2010 7th IEEE Consumer Communications and Networking Conference最新文献

筛选
英文 中文
Recent Activities in PUCC and Its Application to Integrated Home Network Control and Management PUCC研究进展及其在综合家庭网络控制与管理中的应用
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421775
N. Ishikawa, Takeshi Kato, H. Sumino, Kazuhiro Kitagawa, N. Saito
{"title":"Recent Activities in PUCC and Its Application to Integrated Home Network Control and Management","authors":"N. Ishikawa, Takeshi Kato, H. Sumino, Kazuhiro Kitagawa, N. Saito","doi":"10.1109/CCNC.2010.5421775","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421775","url":null,"abstract":"We have been developing and standardizing middleware technologies for home network control from a mobile phone in Peer-to-peer Universal Computing Consortium (PUCC), which is a consortium towards de facto standardization. We discussed issues for unified home network control from a mobile phone. We describe the peer-to-peer/overlay networking technologies developed by PUCC, to resolve those issues. We describe recent PUCC activities, which include the development of PUCC specifications Release 1, development of prototypes implementing PUCC protocols, demonstrations of such prototypes at international leading tradeshows such as CES and CeBIT, and activities towards international standardization. PUCC started a new project for integrated home network control and management in 2009, based on those activities.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125873661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrating Enterprise Communications into Google Wave 将企业通信集成到Google Wave中
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421674
C. Mohit, Xiaotao Wu, V. Krishnaswamy
{"title":"Integrating Enterprise Communications into Google Wave","authors":"C. Mohit, Xiaotao Wu, V. Krishnaswamy","doi":"10.1109/CCNC.2010.5421674","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421674","url":null,"abstract":"This paper proposes our approach of integrating enterprise telecommunication functions into Google Wave. Our approach can monitor communication events and utilize Google Wave functions to enhance call handling.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving Internet Video Streaming Performance by Parallel TCP-Based Request-Response Streams 基于并行tcp的请求-响应流改进互联网视频流性能
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421815
R. Kuschnig, Ingo Kofler, H. Hellwagner
{"title":"Improving Internet Video Streaming Performance by Parallel TCP-Based Request-Response Streams","authors":"R. Kuschnig, Ingo Kofler, H. Hellwagner","doi":"10.1109/CCNC.2010.5421815","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421815","url":null,"abstract":"TCP-based video streaming encounters difficulties in unreliable networks with unanticipated packet loss. In combination with high round trip times, the effective throughput deteriorates rapidly and TCP connection resets or stalls may occur. In this paper, we propose a client-driven video transmission scheme which utilizes multiple HTTP/TCP streams. The scheme is largely insensitive to unanticipated packet loss and thereby reduces throughput fluctuations. Since it is based on HTTP, the scheme can easily be deployed in existing network infrastructures. It fosters scalability on the server side by shifting complexity from the server to the clients. Certain features of request-response schemes allow maintaining fairness, despite of using multiple HTTP streams. Making use of TCP, the scheme inherently adapts to congested network links.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130606778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
A Pointer Forwarding Scheme for Minimizing Signaling Costs in Proxy Mobile IPv6 Networks 一种移动IPv6代理网络中信令开销最小的指针转发方案
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421570
Myung-Kyu Yi, Jae-Young Choi, Jin-Woo Choi, S. Park, Young-Kyu Yang
{"title":"A Pointer Forwarding Scheme for Minimizing Signaling Costs in Proxy Mobile IPv6 Networks","authors":"Myung-Kyu Yi, Jae-Young Choi, Jin-Woo Choi, S. Park, Young-Kyu Yang","doi":"10.1109/CCNC.2010.5421570","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421570","url":null,"abstract":"Proxy Mobile IPv6(PMIPv6) is a network-based mobility management protocol to support mobility for IPv6 nodes without host involvement. In PMIPv6, the Mobilt, Access Gateway(MAG) incurs a high signaling cost to update the location of a mobile node to the remote local mobility anchor(LMA) if the mobile node moves frequently. This increases network overhead on the LMA, wastes network resources, and lengthens the delay time. Therefore, we propose a new mobility management scheme for minimizing signaling cost using the pointer forwarding. Our proposal can reduce signaling costs by registration with the neighbor MAGs instead of the remote LMA using the pointer forwarding. The cost analysis using imbedded Markov chain presented in this paper shows that our proposal can achieve performance superior that of PMIPv6 scheme.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130733377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital Health Care (DHC) Network and IT Infrastructure Solutions 数字医疗保健(DHC)网络和IT基础设施解决方案
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421720
Wei Liu
{"title":"Digital Health Care (DHC) Network and IT Infrastructure Solutions","authors":"Wei Liu","doi":"10.1109/CCNC.2010.5421720","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421720","url":null,"abstract":"Digital Health Care (DHC) reform suggests a new consumer paradigm in data and information processing: from Electronic Health Record (EHR) ownership to consumption of Personal Health Record (PHR); from distributed access of networked collaborative cares to centralized repository of portable records; from private information retrieval to security access control. All aspects of the new paradigm shall impose new challenges in the underlying consumer healthcare communication and network infrastructure. In this paper, I will introduce the solution utilizing a converged network layer, as well as adopting service-layer interfaces between DHC systems in an end-to-end solution (reference architecture). I also present a solution framework that incorporates service management, handheld on-demand access and consultation, quality-of-service accounting, and end-to-end system interconnection solutions.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Fragile Watermarking Scheme and Its Security Evaluation 一种新的脆弱水印方案及其安全性评价
