2010 IEEE/ACIS 9th International Conference on Computer and Information Science最新文献

筛选
英文 中文
Proposal of Spatiotemporal Data Extraction and Visualization System Based on Wikipedia for Application to Earth Science 基于维基百科的时空数据提取与可视化系统在地球科学中的应用
Akihiro Okamoto, Shohei Yokoyama, Naoki Fukuta, H. Ishikawa
{"title":"Proposal of Spatiotemporal Data Extraction and Visualization System Based on Wikipedia for Application to Earth Science","authors":"Akihiro Okamoto, Shohei Yokoyama, Naoki Fukuta, H. Ishikawa","doi":"10.1109/ICIS.2010.82","DOIUrl":"https://doi.org/10.1109/ICIS.2010.82","url":null,"abstract":"The evolution of information technologies has simplified the handling of huge amounts of earth science data. However, since various problems exist before these data can be exploited well, new uses are required. One example is combining earth science data with spatiotemporal data on the Web. In our research, we focus on Wikipedia, which is a Web encyclopedia that has many constructional features. We report our system that extracts spatiotemporal data on Wikipedia and visualizes them.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124617853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Mobile Agent Approach for Flexible Peer-to-Peer File Retrieval 灵活点对点文件检索的移动代理方法
Naoki Fukuta
{"title":"A Mobile Agent Approach for Flexible Peer-to-Peer File Retrieval","authors":"Naoki Fukuta","doi":"10.1109/ICIS.2010.83","DOIUrl":"https://doi.org/10.1109/ICIS.2010.83","url":null,"abstract":"Peer-to-peer (P2P) data sharing is one of valuable approaches for sharing data among people when they are belonging to different institutions. There are strong demands on both flexible, high-precision search and protection of privacy at peer-to-peer data retrievals. Especially, it is demanded for searching relevant files in P2P environment by using metadata while the terms in metadata that are used in such queries and annotations include some private information. In this paper, I present my current ongoing work on P2P-based semantic file sharing and retrieval mechanism that enables us to use private ontologies for flexible concept-oriented semantic searches without loss of privacy in processing semantic matchings among private metadata of files and the requested semantic queries. The private ontologies are formed on a certain reference ontology with differential ontologies for personalization. In our approach, users can manage and annotate their files with their own private ontologies. Reference ontologies are used to find out semantically relevant files for the given queries that include semantic relations among existing files and the requested files. Mobile agent approach is applied for the purpose to implement a system with less use of network bandwidth and also to code it into simple programs. A prototype system is implemented on the MiLog mobile agent programming platform. Discussions about potential advantages and issues on the approach are presented based on the prototype implementation.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129930699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exhancements for a Simple Authenticated SIP Request Management 简单身份验证SIP请求管理的改进
Hisashi Takahara, Motonori Nakamura
{"title":"Exhancements for a Simple Authenticated SIP Request Management","authors":"Hisashi Takahara, Motonori Nakamura","doi":"10.1109/ICIS.2010.113","DOIUrl":"https://doi.org/10.1109/ICIS.2010.113","url":null,"abstract":"SIP is a popular signaling protocol. In SIP, RFC4474 (SIP Identity) [3] is used to verify integrity of a flow from a Proxy to a terminal of a callee while RFC3261 (Proxy Authenticate) [1] is used to ensure authenticity of a flow from a terminal of a caller to a Proxy. However Proxy Authenticate only ensures authenticity and cannot verify the integrity of a flow. Thus, the flow from a terminal of caller to a proxy is inherently vulnerable to man-in-the-middle (MITM) attacks. In this paper, a new method is proposed that makes it possible to verify integrity of a SIP flow from a terminal of a callee to a proxy without such a significant effort as PKI requires. By combining this method and SIP Identity, it is realized to verify integrity of SIP signaling flow over the while end-to-end path more easily than using only SIP Identity.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
One-Finger Interaction for Ubiquitous Environment 一指交互无处不在的环境
Takashi Nakamura, Shin Takahashi, J. Tanaka
