{"title":"Replacing Socket Communication by REST Open API for Acquisition Tax Analyzer Development","authors":"Hae-Ryong Cho, Min Choi","doi":"10.1109/WAINA.2014.159","DOIUrl":"https://doi.org/10.1109/WAINA.2014.159","url":null,"abstract":"The spreading use of wireless internet and smartphone accelerates the growth of location-based service and mobile-cloud computing. With the explosive growth of Iphone and Android smartphones, there are increasing demands and requests for application developers to support both smart platforms, simultaneously. Thus, we develop HTML5 based acquisition tax analysis application which is exchangably executable for Android, Iphone, Linux, and Windows. In this paper, we design and implement a HTML5 based application which is able to check whether the tax payer take the advantage of pay capital gain tax relief or not. In addition, this mobile application is convenient to access tax information during real-estate trading registration. It is quite useful for person who has to visit several sites for a day. We show the architecture and implementation detail of the application in the experimental results section.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Behnaz Arzani, Alexander J. T. Gurney, Shuotian Cheng, R. Guérin, B. T. Loo
{"title":"Impact of Path Characteristics and Scheduling Policies on MPTCP Performance","authors":"Behnaz Arzani, Alexander J. T. Gurney, Shuotian Cheng, R. Guérin, B. T. Loo","doi":"10.1109/WAINA.2014.121","DOIUrl":"https://doi.org/10.1109/WAINA.2014.121","url":null,"abstract":"With increasing deployment of Multipath TCP (MPTCP) in multihoming and data enter scenarios, there is a need to understand how its performance is affected in practice-both by traditional factors such as RTT measurements, and by new multipath-specific considerations such as sub flow selection. We carried out an initial but comprehensive study using an actual MPTCP implementation in an emulated network environment, to explore the impact of different factors on MPTCP throughput. We find that path selection and packet scheduling have a large effect on performance, and that merely trusting the congestion control mechanism to do the right thing is not enough. Moreover, we provide evidence that throughput can be improved by slight modifications to the send buffers and path selection components of the implementation. Important challenges in network design remain, if only to ensure that multiple suitable paths exist in a network.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seyedmehdi Hosseinimotlagh, F. Khunjush, Seyedmahyar Hosseinimotlagh
{"title":"Migration-less Energy-Aware Task Scheduling Policies in Cloud Environments","authors":"Seyedmehdi Hosseinimotlagh, F. Khunjush, Seyedmahyar Hosseinimotlagh","doi":"10.1109/WAINA.2014.66","DOIUrl":"https://doi.org/10.1109/WAINA.2014.66","url":null,"abstract":"Burgeoning market for cloud applications has brought significant interest for cloud providers. They look for methods to maximize their profit margins by executing higher number of jobs while minimizing the operational costs and environmental footprints. Energy consumption of servers plays a crucial role in operational costs. There have been different methods to deal with energy consumption from hardware level to higher layers of abstractions such as compilers and operating systems. For example, several resource-scheduling policies have been proposed to not only regulate energy consumption but also guarantee Service Level Agreement (SLA). One of the prevalent techniques in reducing the total energy consumption in data-centers is through consolidation of virtual machines (VMs). In this technique, one or several VMs migrate from a physical node to other nodes, which in turn incurs a significant overhead not only on a server but also on the network infrastructure of a cloud. To address this problem, we propose a VM scheduling algorithm based on the unsurpassed utilization level to come up with optimal energy consumption while meeting a given QoS. In other words, our proposed algorithm aims to regulate execution speeds of VMs on a host with a result that the host works at its optimal energy level. In fact, a host is scheduled to run its allocated tasks faster to reach the optimum level of utilization instead of migrating its tasks to other hosts. We also propose several task scheduling policies to adjust execution speeds for real-time tasks in each VM. The simulation results show that the proposed task scheduling policies not only reduce the total energy consumption of a cloud by 19%, but also have profound impacts on turnaround times of real-time tasks by 27%.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos A. B. de Queiroz Filho, R. Andrade, L. Rocha, R. Braga, C. Oliveira
{"title":"ConExT-U: A Context-Aware Exception Handling Mechanism for Task-Based Ubiquitous Systems","authors":"Carlos A. B. de Queiroz Filho, R. Andrade, L. Rocha, R. Braga, C. Oliveira","doi":"10.1109/WAINA.2014.25","DOIUrl":"https://doi.org/10.1109/WAINA.2014.25","url":null,"abstract":"Context-awareness is a central aspect in the design of ubiquitous systems, characterizing their ability to observe the environment's context changes and adapt its structure and behavior according. Since those systems can be able to make autonomous decisions (i.e., without direct user intervention), dependability becomes an important requirement. The exception handling is a well-known error recovery technique employed to improve the software robustness and contributes to the overall software system's reliability and dependability. However, despite its benefits, exception handling still not widely used in the development of ubiquitous systems. In fact, we argue that is consequence of the lack of a proper exception handling mechanism to support it during the development and execution phases. In order to address this problem, we propose a context-aware exception handling mechanism designed specifically for context-aware ubiquitous systems. The proposed mechanism is implemented as a Java-based framework that provides a task-based model for building robust ubiquitous systems. A prototype of a ubiquitous parking control system is implemented to explore and validate the features of the proposed mechanism.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Robles, R. Alcarria, Diego Martín de Andrés, A. Dominguez, Mariano Navarro de la Cruz, Rodrigo Calero, Sofía Iglesias, Manuel López
