2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application最新文献

筛选
英文 中文
Social network perspective on innovation: A review 社会网络视角下的创新研究综述
S. Jha
{"title":"Social network perspective on innovation: A review","authors":"S. Jha","doi":"10.1109/IMSAA.2011.6156356","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156356","url":null,"abstract":"Innovation has been studied from several different perspectives. Since innovation has increasingly become a nonlinear, interactive and open activity, social network analysis provides a handy tool to examine this phenomenon. This paper aims to review and synthesize the studies that have examined the phenomenon of innovation from a social network perspective. The current state of the literature, gaps and future research direction are discussed.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132272677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Density-based community detection in social networks 社交网络中基于密度的社区检测
K. Subramani, Alexander Velkov, I. Ntoutsi, Peer Krőger, H. Kriegel
{"title":"Density-based community detection in social networks","authors":"K. Subramani, Alexander Velkov, I. Ntoutsi, Peer Krőger, H. Kriegel","doi":"10.1109/IMSAA.2011.6156357","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156357","url":null,"abstract":"This paper deals with community detection in social networks using density-based clustering. We compare two well-known concepts for community detection that are implemented as distance functions in the algorithms SCAN [1] and DEN-GRAPH [2], the structural similarity of nodes and the number of interactions between nodes, respectively, in order to evaluate advantages and limitations of these approaches. Additionally, we propose to use a hierarchical approach for clustering in order to get rid of the problem of choosing an appropriate density threshold for community detection, a severe limitation of the applicability and usefulness of the SCAN and DENGRAPH algorithms in real life applications. We conduct all experiments on data sets with different characteristics, particularly Twitter data and Enron data.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113931520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
External social capital of the firm: A review 企业外部社会资本研究述评
Shailen Kumar Dalbehera
{"title":"External social capital of the firm: A review","authors":"Shailen Kumar Dalbehera","doi":"10.1109/IMSAA.2011.6156370","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156370","url":null,"abstract":"The social capital available to the firm from its external network is the focal topic around which the literature is reviewed. 57 papers obtained from search of the top three journals in strategy field have been reviewed. The paper tries to find the patterns and trends in researches done from the review. The major motive behind this is to find relevant research gap in terms of broad areas left untouched when classification of papers is done based on certain criteria. The trends in research and thus the gaps found are discussed. Papers are synthesized based on relation of social capital with performance of the firm. Propositions are made based on it. It is argued that cognitive dimension of social capital of the new venture firm affects the performance of the new venture firm.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126228799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chroma components coding in feedback-free distributed video coding 无反馈分布式视频编码中的色度分量编码
V. K. Kodavalla, P. Mohan
{"title":"Chroma components coding in feedback-free distributed video coding","authors":"V. K. Kodavalla, P. Mohan","doi":"10.1109/IMSAA.2011.6156347","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156347","url":null,"abstract":"Distributed Video Coding (DVC) is a relatively new video coding paradigm evolved for catering to emerging applications such as wireless video surveillance and streaming. DVC is not yet commercially deployed due to various challenges including necessity of feedback channel, unavailability of standardized complete coding method including chroma components handling, lower Rate Distortion (RD) performance and flicker. The DVC architectures developed so far assumed availability of feedback channel and dealt with luma component only. In this paper colour components (chroma) coding method of feedback-free DVC is proposed and results are presented.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High speed S-box architecture for Advanced Encryption Standard 高级加密标准的高速s盒结构
R. Rachh, P. Anandamohan, B. Anami
{"title":"High speed S-box architecture for Advanced Encryption Standard","authors":"R. Rachh, P. Anandamohan, B. Anami","doi":"10.1109/IMSAA.2011.6156342","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156342","url":null,"abstract":"This paper presents a high speed architecture for composite field arithmetic based SubBytes transformation (S-box) used in Advanced Encryption Standard (AES) encryption. The proposed architecture is derived by extending the pre-computation technique suggested recently by Liu and Parhi to a recently proposed architecture of AES S-box due to Rashmi, Mohan and Anami. The proposed design of S-box is shown to have the shortest critical path with moderate gate count requirement compared to the known composite field based S-box designs described in literature. The FPGA implementation results using Xilinx XC2V6000–6 are also provided to substantiate the claimed reduction in critical path of AES S-box.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Back-off algorithm based power saving mechanism in a multi-RAT UE 基于回退算法的多终端节能机制
D. Das, D. Das
