2016 IEEE Symposium on Computers and Communication (ISCC)最新文献

筛选
英文 中文
Measuring the users and conversations of a vibrant online emotional support system 测量一个充满活力的在线情感支持系统的用户和对话
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-08-18 DOI: 10.1109/ISCC.2016.7543898
M. Calzarossa, L. Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glendon L. Moriarty
{"title":"Measuring the users and conversations of a vibrant online emotional support system","authors":"M. Calzarossa, L. Massari, Derek Doran, Samir Yelne, Nripesh Trivedi, Glendon L. Moriarty","doi":"10.1109/ISCC.2016.7543898","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543898","url":null,"abstract":"Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect to a crowd of trained listeners for a one-on-one conversation. To better understand who, how, and when users utilize emotional support systems, this paper examines user and conversation characteristics on 7 Cups of Tea. 7 Cups of Tea is a massive, vibrant emotional support system with a community of listeners ready to help those with any number of emotional issues. Intriguing insights, including evidence of world-wide adoption of the service, the need to seek immediate support from many others, and a rich-get-richer phenomenon underscore a growing need for online emotional support systems and highlight important aspects to promote their long-term viability.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Joint power control and sub-channel allocation for co-channel OFDMA femtocells 同信道OFDMA飞基站的联合功率控制与子信道分配
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-08-18 DOI: 10.1109/ISCC.2016.7543895
S. Kazemi, M. Rasti
{"title":"Joint power control and sub-channel allocation for co-channel OFDMA femtocells","authors":"S. Kazemi, M. Rasti","doi":"10.1109/ISCC.2016.7543895","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543895","url":null,"abstract":"Two-tier networks consisting of macrocell and femtocells are provided as a solution to increase capacity and improve indoor coverage of cellular networks. In two-tier networks, when the spectrum is shared by macrocell and all of femtocells, the cross-tier and co-tier interference should be taken into account. In this paper, we investigate the power control problem of minimizing the aggregate transmit power for macro-tier and the joint power control and sub-channel allocation problem of maximizing the total rate for femto-tier, both in uplink transmission, while the cross-tier and co-tier interference are both taken into account. Then, to solve these problems, we propose distributed sub-optimal algorithms for both macro and femto-tier. Finally, simulation results are presented to confirm out performance of our proposed algorithm and to compare with the existing algorithm.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crowdsensing and proximity services for impaired mobility 为行动不便人士提供的群众感应和邻近服务
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543712
Jacopo Cortellazzi, L. Foschini, Carlos Roberto de Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, G. D. Alperstedt
{"title":"Crowdsensing and proximity services for impaired mobility","authors":"Jacopo Cortellazzi, L. Foschini, Carlos Roberto de Rolt, Antonio Corradi, Carlos Augusto Alperstedt Neto, G. D. Alperstedt","doi":"10.1109/ISCC.2016.7543712","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543712","url":null,"abstract":"New sensors embedded into modern smartphones has led into a new data collection prospective in which people directly collect all the sensitive data. This feature has found different applications, in particular in the Smart Cities area, in order to establish dynamic communications between the citizens and the city government. This category of application is nestled into the Mobile Crowd Sensing (MCS) application group, due to their final purpose of sharing sensing data to an open platform that includes a huge number of people. This paper presents an extension of the general-purpose ParticipAct platform, a MCS application developed by the University of Bologna, focused on the needs of people with impaired mobility. The goal is specializing ParticipAct to enable a crowdsourcing platform that guarantees a solid support for their lifetime allowing reviewing and sharing opinions regarding public and private places and architectonic barriers of a city area. Showed results confirm the effectiveness of the developed application in terms of both its viability via integration with existing and widely diffused Geographical Information Systems (GIS), and its feasibility in terms of system and user-perceived performances.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Food and gastronomic heritage: Telling a story of eyes and hands 食物和美食遗产:讲述眼睛和手的故事
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543705
S. Mirri, Catia Prandi, M. Roccetti, P. Salomoni
