2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Data De-duplication on Similar File Detection 基于相似文件检测的重复数据删除
Yueguang Zhu, Xingjun Zhang, Runting Zhao, Xiaoshe Dong
{"title":"Data De-duplication on Similar File Detection","authors":"Yueguang Zhu, Xingjun Zhang, Runting Zhao, Xiaoshe Dong","doi":"10.1109/IMIS.2014.9","DOIUrl":"https://doi.org/10.1109/IMIS.2014.9","url":null,"abstract":"At present, there exist many bottlenecks in block level data de-duplication on the metadata management and read/write rate. In order to achieve higher de-duplication elimination ratio, the traditional way is to expand the range of data for data de-duplication, but that would make metadata fields longer and increase the number of metadata entries. When detecting the redundant data, metadata needs to be constantly imported and exported into the memory and access bottleneck will be produced. So it is necessary to detect similar documents to classify valuable data for de-duplication. In this paper, we propose a new method of block-level data de-duplication combined with similar file detection. At the time of guaranteeing the de-duplication elimination ratio, we narrow the range of data to reduce the metadata and eliminate performance bottlenecks. We present a detailed evaluation of our method and other existing data deduplication methods, and we show that our method meets its design goals as it improves the de-duplication ratio while reducing overhead costs.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132330074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Keyword-Based SPARQL Query Generation System to Improve Semantic Tractability on LOD Cloud 基于关键字的SPARQL查询生成系统提高LOD云上的语义可追溯性
Soyeon Im, Mye M. Sohn, Sunghwan Jeong, Hyun Jung Lee
{"title":"Keyword-Based SPARQL Query Generation System to Improve Semantic Tractability on LOD Cloud","authors":"Soyeon Im, Mye M. Sohn, Sunghwan Jeong, Hyun Jung Lee","doi":"10.1109/IMIS.2014.95","DOIUrl":"https://doi.org/10.1109/IMIS.2014.95","url":null,"abstract":"As the number of RDF triples on the Linking Open Data (LOD) Cloud has been exponentially increased, the difficulties of information query have been increased. To query information on the LOD Cloud, the users have to have some capabilities for developing SPARQL and/or RDQL query statements and exact knowledge for web resources with RDF such as URI, DB title, and name of things. However, it is almost impossible to require the capabilities and/or knowledge to the users who are familiar with keywords search. So, we propose fully automated keyword-based SPARQL query generation system. In our system, the users can query information on the LOD Cloud without having capabilities about structured query language and having prior knowledge of web resources with RDF. The users should type a set of keywords into our system. To do so, we developed a property-based path finding algorithm and an automated SPARQL query generation that can be used to provide query recommendations for the users. In the experimental section, we illustrate an example to validate the effectiveness of our system, and perform a simulation to show the superiority of the algorithms. The experiment results are not bad for a first attempt. If we improve the algorithms, we can expect a better result.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127611400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Conceptual Similarity Calculation Using Common-Context between Comparatives on Ontology 基于本体比较词的概念相似度计算
Hyun Jung Lee, Mye M. Sohn
{"title":"Conceptual Similarity Calculation Using Common-Context between Comparatives on Ontology","authors":"Hyun Jung Lee, Mye M. Sohn","doi":"10.1109/IMIS.2014.12","DOIUrl":"https://doi.org/10.1109/IMIS.2014.12","url":null,"abstract":"For effective searching of appropriate information, it is necessary to well organize data to access and store in database. So, we adopt a case structure as a formalized data form. Web resources are transformed into cases which help information processing and accessing. In addition, we define common-context which are shared concepts by comparatives and propose a common-context-based conceptual similarity through arc compression on ontology. Arc-based conceptual distance between comparative nodes is calculated under consideration of common-context. One of comparatives comes from the user requirements and another from indexes of a case. The distance is contingent upon consideration of common-context. The 'Node Compression (NC)' and 'Arc Compression (AC)' are proposed to support the dynamicity of similarity. NC is conducted between adjacent common-context nodes and leads calculation of conceptual distance between comparatives. AC is processed between non-adjacent common-context nodes. The conceptual arc compression is conducted by Weighted Partial Ontology (WPO) based on weights of arcs under consideration of common-context. The proposed NC and AC support to return conceptual distance between comparatives because it increases the concept-based reliability of search result. To verify the effectiveness, the proposed conceptual similarity is compared with that of edge-counting similarity method. We show that the proposed conceptual similarity calculation leads a higher similarity value for conceptually close classes compared with other methods.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133277923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Windows Installer Package Files for Detection of Pirated Software 识别Windows安装包文件检测盗版软件
