2010 7th IEEE Consumer Communications and Networking Conference最新文献

筛选
英文 中文
Enabling Inter-PMIPv6-Domain Handover with Traffic Distributors 使用流量分配器使能pmipv6域间切换
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421812
Feng Zhong, C. Yeo, Bu-Sung Lee
{"title":"Enabling Inter-PMIPv6-Domain Handover with Traffic Distributors","authors":"Feng Zhong, C. Yeo, Bu-Sung Lee","doi":"10.1109/CCNC.2010.5421812","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421812","url":null,"abstract":"As a local mobility management protocol, Proxy Mobile IPv6 (PMIPv6) is designed to enable mobile nodes to move in a domain without any involvement in the mobility signalling operation. However, a single domain cannot satisfy mobile nodes' movement requirement. Hence, we propose a solution to enable mobile nodes to move across multiple PMIPv6 domains. We introduce a new network entity called traffic distributor (TD) to manage the inter-domain handover. Through redirecting the traffic to the domain which currently visited by the mobile node, TD can ensure mobile node continue its session even when it moves across domains. We conduct a series of experiments to compare our proposal with Neumann proposal [1] which is another proposal to handle inter-PMIPv6-domain issues. Experimental results show that our proposal is a viable alternative for inter-domain handover, it can outperform Neumann proposal in terms of binding cache entry numbers, transmission delay and handover delay.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Novel Estimation-Based Backoff Algorithm in the IEEE 802.11 Based Wireless Network 基于IEEE 802.11的无线网络中一种新的基于估计的回退算法
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421643
S. Kang, Jaeryong Cha, Jae-Hyun Kim
{"title":"A Novel Estimation-Based Backoff Algorithm in the IEEE 802.11 Based Wireless Network","authors":"S. Kang, Jaeryong Cha, Jae-Hyun Kim","doi":"10.1109/CCNC.2010.5421643","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421643","url":null,"abstract":"This paper proposes a new backoff algorithm to enhance both the delay and the throughput of the Distributed Coordination Function (DCF) in the IEEE 802.11 based wireless networks. The proposed algorithm, which is named as the Estimation-based Backoff Algorithm (EBA), observes the number of the idle slots during the backoff period in order to estimate the number of active nodes in the network. Especially, when the number of nodes or the amount of traffic dramatically varies, the proposed algorithm determines a more appropriate contention window based on the estimation algorithm. This paper evaluates the performance of the proposed EBA by using simulation, and it compares the EBA's performance with other backoff algorithms such as the binary exponential back-off (BEB), the exponential increase exponential decrease (EIED), the exponential increase linear decrease (EILD), the pause count backoff (PCB) and the history based adaptive backoff (HBAB). The simulation results show that the EBA outperforms the other backoff algorithms because it has better adaptability to the network load variation. By comparing the performance of the EBA to that of the BEB, which is defined in the IEEE 802.11, the EBA increases the network throughput by around 25%, and it decreases the mean packet delay by about 50% when the number of nodes is 70.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131183880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Optimal Balancing between Efficiency and Fairness for Resource Management in Cognitive Radio Networks: A Dynamic Game-Theoretic Approach 认知无线网络资源管理效率与公平的最优平衡:一个动态博弈论方法
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421628
Chungang Yang, Jiandond Li, Dan Chen
{"title":"Optimal Balancing between Efficiency and Fairness for Resource Management in Cognitive Radio Networks: A Dynamic Game-Theoretic Approach","authors":"Chungang Yang, Jiandond Li, Dan Chen","doi":"10.1109/CCNC.2010.5421628","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421628","url":null,"abstract":"Efficiency and fairness are the two critical and conflicting criterion indicators to measure radio resource management performance including the power and transmit control in the cognitive context. The best tradeoff is achieved using the dynamic game-theoretical approach in this paper, from the individual rationality and the social fairness perspective. Therefore, a two-step resource management scheme is investigated in the cognitive radio networks context, where the initial allocation focus on the personal efficiency and the second adjustment focus on the social fairness and the overall performance. Both the proposed algorithms during the two-steps scheme are distributed, with the help of the iterative water-filling algorithm and the sub-gradient method. Simulation numerical results tell the performance of the proposed algorithm.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132920396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TV Answers - Using the Wisdom of Crowds to Facilitate Searches with Rich Media Context 电视答案-使用人群的智慧,促进搜索与丰富的媒体背景
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421605
N. Narasimhan, Joseph F. Wodka, P. Wong, V. Vasudevan
