2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid Index 利用分层网格索引的无线传感器网络Top-k查询
Jine Tang, Zhenhua Wang, Yunchuan Sun, Chu Du, Zhangbing Zhou
{"title":"Top-k Queries in Wireless Sensor Networks Leveraging Hierarchical Grid Index","authors":"Jine Tang, Zhenhua Wang, Yunchuan Sun, Chu Du, Zhangbing Zhou","doi":"10.1109/IMIS.2014.51","DOIUrl":"https://doi.org/10.1109/IMIS.2014.51","url":null,"abstract":"In the Internet of Things, smart things communicate with each other, and sensed data are aggregated and queried for satisfying certain requests of end-users. Wireless sensor networks (WSN) is a key enabling technique for achieving the vision of the Internet of Things. In real applications of WSN, such as environmental monitoring and vehicle tracking, they may require to launch spatial queries for collecting sensory data to achieve certain goals. Among various queries, top-k query is one of the fundamental operators in many applications of wireless sensor networks for phenomenon monitoring. In this paper we propose a novel top-k query algorithm based on hierarchical grid index and range filter of head nodes, which is able to filter out as many unlikely top-k results as early as possible within the network from transmission.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134293450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth 基于ZigBee和蓝牙的普适医疗保健系统移动网关
T. Laine, Chaewoo Lee, Haejung Suk
{"title":"Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth","authors":"T. Laine, Chaewoo Lee, Haejung Suk","doi":"10.1109/IMIS.2014.17","DOIUrl":"https://doi.org/10.1109/IMIS.2014.17","url":null,"abstract":"A ubiquitous health care system takes the advantage of portability and small size of wireless sensor nodes to provide remote health care services and real-time health monitoring. A gateway is needed to mediate communication between a local sensor network and remote data consumers. In current implementations of ubiquitous health care systems ZigBee-based sensors are often used to gather vital sign data such as ECG and heart rate. Transferring large quantities of vital signs from a ZigBee-based sensor sink node to a gateway requires a bandwidth that ZigBee alone is not able to provide. In this paper, we present a technical design of a Bluetooth-based mobile gateway that bridges the connection between a sensor network and the Internet. Our system enables ubiquitous health care experience while providing a platform for additional services such as alarms, notifications and analysis of medical data. Controlling a sensor network from the mobile gateway is also possible. The flexible design of the system does not restrict its usage only to health care services - the gateway can be configured to work with any kind of sensor network having a sink node with Bluetooth capability.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130938665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
The Effect of TDMA Frame Size and the Hidden Node Problem on the Performance of a Neighbor-Aware VANET MAC TDMA帧大小和隐节点问题对邻居感知VANET MAC性能的影响
M. J. Booysen, G. Rooyen
{"title":"The Effect of TDMA Frame Size and the Hidden Node Problem on the Performance of a Neighbor-Aware VANET MAC","authors":"M. J. Booysen, G. Rooyen","doi":"10.1109/IMIS.2014.40","DOIUrl":"https://doi.org/10.1109/IMIS.2014.40","url":null,"abstract":"Despite various proposed Medium Access Control (MAC) approaches, efficient medium access in VANET remains a significant challenge for the broadcast of safety messages. A key contributing factor, especially with the high node mobility apparent in VANET, is the hidden terminal problem. Since the hidden terminal problem is fundamentally a problem of lack of awareness, increased neighbor awareness at the MAC layer has been suggested as a possible solution. An increased awareness of neighboring nodes' slot allocation requires an increased number of TDMA slots. In this paper we evaluate the impact of TDMA frame size in a neighbor-aware MAC. An analytical model is developed to support the simulation results, based on a geographical probability of RF interference and the slot allocation scheme used in the TDMA MAC. The results show that the packet delivery increases with increased TDMA frame size to support neighbor awareness, as the probability for packet collisions decrease. Packet delivery decreases with increases in neighbor count, since more nodes cause packet collisions. The receiver throughput initially increases as TDMA frame size is increased, since more transmission opportunities occur, and packet delivery increases. However, when the TDMA increases beyond an optimal, throughput is adversely affected by underutilization. Despite the decrease in packet delivery ratio, receiver throughput is higher for more nodes.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132688128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Construction of Scholarly n-Gram from Huge Text Data 基于海量文本数据的学术n-Gram构建