{"title":"Food and gastronomic heritage: Telling a story of eyes and hands","authors":"S. Mirri, Catia Prandi, M. Roccetti, P. Salomoni","doi":"10.1109/ISCC.2016.7543705","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543705","url":null,"abstract":"A multimedia application (termed Di Piazza in Piazza) has been designed and developed that allows people to enjoy a narrative experience based on food and culinary traditions. Several kinds of digital content narrating the gastronomic culture of the Emilia Romagna region has been made available through a gestural interface within an installation to be exhibited in public spaces. The idea of using hands to access content came after the consideration that hands play a primary role in the relationship between humans and food. Our multimedia installation has gone on tour through several cities in Italy allowing to gather a huge amount of data whose analysis provides some important results. Among those: (a) the use of hands was mostly appreciated by visitors and (b) regional products and gastronomic traditions raised interest in visitors, thus confirming that a strong cultural relationship exists among people and food, in cultural terms.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126044171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An architecture for securing federated cloud networks with Service Function Chaining 一种使用服务功能链保护联邦云网络的体系结构
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543711
Philippe Massonet, S. Dupont, Arnaud Michot, A. Levin, M. Villari
{"title":"An architecture for securing federated cloud networks with Service Function Chaining","authors":"Philippe Massonet, S. Dupont, Arnaud Michot, A. Levin, M. Villari","doi":"10.1109/ISCC.2016.7543711","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543711","url":null,"abstract":"Capacity, availability or resilience of clouds can be increased by interconnecting two or more cloud computing environments to form a cloud federation and share resources. Shared resources include compute and storage resources but also networking resources. By integrating software defined networks/ virtual networks (SDN), network function virtualization (NFV) and network function chaining (SFC) technologies into cloud management platforms it is possible to create more advanced and flexible cloud federation mechanisms. In this paper we show how to secure federated cloud networks and how to customise the security of each individual federated cloud network running in a cloud federation. We propose an architecture for securing federated cloud networks by enforcing a global security policy to all network segments of a federation, and local security policies on each network of the federation. Cloud stakeholders can specify the required security virtual network functions (VNF), how to configure them, and how to chain them in a service manifest. The proposed architecture is illustrated with a deep packet inspection case study. Future work on implementing the proposed architecture in an OpenStack federation is briefly discussed.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance comparison of non Delay Tolerant VANET routing protocols 非容延迟VANET路由协议的性能比较
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543746
Ilker K. Basaran, Hasan Bulut
{"title":"Performance comparison of non Delay Tolerant VANET routing protocols","authors":"Ilker K. Basaran, Hasan Bulut","doi":"10.1109/ISCC.2016.7543746","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543746","url":null,"abstract":"As an emerging technology, Vehicular ad hoc networks (VANETs) aim to increase safety and comfort of driving in highways and urban streets. The conventional measures taken have a positive effect on the decline of casualties and injuries incurred by the accidents. But the number of incidents in the traffic still remains stable. VANETs intend to overcome this problem by providing additional information to the driver, thus allowing him to react faster and better in adverse situations. In order to achieve this, VANETs require efficient routing protocols for message transmission among vehicles. In this paper, we explore the performances of four prominent non-delay tolerant routing protocols, namely GPSR, GPSR+AGF, GSR, and GPSRJ+. Although relatively outdated, these protocols are initial inspiration to many routing methods and commonly used as comparison benchmark when a new routing protocol is to be introduced. The evaluation metrics that are used are Packet Delivery Ratio, Average Delay, Traffic Control Overhead, and Average Hop Count.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114505340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards mitigating Link Flooding Attack via incremental SDN deployment 通过SDN增量部署缓解链路泛洪攻击
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543772
Lei Wang, Qing Li, Yong Jiang, Jianping Wu
{"title":"Towards mitigating Link Flooding Attack via incremental SDN deployment","authors":"Lei Wang, Qing Li, Yong Jiang, Jianping Wu","doi":"10.1109/ISCC.2016.7543772","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543772","url":null,"abstract":"Link flooding attack (LFA), as a new type of DDoS attack, can degrade or even cut off network connectivity of a target area. This attack employs legitimate, low-density flows to flood a group of selected links. Therefore, these malicious flows can hardly be distinguished by traditional schemes. In this paper, we propose a scheme called Woodpecker, which makes the LFA more difficult to take effect. First, we select M routers and upgrade them into SDN switches that can maximize the network connectivity. Second, we propose a proactive probe approach to quickly locate the congested links and judge whether LFA occurs. Finally, Woodpecker employs centralized traffic engineering based on the upgraded nodes, which can make the traffic balanced enough to eliminate the routing bottlenecks likely to be utilized by the adversary. We evaluate our scheme by comprehensive experiments. The results show that: 1) the bandwidth utilization of LFA-attacked links can be reduced by around 50%; 2) the average packet loss rate and jitter can be effectively mitigated under LFA attacks.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128540929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
