2012 International Conference on Computing, Networking and Communications (ICNC)最新文献

筛选
英文 中文
Aspects related to geo localization based on mobiles' measurements in WCDMA wireless networks WCDMA无线网络中基于手机测量的地理定位相关问题
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167556
Irina Cotanis, Le Le
{"title":"Aspects related to geo localization based on mobiles' measurements in WCDMA wireless networks","authors":"Irina Cotanis, Le Le","doi":"10.1109/ICCNC.2012.6167556","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167556","url":null,"abstract":"The launch of smart phones and the myriad of 3G services that they support require that mobiles' geo-location in wireless networks go beyond service localization, emergency call service, and home location billing. Operators aiming for more and more cost efficient network operations need to consider mobiles' positioning for UTRAN internal utilization such as location-assisted handover as well as for network optimization and troubleshooting such as dropped and blocked calls/sessions and detection of coverage holes. The paper gives a brief overview of geo-location techniques generally used in mobile networks and proposes a solution suitable for mobiles' positioning in WCDMA networks based on phone measurements. The paper discusses aspects related to the characteristics of geo-location in the context of the wireless environment, particularly WCDMA, and the challenges imposed on the calculation of the mobile geo-location estimate. The paper discusses how a proposed solution based on the phone's measurements solves the WCDMA challenges. and what are the achieved performances.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
DDoS discrimination by Linear Discriminant Analysis (LDA) 基于线性判别分析(LDA)的DDoS识别
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167480
Theerasak Thapngam, Shui Yu, Wanlei Zhou
{"title":"DDoS discrimination by Linear Discriminant Analysis (LDA)","authors":"Theerasak Thapngam, Shui Yu, Wanlei Zhou","doi":"10.1109/ICCNC.2012.6167480","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167480","url":null,"abstract":"In this paper, we propose an effective approach with a supervised learning system based on Linear Discriminant Analysis (LDA) to discriminate legitimate traffic from DDoS attack traffic. Currently there is a wide outbreak of DDoS attacks that remain risky for the entire Internet. Different attack methods and strategies are trying to challenge defence systems. Among the behaviours of attack sources, repeatable and predictable features differ from source of legitimate traffic. In addition, the DDoS defence systems lack the learning ability to fine-tune their accuracy. This paper analyses real trace traffic from publicly available datasets. Pearson's correlation coefficient and Shannon's entropy are deployed for extracting dependency and predictability of traffic data respectively. Then, LDA is used to train and classify legitimate and attack traffic flows. From the results of our experiment, we can confirm that the proposed discrimination system can differentiate DDoS attacks from legitimate traffic with a high rate of accuracy.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130237695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Optimal placement of multiple visual sensors using simulation of pedestrian movement 基于行人运动仿真的多视觉传感器优化布置
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167509
Yunyoung Nam, Sangjin Hong
{"title":"Optimal placement of multiple visual sensors using simulation of pedestrian movement","authors":"Yunyoung Nam, Sangjin Hong","doi":"10.1109/ICCNC.2012.6167509","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167509","url":null,"abstract":"This paper present an optimal camera placement method that analyzes a spatial-temporal model and calculates priorities of spaces using simulation of pedestrian movement. In order to cover the space efficiently, we accomplished an agent-based simulation based on classification of space and pattern analysis of moving people. We have developed an agent-based camera placement method considering camera performance and space utility extracted from a path finding algorithm. We demonstrate that the method not only determines the optimal number of cameras, but also coordinates the position and orientation of the cameras with considering the installation costs. To validate the method, we show simulation results in a specific space.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134545788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Characterizing top user behavior of Sina microblogging in the context of different events 不同事件背景下的新浪微博顶级用户行为特征分析
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167462
Yubao Zhang, Hui Wang, Zhihong Jiang, Pei Li
