2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)最新文献

筛选
英文 中文
User centered and context dependent personalization through experiential transcoding 通过体验式转码实现以用户为中心和上下文相关的个性化
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940520
S. Ferretti, S. Mirri, Catia Prandi, P. Salomoni
{"title":"User centered and context dependent personalization through experiential transcoding","authors":"S. Ferretti, S. Mirri, Catia Prandi, P. Salomoni","doi":"10.1109/CCNC.2014.6940520","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940520","url":null,"abstract":"The pervasive presence of devices exploited to use and deliver entertainment text-based content can make reading easier to get but more difficult to enjoy, in particular for people with reading-related disabilities. The main solutions that allow overcoming some of the difficulties experienced by users with specific and special needs are based on content adaptation and user profiling. This paper presents a system that aims to improve content legibility by exploiting experiential transcoding techniques. The system we propose tracks users' behaviors so as to provide a tailored adaptation of textual content, in order to fit the needs of a specific user on the several different devices she/he actually uses.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123615029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
IoT gadget control on wireless AP at home 物联网小工具控制无线AP在家里
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940525
Jinhong Yang, Hyo-Jin Park, Yongrok Kim, J. Choi
{"title":"IoT gadget control on wireless AP at home","authors":"Jinhong Yang, Hyo-Jin Park, Yongrok Kim, J. Choi","doi":"10.1109/CCNC.2014.6940525","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940525","url":null,"abstract":"This paper demonstrates hosting IoT gadgets on the wireless AP(Access Point) at home. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScriptbased objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method is required. The demonstration shows the IoT gadget registration, monitoring, and control on the wireless AP. In addition, generating mash-up instances by connecting multiple gadgets and controlling them together is performed.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120980541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multiplatform games for Dyslexia identification in preschoolers 学龄前儿童阅读障碍识别的多平台游戏
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940496
A. Facoetti, S. Franceschini, O. Gaggi, G. Galiazzo, S. Gori, C. Palazzi, M. Ruffino
{"title":"Multiplatform games for Dyslexia identification in preschoolers","authors":"A. Facoetti, S. Franceschini, O. Gaggi, G. Galiazzo, S. Gori, C. Palazzi, M. Ruffino","doi":"10.1109/CCNC.2014.6940496","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940496","url":null,"abstract":"Dyslexia is a learning disability affecting the ability to process written and sometimes even spoken language. It affects educational opportunities of about 10% of children, regardless of their intelligence. One of the main challenges is to be able to identify Dyslexia in preschoolers. To this aim we have developed a set of serious games that are the core of this demo. Our games have been created with a multiplatform approach so as to generate, in a single effort, game versions for mobile platforms and the Web. They have also been designed to be adequately challenging and fun for their target users, as well as effective.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Gas leak detection and localization system through Wireless Sensor Networks 无线传感器网络气体泄漏检测与定位系统
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940506
P. Spachos, Liang Song, D. Hatzinakos
{"title":"Gas leak detection and localization system through Wireless Sensor Networks","authors":"P. Spachos, Liang Song, D. Hatzinakos","doi":"10.1109/CCNC.2014.6940506","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940506","url":null,"abstract":"In this demonstration proposal we use a prototype of a Wireless Sensor Network (WSN) to monitor and locate gas leaks of a complex indoor environment. Specifically, a mobile node is moving inside a building to monitor any leakage of carbon dioxide (CO2), supporting and displaying the level and the location of the leakage. Throughout the demonstration, the technological advantages of cognitive networking along with multihop routing are explored.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121751094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New gait metrics for biometric authentication using a 3-axis acceleration 使用3轴加速度的生物识别认证的新步态度量
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940501
Ik-Hyun Youn, Sangil Choi, Richelle Le May, Douglas Bertelsen, Jong-Hoon Youn
{"title":"New gait metrics for biometric authentication using a 3-axis acceleration","authors":"Ik-Hyun Youn, Sangil Choi, Richelle Le May, Douglas Bertelsen, Jong-Hoon Youn","doi":"10.1109/CCNC.2014.6940501","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940501","url":null,"abstract":"Biometric authentication mechanisms are excellent alternatives to often inconvenient interaction authentication methods such as PIN numbers in mobile devices. This research introduces the new concept of using gait signature metrics for biometric authentication. This procedure verifies each subject using only acceleration. We first use a single wireless sensor device to collect data on subjects' gait patterns. By dividing each gait cycle into an Acceleration Phase and a Deceleration Phase, we derive seven periodic and characteristic gait signature metrics. Gait signature metrics can be classified as acceleration metrics, deceleration metrics, and ratio metric. Acceleration metrics represent a degree of dynamic activity when heel-strike actions and mid-stance actions occur, whereas deceleration metrics measure a degree of dynamic activity when mid-stance actions and successive heel-strike of other foot. The last metric, ratio metric, present the relationship between the acceleration metrics and the deceleration metrics. Using the gait signature metrics, we succeeded in differentiating each subject with 100% accuracy.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Is sensor deployment using gaussian distribution energy balanced? 传感器部署使用高斯分布能量平衡?