{"title":"Back-off algorithm based power saving mechanism in a multi-RAT UE","authors":"D. Das, D. Das","doi":"10.1109/IMSAA.2011.6156346","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156346","url":null,"abstract":"In a user equipment (UE) which supports multiple radio access technologies (multi-RAT), the access technology dependent part i.e., access stratum (AS) draw significant amount of power either in active or idle state. Simultaneous switching ON all UE supported idle RAT-ASs to support multi-RAT mobility, apart from the active RAT-AS can drain battery fast. Even the periodic cell search done by idle RAT-AS can lead to significant power consumption. This paper investigates whether the idle RAT-ASs in a UE can be switched OFF when there are not many cells of the particular RAT in the neighbourhood. The authors propose using of various back-off algorithms to schedule cell search in idle RAT-AS. Using the number of searched cells as a criterion, UE achieves power saving by autonomously switching ON or OFF the idle RAT-AS. Simulation results reveal that linear back-off algorithm performs well for back-off window size of 1 whereas for higher window size binary exponential back-off algorithm performs better with respect to power saving. Also, assuming an idle WCDMA RAT-AS supported by the UE we numerically prove that our approach achieves better power saving than conventional idle mode discontinuous reception (DRX) approach proposed by the standard. Results further reveal that a combination of idle mode DRX and our proposed approach leads to even higher power saving, i.e., 94% with respect to 3GPP proposed idle mode DRX only mechanism for WCDMA.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132440944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Collaborative assurance framework for evaluation of security products and services 用于评估安全产品和服务的协作保证框架
Ashley Thomas, A. Paranjpe
{"title":"Collaborative assurance framework for evaluation of security products and services","authors":"Ashley Thomas, A. Paranjpe","doi":"10.1109/IMSAA.2011.6156358","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156358","url":null,"abstract":"In order to operate on the Internet and safeguard the critical infrastructure, there is an increasing need for good security measures and practices. At the same time, there is need of highly scalable, continuous and rapid evaluation of security products and services. There is opportunity for collaborative and customized security evaluation and transparency in the security evaluation process. We present a Collaborative Security Assurance Framework for Evaluation (C-SAFE) — a Cloud based framework that provides Security Evaluation as a Service (SEaaS) in a collaborative fashion, promoting transparency, and providing a common platform for comparison.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and efficient message authentication protocol for vehicular Ad hoc Networks with privacy preservation(MAPWPP) 一种安全高效的车载Ad hoc网络隐私保护消息认证协议
Subhashree Behera, Bharati Mishra, Priyadarshini Nayak, Debasish Jena
{"title":"A secure and efficient message authentication protocol for vehicular Ad hoc Networks with privacy preservation(MAPWPP)","authors":"Subhashree Behera, Bharati Mishra, Priyadarshini Nayak, Debasish Jena","doi":"10.1109/IMSAA.2011.6156332","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156332","url":null,"abstract":"Reliability, efficient bandwidth utilisation, consistency and authenticity are some of the required applications that are required for proper implementation of vehicular ad-hoc networks (VANETs). As vehicular Ad hoc Networks are expected to greatly influence and improve road safety as well as driving conditions, they are attracting much attention these days. But along with all the benefits that it offers, there is more chance of giving way to frequent and severe malicious attacks. Due to this reason much attention is being given to the security and privacy issues in VANETs. A lot of research work is being performed to improve the standards of this network. In this paper we present a security protocol for VANET for message authentication which also promises privacy for its users. Privacy is a big issue in today's information age. Information is abundant but getting the authentic information at appropriate time and place is very crucial.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Considerations for Machine-to-Machine communications architecture and security standardization 机器对机器通信体系结构和安全标准化的考虑
E. N. Barnhart, Charles A. Bokath
{"title":"Considerations for Machine-to-Machine communications architecture and security standardization","authors":"E. N. Barnhart, Charles A. Bokath","doi":"10.1109/IMSAA.2011.6156367","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156367","url":null,"abstract":"This paper describes the challenges of Machine-to-Machine (M2M) communications architecture development and trends in the development of M2M architecture in the Telecommunications Industry Association and the European Telecommunications Standards Institute. Included is information regarding protocol stacks, high-level architecture and functional architecture. A discussion of the development of architectures for M2M security is provided, and use cases for direct and indirect connections between devices and applications M2M systems are presented.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114178371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Federated enterprise and cloud-based collaboration services 联合企业和基于云的协作服务
J. Buford, Kshiteej S. Mahajan, V. Krishnaswamy
{"title":"Federated enterprise and cloud-based collaboration services","authors":"J. Buford, Kshiteej S. Mahajan, V. Krishnaswamy","doi":"10.1109/IMSAA.2011.6156338","DOIUrl":"https://doi.org/10.1109/IMSAA.2011.6156338","url":null,"abstract":"Because of the variety of types of collaboration services used in enterprises today, there is difficulty in integrating related work threads from different collaboration environments. Each collaboration tool differs in storage model, APIs, content organization, content addressing, content formats, user authentication, and user interface. Nevertheless users prefer to be able to choose which collaboration tool they use for a given interaction, and over the course of long-term collaboration, will typically use a variety of tools, including email, instant messages, wikis, blogs, web conferences, and shared documents. The solution presented here is to provide a federated integration of these different collaboration tools to make content access and transfer straight forward between different systems. Additionally, we enable the user to achieve this federation by working directly in the client application of their choice; we illustrate this with plug-ins for MS Outlook, Internet Explorer and Skype. Our architecture integrates both desktop and server-centric tools. Additionally it is now possible to use hosted collaboration services in the cloud. This further complicates the ability to federate collaboration tools because of requirements to protect enterprise information and information flows. We present an architecture to address the federation of cloud-based collaboration services.","PeriodicalId":445751,"journal":{"name":"2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116069737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信