{"title":"A Comparative Analysis of Personalization Techniques for a Mobile Application","authors":"P. Nurmi, Marja Hassinen, K. Lee","doi":"10.1109/AINAW.2007.12","DOIUrl":"https://doi.org/10.1109/AINAW.2007.12","url":null,"abstract":"In order to adapt to the environment of the user, devices have to be able to deduce the user's goals and information needs. In mobile environments, the goals and information needs of the user potentially depend on the user's situation. Existing work on context-dependent user modeling has mainly focused on specific application domains, most notably location-based services such as tourist guides, or on technological enablers. What is currently lacking is an understanding of when and why different personalization techniques work or fail. In this paper, we compare different classification algorithms on data collected from a mobile application. Our results show that methods that are able to learn tree-structured dependencies seem good candidates for personalization due to (i) the inherent hierarchical nature of context information and (ii) the fast running time of the algorithms. We also suggest two future research issues: (1) obtaining a better understanding of the nature of dependencies in contextual data, and (2) using collaborative user modeling techniques to improve the predictive power of user models.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115666759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Password-Based Authentication and Key Establishment Scheme for Mobile Environment","authors":"Jun Liu, J. Liao, Xiaomin Zhu","doi":"10.1109/AINAW.2007.42","DOIUrl":"https://doi.org/10.1109/AINAW.2007.42","url":null,"abstract":"We propose a cost-effective, use-convenient, and well-performing password-based authentication and key establishment scheme by means of IC (integrated circuit) card, RSA cryptography, and discrete logarithm. There doesn't exist any verification (password) table at the server side. To be applicable for the mobile environment, the scheme is designed as a one-roundtrip protocol to reduce the communication consumption over wireless channel. Moreover, the facts that users in this scheme are avoided downloading CRL (certificate revocation list) periodically and change the passwords in use without any interaction with servers over the radio are another two contributing factors to enhance the performance. Making use of queuing model M/G/l/N, we measure the performance of the scheme and compare it with TLS in terms of response time.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124289540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Domain Modelling for Ubiquitous Computing Applications","authors":"A. Harrington, V. Cahill","doi":"10.1109/AINAW.2007.156","DOIUrl":"https://doi.org/10.1109/AINAW.2007.156","url":null,"abstract":"Many Ubiquitous computing applications can be considered as planning and acting problems in environments characterised by uncertainty and partial observability. Such systems rely on sensor data for information about their environment and use stochastic or probabilistic reasoning algorithms to infer system state from sensor data. We propose a domain modelling technique that characterises the sensor and actuator infrastructure and the set of system states in Ubicomp application domains. We capture the location and geometry of all domain model elements and use these spatial properties to tailor system state determination to reflect the quality and spread of the sensor and actuator platform. The domain model is used to support the development of Ubicomp applications and allows us calculate the degree of observability that exists over the state space in the environment. The degree of observability over the state space can act as an input into determining the state inference and action selection algorithms used in Ubicomp systems. In this paper we present the design of our Ubicomp domain model. We show that the proposed model contains information necessary to support Ubicomp application development. The expressiveness of the proposed design has been tested by building a model of an Urban Traffic Control application for Dublin city.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Discovery in Ubiquitous Health Care","authors":"Gautham V. Pallapa, Sajal K. Das","doi":"10.1109/AINAW.2007.313","DOIUrl":"https://doi.org/10.1109/AINAW.2007.313","url":null,"abstract":"Ubiquitous computing is an emerging paradigm for health care environments, in which devices must blend into the background unobtrusively, collaborating to provide value-added services for users. Insufficient information flow and coordination are some of the main concerns in a ubiquitous health care environment. Resources are, therefore, essential to the success of this technology and, as a result, both resource discovery and management play a vital role in sustainable ubiquitous deployment. In this paper, we present a novel resource discovery mechanism for ubiquitous computing environments using Resource Index nodes (RIns) and mobile agents. The context information needed to process a query is identified and mobile agents are deployed to explore the ubiquitous environment for requested resources. We present a health care scenario and evaluate our proposed resource discovery method.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Watanabe, H. Haruki, S. Shimotomai, Takeshi Saito, T. Nagase, Y. Yoshioka, Y. Hasegawa
