2008 IEEE Symposium on Computers and Communications最新文献

筛选
英文 中文
Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networks FZIP (Flooding Zone Initialization Protocol):用于多跳无线网络的高效多媒体扩散
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625729
Tarik Elamsy, R. El-Marakby
{"title":"Flooding Zone Initialization Protocol (FZIP): Enabling efficient multimedia diffusion for multi-hop wireless networks","authors":"Tarik Elamsy, R. El-Marakby","doi":"10.1109/ISCC.2008.4625729","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625729","url":null,"abstract":"Flooding protocols have shown to be failure resilient and robust in transporting data over multi-hop wireless networks, e.g. wireless sensor networks and ad hoc networks. However, flooding protocols are considered to be less efficient in power consumption compared to unicast based protocols. In this paper, we present our Flooding Zone Initialization Protocol (FZIP) which constrains the flooding storm in a carefully selected set of intermediate nodes between the session endpoints. The use of flooding protocols in the constructed zone reduces power expenditure as well as packet loss compared to unrestricted flooding zone. We validate FZIP for diffusing multimedia flows using the NS2 simulator in comparison with flooding without FZIP and using end-to-end UDP. FZIP shows better results in terms of packet delivery and power consumption, especially in large scale multi-hop scenarios with high error rates.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blind MIMO deconvolution of any source distributions via high-order spectra 通过高阶谱对任意源分布进行盲MIMO反卷积
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625691
M. Taoufiki, A. Adib, D. Aboutajdine, S. Biaz
{"title":"Blind MIMO deconvolution of any source distributions via high-order spectra","authors":"M. Taoufiki, A. Adib, D. Aboutajdine, S. Biaz","doi":"10.1109/ISCC.2008.4625691","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625691","url":null,"abstract":"This paper is concerned with blind separation of convolutive mixtures of spatially independent, and temporally possible non linear processes. We consider the MIMO extraction based on the maximization of a contrast function. A new self-styled referenced contrast (RC) function is proposed, which is based on cross-trispectra between the estimated output and a reference signal. Using Parsevals formula, the former criterion yields a new class of time-domain contrast. It presents two main advantages over other more traditional contrasts. Firstly, it concerns the computational cost, and secondly the extension takes into consideration the extraction of the independent sources in the presence of Gaussian sources by making some constraints on the reference signals. There is no comparison with other methods because this is the first technique that deals with this kind of signals in the convolutif mixtures.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification 基于最大互信息准则的纹理特征选择用于卫星图像分类
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625678
M. A. Kerroum, A. Hammouch, D. Aboutajdine, A. Bellaachia
{"title":"Using the maximum Mutual Information criterion to textural Feature Selection for satellite image classification","authors":"M. A. Kerroum, A. Hammouch, D. Aboutajdine, A. Bellaachia","doi":"10.1109/ISCC.2008.4625678","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625678","url":null,"abstract":"This paper presents and evaluates the use of the maximum mutual information criterion to textural feature selection for satellite image classification. Our approach is based on a recent work of Mutual Information Feature Selector Algorithm. The effectiveness of the proposed approach is evaluated on real data. In fact, the textural features are extracted using the cooccurrence matrix from two forest zones of SPOT HRV(XS) image in the region of Rabat, Morocco. The experimental tests of this study prove that the proposed approach gives a better performance for satellite image classification than classical methods such as principal components analysis (PCA) and linear discriminant analysis (LDA). The classifier used in this work is the support vectors machine (SVM).","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Uplink call admission control in multi-services W-CDMA network 多业务W-CDMA网络中的上行呼叫准入控制
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625630
Khalil Ibrahimi, R. E. Azouzi, E. Bouyakhf
