2009 International Conference on Communication Software and Networks最新文献

筛选
英文 中文
Improved Active Queue Management Algorithm for High Performance Networks 高性能网络中改进的主动队列管理算法
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.125
Long Ge, Jinsheng Sun, Zhiquan Wang
{"title":"Improved Active Queue Management Algorithm for High Performance Networks","authors":"Long Ge, Jinsheng Sun, Zhiquan Wang","doi":"10.1109/ICCSN.2009.125","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.125","url":null,"abstract":"On the problem of some Active Queue Management (AQM) algorithms having long time adjustment and being not able to stabilize the queue length to the desired one in dynamic network environment. An improved AQM algorithm for high performance networks based on integral-separated PID and incomplete-derivative PID is proposed. Its performance is evaluated by simulation experiments, which demonstrate that the proposed algorithm is able to speed up the queue convergence and is more robust under various network parameters.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification and Analyses of Business Process Anomalies 业务流程异常的分类与分析
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.154
Gun-Woo Kim, Jeong Hwa Lee, J. Son
{"title":"Classification and Analyses of Business Process Anomalies","authors":"Gun-Woo Kim, Jeong Hwa Lee, J. Son","doi":"10.1109/ICCSN.2009.154","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.154","url":null,"abstract":"Business Process may have unexpected design anomalies in modeling phase. If business process engine executed without anomalies detection, the inappropriate progress will be executed and that will be lead to massive loss of costs and human capitals in organization. To ensure that there is no design anomalies in business process modeling phase and to detect anomalies of predefined actions within modeling tools are important issues in business process management. In this paper, we provide classification and analyses of business process anomalies, which can effectively use to detect or verification in business process modeling phase.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Improved Solution for IPv6 Network Topology Discovery Based on Source Routing Mechanism 基于源路由机制的IPv6网络拓扑发现改进方案
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.116
Zhu Mingming, Lu Junyong
{"title":"An Improved Solution for IPv6 Network Topology Discovery Based on Source Routing Mechanism","authors":"Zhu Mingming, Lu Junyong","doi":"10.1109/ICCSN.2009.116","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.116","url":null,"abstract":"While the source routing mechanism has a unique advantage on enhancing the coverage of IPv6 network topology discovery, it is considered to be inefficient in the current IPv6 network topology discovery technology. Research into the nature of source routing mechanism reveals the fact that the total number of targets to be probed grows rapidly during the progress of topology discovery. This means probing process has to face a huge probing space and this is the main reason for the inefficiency. This paper described how probing space expands, analyzed the reasons why probing space expands, then offered a solution to suppress this fast expansion to improve the efficiency of source routing mechanism. The experiment results showed that the improved solution suppressed more than 65% of the probing space expansion effectively on the premise of not affecting coverage rate.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UBSFQ: An Urgency-Based Start-time Fair Queuing Scheduling 基于紧急度的起始时间公平排队调度
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.69
Liu Wen-bo, Guo Yun-fei, Ma Hai-long, Zhang Fan
{"title":"UBSFQ: An Urgency-Based Start-time Fair Queuing Scheduling","authors":"Liu Wen-bo, Guo Yun-fei, Ma Hai-long, Zhang Fan","doi":"10.1109/ICCSN.2009.69","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.69","url":null,"abstract":"How to provide a broad range of QoS guarantees in a packet network is an important issue. In order to achieve QoS guarantees, good traffic schedulers are indispensable. In this paper, a packet scheduling discipline UBSFQ and its simulation are proposed. According as the implementation and result of our simulations, this scheduling discipline is computational efficient, and can resolve the unstable packet latencies problem, and shares both the bounded-delay and fairness properties of GPS.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114274849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical PI Design by Using Closed-Loop Stability Constraints and H8 Theory for Relativity Rotary Machine 基于闭环稳定性约束和H8理论的相对论旋转机械解析PI设计
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.89
Shuang Liu, B. Liu
{"title":"Analytical PI Design by Using Closed-Loop Stability Constraints and H8 Theory for Relativity Rotary Machine","authors":"Shuang Liu, B. Liu","doi":"10.1109/ICCSN.2009.89","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.89","url":null,"abstract":"In order to suppress the torsional vibration of rotary machine, a PI controller was analytically derived based on stability of the closed-loop system and H∞ mixed sensitivity function. This novel design procedure is adapted to some unstable and critically stable systems, and a single parameter T1 is included in the controller, which can be determined by the disturbance rejection capability and robust stability, at the same time, two performances can arrive at a better compromise by tuning T1. At last, the simulation examples and experiment were provided to show the superiority of the proposed method.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114012339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient and Reliable Routing Scheme for Wireless Sensor Networks 无线传感器网络节能可靠的路由方案
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.101