IacDroid: Preventing Inter-App Communication capability leaks in Android IacDroid:防止Android的应用间通信能力泄漏
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543779
Daojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao
{"title":"IacDroid: Preventing Inter-App Communication capability leaks in Android","authors":"Daojuan Zhang, Rui Wang, Zimin Lin, Dianjie Guo, Xiaochun Cao","doi":"10.1109/ISCC.2016.7543779","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543779","url":null,"abstract":"Inter-App Communication (IAC) plays an important role in Android platform to share data and services among applications. However, the existence of IAC capability leaks could lead to the unauthorized privileged operations. In this paper, we first investigate the usage of IAC in Android applications to show the prevalence of IAC in the Android development model. To mitigate the threat caused by IAC capability leaks in Android, we develop a real-time monitoring and control system, called IacDroid, which distinguishes and prevents the IAC capability leak accurately in both third-party and in-rom applications at runtime. IacDroid extends the Binder IPC mechanism and the system service to construct context-based component call chains between multiple applications. By leveraging the call chains, the permission system is extended to detect and prevent the IAC capability leaks. IacDroid also presents an intuitive client-side solution to help users control the IAC capability leaks. We implement the prototype in Android 4.3, and present a comprehensive assessment with 500 Google Play applications and 36 malicious applications. The experimental results demonstrate that IacDroid can effectively prevent the IAC capability leaks with a negligible performance overhead.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint analog network coding and channel allocation in the walking scenario for WBAN WBAN行走场景下联合模拟网络编码与信道分配
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543803
Hongyun Zhang, F. Safaei, Le Chung Tran
{"title":"Joint analog network coding and channel allocation in the walking scenario for WBAN","authors":"Hongyun Zhang, F. Safaei, Le Chung Tran","doi":"10.1109/ISCC.2016.7543803","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543803","url":null,"abstract":"Wireless Body Area Network (WBAN) has been considered as a revolutionary technology to address current healthcare needs. However, before the extensive deployment of WBAN, one main challenge to be met is how to balance the trade-off between data transmission rate and energy efficiency. In this paper, we utilize WBAN's spatial correlation characteristics during movement and propose an efficient cross-layer scheme, named A3NC, which combines analog network coding (ANC) and MAC layer channel allocation. Our simulation results show that the A3NC scheme achieves significant improvement in upload throughput and energy efficiency compared to the conventional approaches. Meanwhile, our scheme also maintains a better balance between correlated sensors' upload throughput.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129102594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mobile behaviometric framework for sociability assessment and identification of smartphone users 智能手机用户社交能力评估和识别的移动行为测量框架
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543880
Fazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, B. Kantarci, M. Erol-Kantarci, S. Schuckers
{"title":"Mobile behaviometric framework for sociability assessment and identification of smartphone users","authors":"Fazel Anjomshoa, Matthew Catalfamo, Daniel Hecker, Nicklaus Helgeland, Andrew Rasch, B. Kantarci, M. Erol-Kantarci, S. Schuckers","doi":"10.1109/ISCC.2016.7543880","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543880","url":null,"abstract":"The widespread use of mobile technology has accelerated the popularity of social networking services, and has made these services convenient to access. This paper presents a behaviometric mobile application, namely TrackMaison (Track My activity in social networks). TrackMaison keeps track of social network service usage of smartphone users through data usage, location, usage frequency and session duration of five popular social network services. The data collected by the mobile application is presented to the smartphone user and is analyzed to aid in understanding mobile social network service usage. Furthermore, we introduce the social activity rate and sociability factor metrics where the former is a function of a user's relative data usage rate in social network services and the latter is a function of a user's relative session durations in social networks. By using TrackMaison tool, we identify three user behavior types. Those are active user profile, moderately active user profile and low active user profile. Through analysis of real data, we advocate that continuous identification/authentication of mobile device users is possible by using the introduced sociability metrics. We further present a case study on various Instagram user profiles, and show that low active profiles can be identified with negligible false acceptance rates (FAR) whereas a highly active user can be identified with a FAR as low as 3%.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"33 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信