2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Performance and Power Estimation for Mobile-Cloud Applications on Virtualized Platforms 虚拟化平台上移动云应用的性能和功耗评估
Shih-Hao Hung, Fu-Tien Liang, Chia-Heng Tu, N. Chang
{"title":"Performance and Power Estimation for Mobile-Cloud Applications on Virtualized Platforms","authors":"Shih-Hao Hung, Fu-Tien Liang, Chia-Heng Tu, N. Chang","doi":"10.1109/IMIS.2013.52","DOIUrl":"https://doi.org/10.1109/IMIS.2013.52","url":null,"abstract":"Performance optimization and energy-saving have become major challenges for both hardware designers and software developers of mobile systems due to limited battery capacities. Analysis of the performance and power consumption in such a system and employment of energy-saving techniques as early as possible are keys to competitive products designs. With virtual platforms powered by simulation/emulation engines to help hardware designers in the early design stages for verifying the functional correctness of a hardware design or testing software applications before the hardware is ready, we propose a framework to further support hardware/software co-design with advanced performance and power analysis facilities. Our case studies and experimental results show that our framework can reflect the performance and power behavior of mobile-cloud applications and help hardware/software designers in reducing the energy consumption on these systems.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124208084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Improved Direct Trust Evaluation Algorithm for the Context-Aware Trust Model 上下文感知信任模型中一种改进的直接信任评估算法
Yao Ma, Hongwei Lu, Zaobin Gan
{"title":"An Improved Direct Trust Evaluation Algorithm for the Context-Aware Trust Model","authors":"Yao Ma, Hongwei Lu, Zaobin Gan","doi":"10.1109/IMIS.2013.40","DOIUrl":"https://doi.org/10.1109/IMIS.2013.40","url":null,"abstract":"The traditional trust models that concern single service with constant contexts are inapplicable to deal with the data sparsity problem caused by the diversity of services and contexts. The existing context-aware trust models try to solve this problem by referring to the similarity of services in trust evaluation with low calculation efficiency. In this paper, we propose a Leader-Follower clustering based direct trust evaluation algorithm for the context-aware trust model. The direct trust evaluation for the forthcoming interaction is on the basis of the clusters of trust reference set other than every recent interaction record. The simulation experiment shows that the proposed method can obtain accurate direct trust evaluation result even lacking recent interaction experience for the current service, but the calculation efficiency is higher than the existing context-aware trust evaluation methods.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122385613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Novel Approach to Joint Source-Channel Coding for Scalable Video Transmission 一种用于可扩展视频传输的源信道联合编码新方法
Yuxing Wu, Xingjun Zhang, Song Cen, Xiaoshe Dong, I. You
{"title":"A Novel Approach to Joint Source-Channel Coding for Scalable Video Transmission","authors":"Yuxing Wu, Xingjun Zhang, Song Cen, Xiaoshe Dong, I. You","doi":"10.1109/IMIS.2013.19","DOIUrl":"https://doi.org/10.1109/IMIS.2013.19","url":null,"abstract":"Video source coding and transmission may both cause distortion of the video content, and these two types of distortions usually influence each other. There is a fundamental tradeoff between them for achieving the best video transmission quality. We analyze the effect of the source coding distortion and transmission distortion to video quality, and propose a video transmission scheme based on fountain code and unequal protection. A rate distortion model is presented to formulate the video transmission system in a bandwidth limited network. The unequal protection for different layers of scalable video coding is investigated, and an algorithm that can be used to determine the source rate of the video coding and the redundancy amount assigned to each layer is proposed. The experimental results show that, using this method, the optimal quality of video transmission can be achieved and the distortion of the video transmission can be reduced dramatically.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128333528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Certificate-Based Proxy Re-encryption for Public Cloud Storage 公有云存储基于证书的代理重加密
Chul Sur, Youngho Park, Sanguk Shin, K. Rhee, Changho Seo
