JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Minkyu Park, Sangchul Han, I. You, Inshik Song
{"title":"A Survey of Feature Extraction Techniques to Detect the Theft of Windows Applications","authors":"JongCheon Choi, Yongman Han, Seong-je Cho, Haeyoung Yoo, Minkyu Park, Sangchul Han, I. You, Inshik Song","doi":"10.1109/IMIS.2013.131","DOIUrl":"https://doi.org/10.1109/IMIS.2013.131","url":null,"abstract":"As software industry has been grown, it occurs more frequently to illegally copy software or to steal the core modules of a program. In order to detect program plagiarism, similarity analysis of suspicious programs based on source codes is one of accurate methods. However, the source codes are not always available. Therefore, it is necessary to analyze and determine software piracy or theft with only binary executables that are release versions of their products. In this paper, we propose a method to extract the feature information from the binary codes of the executable files on MS Windows systems in order to determine whether software is pirated or core modules of a program are stolen. We perform a small experiment to detect program similarity and plagiarism by comparing the statically extracted features of target programs.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"128 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123243542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chai-Hien Gan, Yung-Chun Lin, Shun-Neng Yang, Yi-Bing Lin
{"title":"A Seamless Multi-link Switch Solution for LTE and Wi-Fi Integrated Networks","authors":"Chai-Hien Gan, Yung-Chun Lin, Shun-Neng Yang, Yi-Bing Lin","doi":"10.1109/IMIS.2013.13","DOIUrl":"https://doi.org/10.1109/IMIS.2013.13","url":null,"abstract":"Today, smart mobile devices drive the mobile traffic growth rapidly. The Integration of multiple radio access technologies is a viable solution for mobile operators to fulfill users' data usage. In this paper, we consider the inter work issue for the LTE and Wi-Fi integration network. Based on the GPRS Tunneling Protocol (GTP), a multi-link switch approach is proposed to solve the seamless handover and cooperating issues between LTE and Wi-Fi networks. The performance results show that the average switch delay is slight, which is efficient to support most of real-time application services, such as VOIP service and interactive games.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123637953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transitivity Reasoning for RDF Ontology with Iterative MapReduce","authors":"Bumsuk Jang, Young-guk Ha","doi":"10.1109/IMIS.2013.47","DOIUrl":"https://doi.org/10.1109/IMIS.2013.47","url":null,"abstract":"As growing of the Web, there are many efforts to use knowledge in formal language. The most popular work of the formal language is \"LOD(linked open data)\" initiative based on RDF(s). Most previous work for RDFs Reasoning is based on single reasoning machine. However, reasoning for large volume of RDFs is became a challenging issue as increasing of RDFs dataset such as LOD because previous work such as Jena can't handle the large scale of RDF dataset in the Internet. Transitivity reasoning which is most complicated one of RDFs reasoning rules generates monotone increasing dataset (transitive closure) continuously. This work proposes distributed reasoning method for large scale of RDFs dataset based on MapReduce algorithm. We analysis distributed RDFs reasoning and propose a distributed reasoning method. We implement the proposed method and reveals experimental results to show performance of our method.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ali-Ahmad, K. Munir, X. Lagrange, M. Ouzzif, P. Bertin
{"title":"Analysis of SIP-Based Location Updates in Distributed Mobility Management Schemes","authors":"H. Ali-Ahmad, K. Munir, X. Lagrange, M. Ouzzif, P. Bertin","doi":"10.1109/IMIS.2013.12","DOIUrl":"https://doi.org/10.1109/IMIS.2013.12","url":null,"abstract":"Recently, various efforts are being conducted on specifying Distributed Mobility Management (DMM). DMM aims at eliminating the limitations of current mobility protocols in order to cope with the rapid growth in mobile data traffic. However, the DMM schemes face generally the location management issue. In this paper, we propose a location management approach based on the Session Initiation Protocol (SIP), that is adapted for the DMM schemes. Then, we carry out a performance analysis, comparing the proposed approach with the default mode of SIP. The results show that the proposed approach reduces significantly the location updates load on the SIP servers.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Cognitive Radio Networks with Imperfect Sensing and Backup Channels","authors":"Jyu-Wei Wang, Ramzi Adriman","doi":"10.1109/IMIS.2013.112","DOIUrl":"https://doi.org/10.1109/IMIS.2013.112","url":null,"abstract":"We study the performance of cognitive radio networks with imperfect spectrum sensing and backup channels (BCs). The cognitive radio network is an opportunistic spectrum access (OSA) network which consists of a primary system serving primary users (PUs) and a secondary system serving secondary users (SUs). There are N primary channels (PCs) licensed to PUs and M BCs dedicated to SUs. The PUs have strict priority over the SUs in utilizing PCs and the SUs first try to opportunistically access the PCs not occupied by the PUs temporarily. In case an SU is blocked from PCs, it then checks the BCs to find a free one. The system is modeled as a three-dimensional continuous-time Markov chain. We precisely specify the state-dependent transition rates due to imperfect sensing by simple recursive functions so that we are able to investigate the performance of the OSA system with imperfect sensing and BCs. Our results suggest that when the SUs opportunistically access the PCs alone with PUs operating in moderate or heavy loading conditions, the performance of SUs may be poor or unacceptable. By using some BCs to accommodate the SU calls blocked from PCs can significantly improve the performance.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-Aware for Smartphone Sensing in Over-the-Counter Market: Ambient Intelligence in Mobile Stock Markets","authors":"Mu-Yen Chen","doi":"10.1109/IMIS.2013.115","DOIUrl":"https://doi.org/10.1109/IMIS.2013.115","url":null,"abstract":"An Ambient Intelligence (AmI) environment is primary developed using intelligent agents and wireless sensor networks. The intelligent agents could automatically obtain contextual information in real time using Near Field Communication (NFC) technique and wireless ad-hoc networks. In this research, we propose a stock trading and recommendation system with mobile devices (Android platform) interface in the over-the-counter market (OTC) environments. The proposed system could obtain the real-time financial information of stock price through a multi-agent architecture with plenty of useful features. In addition, NFC is used to achieve a context-aware environment allowing for automatic acquisition and transmission of useful trading recommendations and relevant stock information for investors. Finally, AmI techniques are applied to successfully create smart investment spaces, providing investors with useful monitoring tools and investment recommendation.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134065464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fei Song, Yige Zhang, Zhaoxu An, Huachun Zhou, Hongke Zhang