{"title":"Characterizing top user behavior of Sina microblogging in the context of different events","authors":"Yubao Zhang, Hui Wang, Zhihong Jiang, Pei Li","doi":"10.1109/ICCNC.2012.6167462","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167462","url":null,"abstract":"Extremely popular and commonly adopted microblogging service is not only a new form of communication, but also seen as a place for ”fueling” viral marketing. Due to essential openness and growing ubiquity, microblogsphere offers ways to manipulate the trending topics, through arranging a number of ”messengers” who send messages and make a push on maximizing influence propagation. In this paper, we present an initial study on quantifying and characterizing the events referring to viral campaigns launched in microblogsphere. Our study is based on two independent data sets, one corresponds to an event referring to viral campaign and the other can be considered as not planned. We examine collectively dynamic response of the event referring to viral campaign, in comparison with the event not planed. We find the event referring to viral campaign exhibits different evolving pattern from the other event. Top users with extremely high yield of microblogs in the event referring to viral campaign has been proven to account for the exceptional pattern of dynamic response. We further investigate the individual dynamic response and calculate the centrality of top users for quantitative characterization of these users. This work aims to suggest insights into the evolving of events referring to the viral campaign launched in microblogsphere and the behavior pattern of top users in these events who may dominate the event evolving.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RocketTC: A high throughput traffic classification architecture RocketTC:一个高吞吐量的流量分类架构
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167454
Zhou Zhou, Tian Song, Wen-Fei Fu
{"title":"RocketTC: A high throughput traffic classification architecture","authors":"Zhou Zhou, Tian Song, Wen-Fei Fu","doi":"10.1109/ICCNC.2012.6167454","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167454","url":null,"abstract":"Real-time traffic classification is becoming increasingly critical for network management, traffic engineering, and network security. Current software-based solutions, however, have difficulties dealing with a great number of flows in today's high-speed networks. This paper proposes RocketTC, a scalable FPGA-based architecture, to accelerate traffic classification while maintaining high accuracy. It combines two significant elements: (1) an efficient flow management scheme using on-chip BRAMs for storing the flow table, and (2) a parallel and pipelined classification engine array with partial dynamic reconfiguration (PDR) on FPGA. We have implemented and evaluated RocketTC on Xilinx Virtex-5 FPGA based platform. Our results show a sustained throughput of over 20 Gbps for minimum packet size of 40 bytes, and high accuracy above 97% for classifying nearly a hundred popular applications. Additionally, it is easy for RocketTC to update more application types.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource allocation and scheduling in cloud computing 云计算中的资源分配与调度
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167434
E. Elghoneimy, O. Bouhali, H. Alnuweiri
{"title":"Resource allocation and scheduling in cloud computing","authors":"E. Elghoneimy, O. Bouhali, H. Alnuweiri","doi":"10.1109/ICCNC.2012.6167434","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167434","url":null,"abstract":"Cloud computing is a platform that hosts applications and services for businesses and users to accesses computing as a service. In this paper, we identify two scheduling and resource allocation problems in cloud computing. We describe Hadoop MapReduce and its schedulers, and present recent research efforts in this area including alternative schedulers and enhancements to existing schedulers. The second scheduling problem is the provisioning of virtual machines to resources in the cloud. We present a survey of the different approaches to solve this resource allocation problem. We also include recent research and standards for inter-connecting clouds and discuss the suitability of running scientific applications in the cloud.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130831668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
An autonomic plane for Wireless Body Sensor Networks 一种用于无线身体传感器网络的自主平面
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167566
G. Fortino, Stefano Galzarano, A. Liotta
{"title":"An autonomic plane for Wireless Body Sensor Networks","authors":"G. Fortino, Stefano Galzarano, A. Liotta","doi":"10.1109/ICCNC.2012.6167566","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167566","url":null,"abstract":"Wireless Body Sensor Networks (WBSN) have proved to be a potential technology for developing applications that can monitor and control physical and biochemical parameters on the human body. Developing such applications is rather cumbersome, since these have to meet a combination of conflicting requirements. Achieving accuracy, efficiency, correctness, fault-tolerance, adaptability and reliability on WBSN is tricky because these features have to be provided beyond the design/implementation phase, notably at execution time. In this paper we explore the viability and convenience of autonomic computing in the context of WBSNs. In particular, we propose to extend a conventional WBSN framework with an autonomic plane, a way for separating out the provision of self-* properties from the WBSN application logic. This separation of concerns leads to an ease of deployment and run-time management of new applications. We study this approach in the context of SPINE2 framework, showing how this can be readily enhanced with an autonomic layer. We find that this enhancement brings not only considerable functional improvements but also measurable performance benefits.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Bandwidth estimation and rate adaptation in HTTP streaming HTTP流中的带宽估计和速率自适应
