{"title":"Ontology-based product data integration","authors":"Mingwu Guo, Shanping Li, Jinxiang Dong, Xiangjun Fu, Yujie Hu, Qiwei Yin","doi":"10.1109/AINA.2003.1192937","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192937","url":null,"abstract":"In this paper we make an analysis of the product data integration problem and propose an ontology-based framework to facilitate the product data integration among enterprise information sources. Advantages of the framework are analyzed in detail, and an example described in DAML+OIL is given. We also make a comparison with EXPRESS modeling language.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129476240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reductions of multiple-access and optical beat interference with fiber-grating OCDMA balanced decoder","authors":"Jen-Fa Huang, Yao-Tang Chang, Chuen-Ching Wang","doi":"10.1109/AINA.2003.1192863","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192863","url":null,"abstract":"An optical spectral coding technique in fiber-grating-based optical code-division multiple-access (OCDMA) system has been investigated in our previous work. In this thesis, the same architecture is set up to investigate the reduction of multiple-access interference caused by the overlapping wavelength from undesired users. Furthermore, the reduction of optical beat interference (OBI) induced by those adjacent grating chips is examined. The reduction of multiple access interference (MAI) and OBI induced by those adjacent grating chips. FBG written as M-sequence and Walsh codes is proposed for such MAI and OBI cancellation in spectrally balanced photo-detectors. Theoretically, M-sequence and Walsh codes are characterized by nearly the same number of \"on\" chips (i.e., logic \"1\" chips) and \"off\" chips (i.e., logic \"0\" chips). It is seen that the differential decoding scheme characterizes a better performance on eliminating the MAI and OBI problem by mutual cancellation in reflected and transmitted branches of wavelength chips. Furthermore, we propose that the wavelength interleaving allocation method can result in a guard band to suppress OBI. It is shown that SIR has 13 dB improvement with the proposed scheme.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128033109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compression-based broadcast strategies in wireless information systems","authors":"Chao-Chun Chen, Chiang Lee, Chih-Horng Ke","doi":"10.1109/AINA.2003.1192837","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192837","url":null,"abstract":"Data delivery is through broadcast in wireless information systems due to the asymmetric communication property. However, broadcasting data easily wastes large access time because the large amount of data pages needs to be broadcast. In this paper we propose three compression-based strategies considering access order to reduce access time. Then, the expected access time of three proposed strategies is also derived by using the probability model. Our analytic and experimental results show that the compression-based broadcast strategies can dramatically reduce the access time for mobile users (MU).","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128248014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"M-commerce transaction management with multi-agent support","authors":"M. Younas, K. Chao, R. Anane","doi":"10.1109/AINA.2003.1192889","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192889","url":null,"abstract":"Transaction management is a major issue in Mobile Commerce (M-commerce). It enables people to order goods and access information in an anywhere and anytime fashion. Given the nature of mobile computing, there is a need for a generic approach that adapts to the needs of M-commerce applications. We propose a new multi-agent approach that dynamically manages mobile transactions which adapt to the processing environment of M-commerce. We also present techniques that deal with the issues of handoff, disconnection, or system failures. Potential advantages of the proposed approach include enhanced flexibility, improved performance and fault tolerance.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130882140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ying-Hong Wang, Chen-An Wang, Jen-Shiun Chiang, Wen-Hung Lo
{"title":"A secure model in agent-based marketplace","authors":"Ying-Hong Wang, Chen-An Wang, Jen-Shiun Chiang, Wen-Hung Lo","doi":"10.1109/AINA.2003.1192894","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192894","url":null,"abstract":"Due to the popularity of broadband network and World Wide Web, network service advances more completely. In spite of lots of network companies suffer deficits, E-Commerce still attracts numerous enterprises to invest in. But consumers have no confidence for electronic transaction, the main reason is security problem. They fret about the data would be stolen, or their accounts would be usurped. Thus the most influential facility is security model. And in the security model, the basic model is \"authentication\". If there is no sturdy authentication, anyone can masquerade others' identities. The major objective of this paper is to propose an agent-based E-Commerce environment and to set up a secure E-marketplace authentication mechanism.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, HIroshi G. Okuno
{"title":"Privacy-enhanced SPKI access control on PKIX and its application to Web server","authors":"Takamichi Saito, Kentaro Umesawa, Toshiyuki Kito, HIroshi G. Okuno","doi":"10.1109/AINA.2003.1192970","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192970","url":null,"abstract":"Access control using PKIX (Public Key Infrastructure with X.509) may cause a privacy problem. It is caused mainly by the fact that a server can know a client's ID. To solve this problem, we proposed a restricted anonymous access control scheme using SPKI (Simple Public Key Infrastructure). It can make a server provide service to an authorized client. It still has another problem: SPKI is not so popular as PKIX. PKIX has many efficient technologies such like SSL (Secure Socket Layer), but SPKI can't directly use these technologies. In this paper our implementation utilizes the slightest extension of PKIX, namely, we use an X.509 Certificate as an Authorization Certificate and PKIX technologies, i.e. SSL. Therefore, our approach can make some proposed SPKI schemes practical and useful. In this paper the proposed scheme is applied to access control of the Web server. The system demonstrates that it succeeds in adding privacy-enhanced access control to SSL mutual authentication. We also describe and discuss the details of implementations.