2016 IEEE Symposium on Computers and Communication (ISCC)最新文献

筛选
英文 中文
Energy efficiency analysis of the Watchful Sleep mode in next-generation passive optical networks 下一代无源光网络中监视睡眠模式的能效分析
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543817
Raisa O. C. Hirafuji, A. R. Dhaini, Denis A. Khotimsky, Divanilson R. Campelo
{"title":"Energy efficiency analysis of the Watchful Sleep mode in next-generation passive optical networks","authors":"Raisa O. C. Hirafuji, A. R. Dhaini, Denis A. Khotimsky, Divanilson R. Campelo","doi":"10.1109/ISCC.2016.7543817","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543817","url":null,"abstract":"Energy efficiency has become a salient element in the design and operation of modern telecommunications networks. To support energy efficiency in passive optical network (PON) systems, the ITU-T has recently standardized a new power management technique, namely the Watchful Sleep mode, which unifies the two previously standardized techniques (i.e., Doze and Cyclic Sleep modes). The new mode can emulate each of the Doze and Cyclic modes, and it outperforms them in terms of energy efficiency and reduced network signaling. In this paper, we present the first analytical model for numerically measure the performance of the Watchful Sleep mode. Specifically, the new model estimates the ONU's energy efficiency under different network scenarios given a set of quality-of-service constraints. To validate our model, we perform comparisons with simulation results. These comparisons demonstrate that the proposed model can accurately capture the energy efficiency of PON systems.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Cyber-healthcare for public healthcare in the developing world 发展中国家公共医疗保健的网络医疗
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543707
M. Mandava, C. Lubamba, Adiel Ismail, A. Bagula, H. Bagula
{"title":"Cyber-healthcare for public healthcare in the developing world","authors":"M. Mandava, C. Lubamba, Adiel Ismail, A. Bagula, H. Bagula","doi":"10.1109/ISCC.2016.7543707","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543707","url":null,"abstract":"The recent advances in sensor/actuator and RFID technologies have spun out a new healthcare model enabling capture and dissemination of patient vital signs over the Internet for ubiquitous monitoring of these patients anytime and from anywhere. This provides new opportunities for enhancing healthcare through participatory consultation, medical diagnosis and many other novel healthcare services. Some of the advantages of this emerging technology referred to in this paper as “Cyber-healthcare” includes low acquisition cost, flexible deployment and improved accuracy resulting from replacing manual operations by fully digitized processes. It is expected that the emerging healthcare technology will change the way healthcare is delivered in both rural and urban settings of the developing world by building upon this technology to leapfrog from poorly prepared to medically equipped environments capable of tackling some of the most challenging medical issues of the developing world such as patients' vital signs capture, patient prioritization and preparedness to virus outbreaks such as Ebola. This paper proposes a Cyber-healthcare system as a first step towards the implementation of least cost digital health systems in the developing countries. We assess the field readiness of the off-the-shelf sensor technology used by the system and evaluate the performance of its underlying patient prioritization module using two machine learning algorithms: 1) multivariate linear regression and 2) support vector machine.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
SPF: An SDN-based middleware solution to mitigate the IoT information explosion SPF:基于sdn的中间件解决方案,缓解物联网信息爆炸
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543778
M. Tortonesi, James R. Michaelis, A. Morelli, Niranjan Suri, Michael A. Baker
{"title":"SPF: An SDN-based middleware solution to mitigate the IoT information explosion","authors":"M. Tortonesi, James R. Michaelis, A. Morelli, Niranjan Suri, Michael A. Baker","doi":"10.1109/ISCC.2016.7543778","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543778","url":null,"abstract":"Managing the extremely large volume of information generated by Internet-of-Things (IoT) devices, estimated to be in excess of 400 ZB per year by 2018, is going to be an increasingly relevant issue. Most of the approaches to IoT information management proposed so far, based on the collection of IoT-generated raw data for storage and processing in the Cloud, place a significant burden on both communications and computational resources, and introduce significant latency. IoT applications would instead benefit from new paradigms to enable definition and deployment of dynamic IoT services and facilitate their use of computational resources at the edge of the network for data analysis purposes, and from smart dissemination solutions to deliver the processed information to consumers. This paper presents SPF (as in “Sieve, Process, and Forward”), an SDN solution which extends the reference ONF architecture replacing the Data Plane with an Information Processing and Dissemination Plane. By leveraging programmable information processors deployed at the Internet/IoT edge and disruption tolerant information dissemination solutions, SPF allows to define and manage IoT applications and services and represents a promising architecture for future urban computing applications.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122394474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A model for identity management with privacy in the cloud 一个在云中具有隐私的身份管理模型