{"title":"Uplink call admission control in multi-services W-CDMA network","authors":"Khalil Ibrahimi, R. E. Azouzi, E. Bouyakhf","doi":"10.1109/ISCC.2008.4625630","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625630","url":null,"abstract":"The capacity of CDMA wireless network is usually studied considering two classes of services: real-time and best-effort. In this paper, we are interested in analyzing sharing between three classes of services: real-time (RT), non-real-time (NRT) and best-effort (BE). A classical approach which is widely used in wireless networks is based on adaptively deciding how many channels to allocate to calls of a given class. The rational behind our idea is that the NRT class (e.g. FTP) requires a minimum transmission rate. The capacity allocated to NRT traffic includes a fixed portion of bandwidth as well as a dynamic part which is shared with RT service. In contrast, BE applications can adapt their transmission rate to the networkpsilas available resources. Hence, the best-effort applications can use only the unused resources of the NRT band. Using a spectral analysis approach, we compute the steady-state distribution of the calls number for those different classes which allows us to provide explicitly the performance measure. The QoS parameters of interest are primarily the blocking probability for both RT calls and NRT calls, and expected sojourn times for both NRT calls and BE calls. We finally provide numerical study to show the benefit of our capacity allocation method by providing a desired quality level of service for NRT services, and we propose some CAC policies for NRT and BE services.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122062475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A robust digital image watermarking method using Dual Tree Complex Wavelet Transform 基于对偶树复小波变换的鲁棒数字图像水印方法
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625651
S. Mabtoul, E. I. Elhaj, D. Aboutajdine
{"title":"A robust digital image watermarking method using Dual Tree Complex Wavelet Transform","authors":"S. Mabtoul, E. I. Elhaj, D. Aboutajdine","doi":"10.1109/ISCC.2008.4625651","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625651","url":null,"abstract":"In this paper, a robust watermarking scheme based on Dual Tree Complex Wavelet Transform (DT-CWT) is proposed. The embedded watermark image is preprocessed with a random location matrix. The original image is transformed in the complex wavelet domain by using DT-CWT, then, according to the characteristics of the image data, the preprocessed watermark image is adaptively spread spectrum and added into the host image DT-CWT coefficients. The watermark detection process is accomplished without referring to the original image. Simulation results are presented to demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117074443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications 实时应用中基于蓝牙的无线局域网切换管理的缺陷和权衡
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625664
L. Oliveira, K. Gorgônio, A. Perkusich, Leandro Dias da Silva
{"title":"Pitfalls and tradeoffs on dealing with handoff management in bluetooth-based WPANs for real-time applications","authors":"L. Oliveira, K. Gorgônio, A. Perkusich, Leandro Dias da Silva","doi":"10.1109/ISCC.2008.4625664","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625664","url":null,"abstract":"In this work, the problems and respective solutions for dealing with two of the most basic questions regarding handoff management are presented: to avoid total loss of connectivity; and to reduce overall time of the handoff procedure. The focus of this research is on handoff in WPANs for real-time applications. Therefore, Bluetooth stands out as the ideal technology for case study due to its particular alignment with the behavior and requirements of the WPANpsilas network model. Bluetoothpsilas inquiry and paging operations may be calibrated for achieving fast discoveries and connections while scatternets may be used to avoid total loss of connectivity. However, the usage of scatternets and calibration of inquiry and paging unveil a series of challenging aspects when applied along with real-time applications. Such challenges are the priority of inquiry and paging data traffic over userspsila applications and unpredictability of scatternet behavior. The key point to overwhelm these difficulties is to understand how they affect the real-time data transfers. In this article a set of discussions and experiments that demonstrate how inquiries, pagings and scatternets can aid achieving the goals of fast and uninterrupted handoffs, as well as the tenuous traps and tradeoffs behind such operations and configurations over real-time applications performance are presented.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117093343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Quality-of-Service routing of best constrained shortest paths. 最佳约束最短路径的分布式服务质量路由。
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625670
A. Mellouk, S. Hoceini, F. Baguenine, M. Cheurfa