Dongjin Kim, Yesol Kim, Jeongoh Moon, Seong-je Cho, Jinwoon Woo, I. You
{"title":"Identifying Windows Installer Package Files for Detection of Pirated Software","authors":"Dongjin Kim, Yesol Kim, Jeongoh Moon, Seong-je Cho, Jinwoon Woo, I. You","doi":"10.1109/IMIS.2014.36","DOIUrl":"https://doi.org/10.1109/IMIS.2014.36","url":null,"abstract":"Nowadays, pirated software is being illegally distributed in various ways such as websites, peer-to-peer (P2P) networks, blogs, and so on. In order to prevent such illegal distribution of software, it is necessary to identify application programs and filter illegally distributed software online. Unfortunately, the existing methods fail to find pirated software, which is delivered in an installer package file format, because they mainly handle executable file formats. Motivated by this, we propose an efficient identification method for detecting pirated software circulated in the Windows installer package format (.msi file), a representative installer package file format of Windows. Our experiment shows that the proposed method identifies well the programs in the Windows installer package format, thereby defending against unlawful software distribution.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133305575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploiting the Internet of Things for Systems Engineering: Breaking Down the Barriers between Siloed Engineering Teams 为系统工程开发物联网:打破孤立的工程团队之间的障碍
Ian Giblett
{"title":"Exploiting the Internet of Things for Systems Engineering: Breaking Down the Barriers between Siloed Engineering Teams","authors":"Ian Giblett","doi":"10.1109/IMIS.2014.53","DOIUrl":"https://doi.org/10.1109/IMIS.2014.53","url":null,"abstract":"Sprint is an FP7 funded research project which looks to deal with the interoperability challenges facing Systems engineering with the advent of increased complexity. The Sprint acronym stands for \"Software Platform for the Integration and Engineering of Things\". 'Things' could be virtual or physical components that can be referenced and worked with during the development lifecycle of an engineering project. The purpose of this paper is to make the case for better collaboration and propose a solution which could be implemented.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"673 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116104436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Semantic Techniques for Intelligent Computing 智能计算的语义技术研究
Myunggwon Hwang, Mi-Nyeong Hwang, Hanmin Jung
{"title":"On Semantic Techniques for Intelligent Computing","authors":"Myunggwon Hwang, Mi-Nyeong Hwang, Hanmin Jung","doi":"10.1109/IMIS.2014.13","DOIUrl":"https://doi.org/10.1109/IMIS.2014.13","url":null,"abstract":"Intelligent computing requires extensive knowledge containing possibly all of information and intelligence utilizing the knowledge. These two requirements have close interactions with each other. This paper takes a look at various kinds of research on intelligent computing from the perspective of semantic techniques and examines core works for the present and the future.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115903084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indoor Taxi-Cab: Real-Time Indoor Positioning and Location-Based Services with Ekahau and Android OS 室内出租车:基于Ekahau和Android操作系统的实时室内定位和位置服务
Caner Kilinc, S. A. Mostafa, Raihan ul Islam, Kashif Shahzad, K. Andersson
{"title":"Indoor Taxi-Cab: Real-Time Indoor Positioning and Location-Based Services with Ekahau and Android OS","authors":"Caner Kilinc, S. A. Mostafa, Raihan ul Islam, Kashif Shahzad, K. Andersson","doi":"10.1109/IMIS.2014.99","DOIUrl":"https://doi.org/10.1109/IMIS.2014.99","url":null,"abstract":"Positioning and routing in outdoors environment is still challenging especially in complex buildings, where a number of buildings are combined with tunnels and bridges, and the GPS signal is unreachable. Looking for a particular room in an unfamiliar huge indoor environment or a product in an enormous store is time wasting and a real life problem that everybody faces on a daily basis. This paper presents a solution using the Ekahau positioning system and Android OS with an intermediary server, which acts between these two systems to provide actual room level positioning by a mathematical modeling technique. The system also provides the shortest path to a target destination by using Dijkstra's search algorithm. The optimal distance between the locations is modeled based on the Taxi-cab geometry distance definition for the mobile clients. Additionally, the users can also display the shortest path for items in the vicinity such as coffee machines, etc. The proposed solution has been evaluated in a real life setting at basement floor level.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Visualization of SSL Setting Status Such as the FQDN Mismatch SSL设置状态可视化,如FQDN不匹配