Myunggwon Hwang, Ha-neul Yeom, Mi-Nyeong Hwang, Hanmin Jung
{"title":"Construction of Scholarly n-Gram from Huge Text Data","authors":"Myunggwon Hwang, Ha-neul Yeom, Mi-Nyeong Hwang, Hanmin Jung","doi":"10.1109/IMIS.2014.4","DOIUrl":"https://doi.org/10.1109/IMIS.2014.4","url":null,"abstract":"The ultimate goal of this research is to provide n-gram data that is specialized for scholarly utilization. To this end, this paper outlines the construction of a scholarly n-gram through the processing of large text documents. Many researchers, especially non-native English language speakers, find it difficult to construct sentences and paragraphs with appropriate and disambiguated words. One of the methods that can assist them is the provision of n-gram data. A representative n-gram known as Web 1T 5-Gram Version 1, which was constructed by processing virtually all documents retrieved using Google, already exists. However, this data contain unfocused word recommendations, therefore, they are not suitable. Consequently, we are constructing a scholarly n-gram. In this paper, we demonstrate the efficiency of n-gram using Web 1T unigram and introduce and discuss the specifics of our research plan related to scholarly n-gram.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131842281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network 基于代理组签名的无线MESH网络匿名认证方案
Tianhan Gao, Qidi Miao, Nan Guo
{"title":"Anonymous Authentication Scheme Based on Proxy Group Signature for Wireless MESH Network","authors":"Tianhan Gao, Qidi Miao, Nan Guo","doi":"10.1109/IMIS.2014.78","DOIUrl":"https://doi.org/10.1109/IMIS.2014.78","url":null,"abstract":"Wireless MESH Network (WMN) has become an important technology and has been widely deployed due to its simplicity, low cost, and flexibility in implementation. WMN is a wireless multi-hop network, therefore the privacy protection is extremely important. This paper proposes an anonymous access authentication scheme based on the proxy group signature. The scheme completely protects user's privacy during authentication. In order to improve the efficiency of our scheme, we further adopt certificate-based signature mechanism to design a highly efficient handover authentication protocol. Finally, we show the security analysis of our scheme.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Efficiency of Bandwidth Expansion Algorithms in Wireless Communication Systems 无线通信系统中带宽扩展算法的能量效率
Yung-Fa Huang, Chuan-Bi Lin, Chia-Chi Chang, Che-Hao Li, Ching-Mu Chen
{"title":"Energy Efficiency of Bandwidth Expansion Algorithms in Wireless Communication Systems","authors":"Yung-Fa Huang, Chuan-Bi Lin, Chia-Chi Chang, Che-Hao Li, Ching-Mu Chen","doi":"10.1109/IMIS.2014.67","DOIUrl":"https://doi.org/10.1109/IMIS.2014.67","url":null,"abstract":"In this paper, the effective bandwidth expansion schemes are investigated to improve the performance of energy efficiency for the Orthogonal Frequency Division Multiplexing (OFDM) wireless communication systems. Three Improved Energy Efficient Bandwidth Expansion (IEEBE) schemes are proposed to assign the available system bandwidth for users. With an exhausted method, the energy efficient Bandwidth Expansion Coefficient (BEC) can be found. Thus the energy efficient performance of the IEEBE is superior to the Same Bandwidth Expansion (SBE). Three methods of pairs, grouping and two-layer grouping are proposed to effectively find the BEC for users based on IEEBE. Simulation results show that two-layer grouping (TLG) outperforms the other two methods and improves Energy Reduction Factor (ERF) by 8.9 % to the SBE.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115714729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using Probabilistic Broadcast 基于概率广播的移动无线自组网传播分析
Daniel Gutiérrez-Reina, S. T. Marín, E. Asimakopoulou, N. Bessis, F. Barrero
{"title":"A Dissemination Analysis in Mobile Wireless Ad Hoc Networks Using Probabilistic Broadcast","authors":"Daniel Gutiérrez-Reina, S. T. Marín, E. Asimakopoulou, N. Bessis, F. Barrero","doi":"10.1109/IMIS.2014.15","DOIUrl":"https://doi.org/10.1109/IMIS.2014.15","url":null,"abstract":"Broadcast schemes play an important role in the performance of mobile ad hoc networks. They are widely used as a dissemination mechanism and as a part of the discovery phase of routing protocols. The simple flooding algorithm is the usual mechanism employed in mobile ad hoc networks, but it has been demonstrated its inefficiency in congested scenarios due to the high number of collisions and contentions. These problems can be partially alleviated by using a probabilistic broadcast scheme in which every node forwards the incoming packets according to a certain forwarding probability. In this paper we use the simple probabilistic broadcast scheme to evaluate the effects of congestion on the performance of broadcasting in ad hoc networks through a mediation analysis. We hypothesize that the congestion mediates in the relationship between the forwarding probability (independent variable) and the output metric (dependent variable). The simulation results prove the existence of the mediating effects and how such effects are counterbalanced depending on the target use of the probabilistic broadcast scheme.