2009 6th IEEE Consumer Communications and Networking Conference最新文献

筛选
英文 中文
Device Driver Isolation within Virtualized Embedded Platforms 虚拟化嵌入式平台中的设备驱动程序隔离
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784877
Sebastian Sumpf, J. Brakensiek
{"title":"Device Driver Isolation within Virtualized Embedded Platforms","authors":"Sebastian Sumpf, J. Brakensiek","doi":"10.1109/CCNC.2009.4784877","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784877","url":null,"abstract":"Mobile device manufacturers are facing the challenge, to maintain device drivers across an increasing number of product variants. Isolation of device drivers into a separate domain using virtualization technology offers a way out of the resulting porting dilemma. This paper explains the architecture concept based on the L4/Fiasco microkernel, using an exemplary block device. The paper specifically details challenges and solutions with respect to enabling DMA access and ensuring access protection in the virtualized environment. Benchmark results are given to show the performance impact of the chosen architecture.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effects of Mobility in Hierarchical Mobile Ad Hoc Networks 分层移动自组网中移动性的影响
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784895
P. S. Prasad, P. Agrawal, K. Sivalingam
{"title":"Effects of Mobility in Hierarchical Mobile Ad Hoc Networks","authors":"P. S. Prasad, P. Agrawal, K. Sivalingam","doi":"10.1109/CCNC.2009.4784895","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784895","url":null,"abstract":"In this paper, we study the effects of mobility on network parameters in hierarchical ad hoc networks. Several mobility models have been designed and studied to mimic the behavior of real world mobility in networks. They have been successful in modeling the movement of mobile nodes in simulations. However, in this work, we show that several mobility models fall short of extending the same result to hierarchical networks. Most mobility models can only predict the movement of nodes in a single cell or cluster. When mobile nodes start moving into adjacent clusters, the time required for handoff and other protocol overhead issues alter the throughput. This leads to drastic drop in throughput and increased latency in packet delivery. Also, commonly used routing protocols do not adequately support handling high mobility and frequent route discovery issues. We evaluate the performances of various routing protocols and mobility models in a highly mobile hierarchical ad hoc network using NS2 simulation.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127757304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intelligent Pervasive Network Authentication: S/Key Based Device Authentication 智能普适网络认证:基于S/Key的设备认证
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784994
Deok-Gyu Lee, J. Han, Doosoon Park, Imyeong Lee
{"title":"Intelligent Pervasive Network Authentication: S/Key Based Device Authentication","authors":"Deok-Gyu Lee, J. Han, Doosoon Park, Imyeong Lee","doi":"10.1109/CCNC.2009.4784994","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784994","url":null,"abstract":"The intelligent pervasive network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. As a number of pervasive network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect intelligent pervasive environment system from illegal accesses and a variety of threats. Intelligent pervasive environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet. So in this paper, we propose authentication in a intelligent pervasive environment security for guaranteeing reliability and availability including authentication, authorization system. We proposed S/Key based authentication, scheme for secure remote access in intelligent pervasive environments. Furthermore, we describes smart environment authentication which is the basic and essential element in the pervasive network security. And our device authentication concept can offer pervasive network service users convenience and security.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Legal Environment for Copyright Protection and Trust Management in China 中国版权保护的法律环境与信托管理
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784942
Lei Sun, Li Zhao, Xin Tong, W. Carey
{"title":"The Legal Environment for Copyright Protection and Trust Management in China","authors":"Lei Sun, Li Zhao, Xin Tong, W. Carey","doi":"10.1109/CCNC.2009.4784942","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784942","url":null,"abstract":"This paper surveys the legal and regulatory environment surrounding copyright protection technologies, focusing on China in particular. The paper begins with a discussion of some of the interactions between law and technology in copyright protection, which has led to the creation of international treaties to protect the technologies that protect copyrights. A comparison of the various national responses to these conventions is presented, followed by a discussion of the structure and development of the relatively advanced Chinese system for copyright protection technology. The last section outlines some of the unique challenges that have arisen in China for copyright protection technologies and the businesses that depend upon them.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5G Mobile Phone Concept 5G手机概念
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784727
T. Janevski