{"title":"One-Finger Interaction for Ubiquitous Environment","authors":"Takashi Nakamura, Shin Takahashi, J. Tanaka","doi":"10.1109/ICIS.2010.125","DOIUrl":"https://doi.org/10.1109/ICIS.2010.125","url":null,"abstract":"We propose a new interaction technique called “One-finger Interaction” for the ubiquitous environment in a home. One-finger Interaction is an interaction technique for performing various operations through movement of the index finger. It is possible for the user to operate from a distance. Additionally, because the user uses only a LED device and fingertip recognition is very sensitive, this method can be readily used in various environments. The user can also change the menu according to personal preferences and applications. We developed two prototype interfaces for One finger Interaction. One is an interface that allows one to execute operations by moving one’s fingertip and crossing icons. The other is one in which the user selects a rough position of the menu by the general direction of movement of one’s fingertip, then selects a specific position by moving one’s finger in a circular fashion. These interfaces allow the user to perform various operations by movement of the fingertip. Also, because it is possible to move from the end of one operation to the next action instantaneously, the user can operate menus continuously.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Examination about Expansion of Displaying Volume in Projection Type Electro-holography (II) 投影式电全息术显示体积扩展的检验(二)
Kunihiko Takano, Hideto Ishii, A. Watanabe, T. Seino, Koki Sato, M. Ohki, K. Asai
{"title":"Examination about Expansion of Displaying Volume in Projection Type Electro-holography (II)","authors":"Kunihiko Takano, Hideto Ishii, A. Watanabe, T. Seino, Koki Sato, M. Ohki, K. Asai","doi":"10.1109/ICIS.2010.30","DOIUrl":"https://doi.org/10.1109/ICIS.2010.30","url":null,"abstract":"In the holographic 3D display using mist screen, large 3D images can be observed with wide viewing angle. However, in the previous methods, it was difficult to observe the sides of the projected 3D images. In this paper, we studied a process to expand the displaying volume of the projected 3D images by preparing a jetting system improving the characteristics of the mist screen and by combining the reconstructing waves reflected from two SLM's. As this result, by adopting our system, 3D images are seen to become observable with wider viewing angle including sides than before.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Website Attractiveness, Consumer-Website Identification, and Website Trustworthiness on Purchase Intention 网站吸引力、消费者网站辨识度、网站可信度对购买意愿的影响
Z. Lee, Jenniffer Yurchisin, C. Lin
{"title":"The Impact of Website Attractiveness, Consumer-Website Identification, and Website Trustworthiness on Purchase Intention","authors":"Z. Lee, Jenniffer Yurchisin, C. Lin","doi":"10.1109/ICIS.2010.148","DOIUrl":"https://doi.org/10.1109/ICIS.2010.148","url":null,"abstract":"This pilot study examined the antecedents of consumers’ intention to purchase from apparel retail websites, including website attractiveness, consumer-website identification, and website trustworthiness. A structural equation model was used to test hypotheses that were derived from social identity theory and previous research concerning online consumer behavior. The results of this study indicated that consumers’ perceptions of the attractiveness of an apparel retail website directly and positively influence the degree to which they identify with that website. Furthermore, the degree to which consumers identify with an apparel retail website directly and positively influences consumers’ perceptions of the trustworthiness of the website. Lastly, the level of trust consumers experience with apparel retail websites is directly and positively related to their intentions to purchase from the website.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Modeling and Verifying Web Service Applications with Time Constraints 建模和验证具有时间约束的Web服务应用程序
Jia Mei, Huai-kou Miao, Qingguo Xu, Pan Liu
{"title":"Modeling and Verifying Web Service Applications with Time Constraints","authors":"Jia Mei, Huai-kou Miao, Qingguo Xu, Pan Liu","doi":"10.1109/ICIS.2010.20","DOIUrl":"https://doi.org/10.1109/ICIS.2010.20","url":null,"abstract":"Web services are a very appropriate communication mechanism to perform distributed business processes among several organizations. These processes should be reliable, because a failure in them can cause high economic losses. In this paper, we present an approach to verify Web Service applications with time restrictions which are defined by BPEL4WS using model checking techniques. We introduce a formalism, called WS Timed Automata, to capture the timed behavior of the web service applications, and methods to translate description of web service applications written in BPEL4WS to WS Timed Automata is proposed in this paper. The formal verification tool Uppaal is used to verify related properties of the system. A particular case study, an airline travel reservation system is taken as illustration.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Architecture of Extended Network Management System: Autonomous Cooperation between Knowledge Resource and Network Equipments 一种扩展的网络管理系统体系结构:知识资源与网络设备的自主协作
