Health campaigns and online intervention studies. In order to establish the baseline, the paper critically reviews prominent tactics facilitated by Social Networking Services (SNS) and social web sites and contrasts them against the specific requirements of targeted online e-Health campaigns and intervention studies. Based on this analysis, the paper describes a web-based system that accommodates functionality and services to enable expert-patient collaboration and co-engagement in building online campaigns and conducting intervention studies. The value and benefits of this approach are illustrated using a case study of cancer patients searching for online nutritional support and collaborating with healthcare providers and other patients.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption 基于密文-策略属性加密实现个人健康记录云平台
Chang-ji Wang, Xuan Liu, Wentao Li
{"title":"Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption","authors":"Chang-ji Wang, Xuan Liu, Wentao Li","doi":"10.1109/iNCoS.2012.65","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.65","url":null,"abstract":"Work on designing and implementing a patient-centric, personal health record cloud platform based on open-source Indivo X system. We adopt cipher text-policy attribute-based encryption to provide privacy protection and fine-grained access control.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133146509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信