{"title":"A Bridge Linking Ubiquitous Devices and Grid Services","authors":"Hiroyuki Morohoshi, Runhe Huang, Jianhua Ma, Ying Huang","doi":"10.1109/AINA.2007.7","DOIUrl":"https://doi.org/10.1109/AINA.2007.7","url":null,"abstract":"Grid computing has made rapid strides from their first serving the scientific computing domain to having great impact on the life science area and their use in the daily activities of users from the resource constrained ubiquitous devices such as PDA and mobile phone. To allow ubiquitous devices to use grid services, there is a necessity to having a platform or middleware, a bridge linking the devices to grid services. This paper presents such bridge named BtoG (bridge to grid). The design idea and system architecture are described, a sample application of skin checking, accessing to a skin-expert service from a mobile phone via the proposed bridge, is explained, and evaluation and comparisons with other related platforms are given in the paper.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Node Failures in Substar Reliability of a Star Network- a Combinatorial Approach","authors":"S. Latifi, Venka Palaniappan","doi":"10.1109/AINA.2007.135","DOIUrl":"https://doi.org/10.1109/AINA.2007.135","url":null,"abstract":"The star graph is a hierarchical graph, and rich in containing substars (or graphs with smaller size but with the same topological properties as the original). Given a set of faulty nodes, we determine the ability to recover substars of a given dimension from the original network. A study of the number of faulty nodes that are required to damage every subnetwork of a given size is also presented.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114070033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On slave-slave bridging with non-acknowledged GTS access in 802.15.4 beacon enabled networks","authors":"J. Misic","doi":"10.1109/AINAW.2007.268","DOIUrl":"https://doi.org/10.1109/AINAW.2007.268","url":null,"abstract":"In this paper, we present and analyze non- acknowledged GTS option for interconnection of IEEE 802.15.4 beacon enabled network clusters using ordinary network nodes as bridge nodes. Bridge design involves uplink transmission to the coordinator and downlink transmission to the bridge. Bridge periodically visits source and sink cluster and exchanges data using Guranteed Time Slot (GTS) access. We develop the queuing model for bridging algorithm and present numerically obtained performance results.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121130476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Baldoni, Silvia Bonomi, Leonardo Querzoni, Adriano Rippa, S. Piergiovanni, A. Virgillito
{"title":"Fighting Erosion in Dynamic Large-Scale Overlay Networks","authors":"R. Baldoni, Silvia Bonomi, Leonardo Querzoni, Adriano Rippa, S. Piergiovanni, A. Virgillito","doi":"10.1109/AINA.2007.71","DOIUrl":"https://doi.org/10.1109/AINA.2007.71","url":null,"abstract":"Overlay management protocols have been introduced to guarantee overlay network connectivity in dynamic large- scale peer-to-peer systems. Some of these protocols have been specifically designed to avoid the partitioning of the overlay in large clusters (network breakage) despite massive node failures and the continuous arrivals/departures of nodes (churn). In this paper we identify a second effect connected to churn, namely network erosion. We show how erosion affects overlay network connectivity and point out that even a strongly connected overlay network, when exposed to continuous churn, can be disgregated. More specifically the consequences of erosion are shown, through an experimental study, in the context of overlay management protocols based on the view-exchange technique. We finally propose a connection recovery mechanism to be endowed at each node which is able to collaboratively detect node isolation and the presence of small clusters. This mechanism is shown to be effective in reducing the erosion of an overlay network exposed to continuous churn and to quickly recover its connectivity during stability periods.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-Demand Real-Time Information Dissemination: A General Approach with Fairness, Productivity and Urgency","authors":"Chih-Lin Hu","doi":"10.1109/AINA.2007.102","DOIUrl":"https://doi.org/10.1109/AINA.2007.102","url":null,"abstract":"Modern real-time information dissemination services generate data dynamically and process data requests on demand. Such data or requests are usually valid or useful subject to temporal conditions. This paper devises an efficient on-demand time-critical data broadcast scheme by considering request urgency, service productivity and access fairness, to maintain quality of service and performance. The experimental studies show the proposed scheduling approach is able to achieve low request deadline miss rate and mean access time simultaneously. Its performance is superior to classical EDF and MRF and further better than SIN-k and RxW methods by simply tuning parameters.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Home-Explorer: Search, Localize and Manage the Physical Artifacts Indoors","authors":"Bin Guo, M. Imai","doi":"10.1109/AINA.2007.76","DOIUrl":"https://doi.org/10.1109/AINA.2007.76","url":null,"abstract":"A new system named Home-Explorer is proposed to search and localize physical artifacts in smart indoor environment. Our view is object-centered and sensors are attached to several objects (named smart objects) in the space. Different from others' research, our system tackles not only smart objects but also hidden objects (e.g. no sensor attached objects). Home-Explorer resolves the hidden object problem by reasoning the physical context from smart objects. A series of inference rules are presented for context reasoning. Moreover, in order to deal with the uncertainty problem when estimating the identity of the hidden objects, we present two effective ways: attribute matching mechanism and associated relation method. Besides, to enhance user-friendly, multiple search modes are provided.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123519635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiwen Yu, Norman Lin, Yuichi Nakamura, S. Kajita, K. Mase
