2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
A Secure Authentication Scheme of Health Care Based on the Cloud 基于云的医疗安全认证方案
Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu
{"title":"A Secure Authentication Scheme of Health Care Based on the Cloud","authors":"Chin-Ling Chen, Tsai-Tung Yang, Fang-Yie Leu","doi":"10.1109/IMIS.2014.72","DOIUrl":"https://doi.org/10.1109/IMIS.2014.72","url":null,"abstract":"In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing 利用无线传感器和大数据处理技术监测慢性病患者
Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio
{"title":"Chronic Patients Monitoring Using Wireless Sensors and Big Data Processing","authors":"Diego Gachet, Fernando Aparicio, M. Rodríguez, Juan R. Ascanio","doi":"10.1109/IMIS.2014.54","DOIUrl":"https://doi.org/10.1109/IMIS.2014.54","url":null,"abstract":"Developed countries are characterized by aging population and economical crisis, so it is desirable to reduce the costs of public and private healthcare systems. It is necessary to streamline the health system resources leading to the development of new medical services based on telemedicine, remote monitoring of chronic patients, personalized health services, new services for dependants, etc. New medical applications based on remote monitoring will significantly increasing the volume of health information to manage, including data from medical and biological sensors, is then necessary process this huge volume of data using techniques from Big Data. In this paper we propose one potential solution for creating those new services, based on Big Data processing and vital signs monitoring.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANET 基于信用的VANET网络编码合作内容分发激励协议
Ing-Chau Chang, Jacky Lo
{"title":"A Credit-Based Incentive Protocol for Stimulating Network-Coded Cooperative Content Distribution in VANET","authors":"Ing-Chau Chang, Jacky Lo","doi":"10.1109/IMIS.2014.65","DOIUrl":"https://doi.org/10.1109/IMIS.2014.65","url":null,"abstract":"As the high-speed vehicular node passes the coverage area of a road side unit in the vehicular ad hoc network, it may not be able to receive all content information broadcast by the RSU during the short contact duration with the RSU. Hence, when the vehicular node leaves the coverage area of the RSU, it has to adopt the cooperative content distribution approach to share its received content pieces, which are encoded by the network coding technology, with all neighboring nodes. However, these approaches do not consider that vehicular nodes in reality may have different degrees of selfishness and interests on various types of content information, which in turn hinders those selfish nodes from sharing their contents with others. In this paper, we will propose the Social Code scheme, adopting the content bitmap, for each node to calculate the number of different network-coded content pieces, its corresponding re-broadcast priority and the correct number of re-encoded NC content pieces with all neighbor nodes first. Social Code then classifies vehicular nodes into four types and further integrates corresponding credit-based incentive protocols to stimulate nodes' willingness to re-broadcast their content pieces. Finally simulation results show that Social Code outperforms over traditional NC-based cooperative content distribution schemes, if they adopt the credit-based incentive protocols without considering node selfishness and interests.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134637939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The GEO-Cloud Experiment: Global Earth Observation System Computed in Cloud GEO-Cloud实验:云中计算的全球地球观测系统
J. Becedas
{"title":"The GEO-Cloud Experiment: Global Earth Observation System Computed in Cloud","authors":"J. Becedas","doi":"10.1109/IMIS.2014.2","DOIUrl":"https://doi.org/10.1109/IMIS.2014.2","url":null,"abstract":"Earth Observation (EO) is considered a key element in the European Research Roadmap and an opportunity market for the next years. However, this field presents some critical challenges to cover the current demand of services: i) there is massive and large-sized data from Earth Observation recordings, ii) On demand storage, processing and distribution of geo-information generated with the recorded data are required. Conventional infrastructures have the risks of over/under size the infrastructure when big data is used, they are not flexible to cover sudden changes in the demand of services and the access to the information presents large latencies. These aspects limit the use of EO technology for real time use. The use of cloud computing technology can overcome the previously defined limitations. The GEO-Cloud experiment emerged to find viable solutions to provide highly demanding EO services by using future internet technologies. It is a close to reality experiment, part of the FP7 Fed4FIRE project. GEO-Cloud consists of the design, implementation and testing in cloud a complete EO system, from the acquisition of geo-data with a constellation of satellites to its on demand distribution to end users with remote access. This paper presents the GEO-Cloud experiment design, architecture and foreseen research activity.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract) 传感器数据安全利用的隐私保护技术(扩展摘要)
T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda
{"title":"Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract)","authors":"T. Izu, T. Ogura, Y. Sakemi, M. Takenaka, H. Tsuda","doi":"10.1109/IMIS.2014.86","DOIUrl":"https://doi.org/10.1109/IMIS.2014.86","url":null,"abstract":"As the number of scenarios for utilizing sensor data from home appliances, privacy issues such as leakage of private information from sensor data are arising. In this paper, we introduce a new technology, partial decryption, which enables parts of the data to be masked while still encrypted, so other data can be substituted or the encryption key can be changed.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective 从基于语义空间的角度重用支持web的执行器
Aitor Gómez-Goiri, Íñigo Goiri, D. López-de-Ipiña
