2012 26th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Development of Human-Like Agent to Support Lecture Presentation Using a Wireless Device and Image Processing Technology 利用无线装置及影像处理技术开发支持演讲的类人智能体
Youji Ochi
{"title":"Development of Human-Like Agent to Support Lecture Presentation Using a Wireless Device and Image Processing Technology","authors":"Youji Ochi","doi":"10.1109/WAINA.2012.209","DOIUrl":"https://doi.org/10.1109/WAINA.2012.209","url":null,"abstract":"We developed a presentation support agent to provide some features beyond the traditional presentation tools. This agent has a human-like interface and the dynamic effects for the presentations. It is controlled with a wireless remote device. Getting use to operate the agent experimentally, user experience tended to be improved.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115384091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Ubiquitous Data Logger that Selects an Efficient Data Compression Method 一个无处不在的数据记录器选择一个有效的数据压缩方法
K. Ono, T. Terada, M. Tsukamoto
{"title":"A Ubiquitous Data Logger that Selects an Efficient Data Compression Method","authors":"K. Ono, T. Terada, M. Tsukamoto","doi":"10.1109/WAINA.2012.206","DOIUrl":"https://doi.org/10.1109/WAINA.2012.206","url":null,"abstract":"Recently, ubiquitous computing has been garnering a great deal of attention. In ubiquitous computing environments, sensor nodes connected to a network are used for collecting sensor data. However, considering the cost needed to set up the network, it may be more convenient to use data loggers that directly send data to users than to use a sensor network. In this paper, we propose a ubiquitous data logger that takes sensor characteristics into consideration in managing data. The logger reduces data volume by selecting an appropriate compression algorithm that takes sensor characteristics into consideration, because the sensor characteristics vary depending on the sensor data.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115705512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCA-secure Anonymous Multi-receiver ID-based Encryption CCA-secure匿名多接收方id加密
Yuh-Min Tseng, Yi-Hung Huang, Hui-Ju Chang
{"title":"CCA-secure Anonymous Multi-receiver ID-based Encryption","authors":"Yuh-Min Tseng, Yi-Hung Huang, Hui-Ju Chang","doi":"10.1109/WAINA.2012.50","DOIUrl":"https://doi.org/10.1109/WAINA.2012.50","url":null,"abstract":"Recently, Fan et al. proposed the first anonymous multi-receiver identity (ID)-based encryption (AMIBE) scheme to encrypt a message for multiple selected receivers while achieving anonymity. They claimed that nobody, except the sender, knows who the selected receivers are. However, their scheme has been shown that any selected receiver can extract the identities of the other selected receivers because their security model cannot capture the full requirement of receiver anonymity. In this article, we first re-define the security model of AMIBE. We then propose a new AMIBE scheme to achieve complete receiver anonymity. We prove that the proposed AMIBE scheme is semantically secure against adaptive chosen cipher text attacks (CCA). Comparisons are given to demonstrate the proposed AMIBE scheme's advantages.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
CubeCuts: A Novel Cutting Scheme for Packet Classification cubeccuts:一种新的分组分类切割方案
Yeim-Kuan Chang, Yu-Hsiang Wang
{"title":"CubeCuts: A Novel Cutting Scheme for Packet Classification","authors":"Yeim-Kuan Chang, Yu-Hsiang Wang","doi":"10.1109/WAINA.2012.110","DOIUrl":"https://doi.org/10.1109/WAINA.2012.110","url":null,"abstract":"Packet Classification is one of the most important services provided by Internet routers nowadays. Decision-tree based schemes, such as HiCuts and HyperCuts, are the most well-known algorithms. These schemes separate search space into many equal-sized sub-spaces. But both schemes have the same rule replication problem, which might cause large memory overhead. Although another decision-tree based solution, Hyper splits, was proposed to cut space according to end-points for reducing the memory requirement, we still observe that its rule replication problem doesn't be solved well and the memory requirement can still be improved. In this paper, we propose a scheme called Cube Cuts to build a binary decision tree that does not generate any duplicated rule. By using the hybrid scheme that combines the Cube Cuts and constrained HiCuts, we can have a memory-efficient data structure such that the entire rule table of up to10K rules can be fit into the on-chip memory of FPGA device. Our design is very suitable to be implemented with parallelism and pipeline. The experimental results show that the rule replication ratio is very low in all rule tables (ACL, FW, and IPC). The proposed parallel and pipelined architecture based on the hybrid scheme can achieve a throughput of 118 Gbps, which is enough to deal with the Internet traffic that is growing rapidly in recent years.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116888146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network 移动Ad-hoc网络中证书管理节点之间的信任构建
Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, T. Nagase, Y. Yoshioka
{"title":"Building Trust among Certificates Management Nodes in Mobile Ad-hoc Network","authors":"Youjiro Takehana, Iichiro Nishimura, Norihito Yosaka, T. Nagase, Y. Yoshioka","doi":"10.1109/WAINA.2012.36","DOIUrl":"https://doi.org/10.1109/WAINA.2012.36","url":null,"abstract":"Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infrastructure. These networks are inherently vulnerable to security attacks from malicious users. Therefore, providing distinct security for ad hoc networks becomes a primary concern and requires several challenges to be achieved. One main challenge is how to manage public keys' certificates among ad hoc nodes. This paper introduces a fast and secure clustering scheme by select candidate's nodes using voting method, This method is to select certificates management node which manages certificates on behave of other nodes in ad hoc network.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116903914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
JOMS: A Java Message Service Provider for Disconnected MANETs JOMS:一个用于断开连接的manet的Java消息服务提供者
Abdulkader Benchi, F. Guidec, P. Launay
{"title":"JOMS: A Java Message Service Provider for Disconnected MANETs","authors":"Abdulkader Benchi, F. Guidec, P. Launay","doi":"10.1109/WAINA.2012.49","DOIUrl":"https://doi.org/10.1109/WAINA.2012.49","url":null,"abstract":"A disconnected mobile ad hoc network (or D-MANET) is a wireless network, which because of the sparse distribution of mobile hosts appears at best as a partially or intermittently connected network. Designing and implementing distributed applications capable of running in such a challenged environment is not a trivial task. Middleware systems such as Java Message Service (JMS) have made application development easy and cost-effective in traditional wired networks. It can be expected that middleware systems designed specifically for D-MANETs bring similar benefits. In this paper, we introduce JOMS (Java Opportunistic Message Service), a JMS provider for D-MANETs with which pre-existing and new JMS-based applications can be deployed simply in D-MANETs.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs 移动无人值守wsn中的入侵和随机数泄漏弹性方案
T. Iida, K. Emura, A. Miyaji, Kazumasa Omote
{"title":"An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs","authors":"T. Iida, K. Emura, A. Miyaji, Kazumasa Omote","doi":"10.1109/WAINA.2012.123","DOIUrl":"https://doi.org/10.1109/WAINA.2012.123","url":null,"abstract":"In INFOCOM 2010, Pietro, Oligeri, Soriente, and Tsudik (POST) proposed an intrusion-resilient system with forward and backward secrecy in mobile Unattended Wireless Sensor Networks (UWSNs), where sensors move according to some mobility model (random jump model and random waypoint model). In the POST scheme, each sensor encrypts its ephemeral key K as a plaintext by using the sink's public key, and sends this cipher text and the encrypted sensed data by K. Although the POST scheme recommends the hybrid encryption, it does not follow the conventional hybrid encryption usage, i.e., the POST scheme is not necessarily secure. More concretely, K must be regarded as a plaintext of the underlying public key system, and therefore the POST scheme requires at least one more encryption procedure (i.e, encryptions for both K and the data) compared with the conventional hybrid encryption procedure. In this paper, we scrutinize the original POST intrusion-resilient system. We set deployed information as a seed used for generating a random number (which is applied for public key encryption). This procedure follows the conventional hybrid encryption usage, and random-number-leakage problem does not occur. In conclusion, we improve the POST scheme from the viewpoint of both security and efficiency without spoiling significant benefit points of the original one.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125189345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Expertise Level Estimation of Library Books by Patron-Book Heterogeneous Information Network Analysis -- Concept and Applications to Library's Learning Assistant Service 借书异质信息网络分析对图书馆图书专业水平的评价——图书馆学习辅助服务的概念及应用
Toshiro Minami
