2009 International Conference on Network-Based Information Systems最新文献

筛选
英文 中文
An Attack-Resilient Channel Assignment MAC Protocol 抗攻击信道分配MAC协议
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.42
Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu
{"title":"An Attack-Resilient Channel Assignment MAC Protocol","authors":"Wanyu Zang, Qijun Gu, Meng Yu, Peng Liu","doi":"10.1109/NBiS.2009.42","DOIUrl":"https://doi.org/10.1109/NBiS.2009.42","url":null,"abstract":"Although multi-channel wireless protocols are becoming predominant, security mechanisms of channel assignment are far from sufficient to protect the channel usage. In this paper, we discuss radio jamming attacks, ripple effect attacks and false information injection attacks in multi-interface and multi-channel wireless networks. We propose a security mechanism to secure channel management in multi-channel wireless networks. Our channel assignment protocol is resilient to the aforementioned intrusions. The evaluation results show that our protocol is effective and efficient.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122167013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SRJE: Decentralized Authentication Scheme against Sybil Attacks SRJE:针对Sybil攻击的分散身份验证方案
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.54
Yo Mashimo, Masanori Yasutomi, H. Shigeno
{"title":"SRJE: Decentralized Authentication Scheme against Sybil Attacks","authors":"Yo Mashimo, Masanori Yasutomi, H. Shigeno","doi":"10.1109/NBiS.2009.54","DOIUrl":"https://doi.org/10.1109/NBiS.2009.54","url":null,"abstract":"In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralized authentication method, referred to as self-registration, in which the rule of majority is used to set a limit on the number of nodes in DHT (Distributed Hash Table) networks, has been proposed. However, self-registration is not effective against increasing the number of malicious users. In this paper, we propose a more reliable method by applying a local trust mechanism (SRJE, Self-Registration with Judgement Evaluation), which uses an original surveillance mechanism for self-registration. We show the effectiveness of SRJE by performing simulations comparing SRJE with self-registration.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123146478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Visualizing a Correlative Multi-level Graph of Biology Entity Interactions 生物实体相互作用的关联多层次图可视化
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.37
Qian You, S. Fang, S. Mukhopadhyay, Harsha Gopal Goud Vaka, J. Chen
{"title":"Visualizing a Correlative Multi-level Graph of Biology Entity Interactions","authors":"Qian You, S. Fang, S. Mukhopadhyay, Harsha Gopal Goud Vaka, J. Chen","doi":"10.1109/NBiS.2009.37","DOIUrl":"https://doi.org/10.1109/NBiS.2009.37","url":null,"abstract":"In this paper we present a new visualization paradigm to represent and assist the understanding of a correlative multi-level graph, a group of inter-connected networks. Such a graph is formed via term association mining, and the visualization paradigm consists of three components: terrain surface visualization units, terrain surface arrangement, and terrain surface correlation. We apply this paradigm to visualize and explore a pair of correlative core cancer terms network and core gene terms network. The results show that our visualization paradigm design is consistent with the derived associations, and is effective in preserving major features as the landmarks in the terrain surfaces.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131418156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Run-time Updating of Network Device Drivers 网络设备驱动程序的运行时更新
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.53
Hiroyuki Tanaka, Y. Nomura, H. Taniguchi
{"title":"Run-time Updating of Network Device Drivers","authors":"Hiroyuki Tanaka, Y. Nomura, H. Taniguchi","doi":"10.1109/NBiS.2009.53","DOIUrl":"https://doi.org/10.1109/NBiS.2009.53","url":null,"abstract":"Recent operating systems are capable of using dynamic loadable module functions to update the device driver programs without shutting down the entire system. However, even if a system continues to operate, some services provided by the device driver will be temporarily unavailable during the run-time update. To reduce the period during which the services are unavailable, we propose a new method for run-time updating of device drivers; this method uses context migration from an old driver to an updated one. In this study, we describe the implementation of a network-device driver using our method. In addition, we have shown some advantages of our method by performing a trial on the FreeBSD operating system.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tele-Immersion Environment for Video Avatar Based CVE 基于CVE的视频Avatar远程沉浸环境
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.89
Tomoyuki Ishida, Keisuke Yatsu, Y. Shibata
{"title":"Tele-Immersion Environment for Video Avatar Based CVE","authors":"Tomoyuki Ishida, Keisuke Yatsu, Y. Shibata","doi":"10.1109/NBiS.2009.89","DOIUrl":"https://doi.org/10.1109/NBiS.2009.89","url":null,"abstract":"In this paper, we propose a middleware system to realize collaborative virtual environment (CVE) considering tele-immersion environment based on personal computer. Using this middleware system, more immersive and presence feeling is attained and collaborative work can be effectively improved compared with using immersive display like CAVE. We built a prototype system of the proposed method and carried out functional and performance evaluations. As a result, we could verify that our proposed system is very cost effective and provided basic CVE functions on PC environment.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129950500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LITS: Lightweight Intelligent Traffic Simulator 轻型智能交通模拟器
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.76
Thomas Winters, Matthew F. Johnson, V. Paruchuri
