2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Replacing Socket Communication by REST Open API for Acquisition Tax Analyzer Development 用REST开放API取代套接字通信用于所得税分析器开发
Hae-Ryong Cho, Min Choi
{"title":"Replacing Socket Communication by REST Open API for Acquisition Tax Analyzer Development","authors":"Hae-Ryong Cho, Min Choi","doi":"10.1109/WAINA.2014.159","DOIUrl":"https://doi.org/10.1109/WAINA.2014.159","url":null,"abstract":"The spreading use of wireless internet and smartphone accelerates the growth of location-based service and mobile-cloud computing. With the explosive growth of Iphone and Android smartphones, there are increasing demands and requests for application developers to support both smart platforms, simultaneously. Thus, we develop HTML5 based acquisition tax analysis application which is exchangably executable for Android, Iphone, Linux, and Windows. In this paper, we design and implement a HTML5 based application which is able to check whether the tax payer take the advantage of pay capital gain tax relief or not. In addition, this mobile application is convenient to access tax information during real-estate trading registration. It is quite useful for person who has to visit several sites for a day. We show the architecture and implementation detail of the application in the experimental results section.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of Path Characteristics and Scheduling Policies on MPTCP Performance 路径特征和调度策略对MPTCP性能的影响
Behnaz Arzani, Alexander J. T. Gurney, Shuotian Cheng, R. Guérin, B. T. Loo
{"title":"Impact of Path Characteristics and Scheduling Policies on MPTCP Performance","authors":"Behnaz Arzani, Alexander J. T. Gurney, Shuotian Cheng, R. Guérin, B. T. Loo","doi":"10.1109/WAINA.2014.121","DOIUrl":"https://doi.org/10.1109/WAINA.2014.121","url":null,"abstract":"With increasing deployment of Multipath TCP (MPTCP) in multihoming and data enter scenarios, there is a need to understand how its performance is affected in practice-both by traditional factors such as RTT measurements, and by new multipath-specific considerations such as sub flow selection. We carried out an initial but comprehensive study using an actual MPTCP implementation in an emulated network environment, to explore the impact of different factors on MPTCP throughput. We find that path selection and packet scheduling have a large effect on performance, and that merely trusting the congestion control mechanism to do the right thing is not enough. Moreover, we provide evidence that throughput can be improved by slight modifications to the send buffers and path selection components of the implementation. Important challenges in network design remain, if only to ensure that multiple suitable paths exist in a network.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Migration-less Energy-Aware Task Scheduling Policies in Cloud Environments 云环境下的无迁移能耗感知任务调度策略
Seyedmehdi Hosseinimotlagh, F. Khunjush, Seyedmahyar Hosseinimotlagh
{"title":"Migration-less Energy-Aware Task Scheduling Policies in Cloud Environments","authors":"Seyedmehdi Hosseinimotlagh, F. Khunjush, Seyedmahyar Hosseinimotlagh","doi":"10.1109/WAINA.2014.66","DOIUrl":"https://doi.org/10.1109/WAINA.2014.66","url":null,"abstract":"Burgeoning market for cloud applications has brought significant interest for cloud providers. They look for methods to maximize their profit margins by executing higher number of jobs while minimizing the operational costs and environmental footprints. Energy consumption of servers plays a crucial role in operational costs. There have been different methods to deal with energy consumption from hardware level to higher layers of abstractions such as compilers and operating systems. For example, several resource-scheduling policies have been proposed to not only regulate energy consumption but also guarantee Service Level Agreement (SLA). One of the prevalent techniques in reducing the total energy consumption in data-centers is through consolidation of virtual machines (VMs). In this technique, one or several VMs migrate from a physical node to other nodes, which in turn incurs a significant overhead not only on a server but also on the network infrastructure of a cloud. To address this problem, we propose a VM scheduling algorithm based on the unsurpassed utilization level to come up with optimal energy consumption while meeting a given QoS. In other words, our proposed algorithm aims to regulate execution speeds of VMs on a host with a result that the host works at its optimal energy level. In fact, a host is scheduled to run its allocated tasks faster to reach the optimum level of utilization instead of migrating its tasks to other hosts. We also propose several task scheduling policies to adjust execution speeds for real-time tasks in each VM. The simulation results show that the proposed task scheduling policies not only reduce the total energy consumption of a cloud by 19%, but also have profound impacts on turnaround times of real-time tasks by 27%.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
