The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A managed wireless mesh for infrastructure-level, stable regional mesh network has been studied. NerveNet, which we have been proposing, is a concept of future regional platform network that covers local regions and provides various context-aware services with the shared use of sensors and actuators. The managed wireless mesh developed for materializing NerveNet features auto-configuration of multiple,...
For multicast applications with large-scale groups in large-scale wireless sensor networks, it is an important issue for energy saving in geographic multicasting both to obtain location information of destination nodes and to construct the geographic multicast tree efficiently. To address this issue, there have been proposed global search based hierarchical geographic multicasting protocols. Such...
This paper proposes an adaptive push system that operates efficiently in the high-latency environment of underwater acoustic wireless networks. Using a simple technique, the proposed system efficiently utilizes the scarce bandwidth resource of the underwater acoustic environment. Simulation results show superior performance of the proposed system compared to adaptations of existing terrestrial push...
The spread of novel multimedia services such as audio and video streaming, HDTV and online gaming have become a ordinary in the home networks. Therefore, the possibility to manage the Quality of Service (QoS) within an home environment becomes a crucial factor for the satisfaction of the user. In this paper we propose an enhanced Admission Control and Drop strategies for a UPnP-QoS controlled home...
Wireless actuators are small scale devices that can receive/accept instructions and act on their environment. The IP Multimedia Subsystem (IMS) is a key component for 3G networks. It aims at seamless provisioning of multimedia services. Combining actuation capabilities with IMS capabilities will certainly enable novel value added services. This paper proposes an architecture for the integration of...
In this paper, we design and implement a hybrid WiMAX network testbed that integrates the NCTUns network emulator with a real-life WiMAX network. This hybrid WiMAX network testbed can seamlessly connect virtual networks (emulated by NCTUns) to a real-life WiMAX network. Thus, in this testbed real-life applications on real machines can exchange data with those on emulated (virtualized) network nodes...
A Bayesian network representing an actual prosecuted case of illegal file sharing over a peer-to-peer network has been subjected to a systematic and rigorous sensitivity analysis. Our results demonstrate that such networks are usefully insensitive both to the occurrence of missing evidential traces and to the choice of conditional evidential probabilities. The importance of this finding for the investigation...
A ubiquitous network environment is a system where the user can access network services anytime, anywhere. Studies are continuously being conducted on wireless communication technology and mobile devices to establish such an environment. The company that provides such services, at a charge to users, should have an established system for authentication and authorization. This service is referred to...
Community Health Information Tracking System using Short Message Service (chitSMS) is an extension of CHITS which is a system that stores health records of patients in the barangay. Another project incorporated a mobile component in CHITS, enabling the health worker to visit the patient, do routine check-ups and medical services, and update CHITS when the health worker returns to the health center...
With recent advances in video encoding and network technology, media streaming services are getting popular. Media streaming system based on the traditional server/client or CDN architecture has a scalability problem, and peer-to-peer media streaming system using resources of peers in the system can provide better scalability. Previous media streaming services are suited to play stored contents such...
E-mail isn't just a simple way of delivering information, but is a core tool of task process. A company mainly uses e-mail as a way to internally communicate and to process main tasks of business. Currently, mail capacity being used in a company has been increasing in rate of 40% and 70% of company information is being preserved in e-mail. However, most of the companies manage e-mail by using diverse...
In this paper, a novel method for profiling phishing activity from an analysis of phishing emails is proposed. Profiling is useful in determining the activity of an individual or a particular group of phishers. Work in the area of phishing is usually aimed at detection of phishing emails. In this paper, we concentrate on profiling as distinct from detection of phishing emails. We formulate the profiling...
As the computer technology evolves, traditional card games are shifting into more interesting ones by adapting Ubiquitous technology. In this paper, we present an effective game framework using various computer technology including RFID and 3D graphics. The user can be convenient and fun to play games with the proposed framework. Especially, we focus on game immersion. The game card is automatically...
Cloud computing, a new thing which is only three years old, becomes the most fashionable technology and developing trend in IT industry now. People say “X as a service” in the cloud computing, which means that everything including software and hardware can be taken as a service for consumers in the cloud. Meanwhile, a high quality multimedia conferencing has been an urgent requirement these years...
In this paper, the Multiprocessor Bandwidth Inheritance (M-BWI) protocol is presented, which constitutes an extension of the Bandwidth Inheritance (BWI) protocol to symmetric multiprocessor and multicore systems. Similarly to priority inheritance, M-BWI reduces priority inversion in reservation-based scheduling systems, it allows the coexistence of hard, soft and non-real-time tasks, it does not require...
The progress of distributed interaction simulation is restricted by the traditional Basic Simulation Computing Resource (BSCR). It is difficult to speedily customize BSCR on demand. Aiming at this question, a BSCR management platform is proposed based on the virtualization technology. Upon the platform, users could apply for a Virtual Machine (VM) as BSCR to execute simulation application. B/S architecture...
The existing access control environment relies on the server to solve security problems. The current environment has spawned the need for light-weight access control by clients, which have a resource limited environment. In this paper, an adaptable light-weight access control scheme is proposed for an evolutionary computing environment. Existing studies using role-based prime number labeling are limited...
Part of the role of universities is, today as from their earlier times, to prepare students for a productive role in the society. In this context, the role of curriculum development is to ensure that students are able-if so they wish-to acquire skills that are in demand in the work market. This is of uttermost importance in areas as IT where weak choices by students and/or universities might have...
With the popularity of smart phones, GPS is used more and more in the cell phone. The location information in the GPS is very significant for evidence-gaining. This paper researched and realized the operations under Symbian OS such as GPS-related applications. Firstly I introduced the concept of GPS and GPS-related knowledge in the mobile phone. Secondly I programmed cell phone GPS detection and extracted...
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats, such as destroying system softwares and access violation, are frequently emerging in the field of software cloud. In this paper, we propose a watermark-aware trusted running environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.