2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Creating Pervasive, Dynamic, Scalable Android Applications 创建普遍的,动态的,可扩展的Android应用程序
Shih-Hao Hung, Yong-Wei Chen, Jeng-Peng Shieh
{"title":"Creating Pervasive, Dynamic, Scalable Android Applications","authors":"Shih-Hao Hung, Yong-Wei Chen, Jeng-Peng Shieh","doi":"10.1109/IMIS.2013.17","DOIUrl":"https://doi.org/10.1109/IMIS.2013.17","url":null,"abstract":"Smart mobile devices and wireless networks have reshaped the way people execute applications and access information. Many of today's mobile applications are programmed to rely on cloud services to augment the execution of sophisticated tasks with the assumption that the smartphone does not have enough computational resources to handle the tasks in time. However, the current application development model has several shortcomings. First, it can be difficult for a developer to decide how to partition a mobile application if the application workload cannot be known in advance and will be performed by a wide range of devices. Second, to get an application augmented, the application user is required to subscribe to a service, which causes additional efforts and privacy risks. Third, a mobile application that relies on the support of the server-side can suffer seriously from poor network connectivity. The work described in this paper enhances the current Android application framework to address the aforementioned shortcomings. First, we introduce the notion of personal application cloud (PAC), which is a unified service that the user can use to augment many applications without revealing personal data to the application vendors. Then, we provide an application programming interface and runtime support for the developers to create pervasive, scalable Android applications whose execution and data can be dynamically migrated and scaled to benefit from PAC. In addition to the design and implementation of the enhanced framework, latest experimental results are presented as well.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Obstacles of Constructing a Learning Government and Resolution 构建学习型政府的障碍及其解决
Dai Changqiao
{"title":"The Obstacles of Constructing a Learning Government and Resolution","authors":"Dai Changqiao","doi":"10.1109/IMIS.2013.145","DOIUrl":"https://doi.org/10.1109/IMIS.2013.145","url":null,"abstract":"Government has a flat structure consisting of several parts. The establishment of learning government is facing with great obstacles because of traditional bureaucratic organization structure. To eliminate these obstacles, must take effective measures: creating an electronic government with the use of information technology, reengineering the governmental process, outsourcing part of governmental services, restructuring the government, reducing the size of government and reducing the government redundancy, reforming the administrative divisions in all levels, putting up the governmental teams in governmental organizations.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126420403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Approach for Service Prosumerization in IoT Scenarios 物联网场景下服务消费化的系统方法
Diego Martín de Andrés, R. Alcarria, T. Robles, A. Dominguez
{"title":"A Systematic Approach for Service Prosumerization in IoT Scenarios","authors":"Diego Martín de Andrés, R. Alcarria, T. Robles, A. Dominguez","doi":"10.1109/IMIS.2013.89","DOIUrl":"https://doi.org/10.1109/IMIS.2013.89","url":null,"abstract":"Mobile prosumer environments describe situations in which non-expert users have the possibility to create and provide their own services to others in a prosumer framework. This paper describes a systematic approach for leveraging current IoT scenarios, where two types of roles (developers and prosumers) interact in order to develop a framework that would allow users to create and publish useful services in IoT scenarios. This paper also discusses the responsibilities of both roles, activities to be carried out, the challenges to be faced, and a proposal of best practices for this kind of development. Our proposed method is tested by the development of a service personalization environment based on Web technologies in the field of drug management in hospital pharmacy.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121129124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Biometrics-based Data Link Layer Anonymous Authentication in VANETs VANETs中基于生物特征的数据链路层匿名认证
Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, Kangbin Yim, Guowei Wu