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421669
H. Kubota, Keiichi Iwamura
{"title":"A New Fragile Watermarking Scheme and Its Security Evaluation","authors":"H. Kubota, Keiichi Iwamura","doi":"10.1109/CCNC.2010.5421669","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421669","url":null,"abstract":"Fragile watermarking is a technology for detecting manipulations in an image, such as the digital signature in cryptography. However, the classification of attacks is not fixed in the security evaluation of existing fragile watermarking schemes, although many schemes have been proposed. In this paper, typical fragile watermarking schemes using a public key cryptosystem are evaluated from the viewpoint of a practical watermarking service. In this evaluation, nine attacks on watermarked images are defined and are classified as: watermarked image attacks, similar to cipher text attacks in cryptography; known original image attacks, similar to known plain text attacks; chosen original image attacks, similar to chosen plain text attacks. We show that the existing schemes are not secure against all attacks and propose a new scheme that is secure against such. attacks and useful for a practical watermarking service.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132267107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Static Channel Width Routeless Routing with Obstacle Avoidance (SCWRROA) Protocol 具有避障(SCWRROA)协议的静态信道宽度无路由
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421668
Mohammad Alotaibi, H. Soliman
{"title":"Static Channel Width Routeless Routing with Obstacle Avoidance (SCWRROA) Protocol","authors":"Mohammad Alotaibi, H. Soliman","doi":"10.1109/CCNC.2010.5421668","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421668","url":null,"abstract":"In this paper, we introduce an obstacle avoidance routeless routing protocol. Our protocol is an extension to our previous routeless protocol SCWRR. It does not require any prior knowledge of destinations' or neighbors' locations. The simulation results show that our protocol is able to avoid obstacles to some extend. Hence, our protocol is amenable to deployment in areas of restricted power-budget and bandwidth, such as the MASNET domain.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Scalability of RTCP-Based Network Tomography for IPTV Services IPTV业务中基于rtcp的网络断层扫描可扩展性研究
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421780
A. Begen, C. Perkins, J. Ott
{"title":"On the Scalability of RTCP-Based Network Tomography for IPTV Services","authors":"A. Begen, C. Perkins, J. Ott","doi":"10.1109/CCNC.2010.5421780","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421780","url":null,"abstract":"Quality of experience (QoE) is an important, and admittedly overloaded, concept for the emerging IPTV services. Service providers are continuously working towards delivering a better TV experience. To this effect, cost-effective and scalable tools are highly desirable for QoE monitoring, diagnostics and reporting. In this paper, we demonstrate that the RTP Control Protocol and its network tomography extensions can satisfy the needs of the providers in collecting and reporting both detailed and summarized information using several numerical examples based on real-life scenarios.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126831729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Evaluation of Multi-Rate Communication in Wireless LANs 无线局域网中多速率通信的性能评价
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421654
Fumie Miki, Daiki Nobayashi, Y. Fukuda, T. Ikenaga
{"title":"Performance Evaluation of Multi-Rate Communication in Wireless LANs","authors":"Fumie Miki, Daiki Nobayashi, Y. Fukuda, T. Ikenaga","doi":"10.1109/CCNC.2010.5421654","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421654","url":null,"abstract":"In IEEE 802.11a/b/g wireless LAN, STAs (Stations) can select an appropriate transmission rate based upon the received signal strength in order to achieve high throughput. In such a multi-rate environment, however, the total throughput is degraded if an AP (access point) is shared by STAs at both high and low transmission rates simultaneously. This problem is identified as the performance anomaly problem in only IEEE 802.11b [1], and we closely examine it under the IEEE 802.11a multi-rate environment. Although earlier studies have assumed that this performance anomaly always occurs, we show that it does not occur under a certain environment. First, we describe the mechanism of the performance anomaly, then illustrate the condition under which the performance anomaly does not occur. Finally, we show, through simulation results, the condition under which a performance anomaly may and may not occur in a multi-rate environment.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Flexible User Profile Management for Context-Aware Ubiquitous Environments 灵活的用户配置文件管理上下文感知无处不在的环境
2010 7th IEEE Consumer Communications and Networking Conference Pub Date : 2010-01-09 DOI: 10.1109/CCNC.2010.5421640
Soraya Ait Chellouche, Julien Arnaud, D. Négru
{"title":"Flexible User Profile Management for Context-Aware Ubiquitous Environments","authors":"Soraya Ait Chellouche, Julien Arnaud, D. Négru","doi":"10.1109/CCNC.2010.5421640","DOIUrl":"https://doi.org/10.1109/CCNC.2010.5421640","url":null,"abstract":"With the important advent of multimedia services and the ubiquity of computing environments, the concept of context-awareness in services access and provisioning is getting crucial. Services, especially the multimedia ones, must perform automatically actions/operations to adapt the delivered content to the user expectations and his environment capabilities, thus ensuring the best quality of experience. To facilitate the adaptation process, we introduce a flexible context-sensitive user profile model that gathers static and dynamic data characterizing the user and his operational context. An efficient framework for managing and delivering the user profile is also proposed. A context-dependent user profile instance is created for each application according to its adaptation process needs. This paper also presents some implementation issues of the developed prototype together with an IPTV streaming use case.","PeriodicalId":172400,"journal":{"name":"2010 7th IEEE Consumer Communications and Networking Conference","volume":"127 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126298197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信