{"title":"Collusion-secure and cost-effective detection of unlawful multimedia redistribution","authors":"F. Sebé, J. Domingo-Ferrer","doi":"10.1109/TSMCC.2003.817351","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.817351","url":null,"abstract":"Intellectual property protection of multimedia content is essential to the successful deployment of Internet content delivery platforms. There are two general approaches to multimedia copy protection: copy prevention and copy detection. Past experience shows that only copy detection based on mark embedding techniques looks promising. Multimedia fingerprinting means embedding a different buyer-identifying mark in each copy of the multimedia content being sold. Fingerprinting is subject to collusion attacks: a coalition of buyers collude and follow some strategy to mix their copies with the aim of obtaining a mixture from which none of their identifying marks can be retrieved; if their strategy is successful, the colluders can redistribute the mixture with impunity. A construction is presented in this paper to obtain fingerprinting codes for copyright protection which survive any collusion strategy involving up to three buyers (3-security). It is shown that the proposed scheme achieves 3-security with a codeword length dramatically shorter than the one required by the general Boneh-Shaw construction. Thus the proposed fingerprints require much less embedding capacity. Due to their own clandestine nature, collusions tend to involve a small number of buyers, so that there is plenty of use for codes providing cost-effective protection against collusions of size up to three.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"1 1","pages":"382-389"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82947954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aggregated hierarchical multicast-a many-to-many communication paradigm using programmable networks","authors":"T. Wolf, Sumi Choi","doi":"10.1109/TSMCC.2003.817352","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.817352","url":null,"abstract":"Developments toward ubiquitous and pervasive computing have lead to application scenarios where a large number of sensors and computing devices are connected to the network. These devices might constantly send status information via multicast to a number of applications or users. One big challenge in this environment is the amount of data traffic generated by such sensors, which depends on the size of the data, the transmission frequency, and the number of senders and receivers. However, for certain applications it is sufficient to receive less accurate, aggregated data from a group of sources. This leads to the possibility of using programmable routers to perform such data aggregation inside the network. While the basic algorithm for data merging has been described in literature, we address how a large number of sources can be organized in a hierarchical structure to allow multiple users to get a view of all sensors at different levels of aggregation. With the control information that is provided by an aggregating node, the user can traverse the aggregation tree by joining different multicast sessions that transmit different levels of detail. This provides a novel communication paradigm that reduces the network overhead from continuously transmitting sources and organizes data in a way that it is useful to receivers. We provide two detailed example scenarios: A battlefield information system, which aggregates geographic location data of units, and a conferencing application, which aggregates audio data. We describe the aggregation algorithm that is used and analyze its effect on delay and jitter of periodic transmissions by the sources. We describe the hierarchical control structure that provides multiple levels of aggregation and how real-time transport protocol (RTP) can be used to implement it. The performance of the proposed scheme is evaluated with measurements that were done on an implementation of the audio aggregation application.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"95 1","pages":"358-369"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89244645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key issues in next-generation Web-based education","authors":"V. Devedzic","doi":"10.1109/TSMCC.2003.817361","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.817361","url":null,"abstract":"This paper analyzes and categorizes limitations and weaknesses of current Web-based educational technology, suggests the steps to overcome them, and presents a framework for developing next-generation Web-based educational systems. It suggests developing Web-based educational applications with more theory- and content-oriented intelligence, more semantic interoperation between two or more educational applications, and realistic technological support to achieve such kinds of flexibility.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"58 1","pages":"339-349"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77463702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gilles Muller, J. Lawall, Scott Thibault, R. E. Jensen
{"title":"A domain-specific language approach to programmable networks","authors":"Gilles Muller, J. Lawall, Scott Thibault, R. E. Jensen","doi":"10.1109/TSMCC.2003.817364","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.817364","url":null,"abstract":"Active networks present significant safety, security, and efficiency challenges. Domain-specific languages, i.e., languages providing only constructs relevant to a particular domain, provide a solution that balances these constraints. Safety and security can be ensured using verification techniques that exploit the restricted nature of such languages. Strategies have been developed for the compilation of domain-specific languages that provide both portability and efficiency. This paper presents a synthesis of work on the PLAN-P domain-specific language for programmable routers. We present the language design, representative experiments that have been carried out using the language, and new compilation strategies. End-to-end performance is typically comparable to that of hand-coded C implementations.