21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)最新文献

筛选
英文 中文
A Comparative Analysis of Personalization Techniques for a Mobile Application 移动应用个性化技术的比较分析
P. Nurmi, Marja Hassinen, K. Lee
{"title":"A Comparative Analysis of Personalization Techniques for a Mobile Application","authors":"P. Nurmi, Marja Hassinen, K. Lee","doi":"10.1109/AINAW.2007.12","DOIUrl":"https://doi.org/10.1109/AINAW.2007.12","url":null,"abstract":"In order to adapt to the environment of the user, devices have to be able to deduce the user's goals and information needs. In mobile environments, the goals and information needs of the user potentially depend on the user's situation. Existing work on context-dependent user modeling has mainly focused on specific application domains, most notably location-based services such as tourist guides, or on technological enablers. What is currently lacking is an understanding of when and why different personalization techniques work or fail. In this paper, we compare different classification algorithms on data collected from a mobile application. Our results show that methods that are able to learn tree-structured dependencies seem good candidates for personalization due to (i) the inherent hierarchical nature of context information and (ii) the fast running time of the algorithms. We also suggest two future research issues: (1) obtaining a better understanding of the nature of dependencies in contextual data, and (2) using collaborative user modeling techniques to improve the predictive power of user models.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Password-Based Authentication and Key Establishment Scheme for Mobile Environment 一种基于密码的移动环境认证与密钥建立方案
Jun Liu, J. Liao, Xiaomin Zhu
{"title":"A Password-Based Authentication and Key Establishment Scheme for Mobile Environment","authors":"Jun Liu, J. Liao, Xiaomin Zhu","doi":"10.1109/AINAW.2007.42","DOIUrl":"https://doi.org/10.1109/AINAW.2007.42","url":null,"abstract":"We propose a cost-effective, use-convenient, and well-performing password-based authentication and key establishment scheme by means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm. There doesn't exist any verification (password) table at the server side. To be applicable for the mobile environment, the scheme is designed as a one-roundtrip protocol to reduce the communication consumption over wireless channel. Moreover, the facts that users in this scheme are avoided downloading CRL (certificate revocation list) periodically and change the passwords in use without any interaction with servers over the radio are another two contributing factors to enhance the performance. Making use of queuing model M/G/l/N, we measure the performance of the scheme and compare it with TLS in terms of response time.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Domain Modelling for Ubiquitous Computing Applications 泛在计算应用的领域建模
A. Harrington, V. Cahill
{"title":"Domain Modelling for Ubiquitous Computing Applications","authors":"A. Harrington, V. Cahill","doi":"10.1109/AINAW.2007.156","DOIUrl":"https://doi.org/10.1109/AINAW.2007.156","url":null,"abstract":"Many Ubiquitous computing applications can be considered as planning and acting problems in environments characterised by uncertainty and partial observability. Such systems rely on sensor data for information about their environment and use stochastic or probabilistic reasoning algorithms to infer system state from sensor data. We propose a domain modelling technique that characterises the sensor and actuator infrastructure and the set of system states in Ubicomp application domains. We capture the location and geometry of all domain model elements and use these spatial properties to tailor system state determination to reflect the quality and spread of the sensor and actuator platform. The domain model is used to support the development of Ubicomp applications and allows us calculate the degree of observability that exists over the state space in the environment. The degree of observability over the state space can act as an input into determining the state inference and action selection algorithms used in Ubicomp systems. In this paper we present the design of our Ubicomp domain model. We show that the proposed model contains information necessary to support Ubicomp application development. The expressiveness of the proposed design has been tested by building a model of an Urban Traffic Control application for Dublin city.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource Discovery in Ubiquitous Health Care 泛在医疗保健中的资源发现
Gautham V. Pallapa, Sajal K. Das
{"title":"Resource Discovery in Ubiquitous Health Care","authors":"Gautham V. Pallapa, Sajal K. Das","doi":"10.1109/AINAW.2007.313","DOIUrl":"https://doi.org/10.1109/AINAW.2007.313","url":null,"abstract":"Ubiquitous computing is an emerging paradigm for health care environments, in which devices must blend into the background unobtrusively, collaborating to provide value-added services for users. Insufficient information flow and coordination are some of the main concerns in a ubiquitous health care environment. Resources are, therefore, essential to the success of this technology and, as a result, both resource discovery and management play a vital role in sustainable ubiquitous deployment. In this paper, we present a novel resource discovery mechanism for ubiquitous computing environments using Resource Index nodes (RIns) and mobile agents. The context information needed to process a query is identified and mobile agents are deployed to explore the ubiquitous environment for requested resources. We present a health care scenario and evaluate our proposed resource discovery method.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Mutable Nonlinear Transformation Algorithm for S-box S-box的一种新的可变非线性变换算法
A. Watanabe, H. Haruki, S. Shimotomai, Takeshi Saito, T. Nagase, Y. Yoshioka, Y. Hasegawa
{"title":"A New Mutable Nonlinear Transformation Algorithm for S-box","authors":"A. Watanabe, H. Haruki, S. Shimotomai, Takeshi Saito, T. Nagase, Y. Yoshioka, Y. Hasegawa","doi":"10.1109/AINAW.2007.36","DOIUrl":"https://doi.org/10.1109/AINAW.2007.36","url":null,"abstract":"This paper proposes a new mutable nonlinear transformation algorithm for AES S-box to enhance the complexity of the S-Box's structure called M_S-box that effectively provides an optimal degree of resistance against differential cryptanalysis and especially the linear cryptanalysis. The structure of the AES S-box has been expanded and modified to be congruent with the proposed algorithm and to obtain good nonlinearity of the S-box. The cryptanalysis of the model is based on the maximum average differential probability (MADP) and maximum average linear hull probability (MALHP). The results show that proposed model significantly improves MADP and MALHP. Furthermore, the results that have been obtained exhibit good enough confusions to achieve high security level.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem 最小代价单源不可分流问题的新算法