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Privacy-Preserving Method for Matching Location Data 一种新的位置数据匹配隐私保护方法
Mebae Ushida, Yuji Yamaoka, Kouichi Itoh, H. Tsuda
{"title":"New Privacy-Preserving Method for Matching Location Data","authors":"Mebae Ushida, Yuji Yamaoka, Kouichi Itoh, H. Tsuda","doi":"10.1109/IMIS.2014.89","DOIUrl":"https://doi.org/10.1109/IMIS.2014.89","url":null,"abstract":"The development of the GPS has recently increased the demand for the beneficial services from the mobile users' location data. If the location data are collected from various organizations, more beneficial services will be provided. However, the organizations are never able to share their location data, because they must avoid their users' privacy information leakage. Therefore, we propose a new system that (i) organizations transform the location data into secured location data that protects users' location information and send them to the third party called mediator and, (ii) the mediator provides beneficial services from the secured location data. We focus on the service that the mediator finds users who are nearby from all users over multiple organizations (one-to-many private location matching). In previous techniques, a user can judge another user (e.g., his/her friend) is close or not by using the secured location data (one-to-one private location matching). We also propose a new scheme that the mediator can perform one-to-many matching without users' privacy information leakage. Our scheme is the first result that realizes one-to-many matching without users' huge task and leaking their privacy.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115976934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Minimum Cost Content Object Reconstruction in Multi-tier Servers 多层服务器中最小成本内容对象重构
Lung-Pin Chen, Chih-Wei Hsieh, Fang-Yie Leu
{"title":"Minimum Cost Content Object Reconstruction in Multi-tier Servers","authors":"Lung-Pin Chen, Chih-Wei Hsieh, Fang-Yie Leu","doi":"10.1109/IMIS.2014.76","DOIUrl":"https://doi.org/10.1109/IMIS.2014.76","url":null,"abstract":"An Internet web application is comprised of dynamic web objects that are updated from time to time. This work investigates the placement of web objects over multi-tier servers in which each host can obtain an object by constructing locally, or via a network transmission from the upstream host. The cost of maintaining web objects consists of the computing resources used for constructing objects as well as the network bandwidth used for object delivery. This paper develops a new efficient algorithm to find the minimum cost object placement strategy.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes 基于匿名凭证的业务流程隐私保护身份验证
Nan Guo, Y. Jin, Kangbin Yim
{"title":"Anonymous Credential-Based Privacy-Preserving Identity Verification for Business Processes","authors":"Nan Guo, Y. Jin, Kangbin Yim","doi":"10.1109/IMIS.2014.80","DOIUrl":"https://doi.org/10.1109/IMIS.2014.80","url":null,"abstract":"During the execution of a business process users need to be authenticated by multiple component service providers, while their identities need to be shared and propagated across multi-domain in a privacy-preserving fashion. An anonymous credential-based identity verification scheme is proposed to address privacy issue. Users establish trust relationship with the federation by running the enrollment protocol, which is based on zero-knowledge proof of a set of committed attributes. The IdP cannot learn identity-related information about the user. Anonymous credentials issued by the IdP allow users to selectively disclose attributes as required and prove them in an untraceable and unlinkable way, where the IdP cannot trace the showing of credential and component service providers cannot address multiple transactions to the same user even if they collude either. With the proposed attributes proof protocols, users can prove AND and OR relation over multiple attributes, and interval and inequality relation over a single attribute as well.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123596544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信