{"title":"Biometrics-based Data Link Layer Anonymous Authentication in VANETs","authors":"Lin Yao, Chi Lin, Jing Deng, Fangyu Deng, Jingwei Miao, Kangbin Yim, Guowei Wu","doi":"10.1109/IMIS.2013.38","DOIUrl":"https://doi.org/10.1109/IMIS.2013.38","url":null,"abstract":"The vehicular ad-hoc network (VANET) aims to make road traffic safer and more efficient. Security and privacy are two important but somewhat contradictory objectives. On the one hand, vehicle-to-vehicle (V2V) authentication requires drivers to present some individual credentials. On the other hand, drivers need privacy protections on their identities, physical locations, and other contextual information. No sensitive information should be unnecessarily exposed during the authentication phase. Therefore, anonymous authentication is expected to play a critical role in VANET. In this paper, we propose a novel biometrics-based anonymous mutual authentication with provable link-layer location privacy preservation. During its authentication phase, two vehicles negotiate their temporary session key and generate two temporary MAC addresses. These two addresses, instead of the real ones, are used in all future communication frames. We further protect the biometric privacy with the help of a biometric encryption technique. Our analysis and simulation results show that the protocol is superior and lightweight with strong security and privacy protection.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123297930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Static Birthmark for MS Windows Applications Using Import Address Table 使用导入地址表的MS Windows应用程序的静态胎记
JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, L. Chung
{"title":"A Static Birthmark for MS Windows Applications Using Import Address Table","authors":"JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Minkyu Park, Youngsang Song, L. Chung","doi":"10.1109/IMIS.2013.159","DOIUrl":"https://doi.org/10.1109/IMIS.2013.159","url":null,"abstract":"A software birthmark is unique and native characteristics of software, and thus can be used to detect the theft of software. We propose a new static software birthmark for programs on Microsoft Windows which have Portable Executable (PE) format. These programs use different Dynamic Link Libraries (DLLs) and Application Program Interfaces (APIs) while they are executing. The number and names of the used DLLs and APIs are unique to each program. The proposed birthmark is based on these numbers and names. This information can be obtained from the Import Address Table (IAT), which is part of the PE file. By inspecting the proposed birthmark, we can identify certain software and detect pirated software. To evaluate the effectiveness of the proposed birthmark, we inspect and compare several applications of different kinds. The experimental results show that the proposed birthmark can identify Windows applications, leading to the prevention of an illegal distribution of copyrighted software.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Study on Big Data Center Traffic Management Based on the Separation of Large-Scale Data Stream 基于大规模数据流分离的大数据中心流量管理研究
Hyoungwoo Park, I. Yeo, Jongsuk Lee, H. Jang
{"title":"Study on Big Data Center Traffic Management Based on the Separation of Large-Scale Data Stream","authors":"Hyoungwoo Park, I. Yeo, Jongsuk Lee, H. Jang","doi":"10.1109/IMIS.2013.104","DOIUrl":"https://doi.org/10.1109/IMIS.2013.104","url":null,"abstract":"The network of traditional data center has been usually designed and constructed for the provision of user's equal access of data centre's resource or data. Therefore, network administrators have a strong tendency to manage user traffic from the viewpoint that the traffic has a similar size and characteristics. But, the emersion of big data begins to make data centers have to deal with 1015 byte-data transfer at once. Such a big data transfer can cause problems in network traffic management in the existed data center. And, the tiered network architecture of the legacy data center magnifies the magnitude of the problems. One of the well-known big data in science is from large hadron collider such as LHC in Swiss CERN. CERN LHC generates multi-peta byte data per year. From our experience of CERN data service, this paper showed the impact of network traffic affected by large-scale data stream using NS2 simulation, and then, suggested the evolution direction based on separating of large-scale data stream for the big data center's network architecture.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Environmental Effect Removal Based Structural Health Monitoring in the Internet of Things 物联网中基于环境影响去除的结构健康监测
Hongyang Zhang, Junqi Guo, Xiaobo Xie, R. Bie, Yunchuan Sun