{"title":"TV Answers - Using the Wisdom of Crowds to Facilitate Searches with Rich Media Context","authors":"N. Narasimhan, Joseph F. Wodka, P. Wong, V. Vasudevan","doi":"10.1109/CCNC.2010.5421605","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421605","url":null,"abstract":"Television has always been a popular entertainment medium with considerable impact on consumer purchase behaviors. However. unlike mobiles and pes, it has yet to support an explicit search capability that extends beyond simple content navigation. A core reason for this is lack of usable input inteifaces for TV coupled with the dtfJiculty of creating and executing queries based on rich media context, In this paper, we present TV Answers - a system that combines a novel context capture capability (Freeze-Frame) with an intelligent web services mediator (Edge Proxy) to \"crowd-source\" user-generated queries. We describe the design and implementation of an early prototype of TV Answers and highlight the challenges and opportunities presented by such systems. Our goal is to demonstrate the viability of using \"social search\" as a complement to existing algorithm-driven search solutions for rich media consumption.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132921293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CMOS Image Sensor Device for Objective Evaluation of Video Quality in Mass Distribution Networks 面向海量配电网络视频质量客观评价的CMOS图像传感器装置
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421579
M. L. Graciano, A. Romariz, J. C. D. Costa
{"title":"CMOS Image Sensor Device for Objective Evaluation of Video Quality in Mass Distribution Networks","authors":"M. L. Graciano, A. Romariz, J. C. D. Costa","doi":"10.1109/CCNC.2010.5421579","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421579","url":null,"abstract":"This work aims to present a device for the objective evaluation of video quality from the user perspective, in mass content distribution networks. This simple and cost-effective device with an integrated image sensor and an embedded processor intends to be network pervasive while minimizing the network overhead, allowing quality measurements over the network with greater control of the content distribution throughout the video chain, from content producers, distributors and to consumers.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134624186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Behavioral Analysis Engine for Network Traffic 网络流量行为分析引擎
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421828
M. Faezipour, M. Nourani, Sateesh Addepalli
{"title":"A Behavioral Analysis Engine for Network Traffic","authors":"M. Faezipour, M. Nourani, Sateesh Addepalli","doi":"10.1109/CCNC.2010.5421828","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421828","url":null,"abstract":"Network intrusion detection systems continuously monitor the network traffic in order to identify any traces of suspicious activities such as worm, viruses or spam. One attractive technique for identifying potential Internet threats is detecting previously unknown, but common sub-strings that appear very frequently in data packets. In this paper, we propose a novel architectural platform that thoroughly analyzes the network traffic behavior in terms of repetitions to identify potential Internet threats. The main idea is to use a two-phase hashing system and small memory units functioning in parallel to achieve a high-throughput and memory efficient behavioral analysis engine. The system performs behavioral analysis on selected information/user(s) and builds a bell-shaped curve for normal traffic using parallel counters. Our traffic behavioral analysis system has been fully prototyped on Altera Stratix FPGA. Experimental results verify that our system can support line speed of gigabit-rates with very negligible false positive and negative rates.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Development of a System for Sleep Care and Its Applications 睡眠护理系统的开发及其应用
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421569
K. Kameyama, Takuji Suzuki, Kazushige Ouchi, Akihisa Moriya
{"title":"The Development of a System for Sleep Care and Its Applications","authors":"K. Kameyama, Takuji Suzuki, Kazushige Ouchi, Akihisa Moriya","doi":"10.1109/CCNC.2010.5421569","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421569","url":null,"abstract":"This paper describes a new sleep monitoring system for home use. The basic system consists of a wearable physiological sensor and the PC software for analyzing sleep quality from user's wrist motion and heart rate variability. Different from a conventional sleep monitoring device used in a hospital, the sensor is so small and easy-to-use that a normal person can use It at home. This means that the system is useful not only for a sleep specialist who wants to check his/her patient's daily sleep pattern, but also is useful for self-care. The concepts of the tele-care system and the real-time control of electric appliances for creating better sleep environment are also mentioned.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Dynamic and Extensible Middleware for Enhancing Exhibits 一种用于增强展示的动态可扩展中间件
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421602
Walter Rudametkin, Kiev Gama, Lionel Touseau, D. Donsez
