2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing最新文献

筛选
英文 中文
Localized Paging Scheme in PMIPv6 PMIPv6中的本地化分页方案
Zhiwei Yan, Jong‐Hyouk Lee, Ye Tian
{"title":"Localized Paging Scheme in PMIPv6","authors":"Zhiwei Yan, Jong‐Hyouk Lee, Ye Tian","doi":"10.1109/IMIS.2013.14","DOIUrl":"https://doi.org/10.1109/IMIS.2013.14","url":null,"abstract":"In Proxy Mobile IPv6 (PMIPv6) network, proxy registrations are performed even for idle Mobile Nodes (MNs), resulting in unnecessary signaling traffic. Although there have been many IP paging techniques aimed at reducing the unnecessary location updates, they mainly focused on Mobile IP (MIP) since it has been developed before PMIPv6 was proposed. To further promote the efficiency of PMIPv6, we propose a localized paging scheme, which pages the idle MN through the Mobility Access Gateway (MAG) and the operation is transparent to the Local Mobility Anchor (LMA). In this way, the bottleneck risk at LMA can be avoided, without the huge requirements of buffer and paging singling cost. We also develop a thorough analytical model for evaluating the performance of the proposed scheme. The results demonstrate that our paging scheme can significantly reduce the signaling cost for IP paging, compared with that of a mature paging scheme managed by LMA.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130433747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Evolutionary Computational Approach for Optimizing Broadcasting in Disaster Response Scenarios 灾难响应场景下广播优化的进化计算方法
Daniel Gutiérrez-Reina, S. T. Marín, J. M. León-Coca, F. Barrero, N. Bessis, E. Asimakopoulou
{"title":"An Evolutionary Computational Approach for Optimizing Broadcasting in Disaster Response Scenarios","authors":"Daniel Gutiérrez-Reina, S. T. Marín, J. M. León-Coca, F. Barrero, N. Bessis, E. Asimakopoulou","doi":"10.1109/IMIS.2013.25","DOIUrl":"https://doi.org/10.1109/IMIS.2013.25","url":null,"abstract":"Rescue teams require exchanging tactical information to efficiently adapt their behavior to the particular disaster response scenario conditions. Broadcasting is the main technique used to disseminate messages throughout nodes in ad hoc networks. Ad hoc networks are one of the most appealing networks to be used in disaster response scenario due to their decentralized and self-organizing features. While many broadcasting techniques have been presented for ad hoc networks, there are not adaptive broadcasting schemes for disaster response scenarios so far. The complexity of designing broadcasting protocols for disaster response scenarios is high due to the large number of factors affecting the communications among nodes, such as mobility, density, message collisions, etc. In this paper we propose an evolutionary computational approach for designing and optimizing a probability-based broadcast scheme using topological features of nodes. The validity of the proposed approach is shown through simulations.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121163202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Efficient Transmission Protocol Based on Network Coding in Delay Tolerant Networks 时延容忍网络中一种基于网络编码的高效传输协议
J. Sheu, Chih-Yin Lee, Chuang Ma
{"title":"An Efficient Transmission Protocol Based on Network Coding in Delay Tolerant Networks","authors":"J. Sheu, Chih-Yin Lee, Chuang Ma","doi":"10.1109/IMIS.2013.74","DOIUrl":"https://doi.org/10.1109/IMIS.2013.74","url":null,"abstract":"In Delay Tolerant Networks, the delay of packets is long due to the intermittent connections caused by the mobility of nodes. Epidemic Routing Protocol can reduce the delay time and raise the packet delivery rate by replicating and spread copies of source packets in the networks, but it inevitably exhaust memory resources and network bandwidth. In this paper, we propose a network coding with limited buffer routing protocol. When a buffer of a node is full, two packets in the buffer are chosen randomly and encoded linearly together in to a packet to save buffer space and improve the performance in many-to-one communications.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Thoughts on Tax Policy for Promoting the Development of SMEs 促进中小企业发展的税收政策思考
Deng Manyuan
{"title":"The Thoughts on Tax Policy for Promoting the Development of SMEs","authors":"Deng Manyuan","doi":"10.1109/IMIS.2013.153","DOIUrl":"https://doi.org/10.1109/IMIS.2013.153","url":null,"abstract":"SMEs are an important pillar of China's economic development, But now, our tax system in SME development is lagging behind, Including tax support system is not perfect, departments regardless the difference between cost and tax on practice and the tax service system cannot keep up with other issues, create an enabling system of tax incentives for SME development, distinguish the cases of tax and fees at different situations and establish green tax services channel for SMEs.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tradition and Innovation in Japanese Long-Established Companies: Focus on E-Business 日本老牌企业的传统与创新:以电子商务为重点
Hidekazu Sone
{"title":"Tradition and Innovation in Japanese Long-Established Companies: Focus on E-Business","authors":"Hidekazu Sone","doi":"10.1109/IMIS.2013.156","DOIUrl":"https://doi.org/10.1109/IMIS.2013.156","url":null,"abstract":"This paper discusses tradition and innovation in Japanese long-established companies and aims to demonstrate the unique characteristics of such companies with a focus on e-business. While it is thought that long-established companies hold stubbornly to tradition and that their management practices are archaic, in actuality, they are flexible in their adaptation to change. Among those adaptations, it is necessary to examine their response to the rapid development of e-business in recent years.To begin, we will provide overview of several long-establish companies upon which our study is based, including Kongo Gumi, and Yasuda-Nenju and Chuuboku-Chaya.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Link Selection Method for Disaster Oriented Mobile Network Based on OpenFlow Framework 基于OpenFlow框架的面向灾害的移动网络链路选择方法
Goshi Sato, K. Hashimoto, Noriki Uchida, Y. Shibata