K. Sasai, Naoyuki Tanji, Yusuke Takahashi, G. Kitagata, Tetsuo Kinoshita
{"title":"An Architecture of Extended Network Management System: Autonomous Cooperation between Knowledge Resource and Network Equipments","authors":"K. Sasai, Naoyuki Tanji, Yusuke Takahashi, G. Kitagata, Tetsuo Kinoshita","doi":"10.1109/ICIS.2010.107","DOIUrl":"https://doi.org/10.1109/ICIS.2010.107","url":null,"abstract":"To reduce the work load of network administrators, e.g., fault detection/recovery, performance analysis and security maintenance etc., knowledge-based intelligent support system for network administrator based on active information resource (AIR-NMS) have been proposed. In this paper, we describe some design pattern and some implemented examples of activated information resource (AIR) on network administration. A design pattern consists of the classification policy of information resources such as state of network equipments and representation of information utilization knowledge such as expertise and heuristics of administrators. Based on these AIRs, we present a prototype architecture of cooperation among AIRs and integration of functions. The architecture realize the flexible/scalable fault recovery support processing in form of parallel distributed procedure.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126618439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Defect Density of Open Source Software 开源软件缺陷密度研究
Cobra Rahmani, D. Khazanchi
{"title":"A Study on Defect Density of Open Source Software","authors":"Cobra Rahmani, D. Khazanchi","doi":"10.1109/ICIS.2010.11","DOIUrl":"https://doi.org/10.1109/ICIS.2010.11","url":null,"abstract":"Open source software (OSS) development is considered an effective approach to ensuring acceptable levels of software quality. One facet of quality improvement involves the detection of potential relationship between defect density and other open source software metrics. This paper presents an empirical study of the relationship between defect density and download number, software size and developer number as three popular repository metrics. This relationship is explored by examining forty-four randomly selected open source software projects retrieved from SourceForge.net. By applying simple and multiple linear regression analysis, the results reveal a statistically significant relationship between defect density and number of developers and software size jointly. However, despite theoretical expectations, no significant relationship was found between defect density and number of downloads in OSS projects.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131458198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Novel Fuzzy Ant System for Edge Detection 一种新的模糊蚁群边缘检测系统
O. Verma, M. Hanmandlu, A. Sultania, Dhruv
{"title":"A Novel Fuzzy Ant System for Edge Detection","authors":"O. Verma, M. Hanmandlu, A. Sultania, Dhruv","doi":"10.1109/ICIS.2010.145","DOIUrl":"https://doi.org/10.1109/ICIS.2010.145","url":null,"abstract":"A new approach for edge detection is presented in this paper using fuzzy derivative and Ant Colony Optimization (ACO) algorithm to reduce the discontinuities presented in the image filtered by Sobel operator. The number of ants are calculated and placed at the endpoints of the edges in the image filtered by Sobel Edge detector. Fuzzy Derivative Technique gives fuzzy probability factor. This probability factor is used to decide the next most probable pixel to be edge. The Ant colony optimization (ACO) technique is taken from the behavior of some species of ants which uses certain chemicals (known as pheromone) to inform other ants about the appropriate path. The intensities of the pheromones help ants for making decision for the right path. This concept is used by placing artificial ants on the image and edges are calculated by considering intensity difference as heuristic information. Two rules are also proposed for reducing movement of ant.","PeriodicalId":338038,"journal":{"name":"2010 IEEE/ACIS 9th International Conference on Computer and Information Science","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131614782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信