{"title":"Towards a Dynamic and Extensible Middleware for Enhancing Exhibits","authors":"Walter Rudametkin, Kiev Gama, Lionel Touseau, D. Donsez","doi":"10.1109/CCNC.2010.5421602","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421602","url":null,"abstract":"Exhibit sites, such as museums and commercial conventions, do not usually allow or motivate visitor interaction with the exhibited items. In this work we present an architecture for providing an augmented experience for exhibits. In our concept, visitors can use wireless handheld devices to scan the identifiers (e.g. RFID tags, 2D barcodes) of exhibit items and receive information about them or trigger events in the surrounding environment. We present a generic middleware which is dynamic, extensible and configurable, and is capable of generating different responses to visitor interactions. Responses can consider the visitor's profile, the exhibit's or visitor's history, administrative preferences, and other information. They include sending events to the visitor's device or to devices surrounding the exhibit. The architecture hides development complexity and takes advantage of various technologies, integrating them into our middleware and our handset application. We also provide administration capabilities, such as reporting and exhibit configuration. Our concept has been implemented and validated in a museum scenario and uses multiple technolugies for communication, unique exhibit identification, and software dynamicity and extensibility.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Behavior Profiling and Analysis in Wireless Home Networks 无线家庭网络中的行为分析
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421571
Kuai Xu, Feng Wang, Bin Wang
{"title":"Behavior Profiling and Analysis in Wireless Home Networks","authors":"Kuai Xu, Feng Wang, Bin Wang","doi":"10.1109/CCNC.2010.5421571","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421571","url":null,"abstract":"In recent years, the low cost of wireless technologies and residential broadband networks have driven the wide deployment of wireless home networks (WHNs). The ubiquitous availability of WHNs enables users the access to the Internet from everywhere within their homes. However, it also opens the doors for the drive-by hackers that exploit open access home networks for Internet connections [1]. Previous work such as [2] and our own measurement studies have shown the existence of a large amount of open or un-encrypted access points in wireless residential networks. For example, our recent measurement experiment finds an average of 35% are open home wireless networks in six residential buildings. At the same time, Internet attackers actively explore vulnerable home computers and turn them into part of botnets for sending spams or launching distributed denial of service (DoS) attacks [3]. The existing wireless access pointers from commercial vendors such as Linksys and Netgear are mostly built with NAT solutions and stateful packet inspection firewalls [4]. These techniques are very useful to filter attacks with known patterns, however they lack the ability to detect novel attacks or existing attacks with new variations. Therefore, it is very important to develop behavior-oriented techniques that do not rely on signatures for detecting such attacks. In this short paper, we present a preliminary design of a behavior profiling system in WHNs for network security monitoring. Figure 1 illustrates a schematic architecture of the behavior profiling system that is deployed in a typical wireless home network. The goals of the proposed behavior profiling system are to i) actively learn the traffic patterns of wireless home networks, ii) detect anomalous behavior from inside networks as well as from the Internet. Based on network traffic patterns for each computer, the system builds baseline behavior profiles, and subsequently detects events of interest through behavior deviations. The contributions of this work are two-fold. First, we propose to build the behavior profiles for each computer in WHNs towards a deep understanding of the traffic patterns in wireless residential networks. Secondly, we present a systematic architecture that aims to detect anomalous behavior through real-time traffic profiling. The reminder of this short paper is organized as follows. Section II presents our behavior profiling methodology that Fig. 1. Behavior profiling system for wireless home networks.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1763 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117343964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Building Social Services 建立社会服务
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421692
N. Klym, M. Montpetit, E. Blain
{"title":"Building Social Services","authors":"N. Klym, M. Montpetit, E. Blain","doi":"10.1109/CCNC.2010.5421692","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421692","url":null,"abstract":"Making a service social means providing a way for users to engage with a product or service as a group. We are specifically interested in groups based on connections that are established using the emerging online social networking tools like Facebook, MySpace, etc. This paper explores the value chain dynamics resulting from the integration of social networks with a given service. The example we will be using in this paper involves social TV applications, with a focus on social discovery. We hypothesize that these mashup social services introduce new control points in a given service's value chain, which complement or compete with existing control points. The paper focuses on the North American experience.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信