2010 International Conference on Information and Communication Technology Convergence (ICTC)最新文献

筛选
英文 中文
Memory reduction of N-LUT method using sub-principle fringe patterns 利用子原理条纹图减少N-LUT方法的内存
Jae-Man Kim, Seung-Cheol Kim, Eun-Soo Kim
{"title":"Memory reduction of N-LUT method using sub-principle fringe patterns","authors":"Jae-Man Kim, Seung-Cheol Kim, Eun-Soo Kim","doi":"10.1109/ICTC.2010.5674659","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674659","url":null,"abstract":"In this paper, memory reduction method using the Sub-PFP is proposed. That is, two-dimensional PFPs in conventional N-LUT method can be converted by one-dimensional Sub-PFPs using trigonometric relations. Some experiments with a test 3-D object are carried out and the reduction ratio of LUT is analyzed.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131683850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Methods for practical whitebox cryptography 实用白盒密码的方法
Jong-Yeon Park, Jiwoong Choi, Okyeon Yi
{"title":"Methods for practical whitebox cryptography","authors":"Jong-Yeon Park, Jiwoong Choi, Okyeon Yi","doi":"10.1109/ICTC.2010.5674789","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674789","url":null,"abstract":"White box cryptography is the new technique against attacks on white box attack environments. In white box attack model, the attacker is even stronger than in black box attack model, and the attacker can monitor all intermediate values. Therefore, safety algorithms are needed against all operation steps being exposure. Chow introduced secure white box cryptography with AES DES implementations against white box attack model [1,2]. However, slower performance by operating too many look up tables is a problem of practical use of white box cryptography. Also key updating on dynamic situations of white box cryptography is much harder than key updating of black box cryptography. Thus, this paper suggests using a specific mode of operation to improve speed of white box implementations, and show concrete examples of enhancement of performance. Also, it suggests a technique of key updating with dynamic and static tables in practically.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Analysis of access delay under high traffic conditions in CATV networks 有线电视网络高流量条件下的接入延迟分析
Joonyoung Jung, Dong-Joon Choi, S. Lee, Jaemin Ahn
{"title":"Analysis of access delay under high traffic conditions in CATV networks","authors":"Joonyoung Jung, Dong-Joon Choi, S. Lee, Jaemin Ahn","doi":"10.1109/ICTC.2010.5674777","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674777","url":null,"abstract":"In this paper, We present more accurate access delay analysis through the consideration of piggyback request. In our analysis, we derived a formula for access delay introducing a self-similar traffic model to prove the effect of the piggyback request. We also show that the piggyback request can greatly affect the access delay under high traffic conditions.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BER (Bit Error Rate) performance according to the FFT input bit resolution in WiBro system WiBro系统中根据FFT输入位分辨率的误码率(BER)性能
Y. Lee, Young-il Kim, Cheol-Hye Cho, W. Ryu, Whan-woo Kim
{"title":"BER (Bit Error Rate) performance according to the FFT input bit resolution in WiBro system","authors":"Y. Lee, Young-il Kim, Cheol-Hye Cho, W. Ryu, Whan-woo Kim","doi":"10.1109/ICTC.2010.5674270","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674270","url":null,"abstract":"This paper finds the optimum input bit size of FFT engine in WiBro system through the uncoded-BER performances of computer simulation.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126271027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design for management software of desktop virtualization solutions 桌面虚拟化解决方案的管理软件设计
Hyung-Jik Lee, Jeunwoo Lee
{"title":"Design for management software of desktop virtualization solutions","authors":"Hyung-Jik Lee, Jeunwoo Lee","doi":"10.1109/ICTC.2010.5674779","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674779","url":null,"abstract":"Desktop virtualization allows IT developments to reduce management and support costs, along with capital expenses for desktop hardware. Therefore, a user uses virtualization services using management tools, but they are not compatible with each other. As a result, t he O VF i s used as t he standard for the virtual machine image in order to provide virtualization solution for companies. Therefore, in this paper, we suggest the management software can generalize a management API and a user interface used in the management tool and can be used even in the virtualization solutions of any companies.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis of cooperative multi-hop transmission protocols 协同多跳传输协议的性能分析
Tran Trung Duy, H. Kong