Chao Peng, Yasuo Tan, L. Yang
{"title":"New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem","authors":"Chao Peng, Yasuo Tan, L. Yang","doi":"10.1109/AINAW.2007.266","DOIUrl":"https://doi.org/10.1109/AINAW.2007.266","url":null,"abstract":"The minimum-cost single-source unsplittable flow problem is a single-source multi-commodity flow problem in which each commodity should be shipped only on one single path at the minimum possible cost without violating the capacity of each edge. An outstanding open question on this problem is whether a simultaneous (2,1)-approximation can be achieved for minimizing congestion and cost. But for the general version so far the best possible ratio is (3 + 2radic(2),1). In this paper we present a polynomial-time approximation algorithms which achieves this approximation ratio, our algorithm is more efficient and easier to implement compares to previous algorithms for this problem.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117235549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Attractive Feature Reduction Approach for Colon Data Classification 冒号数据分类的吸引特征约简方法
Mohammed Al-Shalalfa, R. Alhajj
{"title":"Attractive Feature Reduction Approach for Colon Data Classification","authors":"Mohammed Al-Shalalfa, R. Alhajj","doi":"10.1109/AINAW.2007.103","DOIUrl":"https://doi.org/10.1109/AINAW.2007.103","url":null,"abstract":"In this paper, we try to identify a set of reduced features capable of distinguishing between two classes by performing double clustering using fuzzy c-means. We decided on using fuzzy c-means because a fuzzy model fits better the gene expression data analysis. Fuzziness parameter m is a major problem in applying fuzzy c- means method for clustering. In this approach, we applied fuzzy c-means clustering using different fuzziness parameters for two forms of microarray data. Support vector machine with different kernel functions are used for classification. As a result of the experiments conducted on the colon dataset, we have observed that CSVM is able to correctly classify the whole training and test sets when the data is log2 transformed and when in is close to 1.5.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Embedded Intelligent Intrusion Detection: A Behavior-Based Approach 嵌入式智能入侵检测:基于行为的方法
Adrian P. Lauf, R. Peters, W. H. Robinson
{"title":"Embedded Intelligent Intrusion Detection: A Behavior-Based Approach","authors":"Adrian P. Lauf, R. Peters, W. H. Robinson","doi":"10.1109/AINAW.2007.169","DOIUrl":"https://doi.org/10.1109/AINAW.2007.169","url":null,"abstract":"This paper describes the development of an intelligent intrusion detection system for use within an embedded device network consisting of interconnected agents. Integral behavior types are categorized by focusing primarily on inter-device requests and actions rather than at a packet or link level. Machine learning techniques use these observed behavioral actions to track devices which deviate from normal protocol. Deviant behavior can be analyzed and flagged, enabling interconnected agents to identify an intruder based upon the historical distribution of behavioral data that is accumulated about the possible deviant agent. Simulation results from the prototype system correlate detection accuracy with a tunable input tolerance factor.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multi-Agent System for Directed Diffusion in Wireless Sensor Networks 无线传感器网络定向扩散的多智能体系统
H. Malik, E. Shakshuki, Travis DeWolf, M. Denko
{"title":"Multi-Agent System for Directed Diffusion in Wireless Sensor Networks","authors":"H. Malik, E. Shakshuki, Travis DeWolf, M. Denko","doi":"10.1109/AINAW.2007.260","DOIUrl":"https://doi.org/10.1109/AINAW.2007.260","url":null,"abstract":"This paper presents an agent based system to increase the life time of node in Wireless Sensor Networks. In environment where node density is massive, placement is heterogeneous and lot of sensory traffic with redundancy is produced; individual nodes waste limited wireless bandwidth and consume lot of energy. This minimizes their life time on the network. Directed diffusion paradigm for distributed sensing of the environment has stated to deal with the phenomenon. Directed diffusion approach is data centric in that all communication is for named data. All the nodes in the directed diffusion are application aware and achieve energy saving by choosing good paths and processing data in-network. We unmitigated our efforts to augment the node life time in sensor network by introducing mobile agents. Mobile agents can be used to greatly reduce the communication cost, especially over low bandwidth links, by moving the processing function to the data rather than bringing the data to a central processor (sink). Toward this end, we propose an agent based directed diffusion approach.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Engineering Tele-Health Solutions in the Ambient Assisted Living Lab 环境辅助生活实验室中的工程远程医疗解决方案
E. Ras, Martin Becker, J. Koch
{"title":"Engineering Tele-Health Solutions in the Ambient Assisted Living Lab","authors":"E. Ras, Martin Becker, J. Koch","doi":"10.1109/AINAW.2007.173","DOIUrl":"https://doi.org/10.1109/AINAW.2007.173","url":null,"abstract":"Despite the advancement in electronic industry and the high potential of ambient intelligence applications in the domain of tele-health, the task of engineering such systems is non-trivial and convincing solutions are still missing. The engineering challenges to cope with and the inappropriateness of current engineering methods and research approaches complicate the process of tele-health system development. The purpose of this paper is twofold: (i) to list the current research challenges for tele-health systems from an engineering perspective and (ii) to show how we approach the challenges by means of an assisted living laboratory for engineering and evaluation purposes.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信