2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Passive YouTube QoE Monitoring for ISPs isp被动监控YouTube QoE
R. Schatz, T. Hossfeld, P. Casas
{"title":"Passive YouTube QoE Monitoring for ISPs","authors":"R. Schatz, T. Hossfeld, P. Casas","doi":"10.1109/IMIS.2012.12","DOIUrl":"https://doi.org/10.1109/IMIS.2012.12","url":null,"abstract":"Over the last decade, Quality of Experience (QoE) has become the guiding paradigm for enabling a more user-centric understanding of quality of communication networks and services. The intensifying competition among ISPs and the exponentially increasing traffic volumes caused by online video platforms like YouTube is forcing service providers to integrate QoE into their corporate DNA. This paper investigates the problem of YouTube QoE monitoring from an access provider's perspective. To this end, we present three novel methods for in-network measurement of the QoE impairment that dominates user perception in the context of HTTP video-streaming: stalling of playback. Our evaluation results show that it is possible to detect application-level stalling events at high accuracy by using network-level passive probing only. However, only the most complex and most accurate approach can be used for QoE prediction due to the non-linear ties inherent in human quality perception.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133138837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
A New Identity-Based Group Signature Scheme Based on Knapsack ECC 一种新的基于背包ECC的身份群签名方案
S. Parvin, Song Han, Z. Rehman, M. A. Faruque, F. Hussain
{"title":"A New Identity-Based Group Signature Scheme Based on Knapsack ECC","authors":"S. Parvin, Song Han, Z. Rehman, M. A. Faruque, F. Hussain","doi":"10.1109/IMIS.2012.88","DOIUrl":"https://doi.org/10.1109/IMIS.2012.88","url":null,"abstract":"Elliptic curve cryptography (ECC) is a way to provide security for exchanging keys among communicating parties using the Diffie Hellman key exchange algorithm. This paper presents the ECC implementation for identity-based signature authentication and then applies the knapsack algorithm on ECC for signing a message. The group signature is the concatenation of the identity-based signature with the user's public key. In this paper, we attempt to provide a secure ID-based group signature scheme by using knapsack based ECC.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127870000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling Transparent Communication with Global ID for the Internet of Things 实现物联网全球ID透明通信
S. Jeong, S. Kim, Minkeun Ha, Taehong Kim, Jinyoung Yang, N. Giang, Daeyoung Kim
{"title":"Enabling Transparent Communication with Global ID for the Internet of Things","authors":"S. Jeong, S. Kim, Minkeun Ha, Taehong Kim, Jinyoung Yang, N. Giang, Daeyoung Kim","doi":"10.1109/IMIS.2012.91","DOIUrl":"https://doi.org/10.1109/IMIS.2012.91","url":null,"abstract":"Enabling the Internet of Things (IoT) requires a global identification system for things to be distinguished from trillions of things and to make them globally accessible from the Internet. Unfortunately, the current Internet architecture using an IP address as both ID and locator (i.e., address) makes it difficult to improve networking solutions for the IoT. To solve this, we newly design novel IoT architecture composed of Things' Identification Service (TIDS) and Things' Profile Service (TPS), enabling things to use both a domain name and a global ID in globally accessing other things in the world. It also exploits existing Domain Name Service (DNS) and Dynamic DNS (DDNS) to trace of mobile thing's changing IP address. In addition to this, we develop Things' Application-level Protocol (TALP) to provide users with transparent access to the things over heterogeneous networks. To show the feasibility, we implement TIDS, TPS, and TALP and construct the test-bed for the proposed IoT architecture. Based on this, we prove the feasibility of the proposed IoT architecture.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution Database 基于小波空间颜色和Gabor归一化纹理的多分辨率数据库图像检索
Yong-Hwan Lee, Sang-Burm Rhee, Bonam Kim
{"title":"Content-Based Image Retrieval Using Wavelet Spatial-Color and Gabor Normalized Texture in Multi-resolution Database","authors":"Yong-Hwan Lee, Sang-Burm Rhee, Bonam Kim","doi":"10.1109/IMIS.2012.98","DOIUrl":"https://doi.org/10.1109/IMIS.2012.98","url":null,"abstract":"Image retrieval is one of the most exciting and fastest growing research areas in the field of multimedia technology. This paper proposes a new efficient image retrieval method that applies a weighted combination of color and texture to the wavelet transform, based on spatial-color and second order statistics, respectively. To evaluate the performance of the proposed algorithm, we assess the simulation's performance in terms of average precision and Fscore using several image databases, and perform comparative analysis with existing methods such as MPEG-7. The experimental results show that the proposed approach significantly improves the effectiveness of image retrieval. The proposed descriptor is particularly useful for multi-resolution image search and retrieval.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Document Classification through Building Specified N-Gram 通过构建指定N-Gram进行文档分类