{"title":"Network Link Selection Method for Disaster Oriented Mobile Network Based on OpenFlow Framework","authors":"Goshi Sato, K. Hashimoto, Noriki Uchida, Y. Shibata","doi":"10.1109/IMIS.2013.61","DOIUrl":"https://doi.org/10.1109/IMIS.2013.61","url":null,"abstract":"In this paper, we introduce a network link selection method for disaster oriented mobile network based on Software Defined Network framework using based on dynamic network reconfiguration method to improve the connectivity. Our network system is consisted of multiple mobile routers based on currently available wireless LANs. Those wireless networks are interconnected by OpenFlow Switch and their links are managed by OpenFlow Controller. The proper communication links can be selected based on the required network characteristic, such as electro-magnetic field strength, throughput, latency, packet loss rate and communication distance. In this paper, we designed and implemented a disaster information wireless network with currently available different wireless LANs and constructed a prototype system to evaluate the performance of the mobile router.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Global Perspective of Smart Cities: A Survey 智慧城市的全球视角:一项调查
S. Pellicer, Guadalupe Santa, Andrés L. Bleda, Rafael Maestre, A. Jara, A. Gómez-Skarmeta
{"title":"A Global Perspective of Smart Cities: A Survey","authors":"S. Pellicer, Guadalupe Santa, Andrés L. Bleda, Rafael Maestre, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2013.79","DOIUrl":"https://doi.org/10.1109/IMIS.2013.79","url":null,"abstract":"The technological revolution that has taken place in recent decades, driven by advances and developments in Information and Communication Technologies (ICT) has revolutionized the way people communicate, work, travel, live, etc. Cities need to evolve towards intelligent dynamic infrastructures that serve citizens fulfilling the criteria of energy efficiency and sustainability. This article provides an overview of the main smart city applications, and their implementation status in major cities around the world. We also present a study of patents on basic smart city technologies in order to show which countries and companies are making greater efforts to register the intellectual property. The relation between patented technologies and current ongoing smart city applications is also investigated.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 186
Analysis of Clustering Technique in Android Malware Detection Android恶意软件检测中的聚类技术分析
Aiman Ahmed Abu Samra, Osama A. Ghanem
{"title":"Analysis of Clustering Technique in Android Malware Detection","authors":"Aiman Ahmed Abu Samra, Osama A. Ghanem","doi":"10.1109/IMIS.2013.111","DOIUrl":"https://doi.org/10.1109/IMIS.2013.111","url":null,"abstract":"Mobile computing is an important field in information technology, because of the wide use of mobile devises and mobile applications. Clustering gives good results with information retrieval (IR), It aims to automatically put similar applications in one cluster. In this paper, we evaluate clustering techniques in Android applications. We explain how we can apply clustering techniques in malware detection of Android applications. We also use machine learning techniques in auto detection of malware applications in the Android market. Our evaluation is given by clustering two categories of Android applications: business, and tools. We have extracted 18,174 Android's application files in our evaluation using clustering. We extract the features of the applications from applications' XML-files which contains permissions requested by applications. The results gives a positive indication of using unsupervised machine learning techniques in malware detection in mobile applications using a combination of the application information and xml Android Manifest files.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115884670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Efficient Computing over GF(2^16) Using Graphics Processing Unit 图形处理单元在GF(2^16)上的高效计算
Satoshi Tanaka, T. Yasuda, Bo-Yin Yang, Chen-Mou Cheng, K. Sakurai
{"title":"Efficient Computing over GF(2^16) Using Graphics Processing Unit","authors":"Satoshi Tanaka, T. Yasuda, Bo-Yin Yang, Chen-Mou Cheng, K. Sakurai","doi":"10.1109/IMIS.2013.151","DOIUrl":"https://doi.org/10.1109/IMIS.2013.151","url":null,"abstract":"Evaluating non-linear multivariate polynomial systems over finite fields is an important subroutine, e.g., for encryption and signature verification in multivariate cryptography. The security of multivariate cryptography definitely becomes lower if a larger field is used instead of GF(2) given the same number of bits in the key. However, we still would like to use larger fields because multivariate cryptography tends to run faster at the same level of security if a larger field is used. In this paper, we compare the efficiency of several techniques for evaluating multivariate polynomial systems over GF(216) vi their implementations on graphics processing units.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TSR: Topology Reduction from Tree to Star Data Grids TSR:从树到星数据网格的拓扑约简
Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen
{"title":"TSR: Topology Reduction from Tree to Star Data Grids","authors":"Ming-Chang Lee, Fang-Yie Leu, Ying-ping Chen","doi":"10.1109/IMIS.2013.122","DOIUrl":"https://doi.org/10.1109/IMIS.2013.122","url":null,"abstract":"To speed up data transmission of data grids, several co-allocation schemes have been proposed. However, data grids are often large in scale, heterogeneous in participating resources, and complicated in architecture and network topology, consequently increasing the analytical complexity of its data transmission behaviour. In other words, if we can reduce the data transmission topology for the grid, the analysis will be easier. Therefore, in this paper, we propose a topology reduction approach, called the Tree-to-Star Reduction method (TSR for short), which can reduce a packet delivery tree topology to a star for a data grid so that the data transmission of a co-allocation scheme can be more conveniently analyzed. Here, a delivery tree topology, as a tree topology rooted at the destination node, is a network topology for delivering all fragments of a file to the destination node.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信