ConExT-U: A Context-Aware Exception Handling Mechanism for Task-Based Ubiquitous Systems ConExT-U:基于任务的泛在系统的上下文感知异常处理机制
Carlos A. B. de Queiroz Filho, R. Andrade, L. Rocha, R. Braga, C. Oliveira
{"title":"ConExT-U: A Context-Aware Exception Handling Mechanism for Task-Based Ubiquitous Systems","authors":"Carlos A. B. de Queiroz Filho, R. Andrade, L. Rocha, R. Braga, C. Oliveira","doi":"10.1109/WAINA.2014.25","DOIUrl":"https://doi.org/10.1109/WAINA.2014.25","url":null,"abstract":"Context-awareness is a central aspect in the design of ubiquitous systems, characterizing their ability to observe the environment's context changes and adapt its structure and behavior according. Since those systems can be able to make autonomous decisions (i.e., without direct user intervention), dependability becomes an important requirement. The exception handling is a well-known error recovery technique employed to improve the software robustness and contributes to the overall software system's reliability and dependability. However, despite its benefits, exception handling still not widely used in the development of ubiquitous systems. In fact, we argue that is consequence of the lack of a proper exception handling mechanism to support it during the development and execution phases. In order to address this problem, we propose a context-aware exception handling mechanism designed specifically for context-aware ubiquitous systems. The proposed mechanism is implemented as a Java-based framework that provides a task-based model for building robust ubiquitous systems. A prototype of a ubiquitous parking control system is implemented to explore and validate the features of the proposed mechanism.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Internet of Things-Based Model for Smart Water Management 基于物联网的智能水管理模型
T. Robles, R. Alcarria, Diego Martín de Andrés, A. Dominguez, Mariano Navarro de la Cruz, Rodrigo Calero, Sofía Iglesias, Manuel López
{"title":"An Internet of Things-Based Model for Smart Water Management","authors":"T. Robles, R. Alcarria, Diego Martín de Andrés, A. Dominguez, Mariano Navarro de la Cruz, Rodrigo Calero, Sofía Iglesias, Manuel López","doi":"10.1109/WAINA.2014.129","DOIUrl":"https://doi.org/10.1109/WAINA.2014.129","url":null,"abstract":"Water is a vital resource for life, and for the economy. Nowadays, one of the most serious challenges to solve is to manage the water scarcity. Current water management ICT systems are supported by specific vendor equipment, without considering any interoperability standards. The lack of standardization among producer's water ICT equipment hinders proper monitoring and control systems, resulting in low efficiency in water distribution and consumption, system's maintenance and improvement, and failure identification. In this paper we propose a smart water management model integrating Internet of Things technologies for decoupling decision support systems and monitoring from business processes coordination and subsystem implementation. The proposed smart water management model makes specific vendor equipment interoperable and manageable in a water management domain in a homogeneous way.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"90 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
Context-Aware User Profiling and Multimedia Content Classification for Smart Devices 面向智能设备的上下文感知用户分析和多媒体内容分类
Abayomi Otebolaku, M. T. Andrade
{"title":"Context-Aware User Profiling and Multimedia Content Classification for Smart Devices","authors":"Abayomi Otebolaku, M. T. Andrade","doi":"10.1109/WAINA.2014.92","DOIUrl":"https://doi.org/10.1109/WAINA.2014.92","url":null,"abstract":"Current solutions for delivering adapted multimedia content in mobile environments take into account only a limited set of contextual information, and can be regarded as passive solutions. We propose a new solution that anticipates user's needs based on the contexts of use and preferences to deliver media content to mobile users. This paper describes the profiling approach of the proposed solution, and a context-aware content-based recommendation for smart devices. Recommendations are issued based on user history, driven by real-time contextual conditions.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Intelligent Touring System Based on Mobile Social Network and Cloud Computing for Travel Recommendation 基于移动社交网络和云计算的智能旅游推荐系统
Yuan-Tse Yu, Chung-Ming Huang, Yun-Tz Lee