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543782
Jorge Werner, C. Westphall
{"title":"A model for identity management with privacy in the cloud","authors":"Jorge Werner, C. Westphall","doi":"10.1109/ISCC.2016.7543782","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543782","url":null,"abstract":"Cloud computing has been a great ally in the development of products and services with highly scalable, flexible, on-demand, providing big data to users in different administrative domains services. In this context, federated identity management assist in the administration of access to services and privacy of Personally Identifiable Information (PII). The cloud may impose some security issues, especially some threats to sensitive data such as PII. Therefore, we present a model that addresses privacy issues of PII, considering aspects of dynamic federations, different policies, data manipulation rules and encryption. A prototype of the federation agreement, dynamic scopes and security policies was developed using OpenID Connect (OIDC).","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An alternative approach to mobility analysis in vehicular ad hoc networks 车辆自组织网络中移动性分析的另一种方法
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543747
Bahadir K. Polat, Müjdat Soytürk
{"title":"An alternative approach to mobility analysis in vehicular ad hoc networks","authors":"Bahadir K. Polat, Müjdat Soytürk","doi":"10.1109/ISCC.2016.7543747","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543747","url":null,"abstract":"Understanding vehicle mobility is essential for devising successful protocols for vehicular communications. Vehicles move at varying speeds on roads whose complexities range from plain highway lanes to urban boulevards with intersections/circles, traffic lights and various points of interest on them. This mobility pattern combined with vehicle density fluctuations depending on location and time makes understanding the vehicular mobility a challenging task and leads to vehicular communication solutions which are incomplete or low-performance. In this paper, we propose an alternative method for vehicular mobility analysis. We attempt to extract the spatio-temporal vehicular mobility characteristics of large, complex geographical areas by dividing them into cells and analyzing on these cells certain metrics that are of interest for vehicular communication. We first discuss the logic behind our approach. We then present definitions of the metrics used by the proposed analysis method. We conclude with a demonstration of the results achieved when the proposed method is applied in the analysis of a large scale mobility trace.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel cooperative caching scheme for Content Centric Mobile Ad Hoc Networks 一种新的以内容为中心的移动自组织网络协同缓存方案
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543838
Yinlong Liu, Dali Zhu, Wei Ma
{"title":"A novel cooperative caching scheme for Content Centric Mobile Ad Hoc Networks","authors":"Yinlong Liu, Dali Zhu, Wei Ma","doi":"10.1109/ISCC.2016.7543838","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543838","url":null,"abstract":"Content Centric Mobile Ad-hoc NETwork (CCMANET) applies the advantages of Content Centric networking (CCN) into Mobile Ad Hoc Network(MANET) to overcome the drawbacks of low efficiency and unstable in transmission. Caching scheme is one of the key components of CCMANET. However, the caching scheme in CCMANET has not been well explored. In this paper, a novel cooperative caching scheme based on generalized dominating set and local content popularity for CCMANET is proposed. First, a virtual backbone in CCMANET is constructed by generalized dominating set to make the arbitrary topology become two-level hierarchy and a collaborative cache placement scheme between the two hierarchies is designed. Second, we propose a method of computing the local content popularity and a cache replacement scheme based on the local content popularity. Simulation results show that the proposed caching scheme can effectively reduces both path stretch value and server load, and improves the hit ratio compared with the existing caching schemes.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133583427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On composing a resilient tree in a network with intermittent links based on stress centrality 基于应力中心性的间歇链路网络弹性树构造研究
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543849
Genya Ishigaki, N. Shinomiya
