{"title":"AC-CDS: autonomous collaborative collection, discovery, and sharing of information for mobile users and devices","authors":"Zhang Tao, S. Madhani, E. V. D. Berg, Y. Ohba","doi":"10.1109/ITRE.2005.1503054","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503054","url":null,"abstract":"Mobile users and devices want to discover and share a growing range of information as the processing and storage capacities of mobile devices grow rapidly. For example, users may want to discover the locations of nearby networks and location-based dynamic information contents. A mobile device may want to know the existence and capabilities of neighboring networks and the parameters it needs use to access these networks. This allows the device to intelligently decide which network to use next, and to use its existing network connection to authenticate with a selected neighboring network before it enters the selected network's coverage area (hence significantly reducing handoff delays). Existing service discovery frameworks are not effective in discovering neighboring networks and location-based dynamic user information contents. This paper proposes and evaluates a new approach for real time collection, discovery, and sharing of network and user information, which we refer to as autonomous collaborative information collection, discovery, and sharing (AC-CDS). It is autonomous because regular mobile users and devices act autonomously to collect information and make the information available to others. It is collaborative as the autonomous actions of the mobile users and devices help each other to discover the information they want.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124825686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chih-Yung Chang, Yuh-Shyan Chen, Tai-Chien Kao, J. Sheu
{"title":"Some studies and lessons learned from ad hoc learning","authors":"Chih-Yung Chang, Yuh-Shyan Chen, Tai-Chien Kao, J. Sheu","doi":"10.1109/ITRE.2005.1503147","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503147","url":null,"abstract":"This work proposes concepts, designs, experiences and lessons learned from some studies of ad hoc learning supported by wireless and mobile technologies. The ad hoc learning activity model supports learners communicating with or obtaining help from classmates or teacher, interacting with environment, and accessing teaching material from mobile device or Internet. Example scenarios with prototype systems for ad hoc learning are presented. Preliminary experimental and trial studies are conducted with these example scenarios in elementary and high school students. The potential impacts, limitations, and lessons learned in this study are also discussed from both the educational and technological points of view. Learning in a lively, vivid, and new learning environment, students are motivated with interests for learning the target domains. Ad hoc learning potentially extends the scope of learning activities and with more flexibility than in traditional school curriculum.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130300634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Project based learning as a pedagogical tool for embedded system education","authors":"R. Hsu, Wen-Chung Liu","doi":"10.1109/ITRE.2005.1503143","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503143","url":null,"abstract":"In this paper, a project-based learning strategy is proposed as a pedagogical tool for embedded system education targeting for undergraduate engineering students. The proposed project-based learning can motivate students to integrate and formulate the multi-disciplinary knowledge previous learned into a real-world embedded system project development. To investigate the effectiveness of the project-based learning, a post-project review is conducted for groups of junior-year engineering students participating in embedded system projects development. Post-project review results shown that the knowledge and skill build in earlier learning play major role in the embedded system project development. Evidences also shown that situational factors, such as project subject selection, learning curve of individuals and capability of working under time pressure, are considered influential to the effectiveness of project-based learning in embedded system education as well.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125285181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Canal: a distributed service composition system using mobile agents","authors":"J. Lee, Hung-Chang Hsiao, C. King, A. Banerjee","doi":"10.1109/ITRE.2005.1503163","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503163","url":null,"abstract":"Service composition is the operation of forming a complex service from existing services by discovering, integrating and executing those services. Such an operation is very useful and common in grid computing, especially in e-science. There are many service composition systems, but most of them need a centralized manager to handle the composition. In this paper, we present a fully distributed service composition system. The design of our system is based on a peer-to-peer model and a mobile agent approach to composing the services. We have implemented a platform, called Canal, for composing services. Developers can easily set up their services on the Canal to provide the composite service.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128368912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New working practices: mapping employee work and travel behaviour","authors":"Jasper Lim","doi":"10.1109/ITRE.2005.1503168","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503168","url":null,"abstract":"In recent years, organizations have adopted new working practices for employees in order to achieve competitive advantage and to meet employee demands for better work-life balance. However, up till now, in-depth knowledge concerning the impacts of new working practices on employee work and travel behaviour is limited. Furthermore, the rapid integration of information and communication technology applications into employee work activities has posed many challenges to researchers who are attempting to measure the resulting effects. In this paper, an attempt is been made to mapped out in-depth the work and travel behaviour of two teleworking employees from two different companies using grounded theory method.