2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
An Intuitive Computer Forensic Method by Timestamp Changing Patterns 基于时间戳变化模式的直观计算机取证方法
Gyusang Cho
{"title":"An Intuitive Computer Forensic Method by Timestamp Changing Patterns","authors":"Gyusang Cho","doi":"10.1109/IMIS.2014.92","DOIUrl":"https://doi.org/10.1109/IMIS.2014.92","url":null,"abstract":"This proposes an intuitive computer forensic method by timestamp changing patterns of operations on file in Windows NTFS file system. It categorized by seven file operations and has ten distinguishable patterns by their timestamp changes. The distinct timestamp changing patterns make decision on identifying what kind of file operation is performed. Some patterns are easily identified by their distinct timestamp feature intuitively, and some patterns are needed past timestamp to identify the file operation clearly, and some patterns have ambiguity with similar timestamp patterns. With some performed cases, the forensic method is tested and presented for its usage.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124992494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analytical Modeling of IP-based Hierarchical Mobility Management Protocols 基于ip的分层移动管理协议分析建模
Chulhee Cho, Jun-Dong Cho, Jongpil Jeong
{"title":"Analytical Modeling of IP-based Hierarchical Mobility Management Protocols","authors":"Chulhee Cho, Jun-Dong Cho, Jongpil Jeong","doi":"10.1109/IMIS.2014.58","DOIUrl":"https://doi.org/10.1109/IMIS.2014.58","url":null,"abstract":"Cost-effective mobility management for roaming mobile users is very important in providing seamless service on next-generation wireless networks (NGWNs). Various IPv6-based mobility management schemes have been developed which are directly involved with data transfer from Mobile Node (MN). In this paper, two methods for analyzing mobility management schemes are proposed and the signaling transfer and packet delivery procedures for each mobility management scheme are analyzed. The signaling costs of the mobility management schemes are calculated, and the cost of each protocol is analyzed numerically. Our performance evaluation results revealed that the network-based mobility management scheme yields better performance in terms of overall cost.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131875987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of Selected Future Internet Architectures: A Survey 选择未来互联网架构的安全性:调查
R. Khondoker, Beny Nugraha, R. Marx, K. Bayarou
{"title":"Security of Selected Future Internet Architectures: A Survey","authors":"R. Khondoker, Beny Nugraha, R. Marx, K. Bayarou","doi":"10.1109/IMIS.2014.62","DOIUrl":"https://doi.org/10.1109/IMIS.2014.62","url":null,"abstract":"The Internet faces many challenges in terms of flexibility (so called IP bottleneck) as well as host-centric addressing, mobility, self-configuration, self-monitoring, and security. Several Future Internet (FI) architectures have been proposed to address these challenges including expressive Internet Architecture (XIA), Mobility First, Named Data Networking (NDN), NEBULA, and Recursive Inter Network Architecture (RINA). This paper surveys the security solutions of the FIarchitectures based on literatures, prototypes, and demonstrations. It has been found that none of the architectures can fulfill all of the security goals: confidentiality, authentication, integrity and availability. The results of the survey have been verified by the domain experts.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120946024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Large Imbalance Data Classification Based on MapReduce for Traffic Accident Prediction 基于MapReduce的交通事故预测大不平衡数据分类
Seong-hun Park, Young-guk Ha
{"title":"Large Imbalance Data Classification Based on MapReduce for Traffic Accident Prediction","authors":"Seong-hun Park, Young-guk Ha","doi":"10.1109/IMIS.2014.6","DOIUrl":"https://doi.org/10.1109/IMIS.2014.6","url":null,"abstract":"In modern society, our everyday life has a close connection with traffic issues. One of the most burning issues is about predicting traffic accidents. Predicting accidents on the road can be achieved by classification analysis, a data mining procedure requiring enough data to build a learning model. Regarding building such a predicting system, there are several problems. It requires lots of hardware resources to collect traffic data and analyze it for predicting traffic accidents since the data is very huge. Furthermore, data related to traffic accidents is few comparing with data which is not related to them. The numbers of two types of data are imbalanced. The purpose of this paper is to build a predicting model that can resolve all these problems. This paper suggests using Hadoop framework to process and analyze big traffic data efficiently and a sampling method to resolve the problem of data imbalance. Based on this, the predicting system, first of all, preprocess traffic big data and analyzes it to create data for the learning system. The imbalance of created data is corrected by a sampling method. To improve predicting accuracy, corrected data is classified into several groups, to which classification analysis is applied. These analysis steps are processed by Hadoop framework.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Efficient Compression Algorithm for H.264/AVC Intra-prediction Using an Activity Map 基于活动图的H.264/AVC内部预测的高效压缩算法
June Kim, Youngseop Kim, Yong-Hwan Lee, Oh-Jin Kwon, Bonam Kim
{"title":"Efficient Compression Algorithm for H.264/AVC Intra-prediction Using an Activity Map","authors":"June Kim, Youngseop Kim, Yong-Hwan Lee, Oh-Jin Kwon, Bonam Kim","doi":"10.1109/IMIS.2014.25","DOIUrl":"https://doi.org/10.1109/IMIS.2014.25","url":null,"abstract":"H.264/AVC, the international video coding standard developed by ITU-T VCEG and ISO/IEC MPEG, is known to be more efficient than other standards. Higher compression is provided with the parameter block mode of H.264/AVC, but due to its low compression efficiency, researchers tend to ignore the algorithm's intra-prediction coding capability. This study examined this overlooked aspect to determine its impact on compression efficiency and identify potential adverse effects. This paper proposes a novel algorithm to boost efficiency using an activity map for the pixel unit of respective prediction block in conjunction with specific thresholds. Experimental results reveal that compared to the existing H.264/AVC algorithm, the proposed algorithm shows a significant improvement of over 0.35% in the compression efficiency without any increase in overall encoding time and PSNR complexity.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128506799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cognitive Management Systems 认知管理系统
L. Ogiela, M. Ogiela
{"title":"Cognitive Management Systems","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/IMIS.2014.23","DOIUrl":"https://doi.org/10.1109/IMIS.2014.23","url":null,"abstract":"Computer interpretation and description of the data can be used in the tasks aimed to perform the semantic analysis of particular information. This paper will present a new classes of cognitive information systems supporting various interpretation tasks, as well as analysis and management of data, based on the semantic meaning. Such information systems may be very useful in the tasks supporting interpretation, and management of information in different economical application. The aim of the semantic analysis in cognitive systems, is to identify those factors and characteristics of the analyzed information, the basis of which it is possible to carry out processes of explicit economic information analysis, and forecasting future enterprises states and business characteristics.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116670470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How Does the Ratio and Part-Time Situation of Independent Directors Affect Firm Performance? 独立董事比例和兼职情况对公司绩效的影响?
