2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Improving the Confidential Data Totalization 改进机密数据汇总
Kazuyoshi Furukawa, M. Takenaka, T. Izu
{"title":"Improving the Confidential Data Totalization","authors":"Kazuyoshi Furukawa, M. Takenaka, T. Izu","doi":"10.1109/IMIS.2013.148","DOIUrl":"https://doi.org/10.1109/IMIS.2013.148","url":null,"abstract":"With a rapid spread of the cloud computing, confidential data totalization technologies are becoming more important. In 2011, Ushida et al. proposed a confidential data totalization technique based on the value distortion, in which each data in a formulaic corss-tabulation table is randomized by a random data shared in a pre-provided random data table, and the cloud server is able to totalize the data by summing randomized data since the sum of the randomized table data is known to the server. So the cloud server does not require any specific functions for totalizing randomized data and no information is leaked to the cloud server. However, there are tow problems. The first problem is data leakage from randomized table data if the same random table is used twice or more. The second problem is the difficulty of appending new rows or columns to the random data table without reproviding them to the users. This paper introduces solutions for these problems: a table updating method for the random table and and a table extending method for the random table without any re-provisions. With the proposed solutions, the cost of the the secure table data analysis method for the update and the extension can be reduced extremely.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126689536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Mobile Botnet Using VPN 基于VPN的移动僵尸网络检测
Byungha Choi, Sung-Kyo Choi, Kyungsan Cho
{"title":"Detection of Mobile Botnet Using VPN","authors":"Byungha Choi, Sung-Kyo Choi, Kyungsan Cho","doi":"10.1109/IMIS.2013.32","DOIUrl":"https://doi.org/10.1109/IMIS.2013.32","url":null,"abstract":"As most applications in wired networks become available on mobile devices and mobile networks are well integrated with Internet, Botnet becomes the most significant threat to mobile devices. We propose a mobile Botnet detection scheme that detects \"pull\" style C&C channel. Our network-based scheme detects Botnet by inspecting abnormal flow features of C&C traffic traveling through VPN which provides a shared path for both 3/4G and WiFi. Through the verification analysis under real Botnet attacks, we show that our proposed scheme provides high detection rate by using abnormal models as well as low FP rate by adding white list and signatures.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123916510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Dynamic Web Service Composition Based on Service Integration and HTN Planning 基于服务集成和HTN规划的动态Web服务组合
Xinhuai Tang, F. Tang, L. Bing, D. Chen
{"title":"Dynamic Web Service Composition Based on Service Integration and HTN Planning","authors":"Xinhuai Tang, F. Tang, L. Bing, D. Chen","doi":"10.1109/IMIS.2013.58","DOIUrl":"https://doi.org/10.1109/IMIS.2013.58","url":null,"abstract":"Web Service Composition is an important but challenging issue because of the large number and dynamicity of Web services. This paper proposed a dynamic Web service composition framework which based on OWL-S and HTN planning. It uses OWL-S as Web service description language and HTN planning engine to calculate service execution sequence dynamically. Under this framework, we firstly develop a service integration algorithm based on an improved K-Means algorithm. Based on the proposed service integration algorithm, we design a two-stage service match algorithm, which reduce the time cost of service match making with a large number of services. In particular, our HTN planning approach is based on several service types, not all the service instances, which greatly improve the efficiency of the planning procedure.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Social Aware Assisted Transmission in MANET MANET中的社会意识辅助传输
Hung-Chin Jang, Pei Lee
{"title":"Social Aware Assisted Transmission in MANET","authors":"Hung-Chin Jang, Pei Lee","doi":"10.1109/IMIS.2013.64","DOIUrl":"https://doi.org/10.1109/IMIS.2013.64","url":null,"abstract":"With the coming of information era, our lives have been filled with varied mobile devices. Due to the popularity of mobile devices, Mobile Ad Hoc Network (MANET) has been widespread more than ever. However, \"how to obtain trustworthy information from trusty nodes through social network \" is a significant issue. This research gears toward social aware assisted transmission in MANET. In this paper, social network analysis techniques are employed to analyze the relationship among users to select appropriate node for message forwarding. We propose an Ego-Centric Social Network Routing (ECSNR) method, which stems from the concept of ego network. ECSNR considers those neighbor nodes of either social aware or non-social aware nodes within its communication range for message forwarding. ECSNR uses degree centrality, betweenness centrality, interest similarity, and friend diversity to accelerate message transmission and enhance successful message delivery. Besides, ECSNR has built-in redundant plan for overloaded nodes. The plan uses candidate list, recommended list, and interest-similar list to help select alternative nodes without having to waste time in recalculating new delivery path. ECSNR is compared with SANE [3] through simulations. Simulation results show that ECSNR outperforms SANE in packet delivery ratio, end-to-end delay, and average hop count.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121506219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-generating Procedure and Second Grey Relational Analysis 多生成程序与二次灰色关联分析
Neng-Yih Shih, Hsing-Chung Chen
{"title":"Multi-generating Procedure and Second Grey Relational Analysis","authors":"Neng-Yih Shih, Hsing-Chung Chen","doi":"10.1109/IMIS.2013.106","DOIUrl":"https://doi.org/10.1109/IMIS.2013.106","url":null,"abstract":"The objective of this paper is to study grey relational analysis of the series similarity and approximation. Application the generating procedure produces new data series which physical properties similar the velocity and acceleration. With the original data there are total of three sets of data series. Respectively, the application of traditional Deng's grey relational grade calculates grey relational grade by two loops computing that has real relational response. With several simulations are validated the model that have the result of feasibility and effectiveness.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dual-Antenna and Mobile Relay Station Based Handover in Distributed Antenna System for High-Speed Railway 高速铁路分布式天线系统中基于双天线和移动中继站的切换