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127472605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure VLAN construction protocol in wireless ad hoc networks","authors":"Tzone-I Wang, Ching-Hung Yeh, Yueh-Min Huang","doi":"10.1109/ITRE.2005.1503068","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503068","url":null,"abstract":"The virtual local area network (VLAN) technology is one of the hottest areas of networking systems. A VLAN is a logical rather than physical connection that allows network devices to be combined as \"virtual LANs\". By this characteristic, VLAN segment the network into different broadcast domains so that packets are only delivered between ports that are combined for the same VLAN. Wireless ad hoc networks also have the flexibility to collect more than two devices equipped with wireless communication and networking capability. The communications would be needed for some wireless devices but not all devices in an ad hoc network. So an ad hoc network needs to form multiple-group as \"virtual LANs\" to ensure reasonable performance and security. In this paper we propose a secure VLAN construction protocol (SVCP) in wireless ad hoc networks. For eliminating broadcast drawback, source node will serve as a temporary agent to form a VLAN, which generates a group key for secure communications.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128414279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT-graduate abilities: performance gap as an input for curriculum improvement","authors":"Z. Jamaludin, A. A. Mutalib","doi":"10.1109/ITRE.2005.1503139","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503139","url":null,"abstract":"This paper reports one of the initiatives done by the Faculty of Information Technology, Universiti Utara Malaysia in its efforts to improve the IT curriculum. The initiative generates a survey focusing on the employers' perception towards the performance of IT graduates in their workplace. Nineteen IT-related elements have been put forward for evaluation in terms of importance and performance. The evaluation has three objectives namely, (1) gathering the employers' perceptions using questionnaires and interviews, (2) identifying the competency gap between the performance of our graduates as compared to the importance of the identified elements, and (3) proposing steps for improving the IT curriculum in the BIT programme in preparing graduates that are both knowledgeable and marketable. In this paper, we reported the obtained results, the analysis that can be drawn from the results, and the possible action that can be taken to improve the BIT programme.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticated public-key distribution over WLAN/cellular dual networks","authors":"Jing-Shyang Hwu, Rong-Jaye Chen, Yi-Bing Lin","doi":"10.1109/ITRE.2005.1503107","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503107","url":null,"abstract":"Public-key cryptosystems are characterized by the use of two keys, one held privately and the other available publicly. The main concern in a public-key setting is the authenticity of the public key. This authentication problem is typically resolved by the use of verifiable information called certificate, which is issued by a trusted third party and consists of the user name and his public key. The integrated WLAN/cellular networks enable simultaneous access to both cellular network and wireless LAN. This paper proposes a certificate-free public-key distribution scheme over WLAN/cellular dual networks.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131947171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content searching for e-learning applications","authors":"R. Parekh","doi":"10.1109/ITRE.2005.1503063","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503063","url":null,"abstract":"For e-learning to be established as a global practice new innovative means are required to increase their effectiveness. One of these is to use multimedia components instead of simple textual descriptions. In that case content searching becomes a major challenge, as different methodologies need to be incorporated for searching for multimedia components than for text strings. Other associated problems like byte size, simultaneous accessibility, spatial and temporal specifications, content design and updation times, efficiency over bandwidth sensitive networks etc. need also to be considered. This paper proposes including a multimedia database at the back-end of learning systems for handling these problems and also discusses design and implementation issues for developing the same.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated use of Web technologies to deliver a secure collaborative Web portal","authors":"V. Chang","doi":"10.1109/ITRE.2005.1503085","DOIUrl":"https://doi.org/10.1109/ITRE.2005.1503085","url":null,"abstract":"This paper describes the design and operation of the OMII Web site, which has to date, achieved three major targets. The first target is the successful integrations in different technologies (Server 2003+IIS server+SQL server+.NET and SUSE Linux+Apache Server) and standards (W3C/Macromedia and .NET). The second target is the enhancement in authenticating users, Web site security and back-ups and the final target is the development of a working procedure for static Web site development, dynamic .NET development and data migration on the two test servers and another two live Web servers. The Web site supports the easy registration and login, so that registered users can download and install our software.","PeriodicalId":338920,"journal":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123664542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}