{"title":"Environmental Effect Removal Based Structural Health Monitoring in the Internet of Things","authors":"Hongyang Zhang, Junqi Guo, Xiaobo Xie, R. Bie, Yunchuan Sun","doi":"10.1109/IMIS.2013.91","DOIUrl":"https://doi.org/10.1109/IMIS.2013.91","url":null,"abstract":"Internet of things (IoT) has provided a promising choice for structural health monitoring (SHM) recently. In vibration-based structural health monitoring, structural features which are extracted from periodically spaced measurement using sensors are subject to variable environmental conditions. This paper proposes an environmental effect removal based structural health monitoring scheme in an IoT environment. Principal component analysis (PCA) is employed to eliminate environment effects from sensor data which contain both real vibration feature of architectural structure and environmental interferences. After environmental effects removal, Hilbert-Huang transformation (HHT) which is a classical method for signal analysis is used for structural health analysis and monitoring. Simulation results show that the proposed scheme achieves high accuracy in structural health monitoring and robust performance against environmental interferences.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
BGG: A Graph Grammar Approach for Software Architecture Verification and Reconfiguration 软件架构验证和重构的图语法方法
Chen Li, Linpeng Huang, Luxi Chen, Chengyuan Yu
{"title":"BGG: A Graph Grammar Approach for Software Architecture Verification and Reconfiguration","authors":"Chen Li, Linpeng Huang, Luxi Chen, Chengyuan Yu","doi":"10.1109/IMIS.2013.56","DOIUrl":"https://doi.org/10.1109/IMIS.2013.56","url":null,"abstract":"Software architecture provides an high level abstraction of large software systems. While most of architecture description techniques are incapable of capturing the change in the definition of software architecture directly. This paper provides an graph grammar - Breeze Graph Grammar (BGG), to describe the software architecture in terms of graphs. These graph grammars give an appropriate basis for architecture reconfiguration and style verification. In this approach, the architecture change is implemented by applying the reconfiguration operations which performed through BGG transformation rules, and the style verification is statically checked through the style constraints productions. A Client/Server application for demonstrating our approach is also provided as a running example throughout this paper.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134484240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Future Supermarket: Overcoming Food Awareness Challenges 未来超市:克服食品意识的挑战
S. Gonzalez-Miranda, R. Alcarria, T. Robles, A. Dominguez, Ignacio Gonzalez, E. Montcada
{"title":"Future Supermarket: Overcoming Food Awareness Challenges","authors":"S. Gonzalez-Miranda, R. Alcarria, T. Robles, A. Dominguez, Ignacio Gonzalez, E. Montcada","doi":"10.1109/IMIS.2013.87","DOIUrl":"https://doi.org/10.1109/IMIS.2013.87","url":null,"abstract":"As consumers' preferences evolve and product information grows in complexity, it becomes more difficult both for supermarkets to provide useful information describing products and for customers to select the most appropriate product based on social, ideological or particular preferences. Current shopping environments lack of specific tools for using customer profiles to provide them with information that really want to know (ecological, gluten free, etc.) about products. An IoT-leveraged information system is the perfect choice for filling the existing gap in the services for a Future Supermarket. This paper describes work done by implementing a methodology to involve customers in the development of a web pilot that contributes to the support of the Food Awareness concept by linking product information with consumer preferences deriving into faster product selection and speeding up purchase process. The web pilot developed is comprised of cloud-hosted interacting modules which fulfill requirements of customers. An analysis of user evaluation of web pilot is also presented.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The Impacts of Business Relational Characteristics on the Performance of Innovation Diffusion 企业关系特征对创新扩散绩效的影响
M. Huang, Perng-Fei Huang, Chao-Jung Wu
{"title":"The Impacts of Business Relational Characteristics on the Performance of Innovation Diffusion","authors":"M. Huang, Perng-Fei Huang, Chao-Jung Wu","doi":"10.1109/IMIS.2013.142","DOIUrl":"https://doi.org/10.1109/IMIS.2013.142","url":null,"abstract":"This study integrates relationship marketing and innovation diffusion theories to investigate how Business-to-Business relational characteristics influence the diffusion performance of innovative products through the mediation of relationship quality. An empirical study was conducted among 138 purchasing employees. The results show that relational characteristics including supplier relationship orientation, relationship investments and relationship benefits have positive impacts on customer perception for relationship quality. In turn, relationship quality (serves as a significant mediator) leads to suppliers' new product diffusion performance.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116085012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信