Third International Conference on Information Technology and Applications (ICITA'05)最新文献

筛选
英文 中文
WiFiAdmin: an intelligent Web-based management environment for wireless networks WiFiAdmin:基于web的智能无线网络管理环境
E. Dimopoulos, Athanasios Panousis, E. Sakkopoulos, A. Tsakalidis
{"title":"WiFiAdmin: an intelligent Web-based management environment for wireless networks","authors":"E. Dimopoulos, Athanasios Panousis, E. Sakkopoulos, A. Tsakalidis","doi":"10.1109/ICITA.2005.311","DOIUrl":"https://doi.org/10.1109/ICITA.2005.311","url":null,"abstract":"Wireless network communities face a number of difficulties due to lack of integration between network and community resources management. In this work, we present a novel solution and we outline the architecture, design and implementation of an intelligent Web based management system for metropolitan area wireless network communities. The system supports multi-user and personalization features combined with wireless node configuration and monitoring, in a portal-like environment. Additionally to the software discussed, a test-bed implementation is presented to confirm platform and software robustness and cost-effectiveness of the proposed solutions. The overall environment is already operational for two years, while user and administrators' feedback has been incorporated into the system in a regular manner. Evaluation of the work has been performed in the online wireless network environment by computer and communication engineers and it strongly indicates that the proposed mechanism is both effective and efficient. Finally, future steps and enhancements are discussed.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124310401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
"Do you know a similar project I can learn from?" Self-monitoring of communities of practice in the cultural sciences “你知道我可以借鉴的类似项目吗?”文化科学实践群体的自我监控
R. Klamma, M. Spaniol, M. Jarke
{"title":"\"Do you know a similar project I can learn from?\" Self-monitoring of communities of practice in the cultural sciences","authors":"R. Klamma, M. Spaniol, M. Jarke","doi":"10.1109/ICITA.2005.1","DOIUrl":"https://doi.org/10.1109/ICITA.2005.1","url":null,"abstract":"There is an overwhelming number of digital media supported projects in the cultural sciences on the Internet. Project managers and participants face the question if they are doing the right things right. Most of them are not trained digital media designers nor are they trained computer and network specialists. Costly consultancy is not an alternative due to the lack of financial support for such activities. The answer on these problems is as in many other cases to get support from the community. Therefore, it is crucial to find people doing similar things. In this paper we introduce MAVIS, an Internet based community information system currently containing information about more than 1,500 projects, Web sites, discussion groups and newsletters all originated in the cultural sciences. Within a theoretic framework of working and learning in the cultural sciences we try to identify different levels of similarities for cultural science projects that may be useful for the community.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124376768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The authorization service in dynamic trust domains 动态信任域中的授权服务
Wu Liu, Jianping Wu, Haixin Duan, Xing Li
{"title":"The authorization service in dynamic trust domains","authors":"Wu Liu, Jianping Wu, Haixin Duan, Xing Li","doi":"10.1109/ICITA.2005.269","DOIUrl":"https://doi.org/10.1109/ICITA.2005.269","url":null,"abstract":"Dynamic trust domains (DTDs) are resource collections of servers and clients distributed over multiple policy domains. These DTDs often wish to define and enforce consistent policies over their underlying domain policies. But there are many problems in distributing the policy to the domains, and these domains may each have different capabilities for enforcing the policy. In this paper, we present a solution to this problem through the authorization service in dynamic trust domains (ASDTD).","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123737336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A European knowledgebase framework for deployment of real time AV-communication in distance teaching 在远程教学中部署实时自动驾驶通信的欧洲知识库框架
J. Stav, H. Tsalapatas
{"title":"A European knowledgebase framework for deployment of real time AV-communication in distance teaching","authors":"J. Stav, H. Tsalapatas","doi":"10.1109/ICITA.2005.13","DOIUrl":"https://doi.org/10.1109/ICITA.2005.13","url":null,"abstract":"The knowledgebase constitutes a new independent European framework for disseminating and deploying pedagogical use of high quality real time audio, video and data communication services into distance learning environments at a larger scale. It is completed in 2006. The information base is supported by an educational network in order to provide effective dissemination of new pedagogical methodologies and new didactical frameworks. It offer improved learning experiences, technical advise based on expert knowledge, good practice based on collective end-user knowledge, train-the-trainer program for teaching personnel, and model recommendations for the wide adoption and effective integration of visual communication into distance training programs. A possible extension of the educational network and the knowledgebase, targeting user groups outside Europe, is discussed.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121599167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The method to choose architectural approaches in the software architecture design phase 在软件架构设计阶段选择架构方法的方法
HyonHee Koh, S. Kung, Jae-Nyon Park