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1007/978-3-319-03859-9_5
Subir Halder, Amrita Ghosal
{"title":"Is sensor deployment using gaussian distribution energy balanced?","authors":"Subir Halder, Amrita Ghosal","doi":"10.1007/978-3-319-03859-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-03859-9_5","url":null,"abstract":"","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116756552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
SNC: Scalable NDN-based conferencing architecture SNC:基于ndn的可扩展会议架构
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.7056330
Debessay Fesehaye, Jun Wei
{"title":"SNC: Scalable NDN-based conferencing architecture","authors":"Debessay Fesehaye, Jun Wei","doi":"10.1109/CCNC.2014.7056330","DOIUrl":"https://doi.org/10.1109/CCNC.2014.7056330","url":null,"abstract":"We present a scalable NDN-based conferencing architecture for conference control and management. Conference control functions are divided into individual service modules and are loaded into different control servers. Control servers are added into the control cluster as the number of parcitipants increases. Participants are allowed to register and receive variety of conference control services from any control servers within the cluster. Participant registration and access records are maintained locally by specific control servers. This work presents essential building blocks using (1) light-weighted metadata for effective participant record management, (2) distributed and self-organized storage and replication of participant records, (3) efficient, secure and distributed conference access mechanisms, and (4) dynamic and effective control server discovery. This system enables quick and efficient cluster access by supporting seamless participant mobility and automatic server load balancing. The control cluster is self-organized and self-healing and able to scale to large size of participants. It can also be extended to host multiple conferences. Using CCNx toolkits, we have demonstrated how SNC can automatically (seamlessly) select the closest (small delay) server avoiding congested (under-attack) and far away servers. Using simulation experiments, we have also shown the effectiveness of interest response suppression mechanisms which SNC can employ.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127542536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Flexible end-to-end content security in CCN CCN中灵活的端到端内容安全性
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940528
Christopher A. Wood, E. Uzun
{"title":"Flexible end-to-end content security in CCN","authors":"Christopher A. Wood, E. Uzun","doi":"10.1109/CCNC.2014.6940528","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940528","url":null,"abstract":"Content-centric networking (CCN) project, a flavor of information-centric networking (ICN), decouples data from its source by shifting the emphasis from hosts and interfaces to information. As a result, content becomes directly accessible and routable within the network. In this data-centric paradigm, techniques for maintaining content confidentiality and privacy typically rely on cryptographic techniques similar to those used in modern digital rights management (DRM) applications, which often require multiple consumer-to-producer (end-to-end) messages to be transmitted to establish identities, acquire licenses, and access encrypted content. In this paper, we present a secure content distribution architecture for CCN that is based on proxy re-encryption. Our design provides strong end-to-end content security and reduces the number of protocol messages required for user authentication and key retrieval. Unlike widely-deployed solutions, our solution is also capable of utilizing the opportunistic in-network caches in CCN. We also experimentally compare two proxy re-encryption schemes that can be used to implement the architecture, and describe the proof of concept application we developed over CCNx.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel implementation of public key cryptosystems using Web workers 使用Web工作者并行实现公钥密码系统
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940513
T. Sumi, T. Ishiguro, S. Kiyomoto, Yutaka Miyake, Toru Kobayashi, T. Takagi
{"title":"Parallel implementation of public key cryptosystems using Web workers","authors":"T. Sumi, T. Ishiguro, S. Kiyomoto, Yutaka Miyake, Toru Kobayashi, T. Takagi","doi":"10.1109/CCNC.2014.6940513","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940513","url":null,"abstract":"Web Workers is a specification that defines an API which allows Web application developers to use background workers running scripts in parallel. Web Workers is used with JavaScript and is platform-independent. Hence, Web applications written in JavaScript can be used for a wide variety of purposes. There are many Web applications and some of them, for instance Internet election campaign and real-time broadcasting, need secure communications. We can include digital signatures with such Web applications to guarantee their security of communications. In this demonstration proposal, we assess the performance of parallel implementations of public key cryptosystems on several Web browsers (Internet Explorer, Google Chrome, Opera, and Firefox). With our implementation, it is possible to verify a message in 1.03 milliseconds on a Windows PC and 5.49 milliseconds on an Android tablet (Nexus 7). We also propose cryptography applications for Web browsers.","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green symbiotic heterogeneous networks 绿色共生异质网络
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) Pub Date : 2014-11-03 DOI: 10.1109/CCNC.2014.6940505
H. D. Mustafa, S. Vijayan, S. Katta, S. Sagar, S. Merchant, U. Desai
{"title":"Green symbiotic heterogeneous networks","authors":"H. D. Mustafa, S. Vijayan, S. Katta, S. Sagar, S. Merchant, U. Desai","doi":"10.1109/CCNC.2014.6940505","DOIUrl":"https://doi.org/10.1109/CCNC.2014.6940505","url":null,"abstract":"This paper proposes a symbiotic and distributed communication paradigm for heterogeneous networks. The green and adaptive approach entails the simultaneous use of multiple communication interfaces, enabling efficient resource utilization. The judiciously designed architecture allows multiple users to access multiple mediums concomitantly, for both uplink and downlink, via virtualized communication ports and Internet Protocol (IP) schematic. Principal theoretic feasibility of the hypothesis is established by the linear increase in communication ca-pacity, with minimal energy requirement. Promising simulation and experimental results of a static scenario are shown, User Equipment's (UEs) connecting to multiple Communication Mediums (CMs).","PeriodicalId":287724,"journal":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信