2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

筛选
英文 中文
Context Based Access Control in Pervasive Environments 普适环境中基于上下文的访问控制
Alexandru Petculescu
{"title":"Context Based Access Control in Pervasive Environments","authors":"Alexandru Petculescu","doi":"10.1109/iNCoS.2012.57","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.57","url":null,"abstract":"As current trends show, the Semantic Web is the future interaction environment used in data exchange and integration among homogenous applications. This trend raises new challenges in security models used for access control, and the only acceptable model is to take into account the semantic relations of the interacting entities. In this article we present the access control module used by the Mobile services framework presented in our previous paper: \"Web services applied to mobile environments\". Finally we present results obtained in the implementation of this module and our conclusions.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133339499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Transmission with Broadcasting and Communication 广播通信协同传输
Dongdong Wei, Yun Rui, Yinhui Luo, Mingqi Li, Fang Wang, Yingguan Wang
{"title":"Cooperative Transmission with Broadcasting and Communication","authors":"Dongdong Wei, Yun Rui, Yinhui Luo, Mingqi Li, Fang Wang, Yingguan Wang","doi":"10.1504/IJES.2013.057086","DOIUrl":"https://doi.org/10.1504/IJES.2013.057086","url":null,"abstract":"In this paper, we propose a novel cooperative transmission strategy with broadcasting and cellular communication in a hybrid network system. With the help of cellular base station (CBS), two cooperative schemes are analyzed to improve broadcast performance. We define two thresholds in this paper. For users whose channel quality information (CQI) is less than the low threshold, e.g., the users near the edge of the broadcast cell, we deploy cooperative diversity transmission. Meanwhile, cooperative multiplexing transmission is exploited for users whose CQI is greater than the high threshold, such as those near the broadcasting base station (BBS). Our simulation results validate the effectiveness of our proposed cooperative schemes.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124993854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty 用本体论的方法丰富骨科专业的兴趣共同体
M. E. Riu, David Bañeres, J. Conesa
{"title":"Towards an Ontological Approach to Enrich a Community of Interest in Orthopaedic Specialty","authors":"M. E. Riu, David Bañeres, J. Conesa","doi":"10.1109/iNCoS.2012.81","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.81","url":null,"abstract":"A community of interest is helpful to professionals to assemble around a common interest and exchange information and experiences. However, the most used communities are too general for some specific areas and they are unable to store and classify relevant information for the community users. In this paper, we propose an approach that can be integrated with existent communities of practice. Moreover, it allows to specify and share the information relevant to the community of practice of orthopaedic based on a wiki. Instead of using a generic wiki where the knowledge is stored in textual format, a semantic wiki is used. This semantic tool, combined with an ontology description of the domain, stores the information in a computer readable format that could provide in the future additional advanced services to the community professionals.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management 基于灾害管理社会网络分析的物联网复杂系统互联
Asta Zelenkauskaite, N. Bessis, Stelios Sotiriadis, E. Asimakopoulou
{"title":"Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management","authors":"Asta Zelenkauskaite, N. Bessis, Stelios Sotiriadis, E. Asimakopoulou","doi":"10.1109/iNCoS.2012.25","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.25","url":null,"abstract":"This visionary paper presents the Internet of Things paradigm in terms of interdependent dynamic dimensions of objects and their properties. Given that in its current state Internet of Things (IoT) has been viewed as a paradigm based on hierarchical distribution of objects, evaluation of the dynamic nature of the hierarchical structures faces challenges in its evaluation and analysis. Within this in mind, our focus is on the area of complex social networks and the dynamic social network construction within the context of IoT. This is by highlighting and addressing the tagging issues of the objects to the real-world domain such as in disaster management, these are in relation to their hierarchies and interrelation within the context of social network analysis. Specifically, we suggest to investigate and deepen the understanding of the IoT paradigm through the application of social network analysis as a method for interlinking objects -- and thus, propose ways in which IoT could be subsequently interlinked and analyzed through social network analysis approach - which provides possibilities for linking of the objects, while extends it into real-world domain. With this in mind, we present few applications and key characteristics of disaster management and the social networking analysis approach, as well as, foreseen benefits of its application in the IoT domain.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125370661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
An Advising System for Supporting Users of Collaborative Activities in LMSs 支持lms中协作活动用户的建议系统
T. Chronopoulos, I. Hatzilygeroudis
{"title":"An Advising System for Supporting Users of Collaborative Activities in LMSs","authors":"T. Chronopoulos, I. Hatzilygeroudis","doi":"10.1109/iNCoS.2012.73","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.73","url":null,"abstract":"Learning management systems (LMSs) provide their users with the appropriate environments and tools to author, monitor and engage in collaborative learning activities. The unstructured collaboration spaces and the domain-independent interfaces of those platforms, pose restrictions to the analysis and the evaluation of the collaboration learning process. In this work is presented the design of an advising system, which aims to guide the users of the collaborative activities in a lesson in a LMS, by issuing recommendations and advices on the collaborative learning process. The system uses a fuzzy model to evaluate the learning behaviors of the learners and groups in the collaborative activities across several dimensions. An intelligent agent issues advices and recommendations to the learners and groups of the lesson based on their learning behaviors. The system aims to facilitate management of the collaborative activities in a LMS, by advising the instructors on the design of the collaborative learning experiences and also the learners on self-regulating their learning behaviors. The intelligent system has been partially developed using the Java Agent Development Framework (JADE) for the collaborative activities of Learning Activity Management System (LAMS).","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126889402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm 基于两跳中继算法的manet移动模型分析