{"title":"The method to choose architectural approaches in the software architecture design phase","authors":"HyonHee Koh, S. Kung, Jae-Nyon Park","doi":"10.1109/ICITA.2005.271","DOIUrl":"https://doi.org/10.1109/ICITA.2005.271","url":null,"abstract":"To design a software system, many architecture styles have to be combined to construct the overall architecture of the system. What to choose among various architecture styles or architectural approaches depends on the fact of what kind of functional or non-functional quality requirements the system should satisfy. In this study, the satisfaction level of system requirements is evaluated through estimation about technical parts of architectural approach, so designers can use the information when they choose architectural approaches in the designing process.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual steganalysis of LSB-encoded natural images lsb编码自然图像的视觉隐写分析
P. Watters, F. Martin, H. S. Stripf
{"title":"Visual steganalysis of LSB-encoded natural images","authors":"P. Watters, F. Martin, H. S. Stripf","doi":"10.1109/ICITA.2005.308","DOIUrl":"https://doi.org/10.1109/ICITA.2005.308","url":null,"abstract":"Contemporary steganographic systems encode hidden messages inside the least significant bit layers of colour natural images. The presence of these messages is difficult to detect through statistical attacks. This study examined whether humans could detect steganography in natural images using a controlled 2AFC discrimination task. While d'>l was observed for colour layers 3-8, layer 1 had a negative d'. Thus, layer 1 embedding is highly resistant to visual attack, since observers were more likely to indicate the presence of steganography in the control image than the embedded image.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122783949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management 资源共享与服务管理的新型硬件实验远程实验室
N. Fujii, N. Koike
{"title":"A New Remote Laboratory for Hardware Experiment with Shared Resources and Service Management","authors":"N. Fujii, N. Koike","doi":"10.1109/ICITA.2005.34","DOIUrl":"https://doi.org/10.1109/ICITA.2005.34","url":null,"abstract":"A new remote laboratory system for hardware experiment has been developed. It employs shared resources and enhanced service management scheme based on the Web services. Wide spread use of the Internet and broadband remote network access capability to the home, motivated us to develop a seamless remote and actual hardware laboratory for hardware design laboratory course. The combinatorial use of FPGA/PC connected test hardware and PC-based measurement equipments such as logic analyzer or pattern generator has make it possible to develop a remote multi-user time-sharing hardware experiment system, where students can perform actual experiments using actual hardware equipments and tools concurrently. The Web-services-based course material distribution, course guidance and report collection system are also developed to realize the remote-laboratory self e-learning system","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A two level lexical stress assignment model for highly inflected Slovenian language 高度屈折的斯洛文尼亚语的两级词汇重音分配模型
T. Sef
{"title":"A two level lexical stress assignment model for highly inflected Slovenian language","authors":"T. Sef","doi":"10.1109/ICITA.2005.48","DOIUrl":"https://doi.org/10.1109/ICITA.2005.48","url":null,"abstract":"The paper presents a two level lexical stress assignment model for out of vocabulary Slovenian words used in our text-to-speech system. First, each vowel is determined, whether it is stressed or unstressed, and a type of lexical stress is assigned for every stressed vowel. Then, some corrections are made on the word level, according the number of stressed vowels and the length of the word. We applied a machine-learning technique (decision trees or boosted decision trees). The accuracy achieved by decision trees significantly outperforms all previous results. However, the sizes of the trees indicate that the accentuation in the Slovenian language is a very complex problem and a simple solution in the form of relatively simple rules is not possible.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements 一个公平的物品交换协议,满足新引入的要求
Hao Wang, He-qing Guo, Manshan Lin, Jianfei Yin
{"title":"A Fair Item-Item Exchange Protocol Satisfying Newly Introduced Requirements","authors":"Hao Wang, He-qing Guo, Manshan Lin, Jianfei Yin","doi":"10.1109/ICITA.2005.14","DOIUrl":"https://doi.org/10.1109/ICITA.2005.14","url":null,"abstract":"Many protocols are designed to guarantee fairness in electronic exchange that is widely used in e-commerce and e-government systems. In spite of the cryptographic view, we tend to view the fairness problem in a more complete vision. First we present a renewed set of requirement definitions for fair protocols. Second we study the encrypted item validation problem and present a simple and effective solution. With these preliminary discussions, we present our new item-item exchange protocol that is the first one to satisfy those newly introduced requirements","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130456134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A nonlinear detection scheme for sinusoid in additive unknown colored Gaussian noise 加性未知有色高斯噪声中正弦波的非线性检测方法
J. Weng
{"title":"A nonlinear detection scheme for sinusoid in additive unknown colored Gaussian noise","authors":"J. Weng","doi":"10.1109/ICITA.2005.36","DOIUrl":"https://doi.org/10.1109/ICITA.2005.36","url":null,"abstract":"A nonlinear detection structure is systematically developed for sinusoid in additive unknown colored Gaussian noise. The proposed scheme has made use of the difference of the spectral peakedness of the observation data. Nonlinear spectrum estimator is employed to evaluate the peakedness of the spectrum. Simulation results indicate that, in addition to some attractive robust features, the proposed scheme also achieves considerably better performance than the conventional energy detector in terms of the error probabilities.","PeriodicalId":371528,"journal":{"name":"Third International Conference on Information Technology and Applications (ICITA'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132437016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信