{"title":"Expertise Level Estimation of Library Books by Patron-Book Heterogeneous Information Network Analysis -- Concept and Applications to Library's Learning Assistant Service","authors":"Toshiro Minami","doi":"10.1109/WAINA.2012.184","DOIUrl":"https://doi.org/10.1109/WAINA.2012.184","url":null,"abstract":"In this paper we deal with estimating the ranks of library books in their expertise levels. The estimated ranking score is applicable to library-provided learning assistant service. Due to the advancement of information society, library is expected to change in order to meet the patrons' needs. Helping patrons with learning is a key service for libraries. We put emphasis on the learning material recommendation facility for assisting learning patrons and we put focus on material book's expertise level estimation for recommending the material(s) to be learned to the patrons in this paper. As the very first step toward this direction we propose two candidate measures for expertise level ranking, calculate the books expertise level ranking scores, compare them, and evaluate the potential usefulness of this approach. Even though the precision is not yet very high right now, we are expecting the measure can become more precise in the future research and thus becomes practically applicable to libraries.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123430552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Proposal of a Simplified Jumping Distance Measurement Method for Ski Jumper's Motion Monitoring System Using Terrestrial Magnetism and Acceleration Sensors 基于地磁和加速度传感器的跳台运动员运动监测系统中跳跃距离测量的简化方法
Nobuyoshi Sato, Ryota Takamagi, T. Takayama, Y. Murata
{"title":"A Proposal of a Simplified Jumping Distance Measurement Method for Ski Jumper's Motion Monitoring System Using Terrestrial Magnetism and Acceleration Sensors","authors":"Nobuyoshi Sato, Ryota Takamagi, T. Takayama, Y. Murata","doi":"10.1109/WAINA.2012.121","DOIUrl":"https://doi.org/10.1109/WAINA.2012.121","url":null,"abstract":"We are developing a ski jumper's motion monitor system employing terrestrial magnetism and acceleration sensors. On this development, we have confirmed that terrestrial magnetism and acceleration sensors are useful to measure ski jumper's in run descending speed and taking-off positions using a model of ski jumping ramp. Also, we gathered required measurement by inquiring a ski jumping athlete and his coach. As this result, we confirmed following measurement: in run descending speed, jumper's style and posture at jumping point, and slant of body of the jumper when he is flying. We are developing a ski jumper's motion monitoring system using terrestrial magnetism, acceleration sensors and a video camera. Our system succeeded to monitor of ski jumper's take-off form as changes of degrees on jumper's knee and waist by using cheap terrestrial magnetism sensors. By using our system, it is thought that correction of wrong take-off forms can be realized. To discuss certain take-off form is good or not, flying distance by a particular jump is important. However, flying distance is not measured in daily practice with few numbers of jumpers because of various difficulties for to measure it. In this paper, we propose an extension of our system, that realizes automatic measurement of flying distance for practices by a few number of people group, using landing shock that can be detected by acceleration sensor and video recording for landing slope.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Novel Image Based Features into Markov Random Field Model for Information Retrieval 基于图像特征与马尔可夫随机场模型的信息检索集成
Sheikh Muhammad Sarwar, Mosaddek Hossain Kamal
{"title":"Integration of Novel Image Based Features into Markov Random Field Model for Information Retrieval","authors":"Sheikh Muhammad Sarwar, Mosaddek Hossain Kamal","doi":"10.1109/WAINA.2012.157","DOIUrl":"https://doi.org/10.1109/WAINA.2012.157","url":null,"abstract":"This paper develops a general and formal frame-work for the ranking of web documents by considering the multimedia information contained in these documents. Multimedia information is mostly related to images and videos. Ranking can be treated as a combination of static and dynamic ranking. In this paper, we have described a static ranking method based on the analysis of the images present in the web document and integrated it into the ranking framework which is based on Markov Random Field Model, which combines both static and dynamic ranking. We have described a novel metric DQEV(Document Quality Enhancing Value), based on the images present in a web document and the value of DQEV indicates to what extent the images in a web document increase its value. Integration of an Image Search Engine has also been proposed for the computation of DQEV. It has also been shown that the integration of DQEV can increase the effectiveness of the ranking system.","PeriodicalId":375709,"journal":{"name":"2012 26th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信