Muhammad Tariq, Yong Pyo Kim, Jun Hwan Kim, Yong-Jin Park, Eui-Hyun Jung
{"title":"Energy Efficient and Reliable Routing Scheme for Wireless Sensor Networks","authors":"Muhammad Tariq, Yong Pyo Kim, Jun Hwan Kim, Yong-Jin Park, Eui-Hyun Jung","doi":"10.1109/ICCSN.2009.101","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.101","url":null,"abstract":"Energy efficient and reliable data forwarding becomes important if resources are limited such as in Wireless Sensor Networks. Although Directed Diffusion, a data centric routing approach is widely used in Wireless Sensor Networks,it is inefficient in terms of reliability and energy efficiency. In this paper we present a new routing scheme for Wireless Sensor Networks, in which routing is based on Radio-aware Metric, which contains radio information at the Medium Access Control (MAC) layer. In this new routing scheme, data are forwarded to a designated neighbor, instead of flooding exploratory data into the whole network like with Directed Diffusion. Simulation results show that compared to Directed Diffusion, our proposed routing scheme is almost 4.3 times more efficient in terms of energy consumption and 2.6 times more reliable in terms of data delivery. Our work relies on interaction between routing and MAC layers, with the overall goal of achieving energy efficiency and reliability through cross layer optimization.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122613658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Research on Mine Through-Earth Communication System Based on Spectrum Spreading Technology 基于扩频技术的矿井穿地通信系统研究
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.91
Zhang Qinghui, Zhang Donglin
{"title":"Research on Mine Through-Earth Communication System Based on Spectrum Spreading Technology","authors":"Zhang Qinghui, Zhang Donglin","doi":"10.1109/ICCSN.2009.91","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.91","url":null,"abstract":"Based on the analysis on the through-earth communication using the basic principle of information theory, spectrum spreading technology is adopted to solve the problem that the received signal in through-earth communication is weak. And the technology scheme of through-earth communication is designed. Finally the reliability of the scheme is verified by simulation.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on ZigBee Network Routing Based on Nodal Heterogeneity 基于节点异构的ZigBee网络路由研究
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.49
Liu Dan, Qi Hong
{"title":"Study on ZigBee Network Routing Based on Nodal Heterogeneity","authors":"Liu Dan, Qi Hong","doi":"10.1109/ICCSN.2009.49","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.49","url":null,"abstract":"ZigBee is a kind of low rate, low cost and low power technology to be used in cheap, fixed, portable and mobile devices in wireless personal network. In ZigBee mesh network, the routing algorithms about the two kinds of nodes RN+ and RN- have been studied in this paper. With the increasing number of RN- in the total routers, the packet delivery ratios decrease slowly, but the difference is smaller; the routing overheads decrease one by one while the 40% and 60% percentage of RN-, the overhead are 40.2 and 49 respectively; the end to end delay is almost 0.043s with the 40% and 60% percentage of RN-. The results show that the 40% percentage of RN- is more excellent in deciding routing performance.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior 利用API序列和贝叶斯算法检测可疑行为
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.60
Cheng Wang, J. Pang, Rongcai Zhao, Xiaoxian Liu
{"title":"Using API Sequence and Bayes Algorithm to Detect Suspicious Behavior","authors":"Cheng Wang, J. Pang, Rongcai Zhao, Xiaoxian Liu","doi":"10.1109/ICCSN.2009.60","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.60","url":null,"abstract":"Computer viruses have become the main threat of the safety and security of industry. Unfortunately, no mature products of anti-virus can protect computers effectively. This paper presents an approach of virus detection which is based on analysis and distilling of representative behavior characteristic and systemic description of the suspicious behaviors indicated by the sequences of APIs which called under Windows. Based on decompilation analysis, according to the determinant of Bayes Algorithm, and by the validation of abundant sample space, the technique implements the virus detection by suspicious behavior identification.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131537677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Paper Application of Partial Coefficient Update LMS Algorithm to Suppress Narrowband Interference in DSSS System 部分系数更新LMS算法在DSSS系统中窄带干扰抑制中的应用
2009 International Conference on Communication Software and Networks Pub Date : 2009-02-27 DOI: 10.1109/ICCSN.2009.139
Zhangsheng Wang, Ming Lv, B. Tang
{"title":"Paper Application of Partial Coefficient Update LMS Algorithm to Suppress Narrowband Interference in DSSS System","authors":"Zhangsheng Wang, Ming Lv, B. Tang","doi":"10.1109/ICCSN.2009.139","DOIUrl":"https://doi.org/10.1109/ICCSN.2009.139","url":null,"abstract":"Transform Domain LMS is discussed in this paper and a partial coefficient update LMS adaptive algorithm (P-LMS) is proposed to suppress narrowband interference in DSSS system. In the new algorithm, it only updates a portion of the coefficients of the adaptive filter, so it reduces a lot of computation. It is convenient to implement on FPGA/DSP. The algorithm also has faster convergence speed and little steady state error. The algorithm is applied to the DSSS system to suppress narrowband interference system and it works very well. Computer simulation results confirm the theoretical analysis.","PeriodicalId":177679,"journal":{"name":"2009 International Conference on Communication Software and Networks","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信