{"title":"Performance analysis of cooperative multi-hop transmission protocols","authors":"Tran Trung Duy, H. Kong","doi":"10.1109/ICTC.2010.5674819","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674819","url":null,"abstract":"In this paper, we propose and evaluate the performance of two cooperative multi-hop transmission protocols. We derive expressions of packet error rate (PER) and average number of transmissions for the proposed protocols. The Monte-Carlo simulations are presented to verify the theoretical analyses.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125095407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A revised Mint-Route protocol in wireless sensor networks 一种改进的无线传感器网络薄荷路由协议
Min-Jung Baek, Ki-Il Kim, Sunghyun Cho
{"title":"A revised Mint-Route protocol in wireless sensor networks","authors":"Min-Jung Baek, Ki-Il Kim, Sunghyun Cho","doi":"10.1109/ICTC.2010.5674674","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674674","url":null,"abstract":"The Mint-Route routing protocol was proposed to enhance reliability by choosing adjacent link with the smallest number of lost packets as next hop in wireless sensor networks. However, since packets are transmitted over unstable wireless link, physical distance between nodes can mostly affect the reliability. So, long path with many hops is usually established between source and destination while considering current metrics. To solve this problem, we develop a revised Mint-Route protocol by considering the received packet as well as distance together while deciding parent node toward the sink. Simulations and their analysis are followed to validate the suitability of reduced end-to-end delay and enhanced reliability.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The effect of ETX measurement on routing performance in underwater sensor networks ETX测量对水下传感器网络路由性能的影响
Sungwon Lee, Dongseung Shin, Dongkyun Kim
{"title":"The effect of ETX measurement on routing performance in underwater sensor networks","authors":"Sungwon Lee, Dongseung Shin, Dongkyun Kim","doi":"10.1109/ICTC.2010.5674703","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674703","url":null,"abstract":"Communications in underwater wireless sensor networks have a lot of limitations as compared to those in terrestrial sensor networks. In wireless sensor networks, a routing protocol finds a path between the source and sink nodes according to a routing metric. The hop count is the most widely used routing metric, however, it cannot reflect the quality of a link. It is expected that a link quality aware metric such as ETX can contribute to improving the performance, especially in underwater sensor networks (UWSNs). However, the direct adoption of ETX in UWSNs may not provide expected performance. In this paper, we investigate the effect of ETX measurement on the performance in UWSNs through NS-2 simulations.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122464224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal energy management over solar based energy harvesting sensor network 基于太阳能的能量收集传感器网络的最优能量管理
Sungjin Lee, Taewan Kim, Jongrok Park, Sanghoon Lee, Hyukmin Son, Sanghoon Lee
{"title":"Optimal energy management over solar based energy harvesting sensor network","authors":"Sungjin Lee, Taewan Kim, Jongrok Park, Sanghoon Lee, Hyukmin Son, Sanghoon Lee","doi":"10.1109/ICTC.2010.5674794","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674794","url":null,"abstract":"In this paper, we build a framework for maximizing the utilization of solar-based harvesting energy in sensor networks. For this goal, we analyze the required power at each relay node and give the queueing framework for the power management. In the simulation, our proposed algorithm shows a superior performance than conventional ones in terms of the PRR (Packet Reception Rate) for a day according to the recharging efficiency.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Functional architecture for countering IP multimedia spam 对抗IP多媒体垃圾邮件的功能架构
Soyoung Park, Shingak Kang
{"title":"Functional architecture for countering IP multimedia spam","authors":"Soyoung Park, Shingak Kang","doi":"10.1109/ICTC.2010.5674755","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674755","url":null,"abstract":"IP multimedia spam poses a threat to the users of various IP applications as well as email spam and SMS spam does. Considering this circumstances, we suggest functional architecture for countering IP multimedia spam. Specifically, we first propose functional architecture for countering IP multimedia spam. We then describe functionalities and interactions between functional components in the architecture. Finally, considerations for adoption of the anti-spam framework on telecommunications networks are provided.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133366256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信