Construction of a Topic Database for Remote Conversation Support

Author(s):  
Toru Homan ◽  
Masaya Morita ◽  
Yu Yamaguchi ◽  
Kazuhiro Kuwabara

This paper describes a topic database for conversation support for people with cognitive handicaps such as aphasia. The authors implemented a topic database based on word lists developed for people with aphasia as an RDF database to exploit the conceptual relationships among words and extended it to include web resources a user needs. To allow database personalization, the authors introduce an access control mechanism and incorporate the topic database into a chat system for remote conversation support over the Internet.

Author(s):  
Sudha Senthilkumar ◽  
V. Madhu Viswanatham

Online gaming allows players from different location to play synchronously together for entertainment. Generally multimedia applications which is highly latency sensitive and it requires specific hardware, such as Graphic Processing Units (GPUs) and fast memory. Since recent advances in cloud computing makes it suitable for moving the gaming application to the cloud and streams the video sequence back to the player over the Internet. This is more beneficial for less powerful computational devices that are otherwise incapable of running high-quality games. In addition to this cloud gaming is platform independence means it allow you to play on your android or IOS powered devices. There are several cloud providers like On-Live, G-Cluster and GFACE are provides active game services. However, providing proper access control for games which require license to play various levels is one of the important requirements to play the online games. This paper proposes the suitable access control mechanism to provide the access to cloud gaming applications.


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sign in / Sign up

Export Citation Format

Share Document