2,466 research outputs found
An IPtel architecture based on the SIP protocol
More and better accesses to the Internet increase the interest in using it to carry not only data but also voice and video. The IP Telephony (IPTel) was born in this context and offers a framework to create multimedia communication systems. The Session Initiation Protocol, used in the IPTel architecture, is a protocol for signaling and call control between two or more participants. This paper presents telephony over IP service. Different protocols typically used in IPtel are analyzed and the architecture and functionality of SIP protocol are explained. Different mobility modes provided by SIP through the application layer are described. Finally we present the sIPtel, a Java application that supports real audio and video communications and uses the SIP protocol for call signaling
SMART-M3 v.0.9: A semantic event processing engine supporting information level interoperability in ambient intelligence
This tutorial is addressed to all students in Electronic Engineering and Information Engineering at the Scuola di Ingegneria e Architettura of the University of Bologna attending the following courses: Laboratory of Interoperability of Embedded Systems, "Calcolatori Elettronici M" and "Attività Progettuale di Calcolatori Elettronici M".
This tutorial includes the guidelines to build distributed applications where clients may interact with physical space. Inter-client interaction occurs through a semantic event processing engine. Information interoperability is based on a shared knowledge representation model named ontology. This tutorial is focused on client design and on the SPARQL primitives that provide the means for client-event processing engine interaction
Privacy-preserving PKI design based on group signature
Nowadays, Internet becomes a part of our life. We can make use of numerous services with personal computer, Lap-top, tablet, smart phone or smart TV. These devices with network make us enjoy ubiquitous computing life. Sometimes, on-line services request us authentication or identification for access control and authorization, and PKI technology is widely used because of its security. However the possibility of privacy invasion will increase, if We’re identified with same certificate in many services and these identification data are accumulated. For privacy-preserving authentication or anonymous authentication, there have been many researches such as Group signatures, anonymous credentials, etc. Among these researches, group signatures are very practical Because they provide unlinkability and traceability as well as anonymity. In this paper, we propose a privacy-preserving PKI based on group signature, with which users’ privacy can be Kept in services. Because of traceability, their identities can be traced if they abuse anonymity such as cybercrime. Moreover, we will also discuss open issues for further studies
Engineering Semantic Self-composition of Services Through Tuple-Based Coordination
Service self-composition is a well-understood research area focusing on service-based applications providing new services by automatically combining pre-existing ones. In this paper we focus on tuple-based coordination, and propose a solution leveraging logic tuples and tuple spaces to support semantic self-composition for services. A full-stack description of the solution is provided, ranging from a theoretical formalisation to a technologically valuable design and implementation
- …