{"title":"Reusing Web-Enabled Actuators from a Semantic Space-Based Perspective","authors":"Aitor Gómez-Goiri, Íñigo Goiri, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.45","DOIUrl":"https://doi.org/10.1109/IMIS.2014.45","url":null,"abstract":"Ubiquitous Computing is characterized by heterogeneous devices of a dynamic nature. So far, semantics and space-based computing have been widely applied to cope with both aspects. However, the integration of these devices with the web has gained momentum in the last years. Therefore, the seamless reuse of these web-enabled devices drastically increases the actuation possibilities of any application. This paper explores how semantic space-based applications can perform the aforementioned reuse. This exploration is guided by the implementation of a scenario. The scenario shows a neat interoperation between nodes from both worlds: space-based computing and the web. In addition, the generalization of the proposed solution poses new challenges to be tackled.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122361099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Identification of Windows Executable Programs to Prevent Software Piracy
Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han
{"title":"Efficient Identification of Windows Executable Programs to Prevent Software Piracy","authors":"Yesol Kim, Jeongoh Moon, Seong-je Cho, Minkyu Park, Sangchul Han","doi":"10.1109/IMIS.2014.29","DOIUrl":"https://doi.org/10.1109/IMIS.2014.29","url":null,"abstract":"Pirated software used to be distributed through physical exchange. The Internet, however, is increasingly being used to distributed pirate software. P2P networks, one-click hosting site, and bit-torrent indexing site are typical examples. To block illegal distribution of software through the Internet, we must identify software stored and distributed on such sites. In this paper, we propose a new scheme for identifying software. In this scheme, we concentrate on Microsoft Windows applications because most piracy targets MS Windows applications. The scheme analyzes PE header and PE (Portable Executable) is the executable file format of Windows. The scheme translates information in the header such as start address, the size of the initialized data, etc. into the unique value and uses the value to identify software in question. We show the proposed scheme can identify software effectively and efficiently through an experiment with 439 sample executable files.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126069786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Evaluation Environment and Methodology for Automotive Media Streaming Applications 汽车流媒体应用的评估环境与方法
Robert Protzmann, Kay Massow, I. Radusch
{"title":"An Evaluation Environment and Methodology for Automotive Media Streaming Applications","authors":"Robert Protzmann, Kay Massow, I. Radusch","doi":"10.1109/IMIS.2014.38","DOIUrl":"https://doi.org/10.1109/IMIS.2014.38","url":null,"abstract":"Media streaming in automotive environments is becoming more important with the proliferation of 3G/4G technologies and the general demand for consuming Internet content in cars. Especially the rising popularity of Music on Demand and Media Cloud Storage services pushes automotive manufactures efforts to provide decent music streaming capabilities in vehicles. Two major issues have to be tackled to achieve this goal. (1) Weak or even uncovered areas in tunnels, underpasses or urban canyons. (2) Exhausted mobile network capabilities at crowded spots. Buffering can help to overcome the first issue. However, it consequently worsens the second issue due to its additional bandwidth demand. For this reason, the implementation of reasonable music streaming solutions in the car needs novel prefetching algorithms which reduce caching to the minimum and optimize bandwidth sharing between users. In this paper, we present a comprehensive simulation environment and evaluation methodology to develop and assess such prefetching algorithms.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Evaluation of Sleep Scheduling Method for Data Collection from Sensor Networks Divided into Local Areas 局部传感器网络采集数据的睡眠调度方法评价
Masato Nakamura, S. Kimura
{"title":"Evaluation of Sleep Scheduling Method for Data Collection from Sensor Networks Divided into Local Areas","authors":"Masato Nakamura, S. Kimura","doi":"10.1109/IMIS.2014.41","DOIUrl":"https://doi.org/10.1109/IMIS.2014.41","url":null,"abstract":"Various sleep scheduling methods have been proposed to achieve energy efficiency in wireless sensor networks. Although these methods can make most nodes sleep to save energy, they do not give adequate consideration to the amount of data originating in specific areas of the network. The authors proposed a sleep scheduling method that divided a sensor network into an adjustable number of areas to ensure that more than one node remained active in each area, but which required all nodes to be able to access the sink node. However, the conditions of simulation experiments displayed a problem in that all the active sensor nodes sent packets to the sink node at the same time. This paper reports how the problem was solved in fresh evaluations of the proposed method and shows that the proposed method also extends the network lifetime.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127167229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Codesign-Oriented Platform for Agile Internet of Things Prototype Development 面向代码设计的敏捷物联网原型开发平台
Jonathan Ruiz de Garibay, Aitor Almeida, Szilard A. Kados, Adolfo Garcia Corcuera, D. López-de-Ipiña
{"title":"Codesign-Oriented Platform for Agile Internet of Things Prototype Development","authors":"Jonathan Ruiz de Garibay, Aitor Almeida, Szilard A. Kados, Adolfo Garcia Corcuera, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.52","DOIUrl":"https://doi.org/10.1109/IMIS.2014.52","url":null,"abstract":"The Internet of Things offers a growing market open to new products. To be able to take advantages of this opportunity companies need to be able to quickly create prototypes of their products. Given the difficulties that the development of embedded devices presents, both on the hardware and software parts, it is a necessity to create tools that ease this process. In this paper we present a codesign-oriented platform that will help developers to create their prototypes in an agile manner. The presented platform simplifies the usage and integration of standardized peripherals and reduces the complexity of the development process. We also present a prototype created using the platform, showcasing its capabilities.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信