Ying-Li Lin, Hsiu-Feng Huang, Shu Chen Chen
{"title":"How Does the Ratio and Part-Time Situation of Independent Directors Affect Firm Performance?","authors":"Ying-Li Lin, Hsiu-Feng Huang, Shu Chen Chen","doi":"10.1109/IMIS.2014.85","DOIUrl":"https://doi.org/10.1109/IMIS.2014.85","url":null,"abstract":"Firms with good corporate governance and enterprise have robust systems in order to enhance business performance. Government formulates laws for the purpose of preventing malpractice arising from lack of good corporate governance. This paper intends to examine how the ratio and part-time situation of independent directors affect firm performance. Empirical results show that ratio of independent directors seats has significant impact on non-electronic industry. As for the electronics industry, the more part-time situation of independent directors, the more detraction from the effectiveness of supervision, Non-electronic industry, on the contrary, the more independent directors part-time situation, the better corporate performance.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PasDroid: Real-Time Security Enhancement for Android PasDroid: Android的实时安全增强
S. W. Hsiao, Shih-Hao Hung, Roger Chien, C. Yeh
{"title":"PasDroid: Real-Time Security Enhancement for Android","authors":"S. W. Hsiao, Shih-Hao Hung, Roger Chien, C. Yeh","doi":"10.1109/IMIS.2014.28","DOIUrl":"https://doi.org/10.1109/IMIS.2014.28","url":null,"abstract":"As the number of Android devices increased dramatically in recent years, the number of malware targeted for Android also has spiked up. Among the security risks brought by or the consequences caused by Android malware, the leakage of sensitive information becomes the majority. Current Android system only offers users a permission granting mechanism in the application installation time. Although some vendors place further mechanisms to let users grant or revoke the permissions at any time, the users still cannot distinguish if any data have been normally transmitted or intentionally leaked by the applications. Based on Taint Droid, we created a real-time security scheme on Android, called PasDroid, to trace dubious data flow and to alert the users with information for judging if a transmission should be allowed or not.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121784677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Cross-Layer Design Scheme Based on Integrated Management Applied in Wireless Communication 基于集成管理的跨层设计方案在无线通信中的应用
L. Yao, Fei Song, Hongke Zhang
{"title":"A Cross-Layer Design Scheme Based on Integrated Management Applied in Wireless Communication","authors":"L. Yao, Fei Song, Hongke Zhang","doi":"10.1109/IMIS.2014.96","DOIUrl":"https://doi.org/10.1109/IMIS.2014.96","url":null,"abstract":"The article's central objective is to solve the mobility problem in wireless communications. In the service acquiring process of mobile terminals, wireless communications are asking more requirements for mobile handover. This paper proposes a Cross-layer Scheme based on Integrated Mobility Management (CSIMM) to reduce the handover latency and provide the high transmission performance. The main idea is to realize the uniform authentication and trigger the association of MAC layer and IP layer at the same time by incorporating the Control And Provisioning of Wireless Access Points and Proxy Mobile Internet Protocol version 6. A mathematical model is developed as well. The performance results show that our scheme is superior to those existing inter-domain handover methods in the term of the access and handover latency.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122370168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on the Performance of Electronic Reservation Services 电子预订服务绩效的比较研究
M. Huang, Zhaoxi Liu, Perng-Fei Huang
{"title":"A Comparative Study on the Performance of Electronic Reservation Services","authors":"M. Huang, Zhaoxi Liu, Perng-Fei Huang","doi":"10.1109/IMIS.2014.81","DOIUrl":"https://doi.org/10.1109/IMIS.2014.81","url":null,"abstract":"This study aims to understand how customers perceive the value of the electronic reservation services and how the perception influences their acceptance intention toward the services. Four potential factors (perceived ease of use, usefulness, negativity, and compatibility) are incorporated to examine their impacts on customers' acceptance of the three electronic reservation services (Internet, telephone, and interactive voice response). The comparisons among the three reservation services about their relative position in each influencing factor are also evaluated. Liner regression and ANOVA were employed to analyze data among 140 usable surveys. The results reveal that perceived ease of use, usefulness, negativity, and compatibility are all related to customers' acceptance of the three electronic services. However, perceived negativity turns to insignificant when considering all the variables simultaneously. The results also indicate that telephone is the least and Internet is the most negative tool for making reservations.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127867820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信