Messaging Server

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 153 Experts worldwide ranked by ideXlab platform

Yun Won Chung - One of the best experts on this subject based on the ideXlab platform.

  • Investigation of Energy Consumption of Mobile Station for Instant Messaging Services
    2011 Tenth International Symposium on Autonomous Decentralized Systems, 2011
    Co-Authors: Yun Won Chung
    Abstract:

    Recently, instant Messaging service has been widely used by many users. In instant Messaging, mobile users need to notify their instant Messaging Server of activity information periodically, so that their status should be managed and displayed as active at instant messengers of their buddies. The periodic notification, however, prevents instant messenger from entering sleep mode, and thus, results in energy consumption. Although the energy consumption may not be a big problem for desktop PC, which has stable power source, it is significant to mobile stations (MSs) operated with battery. Since a detailed modeling and analysis on energy consumption of MSs is a prerequisite to understand the effect of various parameters on energy consumption deeply and devise an efficient energy management scheme, we develop a more detailed analytical model of state transitions of MSs for instant Messaging services. Then, we apply the model to evaluate energy consumption due to instant Messaging services, based on steady state probability of MS states.

  • ISADS - Investigation of Energy Consumption of Mobile Station for Instant Messaging Services
    2011 Tenth International Symposium on Autonomous Decentralized Systems, 2011
    Co-Authors: Yun Won Chung
    Abstract:

    Recently, instant Messaging service has been widely used by many users. In instant Messaging, mobile users need to notify their instant Messaging Server of activity information periodically, so that their status should be managed and displayed as active at instant messengers of their buddies. The periodic notification, however, prevents instant messenger from entering sleep mode, and thus, results in energy consumption. Although the energy consumption may not be a big problem for desktop PC, which has stable power source, it is significant to mobile stations (MSs) operated with battery. Since a detailed modeling and analysis on energy consumption of MSs is a prerequisite to understand the effect of various parameters on energy consumption deeply and devise an efficient energy management scheme, we develop a more detailed analytical model of state transitions of MSs for instant Messaging services. Then, we apply the model to evaluate energy consumption due to instant Messaging services, based on steady state probability of MS states.

Dajian Zhang - One of the best experts on this subject based on the ideXlab platform.

  • ISSRE Workshops - A Layered Argument Strategy for Software Security Case Development
    2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2017
    Co-Authors: Biao Xu, Minyan Lu, Dajian Zhang
    Abstract:

    It is normally hard to believe in software security claim if we do not know what is meant exactly by "secure" and the reasons to support the claim are not sufficiently provided. Security cases—which document the rationale for believing that a system is adequately secure—are intended to address both these issues. However, due to lack of practical construction method of security case, there has been limited use of security case so far. This paper presents a hierarchical software security case development method. We present a general asset model and a security concept relationship model first, then come up with a hierarchical asset-threat-control measure argument strategy, which is supported by the general asset model and software threat classification to make it explicit. Lastly, we propose several key argument patterns, which are reusable and instrumental for security case development. A case study of an IM (instant Messaging) Server is used to demonstrate the capability of this method.

  • A Layered Argument Strategy for Software Security Case Development
    2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2017
    Co-Authors: Biao Xu, Minyan Lu, Dajian Zhang
    Abstract:

    It is normally hard to believe in software security claim if we do not know what is meant exactly by "secure" and the reasons to support the claim are not sufficiently provided. Security cases-which document the rationale for believing that a system is adequately secure-are intended to address both these issues. However, due to lack of practical construction method of security case, there has been limited use of security case so far. This paper presents a hierarchical software security case development method. We present a general asset model and a security concept relationship model first, then come up with a hierarchical asset-threat-control measure argument strategy, which is supported by the general asset model and software threat classification to make it explicit. Lastly, we propose several key argument patterns, which are reusable and instrumental for security case development. A case study of an IM (instant Messaging) Server is used to demonstrate the capability of this method.

B. Cuenca - One of the best experts on this subject based on the ideXlab platform.

  • DEXA Workshop - Facsimile processing for a Messaging Server
    Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999
    Co-Authors: L. Likforman-sulem, B. Cuenca
    Abstract:

    We present here the fax processing task of a Messaging system called Majordomo which serves as a telephone attendant. Key information is searched in fax front covers such as names, addresses, fax/phone numbers in order to sort messages and extract condensed information. First a document stage searches for physical entities at the word level. Then physical entities are discriminated into two classes: handwritten or printed. Then user specified fields, identified by keywords, are searched in the electronic version (Ocr'd transcription). Then fields are associated with their corresponding content if printed, with the corresponding image blocks if handwritten. The process was tested on a database of 55 fax images.

