Next Generation networks converge over the IP Multimedia Subsystem (IMS) platform to control the delivery of user-centric secure broadband quad-play services and will enable users to benefit from advanced real-time se...
详细信息
Next Generation networks converge over the IP Multimedia Subsystem (IMS) platform to control the delivery of user-centric secure broadband quad-play services and will enable users to benefit from advanced real-time services. Apart from deploying flexible and cost saving multimedia applications, operators need to be aware that core infrastructure and subscribers are protected against attacks and service abuse from malicious users, infected devices, hackers or *** IMS provides privacy and validation through authentication and encryption, there are open issues towards the protection of subscribers and *** paper includes current IMS security and possible threats and attacks. Possible solutions for providing highly trustworthy IMS based multimedia services are investigated.
It is becoming increasingly important to be able to adapt an application's behavior at run time in response to changing requirements and environmental conditions. Adaptive programs are typically difficult to speci...
详细信息
The new emerging technology of Mobile Agents (MAs) has arisen in the distributed programming field as a potential flexible way of managing resources of a distributed system. In this paper a generic framework that can ...
详细信息
Typically the planning problem formulation of the distribution system integrated with wind-based DGs only considers the peak load and treats the wind-based DG as a constant power supply with a rating based on its capa...
详细信息
In response to the low efficiency problem in the existing authenticated key exchange protocol for mobile commerce, the paper proposes an efficient authenticated key exchange protocol based on token, which can authenti...
详细信息
Authenticating a user online, without compromising the user comfort is an important issue. The most popular approach to authenticate a user online is Password-based authentication. Studies show that, users (always) ch...
详细信息
Existing search engines like Google' Yahoo!' Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead' it is preferable to find and ask...
详细信息
ISBN:
(纸本)9781424421367
Existing search engines like Google' Yahoo!' Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead' it is preferable to find and ask someone who has related expertise or experience on a topic and thus Web-based online communities have become important places for people to seek and share expertise. We need to gather the data that describes these online communities. But extracting' aggregating and analyzing data from these communities for finding experts on a single framework is a challenging task. Also there is no universal standard data structure for the outline of user participation in these communities. In this paper' we present a Grid-enabled framework of expertise search (GREFES) engine which utilizes online communities as sources for experts on various topics. This is a work in progress. We also propose an open data structure called SNML (Social network Markup Language) to outline user participation in online communities. The architecture addresses major challenges in crawling of community data and query processing by utilizing Grid. An expert ranking algorithm is also discussed and evaluated.
Collaborative inquiry learning has gained a lot of attentions among educators for improving student learning. However, students still have difficulties in formulating testable hypotheses, designing conclusive experime...
详细信息
ISBN:
(纸本)9789868473522
Collaborative inquiry learning has gained a lot of attentions among educators for improving student learning. However, students still have difficulties in formulating testable hypotheses, designing conclusive experiments and attending compatible data. The formation of cognitive strategies is an internal process that may be concealed in individuals due to the concurrently cooperation of collaborative inquiry learning. This study attempted to explore the link between awareness of cognitive strategies and peer interactions in collaborative inquiry activity. By gathering the data from 56 college students, who involved experimental physics course as 17 groups, this study utilized handheld devices as an observational tool for peer interactions in a collaborative inquiry activity. The results show the awareness of cognitive strategies which distributed among group members affects peer interaction significantly. This finding suggest that designer of learning environment should consider team members about the importance of the internal process of individuals in collaborative work. In addition, asynchronous awareness which was concealed first then became visible, in an activity could inform more participation and accountability for collaboration. Furthermore, we proposed four peer cooperation models that could provide teachers and designers to configure groups to attain favorable interaction patterns.
Wireless Sensor networks (WSNs) consist of a large number of low-power nodes sensing data from the environment. The sensor nodes are equipped with small and often irreplaceable batteries with limited power capacity. O...
详细信息
Many researchers are concerned about the effects of video games on learning, especially the games with virtual opponents;therefore, the main purpose of this paper is to investigate the possible impacts. The authors de...
详细信息
ISBN:
(纸本)9789868473522
Many researchers are concerned about the effects of video games on learning, especially the games with virtual opponents;therefore, the main purpose of this paper is to investigate the possible impacts. The authors designed Forest Defense, a digital game for practicing mental arithmetic, with two modes: training and challenge modes. In the challenge mode, students have to face virtual opponents which have not been shown in the training mode. A preliminary experiment was conducted to examine the effects of the challenge mode in Forest Defense. The results showed that virtual opponents did not influence the accuracy of the high-ability students, but significantly decreased the accuracy of the low-ability students. The results also suggested that if practicing more, the low-ability students were more able to face virtual opponents.
暂无评论