{"title":"LITS: Lightweight Intelligent Traffic Simulator","authors":"Thomas Winters, Matthew F. Johnson, V. Paruchuri","doi":"10.1109/NBiS.2009.76","DOIUrl":"https://doi.org/10.1109/NBiS.2009.76","url":null,"abstract":"The traffic lighting systems used to regulate today’s trafficking system, although an integral part of the system, is inefficient. This inefficiency contributes to the increased cost of transportation while also contributing to the levels of pollution emitted as a result of human transportation needs; in addition to these detriments, this inefficiency also wastes the travelers’ time. We strongly believe that Intelligent Traffic Light Control can significantly diminish waiting times before red traffic lights in a city and in the process can save our society billions of Dollars annually. To study the efficiency of current system and performance of any proposed system, there is a strong need for an accurate and lightweight simulator. While several traffic simulators have been developed under the Intelligent Transport System initiative, their primary focus has been on modeling and forecasting vehicle traffic flow and congestion from a queuing perspective. In this describe Lightweight Intelligent Traffic Simulator (LITS) being developed for studying different traffic control systems.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"243 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133228008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Selection of Relevant Parameters Based on Conflict 基于冲突的相关参数选择
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.70
M. Benkaci, A. Doncescu, N. Kabbaj
{"title":"Selection of Relevant Parameters Based on Conflict","authors":"M. Benkaci, A. Doncescu, N. Kabbaj","doi":"10.1109/NBiS.2009.70","DOIUrl":"https://doi.org/10.1109/NBiS.2009.70","url":null,"abstract":"In this paper, we present a new approach for selection of relevant parameters in fault detection process. The conflict notion is used in order to evaluate the relevance of any subset of parameters. This selection is divided in two steps. The first consists in making partitioning of data running smooth. During the second step, we calculate the conflict between each subset of parameters. The experimental results are presented for several subsets of parameters for given breakdown in automobile system. In the second part of paper, we propose an automatic discretization algorithm; this algorithm improves the Hellinger-based discretization by adding an automatic stopped criterion.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decision Model for a System to Start Communicating with a Human Using HMM 基于HMM的系统开始与人沟通的决策模型
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.78
Makoto Murakami, M. Yamagiwa, M. Uehara
{"title":"Decision Model for a System to Start Communicating with a Human Using HMM","authors":"Makoto Murakami, M. Yamagiwa, M. Uehara","doi":"10.1109/NBiS.2009.78","DOIUrl":"https://doi.org/10.1109/NBiS.2009.78","url":null,"abstract":"The purpose of this paper is to develop a robot that actively communicates with a human, and explicitly extracts information from the human mind that is rarely expressed as verbal information. The spoken dialogue system for information collection must independently decide whether it may or may not start communicating with a human. In this paper, we assume that the system begins to communicate with a human sitting and working at a desk, analyze the relationship between his behavioral pattern and the decisions made by the other humans, i.e., whether or not to communicate with the former, and construct the decision model for the system to start communicating with the human using hidden Markov model.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133931548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Agent Based Layered Framework to Facilitate Intelligent Wireless Sensor Networks 一种基于Agent的无线传感器网络分层框架
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.40
H. Le, A. Scholtz, A. Potgieter
{"title":"An Agent Based Layered Framework to Facilitate Intelligent Wireless Sensor Networks","authors":"H. Le, A. Scholtz, A. Potgieter","doi":"10.1109/NBiS.2009.40","DOIUrl":"https://doi.org/10.1109/NBiS.2009.40","url":null,"abstract":"Wireless Sensor Networks (WSNs) have emerged with many useful applications but require a number of conflicting desirable properties such as: scalability, self-configuration, self-organization, deployability and simplicity. Most existing WSN proposals meet one or more of these requirements, but not all of them. Besides prior to the deployed of a network, it is challenging to alter the underlying technologies, such as: localization, routing, etc. This paper attempts to solve the complexity of these systems by proposing a dynamic structured framework using agents to facilitate different demands of WSN applications. For proof-of-concept, an initial prototype system was developed on the Solarium SunSPOT emulator.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple Micro Virtual Disks for Constructing Large-scale Storage 用于构建大规模存储的多个微型虚拟磁盘
2009 International Conference on Network-Based Information Systems Pub Date : 2009-08-19 DOI: 10.1109/NBiS.2009.24
M. Uehara
{"title":"Multiple Micro Virtual Disks for Constructing Large-scale Storage","authors":"M. Uehara","doi":"10.1109/NBiS.2009.24","DOIUrl":"https://doi.org/10.1109/NBiS.2009.24","url":null,"abstract":"Recently the demand for low cost, large-scale storage has risen. We developed the VLSD (Virtual Large Scale Disk) toolkit for constructing virtual disk based distributed storage, by aggregating the free space of individual disks. However, the single file server in the prototype system becomes a bottleneck and is the only point of failure. Thus, to improve reliability and performance, we propose the MMVD (Multiple Micro Virtual Disks) method, in which large-scale storage consists of many small file servers. With MMVD, there is neither a single point of failure, nor a bottleneck because multiple file servers manage many small disks. In addition, a MMVD system offers increased reliability because it reduces the MTTR.","PeriodicalId":312802,"journal":{"name":"2009 International Conference on Network-Based Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125605796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信