Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2010
A SIP-TRW algorithm for DDoS attack detection in SIP environments
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 75, Pages 1–8https://doi.org/10.1145/2108616.2108707While there are many ongoing research efforts for Denial-of-Service (DoS) attacks in the general Internet environment, there is insufficient research on voice networks. In this paper, we present the design and evaluation of a SIP-TRW algorithm for ...
- research-articleJanuary 2010
Semantic operation composition according to user tasks in ubiquitous environment
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 74, Pages 1–7https://doi.org/10.1145/2108616.2108706This paper presents the operation composition method based on Service Component Architecture (SCA). Applying semantic factors to this method has revealed the automatically discovered and composited operations corresponding to user demands. We first ...
- research-articleJanuary 2010
A self-organizing two-way DPWS adaptor for adaptive interoperability of multiple heterogeneous services
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 69, Pages 1–7https://doi.org/10.1145/2108616.2108700Although distributed middleware technologies such as UPnP, Jini, HAVi and DPWS generally feature the same goals, many different factors are also isolated from each other. This paper outlines a self-organizing two-way DPWS adaptor which aims to provide ...
- research-articleJanuary 2010
Actor Petri net model for scientific workflows: model, design and system
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 55, Pages 1–6https://doi.org/10.1145/2108616.2108683We propose in this paper Actor Petri net Model for designing scientific workflow applications that are characterized by heterogeneous data and intensive computing. Based on many other workflow representation models (such as Actor Network, a series of ...
- research-articleJanuary 2010
An interactive agent system for supporting knowledge-based recommendation: a case study on an e-novel recommender system
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 53, Pages 1–8https://doi.org/10.1145/2108616.2108681With the fast development of e-commerce, a large number variety of information existed on the Internet. Many researches tend to design a recommender system for assisting users to search the information that they have interested over the internet. The ...
- research-articleJanuary 2010
Hiding data in parity check bit
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 52, Pages 1–5https://doi.org/10.1145/2108616.2108679In this paper, we propose a method to hide secret data in parity check bits. In the data embedding phase, the method first takes 4 bits from the cover data and 3 bits from the secret data. The 3-bit secret data are inserted into appropriate positions ...
- research-articleJanuary 2010
A reversible and multiple-layer embedding strategy with high capacity
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 51, Pages 1–5https://doi.org/10.1145/2108616.2108678This paper proposes a reversible data-embedding scheme that improves on Kieu and Chang's method by increasing the embedding capacity measured by bits per pixel (bpp) while maintaining high image quality. The embedding procedure of the proposed method ...
- research-articleJanuary 2010
In situ measurement of geosensors in low-rate networks
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 21, Pages 1–5https://doi.org/10.1145/2108616.2108642Geographic information system (GIS) is traditionally used with desktop computers. The development of embedded, wireless, and positioning technologies have opened possibilities to apply GIS in new application areas and conditions. In this research area ...
- research-articleJanuary 2010
A technique of embedding digital data in an image compression code reversibly
ICUIMC '10: Proceedings of the 4th International Conference on Uniquitous Information Management and CommunicationArticle No.: 13, Pages 1–6https://doi.org/10.1145/2108616.2108633In this paper, we propose a reversible data hiding technology based on a Vector Quantization (VQ) index table. To improve the hiding capacity, every VQ image has its own corresponding codebook in which the index sequence is reorganized according to the ...