{"title":"Certificate-Based Proxy Re-encryption for Public Cloud Storage","authors":"Chul Sur, Youngho Park, Sanguk Shin, K. Rhee, Changho Seo","doi":"10.1109/IMIS.2013.35","DOIUrl":"https://doi.org/10.1109/IMIS.2013.35","url":null,"abstract":"Recently cloud computing paradigm has increasingly become a new model in which a shared pool of configurable computing resources is provided as services over the Internet. Specially, this paradigm encourages an efficient model for data sharing among cloud users since data owners are able to outsource their data to public cloud storage which can provide access to the data as a service. Considering the useful data sharing model in the cloud, however, it brings new security challenges that make users apprehensive about data confidentiality for their sensitive data on public cloud storage. In this paper, we introduce the notion of certificate-based proxy re-encryption as a new cryptographic primitive to effectively support the data confidentiality on the outsourced data in public cloud storage. In particular, we give a formal security model for secure certificate-based proxy re-encryption schemes and present a concrete scheme based on bilinear pairing, which enjoys the advantages of certificate-based encryption while providing the functionalities of proxy re-encryption. Finally, we show that our scheme has chosen cipher text security in the random oracle model.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128556919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Secure RFID Authentication Scheme for Medicine Applications 一种用于医学应用的安全RFID认证方案
Z. Wu, Tzer-Long Chen, Sung-Chiang Lin, Charlotte Wang
{"title":"A Secure RFID Authentication Scheme for Medicine Applications","authors":"Z. Wu, Tzer-Long Chen, Sung-Chiang Lin, Charlotte Wang","doi":"10.1109/IMIS.2013.37","DOIUrl":"https://doi.org/10.1109/IMIS.2013.37","url":null,"abstract":"RFID could be applied to merely about every section in hospitals, including blood bag management, medical record management, precious medical equipment tracking, discarded object management, emergency medical care tracking, resident healthcare monitoring, patient identification, operating room management, nursery management, drug logistics management, and entry access control. All of them could be well handled with RFID technology. Within such RFID applications, enhancing patients' privacy is considered as the primary task. Nevertheless, the limited computational power of RFID tags indicates that they cannot execute complex cryptographic functions. Consequently, the design of an efficient and secure protocol for RFID systems not employing complex cryptographic techniques is an important issue. Although many authentication protocols have recently been developed for RFID, they either cannot protect the location privacy of tags nor have high overhead on identifying tags for the back-end server. None of them provide satisfactory solutions for both problems at the same time. This study proposes an efficiently mutual authentication scheme for RFID that not only guarantees the location privacy of tags, but also efficiently identifies tags for the back-end server.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis on Smart Warning System for Home Network in Smart Grid 智能电网中家庭网络智能预警系统分析
Hoon Ko
{"title":"Analysis on Smart Warning System for Home Network in Smart Grid","authors":"Hoon Ko","doi":"10.1109/IMIS.2013.129","DOIUrl":"https://doi.org/10.1109/IMIS.2013.129","url":null,"abstract":"Many users usually want to know how much they spend an electricity of all devices in home over their smart devices in real-time. Also, they would like to monitor and to control them to avoid an electricity waste. However, it is very hard to catch them, because they are outside to work at each company [5]. Important thing is that they have no idea what point they have to use to decide how much they are wasting [8]. It means that they can't get the exact decision if all electricity would be wasting at the moment. So, we decide to set the standard point to catch their overuse. In this paper, we suggest Smart Warning System (SWS) which defines the amount of the recommended electricity value named Smart Base Value (SBV) for a day or for a month by analyzing the stored data. Finally, it expects that we save an electricity waste with this system.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124234479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low-Energy Adaptive Clustering Hierarchy Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks 基于交叉覆盖算法的无线传感器网络低能量自适应聚类层次结构
Young-Long Chen, F. Cheung, Yung-Chi Chang
{"title":"A Low-Energy Adaptive Clustering Hierarchy Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks","authors":"Young-Long Chen, F. Cheung, Yung-Chi Chang","doi":"10.1109/IMIS.2013.110","DOIUrl":"https://doi.org/10.1109/IMIS.2013.110","url":null,"abstract":"In wireless sensor networks (WSNs), the sensor nodes are randomly deployed, and energy is limited. Energy consumption reduction is therefore very important. To extend the system lifetime, we used the intersection-based coverage algorithm (IBCA) to address lifetime, its introduction causes sensor nodes to enter sleep mode when not operating. This algorithm can achieve reduced energy consumption in transmission. And we then combine IBCA with Low-energy adaptive clustering hierarchy (LEACH) architecture to improve system performance. Simulation results show that the performance of our proposed LEACH architecture with IBCA perform better than LEACH architecture with phase-based coverage algorithm (PBCA) in terms of energy consumption, number of surviving nodes and sensing areas.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Opportunistic Spectrum Sharing Based Resource Allocation for Wireless Virtualization 基于机会频谱共享的无线虚拟化资源分配