Xingyu Qian, Hao Wu, Jia Meng
{"title":"A Dual-Antenna and Mobile Relay Station Based Handover in Distributed Antenna System for High-Speed Railway","authors":"Xingyu Qian, Hao Wu, Jia Meng","doi":"10.1109/IMIS.2013.103","DOIUrl":"https://doi.org/10.1109/IMIS.2013.103","url":null,"abstract":"When a train speeds up to 350km/h, it is challenging for continuous wireless coverage due to a number of critical issues, e.g. frequent handover and drop-offs. To address this problem, this paper proposes a novel handover scheme based on the dual antennas and Mobile Relay Station (MRS) for High Speed Railway (HSR) Distributed Antenna System (DAS). The scheme enables the dual antennas controlled by the MRS to receive signals from multiple Remote Antenna Units (RAUs), thus obtaining diversity gain when the train moves within one logic cell. While the train runs through the edge of a logic cell, a dual-antenna handover scheme is adopted to enhance the handover performance. Thereby, the proposal improves the quality of the received signal and provides reliable communication for train-tog round network. The numerical analysis and simulation results show the proposed handover scheme can reduce handover frequency dramatically and provide the seamless access for HSR compared to the standard LTE handover scheme.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Breast Tumor Segmentation Based on Level-Set Method in 3D Sonography 基于水平集方法的三维超声乳腺肿瘤分割
Yu-Chih Lin, Yu-Len Huang, Dar-Ren Chen
{"title":"Breast Tumor Segmentation Based on Level-Set Method in 3D Sonography","authors":"Yu-Chih Lin, Yu-Len Huang, Dar-Ren Chen","doi":"10.1109/IMIS.2013.114","DOIUrl":"https://doi.org/10.1109/IMIS.2013.114","url":null,"abstract":"Malignant and benign breast tumors exist discrepancies in their shape and size on sonography. Morphological information provided by the contour of tumor is important in clinical diagnosis. However, ultrasound images contain noises and tissue texture, clinical diagnosis must highly depend on expertise experience. The manual way to sketch 3D breast tumor contour is a time-consuming and complicated task. Automatic contour which provides similar contour with manual sketch of the breast tumor in the ultrasonic images might assist physicians in making an accurate diagnosis. This study presents an efficient segmentation procedure which based on level-set method for automatically detecting contours of breast tumors in 3D sonography. The proposed method always identified similar contours as were obtained by manual contouring of the breast tumor and could save much of the time required to sketch precise contours.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client HTTP客户端中httpendrequest挂接用户认证的安全性评估
Kyungroul Lee, Hyungjun Yeuk, Sungkwan Kim, Kangbin Yim
{"title":"Security Assessment on User Authentication by an HttpSendRequest Hooking in an HTTP Client","authors":"Kyungroul Lee, Hyungjun Yeuk, Sungkwan Kim, Kangbin Yim","doi":"10.1109/IMIS.2013.127","DOIUrl":"https://doi.org/10.1109/IMIS.2013.127","url":null,"abstract":"Most current user authentications on the web server use the server/client based HTTP protocol. In the past, the ID-password based user authentication is exposed the plaintext on the network, because of this problem, the user authentication using the SSL is researched. Through this solution, transferred the user authentication information is able to protect on the network. Nevertheless, a novel problem comes to the fore as an attack using vulnerability of the platform and it causes exposure of the user authentication information. In particular, the attacker utilizes the hooking technique for steal the user authentication information by HttpSendRequest function that sends the user authentication or connection related information. Therefore, in this paper, we analyze this kind of vulnerability and draw its result using implemented sample proof-of concept tools.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131771764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Information Systems in Ubiquitous Computing 普适计算中的认知信息系统
M. Ogiela, L. Ogiela
{"title":"Cognitive Information Systems in Ubiquitous Computing","authors":"M. Ogiela, L. Ogiela","doi":"10.1109/IMIS.2013.49","DOIUrl":"https://doi.org/10.1109/IMIS.2013.49","url":null,"abstract":"In this publication will be described the most important areas of application of intelligent, cognitive information systems in pervasive and urban computing. Such systems are mainly designed to perform a semantic analysis of complex visual information and multidimensional data structures, as well as human-being behavioral analysis. In our paper will be presented the ways of application of such systems, in security, economical or financial areas. The paper will also describe the safety features for developed systems, and possible application in information management.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133736361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Two-Step P2P Traffic Classification with Connection Heuristics 基于连接启发式的两步P2P流量分类
Wujian Ye, Kyungsan Cho
{"title":"Two-Step P2P Traffic Classification with Connection Heuristics","authors":"Wujian Ye, Kyungsan Cho","doi":"10.1109/IMIS.2013.31","DOIUrl":"https://doi.org/10.1109/IMIS.2013.31","url":null,"abstract":"The basis of P2P traffic control is to classify P2P traffic accurately. Several methods such as port-based, signature-based, pattern-based and statistics-based method have been proposed for P2P traffic classification. However, as P2P applications have tried to avoid being easily detected, it becomes hard to classify P2P traffic accurately using only one method. In this paper, we propose an improved two-step P2P traffic classifier by combining signature-based classifier with connection heuristics in packet-level, and statistics-based classifier in flow-level. With connection heuristics, our scheme detects P2P traffic quickly in packet-level classification and reduces the amount of computation. Through verification with real datasets, we show that our two-step scheme has high accuracy and low overhead compared to simple combination of signature-based scheme and statistics-based scheme.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116933278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信