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"124 1","pages":"370-381"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80051236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special issue on computational intelligence in telecommunications networks and Internet services. I","authors":"W. Pedrycz, A. Vasilakos, S. Karnouskos","doi":"10.1109/TSMCC.2003.818945","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.818945","url":null,"abstract":"In recent years, we have witnessed a rapidly growing role of the Internet that has already formed a conceptual backbone of the society in the information era. What becomes apparent and highly visible is a broad range of services and their enormous diversity being seamlessly available to those surfing cyberspace. The ongoing developments not only have enabled a different way of doing business but also pushed toward ambient intelligence where the user fully interacts with his or her surrounding information environment. The three special issues bring together the ideas of CI to the network area in a systematic, coherent, and comprehensive fashion that will help us move one step closer to the realization of the vision of ambient intelligence.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"27 1","pages":"294-296"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73894405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing power aware self-reconfiguring topology for mobile wireless personal area networks using fuzzy logic","authors":"Q. Liang","doi":"10.1109/TSMCC.2003.817356","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.817356","url":null,"abstract":"In mobile wireless personal area networks (WPAN), the position of each node changes over time. A network protocol that is able to dynamically update its links in order to maintain strong connectivity is said to be \"self-reconfiguring.\" We propose a mobile wireless personal area networks (WPAN) design method with self-reconfiguring protocol for power efficiency. The WPAN is self-organized to clusters using an unsupervised clustering method, fuzzy c-means. A fuzzy logic system is applied to master/controller election for each cluster. A self-reconfiguring topology is proposed to manage the mobility and recursively update the network topology. We also modify the mobility management scheme with hysteresis to overcome the ping-pong effect. Simulation results show that our scheme performs much better than the existing algorithm.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"36 1","pages":"390-394"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85324503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent binding in the engineering of automation systems using ontology and Web services","authors":"Z. Hu, E. Kruse, L. Draws","doi":"10.1109/TSMCC.2003.817346","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.817346","url":null,"abstract":"In an integrated automation system a well-designed data model and computation model are required. For the engineering of such a system one often faces a challenge of finding the suitable computation elements defined in the computation model for the data defined in the data model, especially when the data model and the computation model are complex. In this paper we will use the ontology technology and Web services to address the challenge in an intelligent way. We will present the required ontology model including the formal expression, the binding conditions, the object model, XML representation and the corresponding system architecture for implementation. Evaluation is also given to show the usefulness of the approach.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"28 1","pages":"403-412"},"PeriodicalIF":0.0,"publicationDate":"2003-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89855151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A neural-network based control solution to air-fuel ratio control for automotive fuel-injection systems","authors":"C. Alippi, Cosimo de Russis, V. Piuri","doi":"10.1109/TSMCC.2003.814035","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.814035","url":null,"abstract":"Maximization of the catalyst efficiency in automotive fuel-injection engines requires the design of accurate control systems to keep the air-to-fuel ratio at the optimal stoichiometric value AF/sub S/. Unfortunately, this task is complex since the air-to-fuel ratio is very sensitive to small perturbations of the engine parameters. Some mechanisms ruling the engine and the combustion process are in fact unknown and/or show hard nonlinearities. These difficulties limit the effectiveness of traditional control approaches. In this paper, we suggest a neural based solution to the air-to-fuel ratio control in fuel injection systems. An indirect control approach has been considered which requires a preliminary modeling of the engine dynamics. The model for the engine and the final controller are based on recurrent neural networks with external feedbacks. Requirements for feasible control actions and the static precision of control have been integrated in the controller design to guide learning toward an effective control solution.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"43 1","pages":"259-268"},"PeriodicalIF":0.0,"publicationDate":"2003-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83319570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Engineering complex systems: implications for research in systems engineering","authors":"W. Rouse","doi":"10.1109/TSMCC.2003.813335","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.813335","url":null,"abstract":"A discussion of the scope of systems engineering, which seems to cover everything and therefore, in a way, to cover nothing. Systems engineering crosses the boundaries of other disciplines. It is the exploration, understanding, and design of how everything fits together.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"15 1","pages":"154-156"},"PeriodicalIF":0.0,"publicationDate":"2003-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75303535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extensions of an integrated approach for multi-resource shop scheduling","authors":"S. Dauzére-Pérés, C. Pavageau","doi":"10.1109/TSMCC.2003.814036","DOIUrl":"https://doi.org/10.1109/TSMCC.2003.814036","url":null,"abstract":"In a previous work, we proposed an integrated approach for a rather general shop scheduling problem, with multiresource, flexibility, and nonlinear routings. In this paper, we want to overcome some of the limitations of the approach. In particular, an operation that needs several resources might not need all the resources during its entire processing time. Our first extension allows a resource to be released before the end of the operation. The second extension considers the fact that, for a given operation, one might have to prevent a set of incompatible resources to be chosen.","PeriodicalId":55005,"journal":{"name":"IEEE Transactions on Systems Man and Cybernetics Part C-Applications and Re","volume":"216 1","pages":"207-213"},"PeriodicalIF":0.0,"publicationDate":"2003-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76237218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}