{"title":"An Internet of Things-Based Model for Smart Water Management","authors":"T. Robles, R. Alcarria, Diego Martín de Andrés, A. Dominguez, Mariano Navarro de la Cruz, Rodrigo Calero, Sofía Iglesias, Manuel López","doi":"10.1109/WAINA.2014.129","DOIUrl":"https://doi.org/10.1109/WAINA.2014.129","url":null,"abstract":"Water is a vital resource for life, and for the economy. Nowadays, one of the most serious challenges to solve is to manage the water scarcity. Current water management ICT systems are supported by specific vendor equipment, without considering any interoperability standards. The lack of standardization among producer's water ICT equipment hinders proper monitoring and control systems, resulting in low efficiency in water distribution and consumption, system's maintenance and improvement, and failure identification. In this paper we propose a smart water management model integrating Internet of Things technologies for decoupling decision support systems and monitoring from business processes coordination and subsystem implementation. The proposed smart water management model makes specific vendor equipment interoperable and manageable in a water management domain in a homogeneous way.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"90 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113989016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware User Profiling and Multimedia Content Classification for Smart Devices","authors":"Abayomi Otebolaku, M. T. Andrade","doi":"10.1109/WAINA.2014.92","DOIUrl":"https://doi.org/10.1109/WAINA.2014.92","url":null,"abstract":"Current solutions for delivering adapted multimedia content in mobile environments take into account only a limited set of contextual information, and can be regarded as passive solutions. We propose a new solution that anticipates user's needs based on the contexts of use and preferences to deliver media content to mobile users. This paper describes the profiling approach of the proposed solution, and a context-aware content-based recommendation for smart devices. Recommendations are issued based on user history, driven by real-time contextual conditions.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116731570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Touring System Based on Mobile Social Network and Cloud Computing for Travel Recommendation","authors":"Yuan-Tse Yu, Chung-Ming Huang, Yun-Tz Lee","doi":"10.1109/WAINA.2014.12","DOIUrl":"https://doi.org/10.1109/WAINA.2014.12","url":null,"abstract":"Although many travel recommendation systems are worked with mobile social network, the articles and delivered messages between users are still not to be utilized well for estimating user preferences. If the articles and the delivered messages are closed related with the touring experiences, the information should be merged to the recommendation systems. Therefore, the information can be used for generating recommendation POIs through the intelligent modules. Besides, if the groups of social network and the exchanged information are collected large enough, the generating POIs should be more closed to user preferences. But the ideal situations are still not provided on the developed traveling recommendation system of current Internet. Therefore, we proposed a cloud-based Intelligent Touring System (ITS) to provide personalized PoIs instantly. By combining developed cloud computing technology, we can achieve analyzing posted blogs in mobile social network and recognizing user pedestrian patterns through smart phone sensors. Afterward, in order to generate the suggested PoIs related with user preferences, we construct meta-group based on similar user preferences. Moreover, in order to achieve meta-group classification, we developed clustering algorithm based on CLOPE [8]. Finally, we conducted experiments for examining the performance of the proposed meta-group classification, and the results show it could construct groups with similar preferences and provide suitable PoIs to users during touring.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134312495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consumer Transactions on the Web","authors":"Gulnar Ali, K. F. Li","doi":"10.1109/WAINA.2014.111","DOIUrl":"https://doi.org/10.1109/WAINA.2014.111","url":null,"abstract":"The rapid development of the Web has enabled people to gather information quickly though may not be accurately. The Web has also becoming a marketplace used by many. With buy and sell opportunity comes scamming opportunity. Many people have bought and sold on the Web via commercial listing sites such as eBay or social networks such as kijiji. Consumers in general have good experience in Web transactions but at the same time many have been cheated and are hesitant to use the Web to acquire goods or services again. There are blacklists which identify malicious sites, however, they are not up-to-date and the scammers are always one step ahead in their schemes. This work reviews the current status of trust in Web transactions, in particular, consumer transactions.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116104319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DAIDS: An Architecture for Modular Mobile IDS","authors":"Alaa Salman, I. Elhajj, A. Chehab, A. Kayssi","doi":"10.1109/WAINA.2014.54","DOIUrl":"https://doi.org/10.1109/WAINA.2014.54","url":null,"abstract":"The popularity of mobile devices and the enormous number of third party mobile applications in the market have naturally lead to several vulnerabilities being identified and abused. This is coupled with the immaturity of intrusion detection system (IDS) technology targeting mobile devices. In this paper we propose a modular host-based IDS framework for mobile devices that uses behavior analysis to profile applications on the Android platform. Anomaly detection can then be used to categorize malicious behavior and alert users. The proposed system accommodates different detection algorithms, and is being tested at a major telecom operator in North America. This paper highlights the architecture, findings, and lessons learned.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Third Party Auditing in Cloud Computing","authors":"M. Hussain, M. Al-Mourad","doi":"10.1109/WAINA.2014.158","DOIUrl":"https://doi.org/10.1109/WAINA.2014.158","url":null,"abstract":"Cloud computing is the next phase in the Internet's evolution, providing the means through which computing power, computing infrastructure, applications, business processes can be delivered to businesses and individual as a service wherever and whenever they need. Businesses who use cloud service providers (CSP) tend to have service level agreements (SLA) that act as contract and define the level of expected service from the CSP, including availability, performance and security. Recent research suggests the use of third party auditors (TPA) as a mean to monitor CSPs. This paper shows how CSP may deceit the SLA to reduce their cost and become more competitive, while avoiding detection by TPAs. The paper presents a crowdsourced TPA model to monitor the CSPs and consequently detect any deception.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125084351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}