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167520
Bing Zhou, Jingyuan Wang, Z. Zou, Jiangtao Wen
{"title":"Bandwidth estimation and rate adaptation in HTTP streaming","authors":"Bing Zhou, Jingyuan Wang, Z. Zou, Jiangtao Wen","doi":"10.1109/ICCNC.2012.6167520","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167520","url":null,"abstract":"HTTP Streaming is one type of video streaming technology, delivering multimedia data using HTTP/TCP. Due to the strict boundaries between layers of the OSI communication model, HTTP Streaming client at the Application Layer can only see the bandwidth that TCP at the Transport Layer supplies. How to estimate the upcoming bandwidth in the future according to the bandwidth history HTTP Streaming client has seen is the first problem this paper wants to address. Since the network bandwidth represents the data producing rate for the media player at the client and the media bitrate represents the data consuming rate of the media player, the quality of user experience of HTTP Streaming would be at a low level, if there is mismatch between the network bandwidth and the media bitrate. How to make rate adaptation for HTTP Streaming system based on the bandwidth estimation results is the second problem this paper wants to address. From the experimental results, we can see our bandwidth estimation and rate adaptation algorithm proposed to tackle the above two problems can provide a better enhancement for the prevalent HTTP Streaming system, comparing with the rate adaptation algorithm using common throughput smoothing strategy.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Modeling and analysis of a solar powered wireless sensor node 太阳能无线传感器节点的建模与分析
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167570
Hengzhao Yang, Y. Zhang
{"title":"Modeling and analysis of a solar powered wireless sensor node","authors":"Hengzhao Yang, Y. Zhang","doi":"10.1109/ICCNC.2012.6167570","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167570","url":null,"abstract":"A wireless sensor node powered by solar energy is modeled and analyzed. The sensor node consists of six components: solar panel, maximum power point tracker, input stage, supercapacitor, output stage, and load. The components are either modeled using equivalent circuits or characterized by behavior defining parameters. The sensor node model is first simulated and analyzed using a typical solar radiation and a fixed load current. Results show that these component models capture their characteristics. Two supercapacitor models, the variable leakage resistance model and the energy iteration equation model, are compared within the sensor node model. Their potential impacts on sensor node operation are investigated.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132406371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Regenerator allocation for scheduled lightpath demands in translucent optical networks 半透明光网络中预定光路需求的再生器分配
2012 International Conference on Computing, Networking and Communications (ICNC) Pub Date : 2012-03-12 DOI: 10.1109/ICCNC.2012.6167430
Ying Chen, A. Jaekel
{"title":"Regenerator allocation for scheduled lightpath demands in translucent optical networks","authors":"Ying Chen, A. Jaekel","doi":"10.1109/ICCNC.2012.6167430","DOIUrl":"https://doi.org/10.1109/ICCNC.2012.6167430","url":null,"abstract":"Physical layer impairments limit the maximum distance a signal can travel in the optical domain in wavelength-routed optical networks. In translucent optical networks, regenerators are made available at certain nodes, so long-haul lightpaths can undergo signal regeneration, if needed. A number of different routing and wavelength assignment (RWA) techniques for translucent networks have already been proposed in the literature, for both static and dynamic traffic. However, such techniques fail to exploit the resource sharing capabilities inherent in the scheduled traffic model (STM). Recent research has clearly established the advantages of holding-time-aware strategies for resource allocation of such scheduled (periodic) lightpath demands. In this paper, we propose a new and efficient integer linear program (ILP) based formulation for resource allocation of scheduled lightpath demands in translucent optical networks. To the best of our knowledge, this is the first holding-time-aware approach that allows optimal sharing of regenerators and other resources among non-overlapping demands to obtain a cost-effective solution. Simulation results indicate it is possible achieve significant improvements compared to existing techniques that do not consider such resource sharing.","PeriodicalId":125988,"journal":{"name":"2012 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信