P186 - I2CS 2011: 11th International Conference on Innovative Internet Community Systems
Autor*innen mit den meisten Dokumenten
Neueste Veröffentlichungen
- KonferenzbeitragOn using a distributed approach for help in medical diagnosis with wireless sensor networks(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Dessart, Nathalie; Fouchal, Hacène; Hunel, Philippe; Vidot, NicolasIn this paper, we focus on providing new tools to help doctors in their diagnosis. We study the feasibility of using a distributed approach over Wireless Sensor Networks (WSN). We define a Wireless Body Area Network (WBAN) as a set of wireless sensors which equipped a patient. Each sensor senses a health parameter, for example, temperature or heart pulse. Our aim is to understand how a distributed approach can be a fair alternative to the common centralized paradigm. We study a distributed approach based on the token paradigm. Then, we compare this approach to the centralized one, throw simulations and experimentations over real sensors.
- KonferenzbeitragIdentifying good connections in an unstructured peer-to-peer network: the case of Gnutella(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Babin, Gilbert; Larocque, Denis; Dine, AbdessamadPast studies have shown the unstability of unstructured peer-to-peer networks and in particular Gnutella. Because of this unstability, queries in these networks are inefficient. Furthermore, to keep the network stable, the protocols used require huge bandwidth usage. One approach proposed by Gnutella conceptors is to create two classes of servents: leaf nodes and ultrapeers. The core of the network is preserved by the ultrapeers, while the leaf nodes remain at the periphery. Others suggest to use random walks rather than flooding. We also see suggestions to build communities to reduce traffic. In this paper, we investigate the possibility to use a different, yet complementary approach, where a node would only keep connections that it deems “good”. Based on statistics collected on the Gnutella network, we show that it is possible to rapidly determine whether a connection is good or not. The detection of good connections uses two criteria: the duration of connection establishment time and the number of messages received through the connection.
- KonferenzbeitragChallenges in designing technology for reducing the need for synchronous communication in the perioperative environment(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Wienhofen, Leendert W. M.; Toussaint, Pieter J.This paper describes health informatics as a field of research and some of the challenges that are faced when designing a complex event processing middleware gathering input from multiple legacy sources in a hospital environment. The goal of the system is to reduce the need for synchronous communication between medical stakeholders by creating a situational awareness and thereby cause fewer interruptions.
- KonferenzbeitragSimulating individual and cooperation node behavior within a ring network(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Akinalp, Coskun; Unger, HerwigThe performance of networks is usually linked to network-related aspects such as bandwidth and protocols. However, behind every network element there are users who may organize their relations to others. But which organizational structures are successful for individuals and groups and how can the data traffic be optimized for network infrastructure? By means of a network creation game, this paper examines the results of different network structures and compares individual decisions to grouping behaviours. The experiments were simulated in the form of a ring network which enables individual nodes to create long links (direct connections between nodes) to other nodes based on their account values. For one group within the network, an extended approach was tested, i.e. there was the option of having the behaviours of decentralized”democracy” or centralized-hierarchical”kingdom” organizations? manage the long links within the group. The results of the simulations for different power law distributions of messages show that cooperation within the structures, compared to the individual node, differ in terms of routing steps, account values and the stable management of long links. We find that the hierarchical approach represents successful network transactions for different grouping sizes.
- KonferenzbeitragConsensus and relation networks(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Ahat, Murat; Bennani, Omar; Bui, Marc; Amor, Soufian BenIn this paper, we propose an extension to bounded confidence model which is a nonlinear opinion dynamics model. The goal of this new extension is to emphasize the underlying network structure of the model, since in real life network structure plays an important , if not vital, role in opinion dynamics. And with simulation results, we show how networks, such as grid and scale-free, affect the consensus formation in bounded confidence model separately as well as together.
- KonferenzbeitragPredicting social networks in weblogs(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Jähnichen, PatrickWeblogs and other platforms used to organize a social life online have achieved an enormous success over the last few years. Opposed to applications directly designed for building up and visualizing social networks, weblogs are comprised of mostly unstructured text data, that comes with some meta data, such as the author of the text, its publication date or the URL it is available under. In this paper, we propose a way, how these networks may be inferred not by the available meta data, but by pure natural language analysis of the text content, allowing inference of these networks without any meta data at hand. We discuss results of first experiments and outline possible enhancements as well as other ways to improve prediction of social networks based solely on content analysis.
- KonferenzbeitragAn MTM based watchdog for malware famishment in smartphones(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Ugus, Osman; Westhoff, DirkDue to their various wireless interfaces, a continuously increasing number of fishy Apps, and due to their raising popularity, smartphones are becoming a promising target for attackers. Independently of the point of entrance, malwares are typically attached to an App to perform their malicious activities. However, malware can only do harm on a smartphone if it is executed. We thus propose a malware prevention architecture for smartphones that exploits App signatures, process authentication during their creation, and process verification during their execution and scheduling. The proposed security mechanism will allow a smartphone to run only those Apps which are classified as trusted (i.e., signed Apps) and which are not modified after their installation. The trust derived from the App signatures and a Mobile Trusted Module (MTM) is propagated through the processes until their execution via process authentication. The MTM serves as a trust anchor for our malware famishment in smartphones. This work presents our solution conceptually. We will soon start with a proof of concept implementation and a performance study using a software based MTM emulator.
- KonferenzbeitragSignificance of low frequent terms in patent classification using IPC hierarchy(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Khattak, Akmal Saeed; Heyer, GerhardInternational Patent Classification (IPC) is a standard taxonomy or hierarchy maintained by WIPO (World Intellectual Property Organization). Using this standard hierarchy, patents are classified using machine learning techniques. The first sets of experiments investigate the effect on classification performance at different levels (section, class, subclass and main group level) of IPC hierarchy. Experiments show that there is a decrease in performance going deep down the hierarchy and at the higher level of detail, the accuracy is very low. This might be due to inclusion of more general terms than specific terms. The deeper level (higher level of details) of hierarchy is more specific. The internal nodes of a hierarchy are more general than the leaf nodes and the leaf nodes are more specific than the internal nodes. Classification at different levels of hierarchy considering low frequent terms were investigated. Low frequent terms can refer to specific terms and it cannot be ignored as noise. The second set of experiments focuses on what field of patents optimize the classification accuracy at different levels of detail. The third set of experiments focuses on the significance of low frequent terms across the IPC hierarchy. Experiments show that by including low frequent terms, the accuracy at higher level of details can be improved significantly. The low frequent terms set outperforms full terms set in achieving better performance in terms of accuracy and it also reduces the dimension of text substantially.
- Editiertes Buch
- KonferenzbeitragUnderstanding the power of social media(11th International Conference on Innovative Internet Community Systems (I2CS 2011), 2011) Drüner, MarcEven at a basic level we all know how to use social media, well, to the point where we can post a Facebook update or even send a Tweet. But the most of us do not really understand its power nor how you can use that power effectively. Social media is leading the biggest transformation in communication and advertising. During this talk Prof. Dr. Drüner highlights the phenomena of social media and points out the opportunities and risks for small and medium-sized enterprises. A second part will be the impact of social media on the opinions of consumers and how companies can use social media data with opinion mining and social media tracking methods.
- «
- 1 (current)
- 2
- 3
- »