{"title":"A New Mutable Nonlinear Transformation Algorithm for S-box","authors":"A. Watanabe, H. Haruki, S. Shimotomai, Takeshi Saito, T. Nagase, Y. Yoshioka, Y. Hasegawa","doi":"10.1109/AINAW.2007.36","DOIUrl":"https://doi.org/10.1109/AINAW.2007.36","url":null,"abstract":"This paper proposes a new mutable nonlinear transformation algorithm for AES S-box to enhance the complexity of the S-Box's structure called M_S-box that effectively provides an optimal degree of resistance against differential cryptanalysis and especially the linear cryptanalysis. The structure of the AES S-box has been expanded and modified to be congruent with the proposed algorithm and to obtain good nonlinearity of the S-box. The cryptanalysis of the model is based on the maximum average differential probability (MADP) and maximum average linear hull probability (MALHP). The results show that proposed model significantly improves MADP and MALHP. Furthermore, the results that have been obtained exhibit good enough confusions to achieve high security level.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117229929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow Problem","authors":"Chao Peng, Yasuo Tan, L. Yang","doi":"10.1109/AINAW.2007.266","DOIUrl":"https://doi.org/10.1109/AINAW.2007.266","url":null,"abstract":"The minimum-cost single-source unsplittable flow problem is a single-source multi-commodity flow problem in which each commodity should be shipped only on one single path at the minimum possible cost without violating the capacity of each edge. An outstanding open question on this problem is whether a simultaneous (2,1)-approximation can be achieved for minimizing congestion and cost. But for the general version so far the best possible ratio is (3 + 2radic(2),1). In this paper we present a polynomial-time approximation algorithms which achieves this approximation ratio, our algorithm is more efficient and easier to implement compares to previous algorithms for this problem.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117235549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attractive Feature Reduction Approach for Colon Data Classification","authors":"Mohammed Al-Shalalfa, R. Alhajj","doi":"10.1109/AINAW.2007.103","DOIUrl":"https://doi.org/10.1109/AINAW.2007.103","url":null,"abstract":"In this paper, we try to identify a set of reduced features capable of distinguishing between two classes by performing double clustering using fuzzy c-means. We decided on using fuzzy c-means because a fuzzy model fits better the gene expression data analysis. Fuzziness parameter m is a major problem in applying fuzzy c- means method for clustering. In this approach, we applied fuzzy c-means clustering using different fuzziness parameters for two forms of microarray data. Support vector machine with different kernel functions are used for classification. As a result of the experiments conducted on the colon dataset, we have observed that CSVM is able to correctly classify the whole training and test sets when the data is log2 transformed and when in is close to 1.5.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded Intelligent Intrusion Detection: A Behavior-Based Approach","authors":"Adrian P. Lauf, R. Peters, W. H. Robinson","doi":"10.1109/AINAW.2007.169","DOIUrl":"https://doi.org/10.1109/AINAW.2007.169","url":null,"abstract":"This paper describes the development of an intelligent intrusion detection system for use within an embedded device network consisting of interconnected agents. Integral behavior types are categorized by focusing primarily on inter-device requests and actions rather than at a packet or link level. Machine learning techniques use these observed behavioral actions to track devices which deviate from normal protocol. Deviant behavior can be analyzed and flagged, enabling interconnected agents to identify an intruder based upon the historical distribution of behavioral data that is accumulated about the possible deviant agent. Simulation results from the prototype system correlate detection accuracy with a tunable input tolerance factor.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent System for Directed Diffusion in Wireless Sensor Networks","authors":"H. Malik, E. Shakshuki, Travis DeWolf, M. Denko","doi":"10.1109/AINAW.2007.260","DOIUrl":"https://doi.org/10.1109/AINAW.2007.260","url":null,"abstract":"This paper presents an agent based system to increase the life time of node in Wireless Sensor Networks. In environment where node density is massive, placement is heterogeneous and lot of sensory traffic with redundancy is produced; individual nodes waste limited wireless bandwidth and consume lot of energy. This minimizes their life time on the network. Directed diffusion paradigm for distributed sensing of the environment has stated to deal with the phenomenon. Directed diffusion approach is data centric in that all communication is for named data. All the nodes in the directed diffusion are application aware and achieve energy saving by choosing good paths and processing data in-network. We unmitigated our efforts to augment the node life time in sensor network by introducing mobile agents. Mobile agents can be used to greatly reduce the communication cost, especially over low bandwidth links, by moving the processing function to the data rather than bringing the data to a central processor (sink). Toward this end, we propose an agent based directed diffusion approach.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engineering Tele-Health Solutions in the Ambient Assisted Living Lab","authors":"E. Ras, Martin Becker, J. Koch","doi":"10.1109/AINAW.2007.173","DOIUrl":"https://doi.org/10.1109/AINAW.2007.173","url":null,"abstract":"Despite the advancement in electronic industry and the high potential of ambient intelligence applications in the domain of tele-health, the task of engineering such systems is non-trivial and convincing solutions are still missing. The engineering challenges to cope with and the inappropriateness of current engineering methods and research approaches complicate the process of tele-health system development. The purpose of this paper is twofold: (i) to list the current research challenges for tele-health systems from an engineering perspective and (ii) to show how we approach the challenges by means of an assisted living laboratory for engineering and evaluation purposes.","PeriodicalId":338799,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126833563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}