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Run time adaptation of UMTS services to available resources","authors":"Z. Choukair, S. Sfar","doi":"10.1109/AINA.2003.1192840","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192840","url":null,"abstract":"The UMTS is setting forth new challenges in terms of integration of end-to-end QoS management. Our approach consists of providing an end-to-end adaptation frame to UMTS commercial services. A commercial service provided to the user should be adapted when selected as well as during its transfer through the different parts of the network. These adaptations are due to the fluctuation of the parameters of the network and the need to adapt the QoS parameters. We then improve QoS management in respect with the contractual commitments, decrease dropped calls rate and optimize resources use by avoiding call rejections and application flow blocking. The four steps of adaptation of our model are guaranteed by an \"adaptation bearer service (ABS)\" which provides technologies to adapt the media to available resources according to the adaptation mode and the localization of resource limitation. At connection time, the service provider or ASP may ask the ABS to adapt the requested service according to the user contract, profile and preferences. At the border of the DiffServ network, the router asks for ABS to adapt the waiting flow of the commercial service according to network resource availabilities and the same at the border of radio network and finally to the terminal according to available CPU, memory, etc. Our approach is intended to take into account the requirements of mastering the degradation of multimedia services to avoid bad renderings and process a degradation as early as possible. In this paper, we will develop our model, the intended extension and our preliminary ongoing developments. In another respect, those control points constitute a cornerstone to set up the verification of fundamental properties such as synchronisation.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, implementation and performance evaluation of IP-VPN","authors":"Jin-Cherng Lin, Ching-Tien Chang, Wei-Tao Chung","doi":"10.1109/AINA.2003.1192872","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192872","url":null,"abstract":"Network security has always been a significant issue, but a recognized priority today due to the popularity of Internet. The issue is not if security should be implemented on a network rather, the question to ask is if security has been implemented properly and the interoperability with today's network architecture. Although there are various ways to perform a secure network environment, but the most popular and the most progressive network security mechanism is Security Architecture for IP (IPSec), offered by IETF (Internet Engineering Task Force). We discuss the problems when combine IPSec into current TCP/IP module by porting an IPSec shareware (FreeS/WAN) into a router. Finally, in order to understand the impact on router's performance when using various services and hash/encryption algorithms provided by IPSec, we testing the throughput of the router before and after applying IPSec.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127373224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of crossbar switch fabrics in core routers","authors":"Wenjie Li, Yiping Gong, B. Liu","doi":"10.1109/AINA.2003.1192996","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192996","url":null,"abstract":"Many researchers have pointed out that using complex scheduling algorithms in input queuing switches with VOQ (Virtual Output Queuing) can achieve 100% throughput. But these algorithms are too complex to be implemented in hardware. In this paper, based on combined input/output queuing (CIOQ) switch fabrics, we propose a simple scheduling algorithm named OPRR (Outlet Priority Round Robin). For the synthetic workloads we consider, including uniform and bursty traffic models, the performance of OPRR in VOQ and single queue mode is evaluated respectively. Through the simulation results we show that 1) OPRR algorithm, coupled with a speedup of 2, can lead to performance very close to output queuing switches, and 2) under the same condition the single queue mode behaves almost identically to VOQ mode. These results are very useful to direct the design and implementation of switch fabrics in core routers.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"66 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mikito Nakamura, Jianhua Ma, K. Chiba, M. Shizuka, Yoichiro Miyoshi
{"title":"Design and implementation of a P2P shared Web browser using JXTA","authors":"Mikito Nakamura, Jianhua Ma, K. Chiba, M. Shizuka, Yoichiro Miyoshi","doi":"10.1109/AINA.2003.1192852","DOIUrl":"https://doi.org/10.1109/AINA.2003.1192852","url":null,"abstract":"The most shared applications use the client/server model in which, however a server is usually very complex and heavy since all of group managements are done by the server and sometimes becomes a communication bottleneck as all of date exchange among group members are mediated via it. To solve the above problems, our shared browser adopted a pure peer-to-peer (P2P) architecture without using any server A group member or a device called a peer dynamically finds other peers via distributed searching, and directly exchange data with other peers. It supports not only sharing a Web document in a peer group but also synchronously viewing the document and manipulating the browser with further support of some group users' awareness information like a user's moving a cursor, entering a new URL and clicking a hyperlink. It is implemented using JXTA protocols and Java programming language. To make the system applicable over the Internet across firewalls and NATs, the HTTP protocol can be used to transfer data via a pipe, a communication mechanism in JXTA.","PeriodicalId":382765,"journal":{"name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117216839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}