Yuji Suga
{"title":"Visualization of SSL Setting Status Such as the FQDN Mismatch","authors":"Yuji Suga","doi":"10.1109/IMIS.2014.88","DOIUrl":"https://doi.org/10.1109/IMIS.2014.88","url":null,"abstract":"In 2009, researchers released details of a vulnerability in the SSL and TLS protocols that could allow Man-in-the-Middle attacks to be carried out. IETF published countermeasures with unprecedented speed as RFC5746, however server-side implementations are not deployed because of problems in business such as the loss of opportunities and backward compatibilities. An efficient DOS attack tool using this vulnerability launched by hacker group. Also, an update that blocks RSA keys less than 1024 bits, which it is recognized should only be used by those understanding the risks involved distributed in August 2012. In November 2012, NISC published a concrete transitioning plan on government systems. Thus measures to be considered are present in the handling of SSL/TLS servers. We went crawling using SSLyze the status of measures above vulnerabilities. This paper also proposes visualization methods to understand the latest status and the statistics for geographical regions.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers 针对云数据中心的自适应隐身能量相关DoS攻击
F. Palmieri, M. Ficco, Aniello Castiglione
{"title":"Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers","authors":"F. Palmieri, M. Ficco, Aniello Castiglione","doi":"10.1109/IMIS.2014.33","DOIUrl":"https://doi.org/10.1109/IMIS.2014.33","url":null,"abstract":"The effects of energy-related Denial of Service (DoS) attacks on modern large-scale cloud data centers may involve not only the availability or quality of the service delivered through these infrastructures, but also their operational costs in terms of energy bill. Specifically, the longer is the time needed to detect the attack, the higher is the impact on the overall energy consumption and hence on the related expenses. Therefore, particular attention has to be paid for low-rate DoS attacks. They aim at minimizing their visibility, and at the same time, can be as harmful as the more traditional DoSs or even worse. These sophisticated attacks are tailored to induce the worst-case energy demands on the target system by leveraging properly crafted low-rate traffic patterns. In this work, we introduce a strategy for orchestrating adaptive variable-rate attacks that dynamically change their offending patterns and packet rate in order to minimize their detectability and maximize their energy-related impact, by wasting as much energy as possible. We describe both the details behind the proposed strategy, and analyze its potential effects on typical servers operating within large-scale cloud data center infrastructures.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128194953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Thermal-Aware Task Placement with Dynamic Thermal Model in an Established Datacenter 基于动态热模型的数据中心热感知任务布置
Zhigang Jiang, Wei Huang, I. You, Zhuzhong Qian, Sanglu Lu
{"title":"Thermal-Aware Task Placement with Dynamic Thermal Model in an Established Datacenter","authors":"Zhigang Jiang, Wei Huang, I. You, Zhuzhong Qian, Sanglu Lu","doi":"10.1109/IMIS.2014.1","DOIUrl":"https://doi.org/10.1109/IMIS.2014.1","url":null,"abstract":"Cooling system is one of the key components in data centers and consumes nearly half of the total energy. For the safety and efficiency of a data enter, cooling system should guarantee all the servers running in a suitable temperature. Thus, the cooling efficiency becomes lower as the occurrence of hot spots, because the whole cooling system will accordingly work in a strong cooling mode, which leads to overcooling. One of the key challenges toward this problem is to build an effective and efficient online task scheduling to balance the inlet temperature of the servers in a data enter. In this paper, we investigate the thermal model in a data enter, and we formulate the task placement problem to an optimization problem with the purpose to minimize the maximum inlet temperature of all servers. To get higher accuracy, we proposed a dynamic thermal model updated with the real data from temperature sensors. We solve the formulated problem in an approximate way and design a first-fit decreasing task placement algorithm with the idea of CPU budget. Finally, the effectiveness and accuracy of our algorithm are confirmed by experiments on a real test bed.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"77 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信