{"title":"5G Mobile Phone Concept","authors":"T. Janevski","doi":"10.1109/CCNC.2009.4784727","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784727","url":null,"abstract":"Today 3G mobile systems are on the ground providing IP connectivity for real-time and non-real-time services. On the other side, there are many wireless technologies that have proven to be important, with the most important ones being 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), as well as ad-hoc Wireless Personal Area Network (WPAN) and wireless networks for digital TV and radio broadcast. Then, the concepts of 4G is already much discussed and it is almost certain that 4G will include several standards under a common umbrella, similarly to 3G, but with IEEE 802.xx wireless mobile networks included from the beginning. The main contribution of this paper is definition of 5G (Fifth Generation) mobile network concept, which is seen as user-centric concept instead of operator-centric as in 3G or service-centric concept as seen for 4G. In the proposed concept the mobile user is on the top of all. The 5G terminals will have software defined radios and modulation scheme as well as new error-control schemes can be downloaded from the Internet on the run. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. Each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. The paper also proposes intelligent Internet phone concept where the mobile phone can choose the best connections by selected constraints and dynamically change them during a single end-to-end connection. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies, and this concept is called here - the 5G.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
Parallelization and analysis of speech recognition on mobile multi-core processor 移动多核处理器上语音识别的并行化与分析
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784794
Seung Mo Cho, D. Im, H. Song
{"title":"Parallelization and analysis of speech recognition on mobile multi-core processor","authors":"Seung Mo Cho, D. Im, H. Song","doi":"10.1109/CCNC.2009.4784794","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784794","url":null,"abstract":"Speech recognition is an important application which requires large amount of computation and data. We parallelized speech recognition on ARM11-mpcore, one of the mobile multi-core processors. We achieved 1.92 times speed-up using four cores. We argue that this is sufficiently close to the theoretical best regarding Amdahl's law. We also evaluated it on Intel Core2Quad to derive requirements for future mobile multi-core platforms.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132823911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Refresh-Based Tag Identification Schemes 基于刷新的标签识别方案研究
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784992
Jihoon Cho
{"title":"On Refresh-Based Tag Identification Schemes","authors":"Jihoon Cho","doi":"10.1109/CCNC.2009.4784992","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784992","url":null,"abstract":"We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RealClass: An Interactive-Enable Multi-Channel Live Teaching System on Overlay Service Network RealClass:基于覆盖业务网络的交互式多通道实时教学系统
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784999
Weizhan Zhang, Q. Zheng, Yanze Lian, Xingzhuo Liu, Jixin Hou
{"title":"RealClass: An Interactive-Enable Multi-Channel Live Teaching System on Overlay Service Network","authors":"Weizhan Zhang, Q. Zheng, Yanze Lian, Xingzhuo Liu, Jixin Hou","doi":"10.1109/CCNC.2009.4784999","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784999","url":null,"abstract":"In this demonstration, a prototype of live teaching system on overlay service network is presented. The system evolves the following novel characteristics: (1) Firstly, an infrastructure-based overlay multicast structure is introduced, providing multi-channel live media delivery with service differentiation on shared overlay service network. (2) Secondly, the system can support two-way interactive media as well as one-way live media at the same time. The enabling technology is a dynamic user interaction adjustment based on pre-reserved resources in the top layers of the tree. In the demonstration, diversified real-time services will be presented, including audio, video, instant message delivery for multi-channel live teaching scenario, and flexible interactive communication for group discussion.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133445600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasibility of a Socially Aware Authentication Scheme 社会感知认证方案的可行性
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784910
Andrew Frankel, Muthucumaru Maheswaran
{"title":"Feasibility of a Socially Aware Authentication Scheme","authors":"Andrew Frankel, Muthucumaru Maheswaran","doi":"10.1109/CCNC.2009.4784910","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784910","url":null,"abstract":"Social interaction is already a proven component of informal identification: humans are naturally skilled at recognizing other people and are unlikely to be duped by impersonation. Based on this premise, a fourth-factor, someone-you-know, has already been proposed as an emergency authentication method. This paper explores leveraging a user's preexisting social actions as a primary authentication tool, one that operates transparently and automatically without explicit user guidance. Specifically, we describe the feasibility of capturing a user's local social context using short range wireless devices and evaluate the uniqueness of that context in comparison to that of possible aggressors.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
TLS-Tandem: A Smart Card for WEB Applications TLS-Tandem:用于WEB应用程序的智能卡
2009 6th IEEE Consumer Communications and Networking Conference Pub Date : 2009-01-11 DOI: 10.1109/CCNC.2009.4784998
P. Urien
{"title":"TLS-Tandem: A Smart Card for WEB Applications","authors":"P. Urien","doi":"10.1109/CCNC.2009.4784998","DOIUrl":"https://doi.org/10.1109/CCNC.2009.4784998","url":null,"abstract":"This demonstration shows a WEB application offering multimedia contents, whose access is fully controlled by a smart card according to an innovative context, named TLS-Tandem. Credentials required by the WEB site, and used by the smart card (certificates, private keys), are distributed via AJAX facilities.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信