Byeongkyu Ko, Dongjin Choi, Chang Choi, Junho Choi, Pankoo Kim
{"title":"Document Classification through Building Specified N-Gram","authors":"Byeongkyu Ko, Dongjin Choi, Chang Choi, Junho Choi, Pankoo Kim","doi":"10.1109/IMIS.2012.142","DOIUrl":"https://doi.org/10.1109/IMIS.2012.142","url":null,"abstract":"This paper proposed a method to classify textural documents using specified n-gram data set. Human lives in the world where web documents have a great potential and the amount of valuable information has been consistently growing over the year. There is a problem that finding relevant web documents corresponding to what users want is more difficult due to the huge amount of web size. For this reason, many approaches have been suggested to overcome this obstacle. The most important task is classifying textural documents into predefined categories. Over the years, many statistical approaches were introduced though, no one can find perfect solution yet. In this paper, we suggest a method for textural document classification using n-gram model. The n-gram data frequency has a great potential to find similarities between documents. For this reason, we construct our own n-gram data sets from research papers. If an unknown document comes to the system, the system will extract n-grams from the given unknown documents. After this step, n-grams from unknown document and n-grams in previous data sets will be compared by proposed similarity measurement. The precision rate of this method comes to 86%.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Privacy Preserving Model for Personal Information in Search Engine 搜索引擎中个人信息的隐私保护模型
Eun-Ae Cho, Kyungroul Lee, Kangbin Yim
{"title":"A Privacy Preserving Model for Personal Information in Search Engine","authors":"Eun-Ae Cho, Kyungroul Lee, Kangbin Yim","doi":"10.1109/IMIS.2012.191","DOIUrl":"https://doi.org/10.1109/IMIS.2012.191","url":null,"abstract":"In this modern-day society, people get information by using a search engine, and this is a very ordinary part of our lives. When users, however, begin to retrieve some information after their login on the portal sites, the data related to the user and the query information may be sent to the portal server to enhance the users' comfort. Here, the information that the user does not want to expose can be included. So, an invasion of privacy can occur and we have to protect this kind of incident. In this case, if the user hides all the information, the server can not show the customized result for the user, which can influence the advertising revenue. Moreover, there may be a general downward trend in the portal sites field. Thus, in this paper, we propose a user privacy preserving model in a search engine by using a homomorphic encryption algorithm on the user's policy to solve this problem. This can provide information on what the user wants to know with encrypted user information and targeted advertising service from the portal sites.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123474325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Computer System with User Friendly Environment and Security Protection 具有友好环境和安全保护的移动计算机系统
Chu-Hsing Lin, Jung-Chun Liu, W. Wu, T. You, Ming Liu
{"title":"Mobile Computer System with User Friendly Environment and Security Protection","authors":"Chu-Hsing Lin, Jung-Chun Liu, W. Wu, T. You, Ming Liu","doi":"10.1109/IMIS.2012.11","DOIUrl":"https://doi.org/10.1109/IMIS.2012.11","url":null,"abstract":"In this paper, motion detection with the web cam can determine current conditions around mobile computers, which act accordingly with a variety of response methods. A good balance is achieved between sensitivity of machines and experiences of users. Many practical applications are investigated, and this paper is primarily focused on two main points: user-friendly operations and security. Our system provides dynamic detection features for suspicious objects: photos of suspected thieves are taken, saved, and uploaded to the Internet, and when necessary, warning Short Message Service messages are sent to mobile phone users. Apart from this application, many other applications are feasible, for example, connection of alternative current power cords of laptops can be used to determine whether they are at a risk of being stolen.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model 用于扭曲和模糊模式的随机图语言:单层模型
M. Ogiela, M. Piekarczyk