{"title":"An Intelligent Touring System Based on Mobile Social Network and Cloud Computing for Travel Recommendation","authors":"Yuan-Tse Yu, Chung-Ming Huang, Yun-Tz Lee","doi":"10.1109/WAINA.2014.12","DOIUrl":"https://doi.org/10.1109/WAINA.2014.12","url":null,"abstract":"Although many travel recommendation systems are worked with mobile social network, the articles and delivered messages between users are still not to be utilized well for estimating user preferences. If the articles and the delivered messages are closed related with the touring experiences, the information should be merged to the recommendation systems. Therefore, the information can be used for generating recommendation POIs through the intelligent modules. Besides, if the groups of social network and the exchanged information are collected large enough, the generating POIs should be more closed to user preferences. But the ideal situations are still not provided on the developed traveling recommendation system of current Internet. Therefore, we proposed a cloud-based Intelligent Touring System (ITS) to provide personalized PoIs instantly. By combining developed cloud computing technology, we can achieve analyzing posted blogs in mobile social network and recognizing user pedestrian patterns through smart phone sensors. Afterward, in order to generate the suggested PoIs related with user preferences, we construct meta-group based on similar user preferences. Moreover, in order to achieve meta-group classification, we developed clustering algorithm based on CLOPE [8]. Finally, we conducted experiments for examining the performance of the proposed meta-group classification, and the results show it could construct groups with similar preferences and provide suitable PoIs to users during touring.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Consumer Transactions on the Web 网上的消费者交易
Gulnar Ali, K. F. Li
{"title":"Consumer Transactions on the Web","authors":"Gulnar Ali, K. F. Li","doi":"10.1109/WAINA.2014.111","DOIUrl":"https://doi.org/10.1109/WAINA.2014.111","url":null,"abstract":"The rapid development of the Web has enabled people to gather information quickly though may not be accurately. The Web has also becoming a marketplace used by many. With buy and sell opportunity comes scamming opportunity. Many people have bought and sold on the Web via commercial listing sites such as eBay or social networks such as kijiji. Consumers in general have good experience in Web transactions but at the same time many have been cheated and are hesitant to use the Web to acquire goods or services again. There are blacklists which identify malicious sites, however, they are not up-to-date and the scammers are always one step ahead in their schemes. This work reviews the current status of trust in Web transactions, in particular, consumer transactions.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116104319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DAIDS: An Architecture for Modular Mobile IDS 模块化移动IDS的体系结构
Alaa Salman, I. Elhajj, A. Chehab, A. Kayssi
{"title":"DAIDS: An Architecture for Modular Mobile IDS","authors":"Alaa Salman, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/WAINA.2014.54","DOIUrl":"https://doi.org/10.1109/WAINA.2014.54","url":null,"abstract":"The popularity of mobile devices and the enormous number of third party mobile applications in the market have naturally lead to several vulnerabilities being identified and abused. This is coupled with the immaturity of intrusion detection system (IDS) technology targeting mobile devices. In this paper we propose a modular host-based IDS framework for mobile devices that uses behavior analysis to profile applications on the Android platform. Anomaly detection can then be used to categorize malicious behavior and alert users. The proposed system accommodates different detection algorithms, and is being tested at a major telecom operator in North America. This paper highlights the architecture, findings, and lessons learned.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effective Third Party Auditing in Cloud Computing 有效的云计算第三方审计
M. Hussain, M. Al-Mourad
{"title":"Effective Third Party Auditing in Cloud Computing","authors":"M. Hussain, M. Al-Mourad","doi":"10.1109/WAINA.2014.158","DOIUrl":"https://doi.org/10.1109/WAINA.2014.158","url":null,"abstract":"Cloud computing is the next phase in the Internet's evolution, providing the means through which computing power, computing infrastructure, applications, business processes can be delivered to businesses and individual as a service wherever and whenever they need. Businesses who use cloud service providers (CSP) tend to have service level agreements (SLA) that act as contract and define the level of expected service from the CSP, including availability, performance and security. Recent research suggests the use of third party auditors (TPA) as a mean to monitor CSPs. This paper shows how CSP may deceit the SLA to reduce their cost and become more competitive, while avoiding detection by TPAs. The paper presents a crowdsourced TPA model to monitor the CSPs and consequently detect any deception.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信