{"title":"On composing a resilient tree in a network with intermittent links based on stress centrality","authors":"Genya Ishigaki, N. Shinomiya","doi":"10.1109/ISCC.2016.7543849","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543849","url":null,"abstract":"This paper discusses a composition problem of a resilient tree on a graph modeling a communication network whose links are intermittent. The resiliency of a tree is defined exploiting the binary relation on two kinds of edge weights: availability and commonality. Availability represents a probabilistic stability of a communication link corresponding to an edge, and commonality indicates the influence of an edge based on relative locations of edges on a tree. Our simulation analyzes that the trees satisfying the proposed ordering property on the binary relation provide more stable connections among communication nodes.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132764118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Google Cloud Vision in assistive technology scenarios 在辅助技术场景中使用谷歌云视觉
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543742
Davide Mulfari, A. Celesti, M. Fazio, M. Villari, A. Puliafito
{"title":"Using Google Cloud Vision in assistive technology scenarios","authors":"Davide Mulfari, A. Celesti, M. Fazio, M. Villari, A. Puliafito","doi":"10.1109/ISCC.2016.7543742","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543742","url":null,"abstract":"Google Cloud Vision is an image recognition technology that allows us to remotely process the content of an image and to retrieve its main features. By using specialized REST API, called Google Cloud Vision API, developers exploit such a technology within their own applications. Currently, this tool is in limited preview and its services are accessible for trusted tester users only. From a developer's perspective, in this paper, we intend to use such software resources in order to achieve assistive technology solutions for people with disabilities. Specifically, we investigate some potential benefits of Cloud Vision tool towards the development of applications for users who are blind.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"57 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132837068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Greedy heuristic for replica server placement in Cloud based Content Delivery Networks 基于云的内容分发网络中副本服务器放置的贪婪启发式算法
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543758
Jagruti Sahoo, R. Glitho
{"title":"Greedy heuristic for replica server placement in Cloud based Content Delivery Networks","authors":"Jagruti Sahoo, R. Glitho","doi":"10.1109/ISCC.2016.7543758","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543758","url":null,"abstract":"Recently, Cloud based Content Delivery Network (CCDN) has emerged as efficient content delivery architecture to provide content delivery services with improved Quality of Service (QoS), scalability and resource efficiency. Replica server placement is a key design issue in CCDNs and involves deciding the placement of replica servers on geographically dispersed cloud sites that minimizes the operational cost and satisfies QoS of the end-users. Since replica server placement problem is NP-hard, it is necessary to design an efficient heuristic for CCDNs. In this paper, we propose an efficient greedy heuristic for the replica server placement problem. The heuristic consists of two main procedures: placement and refinement. The placement procedure obtains an initial placement of replica servers on cloud sites with low operational cost. The refinement procedure removes the redundant cloud sites to reduce the operational cost further. The simulation results demonstrate that the proposed greedy heuristic outperforms the existing greedy heuristics in terms of computation time and the operational cost.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"480 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133704444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards optimal cache decision for campus networks with content-centric network routers 基于内容中心网络路由器的校园网最优缓存决策研究
2016 IEEE Symposium on Computers and Communication (ISCC) Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543836
Muhui Shen, Bing Chen, Xiaojun Zhu, Yanchao Zhao
{"title":"Towards optimal cache decision for campus networks with content-centric network routers","authors":"Muhui Shen, Bing Chen, Xiaojun Zhu, Yanchao Zhao","doi":"10.1109/ISCC.2016.7543836","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543836","url":null,"abstract":"A traditional approach to solving the large delay problem of campus networks is to upgrade the link connecting the gateway to the Internet. Inspired by the emerging content-centric network (CCN) and software defined network (SDN) architecture, we propose an alternative solution where the campus network uses a few CCN routers with caching ability, so that duplicate requests for the same content can be satisfied locally without traffic from the Internet. In our solution, we formulate the problem of deciding the cached content at each router to minimize the total delay of all requests. We prove that the problem is NP-hard, and no polynomial time algorithm can provide a constant approximation ratio, unless P=NP. We then propose an exponential-time exact algorithm and three polynomial-time heuristic algorithms. Numerical results show that our solution can reduce network delay significantly, compared to existing cache decision algorithms.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133744753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信