{"title":"Distributed Quality-of-Service routing of best constrained shortest paths.","authors":"A. Mellouk, S. Hoceini, F. Baguenine, M. Cheurfa","doi":"10.1109/ISCC.2008.4625670","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625670","url":null,"abstract":"High speed modern communication networks are required to integrate and support multimedia application which requires differentiated quality-of-service (QoS) guarantees. Routing mechanism is a key to success of future communication networking. However, it is often complicated by the notion of guaranteed QoS, which can either be related to time, cost, packet loss or bandwidth requirements. Communication network requires that as the load levels, traffic patterns and topology of the network change, the routing policy also adapts. In this paper, we present a QoS based routing to construct dynamic state-dependent routing policies. The proposed algorithm used a reinforcement learning paradigm to optimize two QoS criteria: cumulative cost path based on hop count and end-to-end delay. Multiple paths are searched in parallel to find the N best qualified ones. In order to improve the overall network performance, a load balancing policy is defined and depends on a dynamical traffic path probability distribution function. The performance of our algorithm for different levels of trafficpsilas load is compared experimentally with standard optimal path routing algorithms for the same problem.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reliable synchronous transport protocol for wireless image sensor networks 无线图像传感器网络的可靠同步传输协议
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625679
A. Boukerche, Yan Du, Jingwen Feng, R. Pazzi
{"title":"A reliable synchronous transport protocol for wireless image sensor networks","authors":"A. Boukerche, Yan Du, Jingwen Feng, R. Pazzi","doi":"10.1109/ISCC.2008.4625679","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625679","url":null,"abstract":"Recent advances in image sensing hardware have enabled the development of wireless image sensor networks. Similar to generic wireless sensor networks that collect information from surrounding physical environments as scalar variables, wireless image sensor networks can collect data to generate descriptions of interested targets as images or video streams that, in turn, enhance the userpsilas understanding. However, relaying images over wireless image sensor networks with certain QoS requirements is a challenging task due to the characteristics of wireless channels. In this paper, a novel transport protocol for wireless image sensor networks is presented. This protocol aims at the reliable and synchronous transmission of images from multiple sensor nodes to a sync point. The semantics of JPEG stream are exploited in order to improve the performance of the proposed protocol. We have conducted a series of simulation experiments and reported on their results. Our simulation results show that the proposed protocol performs well in error-prone wireless channels even under high packet loss rates.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"82 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120895407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
End-to-end shared restoration algorithms in multi-domain mesh networks 多域网状网络的端到端共享恢复算法
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625731
Zhiying Gao, H. Naser
{"title":"End-to-end shared restoration algorithms in multi-domain mesh networks","authors":"Zhiying Gao, H. Naser","doi":"10.1109/ISCC.2008.4625731","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625731","url":null,"abstract":"This paper presents two distributed end-to-end shared restoration algorithms in a multi-domain network environment. While the first proposed algorithm yields a pair of ldquolink-disjointedrdquo paths between any given pair of nodes in the network, the second algorithm computes a pair of ldquodomain-disjointedrdquo paths. To address the problem of limited information exchange among the domains, the multi-domain network is topologically aggregated as a single-domain network, called virtual path network, in which each domain is abstracted by its border nodes interconnected by point-to-point virtual paths. The performance of both algorithms are evaluated and compared through simulation experiments.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116511091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A sybilproof distributed identity management for P2P networks 面向P2P网络的无符号分布式身份管理
2008 IEEE Symposium on Computers and Communications Pub Date : 2008-07-06 DOI: 10.1109/ISCC.2008.4625694
François Lesueur, L. Mé, Valérie Viet Triem Tong
{"title":"A sybilproof distributed identity management for P2P networks","authors":"François Lesueur, L. Mé, Valérie Viet Triem Tong","doi":"10.1109/ISCC.2008.4625694","DOIUrl":"https://doi.org/10.1109/ISCC.2008.4625694","url":null,"abstract":"Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in order to disrupt availability or integrity in the P2P network. In order to circumvent this attack, one person should be able to obtain only a limited set of identifiers and should not be able to choose them. Moreover, due to the distributed architecture of P2P networks, this limitation should not be managed by a centralized system. In this paper, we propose such a sybilproof distributed identity management system which is based on invitations, and thus rely on social relationships between users.","PeriodicalId":156879,"journal":{"name":"2008 IEEE Symposium on Computers and Communications","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书