{"title":"Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model","authors":"M. Ogiela, M. Piekarczyk","doi":"10.1109/IMIS.2012.147","DOIUrl":"https://doi.org/10.1109/IMIS.2012.147","url":null,"abstract":"The work introduces a linguistic based model designed for distorted or ambiguous patterns where a graph based approach is used for structure representation. The knowledge about unevenness is usually created on the basis of finite number of patterns treated as positive samples of unknown language. The IE graphs are used as the base. Single pattern can be represented using deterministic IE graph. Subsequently, the collection of patterns, represented by deterministic graph is transformed into equivalent random graph language. Utilization of the grammatical inference mechanisms gives the possibility to perform this process in automatic way. Using the IE graphs and imposing some simple limitations on graph structures allows to obtain a polynomial complexity of knowledge inference. In the work it is described how to use the proposed model for collecting the knowledge in handwritten signatures recognition and analysis systems. Information about graphemes (solid fragment of handwritten signature) variability is stored in the form of random IE graphs and stochastic ETPL(k) graph grammars. Instead of an ordinary the IE graph, an attributed one is used in order to increase a descriptive power of the proposed schema. The parametrical data embedded in the graph carries some additional semantic information associated with the structure of pattern. The work presents discussion about inference scheme and computational complexity of the proposed linguistic representation scheme. Described methodology can be especially suited for creating the knowledge representation of the handwritten signatures, signs and ideograms (e.g. kanji) in offline recognition systems.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121576634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automatic Bibliometric Analysis of Research Literature in Adult Education 成人教育研究文献的自动计量分析
Yao-Hua Wang, Yuen-Hsien Tseng
{"title":"Automatic Bibliometric Analysis of Research Literature in Adult Education","authors":"Yao-Hua Wang, Yuen-Hsien Tseng","doi":"10.1109/IMIS.2012.69","DOIUrl":"https://doi.org/10.1109/IMIS.2012.69","url":null,"abstract":"Due to the vast volume of publications in nowadays research environment, methods for analyzing, organizing, and accessing information from large databases are in great need. Through appropriate analytic tools, competitive intelligence can be revealed to enhance the organization or individual performance. This article will show how a free software package called CATAR carry on the analysis about the literature of the Adult Education science. Adult Education Quarterly (AEQ) is a scholarly forum of research and theory in adult education. The field of adult education is broad-based and inter disciplinary, during 1990 to 2010 having 672 papers from the ISI Web of Knowledge database was collected. The data analyzed include the distribution of authors' countries, topical clusters, the most cited references, the productivity rankings, and others to provide information for further study. Our analysis scenario also suggests a feasible way of analyzing other similar data for readers interesting in literature mining applications.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"47 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120995961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Service Oriented Analysis Environment for Neuroimaging Studies 面向服务的神经成像研究分析环境
A. Anjum, N. Bessis, R. McClatchey, K. Munir, I. Habib, A. Branson, Jetendr Shamdasani
{"title":"A Service Oriented Analysis Environment for Neuroimaging Studies","authors":"A. Anjum, N. Bessis, R. McClatchey, K. Munir, I. Habib, A. Branson, Jetendr Shamdasani","doi":"10.1109/IMIS.2012.140","DOIUrl":"https://doi.org/10.1109/IMIS.2012.140","url":null,"abstract":"neuGRID is an EC-funded project driven by the needs of the Alzheimer's disease research community that aims to facilitate the collection and archiving of large amounts of imaging data coupled with a set of generalized services and algorithms. By taking Alzheimer's disease as an exemplar, the neuGRID project has developed a set of generic analysis services and a Grid infrastructure that enables the European neuroscience community to carry out research required for the study of degenerative brain diseases. Using the services and the infrastructure, neuroscientists should be able to more easily identify neurodegenerative disease markers through the analysis of magnetic resonance and other brain imaging. The availability of such image-based disease markers will allow earlier diagnosis and foster the development of new drugs. This paper reports our work on the service oriented analysis environment that has been developed from a study of user requirements and that enables the neuroscience community to conduct and trace analyses for the study of Alzheimer's and other neurodegenerative diseases. We present the salient features, architecture and implementation details of the services that will form an analysis environment. We also describe the functionality and benefits that these services will offer to the medical community in general and neuroimaging analysis in particular.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"10 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125741414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信