{"title":"Connection Characteristics Analyses Based on Access Network Data","authors":"Fei Song, Yige Zhang, Zhaoxu An, Huachun Zhou, Hongke Zhang","doi":"10.1109/IMIS.2013.23","DOIUrl":"https://doi.org/10.1109/IMIS.2013.23","url":null,"abstract":"This paper mainly considers the analytical mechanism for Internet connection characteristics. We extract the real packet level trace from an access network border router. No sampling method is adopted to maintain the full information. Parameters inside connections are examined carefully. Different time bins are detected for comprehensive exploration. Then, the potential relationship between IP addresses and port numbers at both sides are investigated two-by-two. Thirdly, in order to figure out the properties of connection size and duration, the fluctuation of packets volume is demonstrated, together with connections number. A new scheme based on dynamic window is proposed to calculate duration time efficiently. The result has shown several interesting phenomenon: 1 minute is a suitable bin for capturing the pattern in macroscopic perspective, less connections might generate more packets, etc.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Cities as an Application of Internet of Things: Experiences and Lessons Learnt in Barcelona","authors":"Tomas Gea, J. Aspas, M. Lamarca, David Roldán","doi":"10.1109/IMIS.2013.158","DOIUrl":"https://doi.org/10.1109/IMIS.2013.158","url":null,"abstract":"Internet of things is a ubiquitous technology that will be present everywhere. One of the first applications will be smart cities. Cities are growing in population and citizens demand better services from the administration without increasing taxes. The only way to attend this demand is to improve information and how this is treated to take decisions. In other words, we should make the city smart. Smart cities are a novel concept that defines new technologies but also reuses some of the existing ones. All novel solutions phase the same problem: the lack of standards and widely accepted solutions. The City of Barcelona with the collaboration from research centers and industrial partners has been testing the smart city concept with the double purpose to contribute to the creation of standards and providing in the interim a solution to cope with the heterogeneity of providers, in particular from the wireless sensor part. This work has been structured as a \"Barcelona Intelligent City\" project or BCI. BCI project considers all the steps of the data process from its capture by a sensor network to the processing to make it relevant (pointing events that requires attention) and rich (with context information). Conclusions from the pilots has started to be applied. One example is the sensoring in civil works control. This paper includes some lines about Avinguda de l'Estatut Civil Works Project and its conclusions.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"31 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131791673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reward-Based Radio Interface Selection for Hybrid 4G UMTS and LTE Communications","authors":"Ben-Jye Chang, Ying-Hsin Liang, Kai-Xiang Cao","doi":"10.1109/IMIS.2013.11","DOIUrl":"https://doi.org/10.1109/IMIS.2013.11","url":null,"abstract":"To provide gigabit data rate for the forwarding link under high-mobility wireless communications, 3GPP specifies LTE/LTE-Advanced specifications as the 4G system that cooperate with the existing UMTS system. To balance loads among different communication interfaces in the hybrid cellular system is one of the most important issues that should be addressed for achieving efficient radio resource allocations. In a shared packet service, the 3GPP UMTS adopts the VSF-OFCDM interface to allocate orthogonal codes of an OVSF code tree in two-dimension (2D) spreading of the time and frequency domains. Nevertheless, UMTS suffers from high packet loss rate and high bandwidth waste rate. In 4G, although the LTE/LTE-Advanced interface offers a high data rate, it suffers from unbalanced loads and moderate reward. This paper thus proposes an adaptive radio interface selection for balancing loads between the UMTS and LTE/LTE-Advanced interfaces according to various interference and mobility environments. Numerical results indicate that the proposed approach outperforms other approaches in fairness, FRL and utilization.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133251693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kai-Di Chang, Chia-Yu Chang, Huei-Min Liao, Jiann-Liang Chen, H. Chao
{"title":"A Framework for IoT Objects Management Based on Future Internet IoT-IMS Communication Platform","authors":"Kai-Di Chang, Chia-Yu Chang, Huei-Min Liao, Jiann-Liang Chen, H. Chao","doi":"10.1109/IMIS.2013.98","DOIUrl":"https://doi.org/10.1109/IMIS.2013.98","url":null,"abstract":"In recent years, with the continuing growth and development in mobile communication technologies, the number of mobile devices and network connected equipment are increasing quickly. Objects/Things in daily life are given the capability to achieve environment sensing and network connectivity. Internet of Thing is the best usage and application of mobile computing and ubiquitous service. There are more and more possible applications while things can communicate with each other. However, there are lacks of rules or specifications for things naming. A framework for IoT object management and naming is proposed based on the future Internet IoT-IMS communication platform. The communications to Internet of Things (IoT) objects can be easily accomplished through the proposed IoT-IMS (IP Multimedia Subsystem) URI (Uniform Resource Identifier). The framework is implemented by integrating with previous future Internet IoT-IMS communication.","PeriodicalId":425979,"journal":{"name":"2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133312583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}