{"title":"Fuzzy Recommendation towards QoS-Aware Pervasive Learning","authors":"Zhiwen Yu, Norman Lin, Yuichi Nakamura, S. Kajita, K. Mase","doi":"10.1109/AINA.2007.73","DOIUrl":"https://doi.org/10.1109/AINA.2007.73","url":null,"abstract":"Pervasive learning promises an exciting learning environment such that users can access content and study them at anytime, anywhere, through any devices. Besides delivering the right content to the learner, it is necessary to provide acceptable Quality-of-Service (QoS) guarantees in terms of presenting the content. In this paper, we propose a recommendation approach based on fuzzy logic theory towards QoS-aware pervasive learning. It determines appropriate presentation form of the learning content according to user's QoS requirements and device/network capability. We also propose an adaptive QoS mapping strategy, which dynamically sets quality parameters at running time according to the capabilities of client devices. The experimental results show the proposed approach is feasible and acceptable to enable QoS-aware pervasive learning.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122866798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Quantifying the (In)Security of Networked Systems","authors":"Xiaohu Li, T. Parker, Shouhuai Xu","doi":"10.1109/AINA.2007.138","DOIUrl":"https://doi.org/10.1109/AINA.2007.138","url":null,"abstract":"Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for answering an equally important question: what is the security assurance of a physically or logically networked system when we consider it as a whole? This question is known to be notoriously difficult, and the state-of-the-art is that we know very little about it. In this paper, we make a step towards resolving it with a new modeling approach.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124198051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"4VP: A Novel Meta OS Approach for Streaming Programs in Ubiquitous Computing","authors":"Yaoxue Zhang, Yuezhi Zhou","doi":"10.1109/AINA.2007.6","DOIUrl":"https://doi.org/10.1109/AINA.2007.6","url":null,"abstract":"With the rapid improvements in hardware, software and networks, the computing paradigm has also shifted from mainframe computing to ubiquitous or pervasive computing, in which users can focus on their desired services rather than specific computing devices and technologies. However, the emerging of ubiquitous computing has brought many challenges, one of which is that it is hard to allow users to freely obtain desired services, such as heterogeneous OSes and applications via different light-weight devices. We have proposed a new paradigm, called Transparent Computing, to store and manage the commodity programs including OS codes centrally, while stream them to be run in non-state clients. This leads to a service-centric computing environment, in which users can select the desired services on demand, without concerning these services' administrations, such as their installation, maintenance, management, upgrade, and so on. In this paper, we introduce a novel concept: Meta OS to support such program streaming through a distributed 4VP+ platform. Based on this platform, a pilot system has been implemented and it supports Windows and Linux environments. We verify the effectiveness of the platform through both real deployments and testbed experiments. The evaluation results suggest that 4VP+ platform is a feasible and promising solution for future computing infrastructure in ubiquitous computing.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specifying Kerberos over EAP: Towards an integrated network access and Kerberos single sign-on process","authors":"Saber Zrelli, Y. Shinoda","doi":"10.1109/AINA.2007.130","DOIUrl":"https://doi.org/10.1109/AINA.2007.130","url":null,"abstract":"Kerberos is a widely deployed authentication system used for authenticating users to various types of application services in open networks. Network access on the other hand is a service that is generally handled separately using authentication frameworks based on the extensible authentication protocol (EAP). The EAP protocol specified by the IETF in RFC3748 is well on its way to becoming an industry standard for network access control. It provides an extensible, link layer agnostic protocol for carrying various authentication methods. In this paper, we design the integration of the Kerberos protocol as an authentication method in existing EAP-based authentication frameworks. We define the architectural elements and their interactions, then we specify the encapsulation of Kerberos messages in EAP packets. The use of Kerberos as an EAP authentication mechanism allows institutions managing their individuals using a Kerberos system to re-use the same credentials for network access authentication instead of managing a different set of credentials such as Unix passwords or public key certificates. Moreover, the proposed framework allows users to sign-on in the network as a consequence of successful network access authentication, eliminating the need for additional login procedures necessary for accessing application services.","PeriodicalId":361109,"journal":{"name":"21st International Conference on Advanced Information Networking and Applications (AINA '07)","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}