Mao Yang, Yong Li, Depeng Jin, Jian Yuan, L. Su, Lieguang Zeng
{"title":"Opportunistic Spectrum Sharing Based Resource Allocation for Wireless Virtualization","authors":"Mao Yang, Yong Li, Depeng Jin, Jian Yuan, L. Su, Lieguang Zeng","doi":"10.1109/IMIS.2013.18","DOIUrl":"https://doi.org/10.1109/IMIS.2013.18","url":null,"abstract":"Wireless virtualization has been proposed as a promising way to overcome the current plight of the wireless network, i.e. spectrum crisis, by enabling multiple concurrent wireless virtual networks running on shared wireless substrate resource. However, making efficient use of the underlying spectrum requires effectively assigning the physical spectrum resources to several virtual networks. Since opportunistic spectrum sharing makes wireless communication more intelligent and efficient, we present an opportunistic spectrum sharing based resource allocation scheme for wireless virtualization. First, we formulate the resource allocation problem as an NP-Hard integer program through employing opportunistic spectrum sharing. Then, we propose a dynamic programming algorithm and a heuristic algorithm to solve it. Simulation results confirm the advantage of our algorithms and show that opportunistic spectrum sharing significantly improves the revenue, resource utilization and accept rate while decreasing the payments of virtual networks.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Self-Evolved Ontology-Based Service Personalization Framework for Disabled Users in Smart Home Environment 智能家居环境下残障用户基于本体的自进化服务个性化框架
Mye M. Sohn, Sunghwan Jeong, Hyun Jung Lee
{"title":"Self-Evolved Ontology-Based Service Personalization Framework for Disabled Users in Smart Home Environment","authors":"Mye M. Sohn, Sunghwan Jeong, Hyun Jung Lee","doi":"10.1109/IMIS.2013.48","DOIUrl":"https://doi.org/10.1109/IMIS.2013.48","url":null,"abstract":"Providing context-aware personalized service in smart home environment is very important to improve the quality of the disabled life. To reaching the goal, it needs to challenge due to diversity of needs: type of disability, degree of disability, preferences, tasks, and context. We propose a framework to recommend context-aware personalized services for the disabled in smart home environment called SOLVE-D. Main module of SOLVE-D is ontology repository that is consisted of three ontologies: generic service ontology, personalized service ontology, and service context ontology. The ontologies interact with each other to recommend context-aware personalized services, and to increase the quality of personalized services for disabled person in smart home environment. In addition, to support self-evolved ontologies and to provide the optimal service, SOLVE-D has follow modules such as Standard Service Recommendation Module (SSRM), Personalized Service Recommendation Module (PSRM), Personalized Service Ontology Generation Module (PSOGM), and Context and PSO Mapping Module (CPMM). The proposed ontologies and various modules of SOLVE-D are in perfect harmony to provide context-aware personalized services for` disabled users.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127863336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An Energy Efficient Virtual Machine Placement Algorithm with Balanced Resource Utilization 一种资源均衡利用的高能效虚拟机布局算法
Wei Huang, Xin Li, Zhuzhong Qian
{"title":"An Energy Efficient Virtual Machine Placement Algorithm with Balanced Resource Utilization","authors":"Wei Huang, Xin Li, Zhuzhong Qian","doi":"10.1109/IMIS.2013.59","DOIUrl":"https://doi.org/10.1109/IMIS.2013.59","url":null,"abstract":"Virtualization is a key technology for resource sharing in IaaS/PaaS cloud infrastructures. One primary issue in virtualization is the virtual machine placement (VMP) problem, which is to choose proper physical machine (PM) to deploy virtual machines (VMs) in runtime. In this paper, we study the VMP problem with the goal of minimizing the total energy consumption. We first present a multi-dimensional space partition model to characterize the resource usage states of PMs. Based on this model, we then propose a virtual machine placement algorithm, which can balance the utilization of multi-dimensional resources, reduce the number of running PMs and thus lower down the energy consumption. We also evaluate our proposed balanced algorithm via extensive simulations. Simulation results show that our approach can save as much as 15% energy compared to the first fit algorithm over a long run.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131361205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信