  • Facsimile processing for a Messaging Server
    Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99, 1999
    Co-Authors: L. Likforman-sulem, B. Cuenca
    Abstract:

    We present here the fax processing task of a Messaging system called Majordomo which serves as a telephone attendant. Key information is searched in fax front covers such as names, addresses, fax/phone numbers in order to sort messages and extract condensed information. First a document stage searches for physical entities at the word level. Then physical entities are discriminated into two classes: handwritten or printed. Then user specified fields, identified by keywords, are searched in the electronic version (Ocr'd transcription). Then fields are associated with their corresponding content if printed, with the corresponding image blocks if handwritten. The process was tested on a database of 55 fax images.

Chang-ji Wang - One of the best experts on this subject based on the ideXlab platform.

  • EIDWT - Design of an Instant Messaging System Using Identity Based Cryptosystems
    2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
    Co-Authors: Chang-ji Wang, Wen-long Lin, Hai-tao Lin
    Abstract:

    The rapid development of instant Messaging changes the people's communication, collaboration and entertainment manner radically. Unfortunately, the existing instant Messaging technology does not provide built-in support for security features. The security problem of instant Messaging system has aroused widespread concern in both academia and industry. In this paper, we proposed a new and secure instant Messaging system by using identity-based cryptosystems, which can provide strong authentication and secure communication (confidentiality, integrity and non-repudiation) for both instant Messaging client to instant Messaging Server and instant Messaging client to instant Messaging client. The proposed instant Messaging system is simpler and more efficient than those of existing instant Messaging systems.

  • Design of an Instant Messaging System Using Identity Based Cryptosystems
    2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
    Co-Authors: Chang-ji Wang
    Abstract:

    The rapid development of instant Messaging changes the people's communication, collaboration and entertainment manner radically. Unfortunately, the existing instant Messaging technology does not provide built-in support for security features. The security problem of instant Messaging system has aroused widespread concern in both academia and industry. In this paper, we proposed a new and secure instant Messaging system by using identity-based cryptosystems, which can provide strong authentication and secure communication (confidentiality, integrity and non-repudiation) for both instant Messaging client to instant Messaging Server and instant Messaging client to instant Messaging client. The proposed instant Messaging system is simpler and more efficient than those of existing instant Messaging systems.

Jerome Sautret - One of the best experts on this subject based on the ideXlab platform.

  • using temporal relations to specify and test an instant Messaging Server
    Automation of Software Test, 2010
    Co-Authors: John Hughes, Ulf Norell, Jerome Sautret
    Abstract:

    Asynchronous events are awkward to handle in specification-based testing. State machine specifications become very complex when variable event order, timing constraints, and timing uncertainties must all be captured. We propose an alternative formalism for specifying asynchronous behaviour based on temporal relations, designed to support more declarative and modular specifications. Temporal relations are in a sense a combination of bulk data types and temporal logic. We illustrate the formalism by specifying parts of a simplified instant Messaging Server, and show that it can handle timing uncertainty very simply. We have implemented the formalism as part of Quviq QuickCheck, a commercial specification-based testing tool, and we describe its application to testing ejabberd, the leading instant Messaging Server based on the open XMPP protocol.

  • AST - Using temporal relations to specify and test an instant Messaging Server
    Proceedings of the 5th Workshop on Automation of Software Test - AST '10, 2010
    Co-Authors: John Hughes, Ulf Norell, Jerome Sautret
    Abstract:

    Asynchronous events are awkward to handle in specification-based testing. State machine specifications become very complex when variable event order, timing constraints, and timing uncertainties must all be captured. We propose an alternative formalism for specifying asynchronous behaviour based on temporal relations, designed to support more declarative and modular specifications. Temporal relations are in a sense a combination of bulk data types and temporal logic. We illustrate the formalism by specifying parts of a simplified instant Messaging Server, and show that it can handle timing uncertainty very simply. We have implemented the formalism as part of Quviq QuickCheck, a commercial specification-based testing tool, and we describe its application to testing ejabberd, the leading instant Messaging Server based on the open XMPP protocol.