Ying Cai, Xiaofei Wang, Yuqing Zhang
{"title":"The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm","authors":"Ying Cai, Xiaofei Wang, Yuqing Zhang","doi":"10.1109/iNCoS.2012.12","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.12","url":null,"abstract":"The lack of available and practical analysis about some regular knowledge of mobility models has limit their applications to mobile ad hoc networks. As the mobility models have the great significance effects on the network performance, and meanwhile, existing in-depth researches are mostly based on the i.i.d. mobility model which is a way of globe move, the desire for the effective and reasonable applications of the two-hop relay algorithms to other more realistic mobility models contributes to this paper. We focus on a time-slotted finite network system in order to simplify the complex probabilistic description process of the non-i.i.d. mobility models and we develop some general probability analysis under various mobility solutions. We further put forward some conditions that can make the behaviors of the special mobility models approximately equivalent to that of the i.i.d mobility model. Related simulation studies are also conducted to demonstrate that the different mobility models might have similar influences on the capacity and delay of a mobile ad hoc network.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127378480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing 云计算中高效安全的批量运算外包
Xu Ma, Jin Li, Fangguo Zhang
{"title":"Efficient and Secure Batch Exponentiations Outsourcing in Cloud Computing","authors":"Xu Ma, Jin Li, Fangguo Zhang","doi":"10.1109/iNCoS.2012.31","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.31","url":null,"abstract":"Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for security when users want to securely outsource the computation of cryptographic operations to the untrusted cloud servers. As we know, modular exponentiation is one of basic operations among most of current cryptosystems. In this paper, we present two generic secure outsourcing schemes enabling users to securely outsource the computations of exponentiations to cloud servers. The first one is a secure outsourcing scheme for fixed base-variable exponent exponentiation, while the second is for fixed exponent-variable base exponentiation. With our techniques, a batch of exponentiations (eg. t exponentiations) can be efficiently computed by the user with only (n+t) multiplications, where n is the number of bits of the exponent. Furthermore, there is not any pre-computation on the user side. The schemes are proved to be secure under the Hidden Subset Sum Problem.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115269689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks 双tie共存移动蜂窝网络中认知基站的博弈论资源分配
Jing Song, J. Ge, Jing Li, L. Cong
{"title":"Game-Theoretic Resource Allocation of the Cognitive Base Station in Two-Tie Co-existing Femtocell Networks","authors":"Jing Song, J. Ge, Jing Li, L. Cong","doi":"10.1109/iNCoS.2012.49","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.49","url":null,"abstract":"Femtocells will be widely employed in the next generation wireless networks since they improve indoor capacity and coverage with low cost and low power characteristics. However since macro cells may have to share the same spectrum with femtocells, resource allocation schemes have been a key challenge to manage interference. In this paper, we propose a novel resource allocation scheme based on cognitive technologies and cooperative game theory. The competition among the Femtocell Access Points (FAPs) for spectrum resource and power resource is formulated as a game-theoretic problem. We solve the problem by integrating Dynamic Sub carrier Allocation (DSA) algorithm and Adaptive Power Allocation (APA) algorithm implemented by the cognitive macro cell Base Station, so that the interference is reduced and the transmitting rate is increased. Simulation results show that compared with the max-rate algorithm and max-min fairness algorithm, the scheme we proposed achieves a better trade-off between the transmitting rate and the fairness.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126690538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Management of Software Driven Networks - Research Challenges 软件驱动网络的管理-研究挑战
A. Galis, S. Clayman
{"title":"Management of Software Driven Networks - Research Challenges","authors":"A. Galis, S. Clayman","doi":"10.1109/iNCoS.2012.122","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.122","url":null,"abstract":"In this position paper we present a new networking framework -- SdNET - that integrates software driven features with the management features of modern autonomic network management, and many service features from the world of Services. This framework is under development and validation.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme 基于身份的多用途cca安全代理重加密方案的安全性分析
Jindan Zhang, Xu An Wang
{"title":"Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/iNCoS.2012.52","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.52","url":null,"abstract":"In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the underlying plaintext. In multi-use PRE schemes, the cipher text can be transformed from Alice to Bob and to Charlie and so on. Due to its cipher text transformation property, it is difficult to achieve chosen cipher text security for PRE, especially for multi-use PRE. IBE is a new kind of public-key encryption where the recipient's public key is an arbitrary string that represents the recipient's identity. Identity based proxy re-encryption (IBPRE) is a primitive combing the feature of IBE and PRE. Recently Wang et al. proposed a multi-use unidirectional CCA-secure identity based proxy re-encryption (IBPRE) scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信